text
stringlengths 16k
189k
| timestamp
stringlengths 20
20
| url
stringlengths 15
841
|
---|---|---|
We are pleased that you have expressed interest in our innovative trucking insurance program. We invite you to review the following summary of our target market, mission and operating philosophies, key program components and contact us with any questions. Whether you are a large motor carrier or a retail broker representative of a large motor carrier, we look forward to working with you to improve your commercial auto liability insurance program.
American Trucking and Transportation Insurance Company, a Risk Retention Group was formed in 2002 after a large contingency of large motor carriers urged us to develop an innovative approach to providing commercial auto liability insurance. This group desired to create a strategic alliance of top safety-minded motor carriers to return more control of every aspect of their insurance program back to the motor carriers. ATTIC, RRG has created a group of risk retention program that provides access to high primary limits, with large deductible options without the burdensome collateral requirements, superior claims management services and group safety incentive programs that have created a valuable investment and a stable insurance program for each motor carrier member.
The mission of ATTIC, RRG is to provide its members/insureds with superior insurance products and services designed to improve the long-term stability of their insurance programs through competitive pricing, claims management and risk control; and to provide a foundation to capitalize upon the synergy of the group and member expertise to strengthen each member/owner individually.
High standards of safety and compliance are the foundation of ATTIC, RRG’s ability to provide long-term success and stability.
The success of the risk retention group and its individual motor members is including only motor carriers who meet the high standards of the group and continually strive to improve their safety and loss performance.
Motor carrier member involvement in ATTIC, RRG is critical. To facilitate this involvement ATTIC, RRG has built a governance process that establishes adequate opportunity for each member to provide input in the goals and objectives of the organization.
ATTIC, RRG communicates with its members and outside vendors in a fully transparent, concise, timely and professional manner.
ATTIC, RRG strives to be proactive rather than reactive in all aspects of operation, thus staying “ahead of the curve” and developing innovative products and services to add to the strength of our motor carrier members and enable us to become the industry leader in transportation specific insurance practices.
ATTIC, RRG at all times maintain the highest level of confidentiality in all aspects of operation. Of special emphasis, will be maintaining the confidences of each motor carrier member while maximizing their involvement.
In the true spirit of alternative risk solutions, ATTIC, RRG thinks outside the traditional realm of expectations to develop visionary solutions and cement long-term stability and success.
ATTIC, RRG’s membership selection and underwriting process is designed to thoroughly evaluate the risk associated with the addition of any prospective motor carrier member. We believe one of the foundations of our success is the selectivity of its membership which is formed by the collective strength our motor carrier members’ safety and risk management programs. To determine the strengths and identify areas of possible weakness and improvement, ATTIC, RRG conducts an on-site safety and risk assessment audit of any prospective motor carrier member generating a Motor Carrier Operational Characteristics and Safety and Risk Management Report. This report provides an understanding of any prospective motor carrier’s operational, safety and risk management program for use in underwriting and membership selection. In addition, the report creates a baseline to be used to annually assess the performance of our all of ATTIC, RRG’s members. The report provides a detailed summary of the operational characteristics and safety and risk management controls within each motor carrier and create goals for improvement by our member companies.
Through its relationship with Pinnacle Actuarial Resources, Inc., ATTIC, RRG utilizes the individual loss and claims expense history of each motor carrier member or prospective member to actuarially determine the level of premium for each policy. The individual motor carrier member’s loss history data is trended both at the frequency level and severity level, then compared to the overall experience of the group, to determine how much premium is necessary to cover the expected loss, expense and underwriting cost for the member’s policy. The rating process is designed to establish a premium sufficient to administrate and pay for the member’s expected ultimate losses with credits provided for losses expected within its large deductible and for investment income earned on the premium.
Beyond meeting the Target Market qualifications, to begin the preliminary rating process a prospective motor carrier must provide at least five years of ground-up loss and claims expense history and corresponding mileage exposure reports.
ATTIC, RRG offers commercial auto liability, brokerage operations, and contingent auto liability for brokered loads coverage with per occurrence limits up to $10,000,000 with deductible options between $50,000 and $350,000. In addition, ATTIC, RRG offers cargo liability with per occurrence limits up to $500,000 also with deductible options between $50,000 and $350,000.
ATTIC, RRG is a deductible program providing its members with several options in size of deductible and type of deductible. Rates can be developed for deductible programs of $50K through $350K per occurrence and either by coverage line or as a basket deductible.
Under the capital investment structure, each motor carrier member must maintain an equity position within ATTIC, RRG at least 125% of its reserved bodily injury claims below its retention. If a members’ capital position drops below 125% of its reserved bodily claims below its retention, the member will be required to provide collateral through several available options. By using the capital investment as our member’s deductible collateral, it reduces burdensome letters of credit to secure high deductible programs.
Each motor carrier insured is also a shareholder (also referred to as a “member”) of ATTIC, RRG. The amount of capital investment of each member depends upon the amount of the member’s initial policy premium.
In order to establish financial strength, ATTIC, RRG maintains a minimum 2-to-1 net written premium to capital ratio. Net written premium is the potion of each motor carrier insured’s total premium that is retained by ATTIC, RRG to cover the loss exposure for losses which ATTIC, RRG retains, all claims adjustment costs and operational costs. ATTIC, RRG retains the loss exposure for each loss below $500,000 (less the member’s retention) plus participation in certain reinsurance layers. If a prospective motor carrier member’s expected annual losses within its deductible exceed the 2-to-1 net written to capital ratio, additional capital investment may be required at the initial renewal. By way of example, if ATTIC, RRG retains $1,200,000 of ABC Trucking Company’s total premium, ABC’s one-time capital investment will be a minimum $600,000, unless ABC’s total losses expected below its deductible exceed this amount requiring an additional up-front investment. This cash investment results in shareholder status on the motor carrier insured’s renewal date. The capital investment is a one-time investment in ATTIC, RRG to meet the required regulatory capitalization and create the equity in ATTIC, RRG necessary to secure the long-term stability of ATTIC, RRG.
ATTIC, RRG is a corporation existing under the laws of the State of Montana and operates as a captive risk retention group insurer. The shareholders are the individual motor carrier insureds. Percentage of share ownership depends upon the motor carrier member’s initial premium and any subsequent investments made with the Company. At each motor carrier member’s initial renewal with ATTIC, RRG it is required to execute a subscription agreement creating their obligation to become an insured with ATTIC, RRG and establishing their capital investment requirement. In addition, each shareholder is required to execute a counterpart of the shareholders’ agreement setting forth their rights and obligations as a shareholder in ATTIC, RRG. The initial investment by all motor carrier members is contractually obligated to the benefit of ATTIC, RRG for a period of five years ATTIC, RRG has adopted corporate bylaws which establish a governing board of directors. Each shareholder insured is entitled to one board representative seat. The Board is supported by an executive, audit, investment and personnel committee.
ATTIC, RRG is an insurer “NR” Rated through A.M. Best. This means that ATTIC, RRG has not sought a rating from A.M. Best. Despite this rating status, the certificates of insurance issued by ATTIC, RRG have been universally accepted by all of our members’ shipping customers worldwide. Historically, ATTIC, RRG has answered the concerns of a very small number of shipping customers annually regarding the “NR” rating. When we receive such inquiries, we respond by explaining that the commercial auto liability policy is fully reinsured by A-rated reinsurance companies for all losses above $500,000. Supporting the total limits on all policies, ATTIC, RRG has transferred the risks of all catastrophic loss potentials to “A” rated reinsurance companies. ATTIC, RRG maintains three layers of reinsurance – $500,000 excess of the first $500,000 (Layer One), $4,000,000 excess of the first $1,000,000 (Layer Two) and $5,000,000 excess of the lower $5,000,000 (Layer Three). This provides customers with the comfort of knowing the large claims are ultimately paid by large A rated reinsurance companies. As a fail-safe response to our “NR” rating, ATTIC, RRG has created a relationship with an A-rated insurer to access their admitted paper on a specific location endorsement basis. What this means is that our motor carriers will have access to A-rated issuance paper if we cannot gain acceptance of the ATTIC, RRG certificate of insurance as explained above. In those cases, we will issue a separate policy for the specific vendor at their identified location covering trucks used to service the account. Currently, no member is using this endorsement.
The mission of ATTIC, RRG’s claims department is to provide industry leading claims services, always seeking the best possible result in every claim, period. We operate as an extension of our members’ risk management teams ever mindful that we must constantly be vigilant stewards of their resources. We work from the point of view that the best results are achieved collaboratively and that in the claims business surprises are best avoided.
No two members are alike, which is why when a motor carrier decides to place their liability insurance with ATTIC, RRG, we work hand-in-hand to design a bespoke claims management program that takes into account the unique needs our members, their size, their existing claims management resources, and their risk tolerance.
One major advantage of joining ATTIC, RRG is that membership provides motor carriers access to a sophisticated claims operation usually only available to the largest companies.
ATTIC, RRG’s defense panel is made up of lawyers who are trucking specialists, capable of defending the most complicated claims through trial if necessary. Many of our panel counsel are lawyers with a national reputation; they are always highly respected in the jurisdictions in which they practice. They all have specialized experience in the trucking industry.
ATTIC, RRG has a nationwide network of independent adjusters, accident constructionists, private investigators, and other consultants capable of responding to accidents wherever they occur, day or night.
In addition to the management of third-party liability claims, ATTIC, RRG deploys its claims expertise to recovering damages on behalf of our motor carrier members when their equipment is damaged through the fault of another. Like our liability claims program, ATTIC, RRG’s recovery and subrogation program can be customized to meet the needs of individual members, and relies on the same team of highly qualified adjusters and consultants that support our liability program.
Beginning in 2015, ATTIC, RRG has made a financial commitment to partner with the most leading-edge safety enhancement technologies available in the industry today. This investment is made with the dual purpose of improving the accident performance of each of our motor carrier members within their large deductibles and to reduce claim severity and claims defense costs incurred by ATTIC, RRG. ATTIC, RRG currently makes direct payments to support technology programs including dash cam video technology through DriveCam, SmartDrive, and Seeing Machine, as well as speed management technology through Speed Gauge.
ATTIC, RRG strives to provide greater consultation services to our motor carrier members through on-site targeted reviews of all aspects of the member’s driver safety and risk management programs. ATTIC, RRG facilitates on-site mock DOT audits and works closely with each member to hire and train qualified motor carrier safety personnel. In addition, ATTIC, RRG utilizes its resources to support further educational training through our annual Member Safety Conference and member safety and risk personnel certification programs.
ATTIC, RRG’s Member Services team takes pride in their commitment to provide prompt, accurate, reliable and courteous service to our member motor carriers. The member services team facilitates a single point of contact for questions and concerns for our member motor carriers, facilitates a single point of contact for issuance of Certificates of Insurance and provides periodic training on claims reporting software programs.
A key focus of our Member Services and IT team is the integration of key analytics generated by each of our members as well as the analytics of the group. This information will provide a predictive analysis of your motor carrier and will help the Safety and Risk team focus on future loss trends based on historic data.
This data, when used by your Safety Team, will allow for focused intervention training and remedial training into the areas of your organization where needed. This will bring about results which will be seen on your loss reports and associated claims cost. Historically, safety teams are working either from a reactive or inventory stance. With this assistance, the team will be able to focus on the issues and move into a proactive approach to safety.
Since moving to Origami Risk (Risk Management Software), ATTIC, RRG has added abilities to collect and utilize accident data, driver demographics, and other data points. Additional data can also be requested and adjusted by each member. Origami Risk is an integrated platform of products that includes RMIS, Claims, Safety, Analytics, Underwriting, and Data Tools. It allows you to effortlessly integrate workflows, aggregate your data across disciplines, easily analyze it, and automatically act on insights from a single system. Origami Risk makes data analysis straightforward and fast with tools to standardize data from disparate sources for like-comparisons; simplify data in a visual format so it’s easy to understand; and automatically generate and distribute recurring or ad-hoc reports to meet stakeholder preferences. Origami’s analytics functionality is central to the system’s risk management, claims administration, safety management, and underwriting capabilities.
Since its inception, ATTIC, RRG has accumulated invested assets exceeding $25 million. The Company is regulated as a typical insurance company in the size and type of investments it can maintain. ATTIC, RRG earns enough investment income to cover a significant portion of its operating expenses reducing members’ premiums through expected investment income credit.
Advance Structure Risk Services. Located out of Dallas, TX, Advance Structure President David Cauble leads ATTIC, RRG’s business development program marketing the risk retention program to our selective target market.
Actuarial Services. ATTIC, RRG contracts with Pinnacle Actuarial Resources of Bloomington, IL to provide actuarial analysis of loss data and financial performance. Pinnacle Actuarial specializes in trucking insurance programs, including individual and group captive entities.
Independent Audit and Tax Preparation Services. Larson & Company, of Salt Lake City, Utah was retained beginning with the December 31, 2016 audit and tax year. Larson & Company has many years of alternative risk insurance auditing and tax preparation work.
AON Benfield. AON Benfield of Chicago, IL and London, UK serves as ATTIC, RRG’s reinsurance broker and consultant. AON Benfield is the worldwide leader in the reinsurance industry and is well versed in the reinsurance needs of captive insurance companies.
D.A. Davidson & Co. and Stockman Wealth Management, Inc. ATTIC, RRG utilizes the investment expertise and management of two nationally recognized investment management firms.
ATTIC, RRG completed an actuarial analysis and financial feasibility study in order to determine manual rates for the charter group members and individual rate indications based on each of the company’s five-year loss history. The rating plan was approved by the Board of Directors and has been submitted and accepted by the State of Montana and the reinsurance market. Each new member’s rates will be determined through actuarial analysis of the member’s five-year loss history. The loss history data is trended and developed by ATTIC, RRG’s actuarial firm. The rating development is designed to establish a premium sufficient to administrate and pay for the member’s expected ultimate losses with credits provided for losses expected within a deductible layer and for investment income earned on the premium.
Since its inception ATTIC, RRG has accumulated invested assets exceeding $28 million. The Company is regulated as any admitted insurance company in the size and type of investments it can maintain.
ATTIC, RRG maintains relationships with two investment managers specializing in insurance company investment strategies and compliance.
A key focus of our Member Service Group and IT is the integration of key analytics generated by each of our members as well as the analytics of the group. This information will provide a predictive analysis of your motor carrier and will help the Safety/Risk team focus on future loss trends based on historic data.
The role of Safety Services at ATTIC, RRG is to provide a high level of consultation in the areas of driver orientation, over-the-road new driver training, and remedial action training.
The goal of Safety Services at ATTIC, RRG is to provide greater consultation services and improved accident analytics to help make positive changes in driver management to result in lower accident frequency and loss costs. | 2019-04-20T17:09:07Z | http://www.atticrrg.com/about-attic/ |
Green Bay Metro offers Paratransit service programs to individuals with qualifying disabilities. Paratransit is a demand response service where the vehicle does not follow a fixed route or schedule.
Some of Green BayMetro’s Paratransit services are provided by a private contractor. The contractor utilizes demand response sedans and lift-equipped vehicles to serve the needs of ambulatory and non-ambulatory riders. The service is shared ride, so riders may share the vehicle with other riders during their trip. The current Paratransit provider is MV Transportation.
The Americans with Disabilities Act (ADA) requires federally funded public transit systems to provide a complementary Paratransit service for individuals with a disability whose condition prevents them from using the fixed route bus service. Green Bay Metro’s core Paratransit service program was established to comply with the ADA.
This document is designed to provide information regarding Green Bay Metro’s ADA Paratransit program. Some of the ADA standards cited in this document do not apply to non-ADA Paratransit programs.
Forms are also available for download on Green Bay Metro’s website. Hearing impaired customers can contact Green Bay Metro through the Wisconsin Telephone relay system line 800-947-3529.
Green Bay Metro determines eligibility upon review of a completed eligibility form containing information regarding the applicant’s functional ability to board, ride, or disembark from Green Bay Metro fixed route buses. Green Bay Metro reserves the right to require a medical professional’s opinion and/or a functional assessment prior to determining eligibility.
The ADA certification may be conditional or unconditional depending on the applicant’s abilities. Green Bay Metro, in accordance with Title III of the Americans with Disabilities Act of 1990, will determine eligibility no later than 21 days after receiving the completed application. This does not include time waiting for requests for more information from the applicant or the applicant’s health care professional.
After the completed eligibility form is received, a Green Bay Metro staff member will call to schedule an in-person interview. Interviews are conducted by appointment. If necessary, transportation to and from the interview will be provided free of charge.
1. A person who cannot navigate the transit system without assistance. This includes an inability to board, ride, or disembark from a fully accessible Green Bay Metro bus.
2. A person who, because of a disability, cannot travel to or from the bus stop due to, for example, distance, terrain, weather, safety, or other obstacles that impede them due to their disability.
All Green Bay Metro buses are equipped with a ramp and other accessible features. All routes are served by accessible buses, so there is no eligibility based on inaccessible vehicles. If there is a mechanical failure of a bus’s accessible features, the vehicle is immediately replaced with a fully functioning spare bus.
1. Unconditional (all trips)-An individual with disabilities that cannot use the fixed route bus system under any circumstance.
2. Conditional or Trip by trip (some trips)-An individual with disabilities that can be reasonably expected to make some trips by bus, but requires Paratransit for trips under certain circumstances (e.g., deep snow or variable health conditions).
3. Temporary Disabilities-An individual with disabilities that cannot use the fix route bus system for a limited period of time.
An appeal process will be available to those individuals wishing to dispute a conditional, certification, denial certification, or service suspension.
3. Green Bay Metro will notify the individual of the Commission’s ruling on the appeal within 10 days. This notification will outline the ruling and supporting reasons.
4. Once the individual has been informed of the Commission’s ruling, the decision will be implemented on the next day of service.
5. All decisions made by the Commission are final.
3. Service is provided at all times that Metro fixed routes operate.
Service is only provided inside the service area as defined by the requirements of the Americans with Disabilities Act (ADA). The area is defined as an area within ¾ of a mile on either side of a fixed route. (Map enclosed).
The basic mode of service for complementary paratransit is demand responsive, origin-to-destination. Door-to-door service is provided.
Basic service: $3 per one-way trip.
Agency fare: $15 per one-way trip.
Riders can pay the driver the exact cost of the one way trip or use a Paratransit ticket. Paratransit tickets can only be purchased at the Green Bay Metro office.
Mail a check payable to Green Bay Metro for the exact amount.
Be sure to include your current address.
Green Bay Metro assumes no responsibility for lost or stolen Paratransit tickets.
Paratransit riders reserve trips by calling the service provider’s dispatch number during business hours of 8 a.m. to 5 p.m. Monday through Friday and 7:15 a.m. to 6 p.m. Saturday. The caller should be prepared to provide the dispatcher the following information: first name; last name; phone number; how they intend to pay the fare; origin address; destination address; accompanying companion(s), if needed; accompanying equipment(e.g., oxygen tank and respirators); ambulatory or non-ambulatory and desired arrival time.
Next day or subscription service is available by contacting the provider’s dispatcher. Trips can be scheduled up to 14 days in advance. The more notice given, the better the chance the requester has of obtaining a desirable pick-up time.
During periods of high demand, it may be necessary for dispatchers to negotiate pick-up times; however, the rider will not be required to schedule a trip more than one hour before or after the desired pick-up time.
Same day call-ins, including unscheduled requests for return trips, might not be accepted. “Will Calls” will only be accepted if a trip has been scheduled. You must have a scheduled pick-up time. A rider can call to request an earlier pick-up time before their scheduled trip, but Green Bay Metro cannot guarantee that the requested pick up time will be accepted. We cannot assure any specific pick-up time.
The ADA prohibits restrictions or priorities based on trip purpose. All trips are served in the order received and as scheduled. For state and federal reporting purposes, riders may be requested to provide the reason for the trip, but will not be denied service based on trip purpose.
There are two types of reservations: advance and subscription. Advance service includes trips scheduled for next day service. Subscription service is defined as trips that are set up for a rider to occur on a regular basis (daily, weekly, monthly).
The rider must demonstrate a pattern of the subscription trips for 30 days prior to subscription service being implemented. Riders must travel to and from the same destination, with similar pickup and drop-off times, at least once a week for 30 days to demonstrate a pattern for subscription service.
Riders are allotted one permanent change per subscription trip to their subscription service. Permanent changes are defined as changes to pickup time, locations, number of companions, and other factors that may affect scheduling. More than one change may result in the subscription being cancelled.
Subscription trips that are cancelled 25% or more within a 30 day period may result in the cancellation of subscription service.
The rider is to be aware that subscription service will be automatically cancelled on all Federal holidays.
If the destination and/or origin address changes, the rider has to cancel their current subscription and a new subscription must be implemented. The rider must demonstrate a pattern of the new subscription as described above.
Subscription service may take up to fourteen (14) calendar days to implement.
Prior to subscription service being established riders must continue to call for a scheduled pick-up time.
Subscription service may be placed on hold for a maximum of 14 days within a rolling 90 day period. The exact same subscription must be implemented, or it will be handle as a new subscription.
Subscriptions which have been inactive for longer than 30 days will be cancelled. The rider is responsible for rebooking inactive subscription trips. If a client rebooks a previously existing subscription after 30 days and the subscription is identical to the original, the 30 day pattern is not required.
Green Bay Metro limits the number of subscriptions riders at 60%. Once the limit is met the rider will be added to a waiting list.
Each trip includes one destination. Brief stops at locations before the scheduled destination will not be allowed. If multiple destinations are needed, each section of the trip must be scheduled separately and the rider must pay a fare for each ride.
All certified clients will receive a Paratransit Identification Card after their application is processed. The card must be kept current and presented to the driver upon boarding the vehicle.
It is the rider’s responsibility to keep the card’s information current. If a rider’s address or name changes, the rider should contact Green Bay Metro to update this information. Clients are required to reapply for ADA certification every three (3) years.
When your pick-up time is scheduled, the vehicle can arrive anytime within a 30-minutes pick-up window, which is defined as fifteen (15) minutes before and fifteen (15) minutes after the scheduled pick-up time. For example, if your appointment is scheduled for 9 a.m., the pick-up window time frame is 8:45 am to 9:15 a.m. It is the rider’s responsibility to be prepared to board the vehicle within the pick-up window.
Once the vehicle arrives in the allotted pick-up time, the driver will wait for up to five (5) minutes for a rider. If the rider is not prepared to board within this five (5) minute period, the trip will be counted as a no-show and the vehicle will be dispatched to another location. It is the rider’s responsibility to be able to clearly see the area where a vehicle would arrive for pick-up. The rider should be prepared to approach the vehicle when it arrives unless driver assistance was requested when the ride was scheduled.
When a rider needs to cancel a trip, the cancellation should occur more than one hour prior to the scheduled pick-up time. A late cancellation (less than 1 hour) is considered a no-show (see the “No-Shows” policy below).
The first no-show: Letter stating date of no-show and a copy of the no-show policy.
The second no-show: Letter stating date of the no-show and a copy of the no-show policy.
The third no-show: Letter stating date of the no-show, a copy of the no-show policy, imposition of a 7-day suspension if applicable and a copy of the Green Bay Metro appeals process.
Any person suspended from service has the right to appeal the decision. ADA Service may continue during the appeals process.
Any individual may, in lieu of a 7-day suspension, have the option to pay a NO-SHOW FEE The cost of the No-Show Fee will be $15 to eliminate one no-show trip. The No-Show Fee must be paid at the office of Green Bay Metro before service is reinstated.
To ensure safety, our rider policy prohibits seriously disruptive behavior, public health threats, and refusal to comply with rules. If the prohibited behavior results from a disability, GBM may require that a personal care attendant ride with the rider to control the prohibited behavior.
One personal care attendant (PCA) per ADA program rider is permitted to ride free.
One companion may accompany a program rider, but must pay the current cost for each one-way trip. Additional companions may ride and pay a fare, if space is available for safe transport. PCA’s and companions must have the same origin and destination as the program rider.
Arrangements for all additional companions must be made at the time of the reservation. Program rider must supply child safety seat for accompanying infants and small children.
Visitors are eligible for 21 days of service in a 365-day period beginning on the first day the service is used by the visitor. For additional days of service, the individual is expected to register under Green Bay Metro’s eligibility procedures.
For individuals who reside outside the Green Bay Metro service jurisdictions, Green Bay Metro shall certify an individual with a disability as a visitor when providing documentation of residence, a statement that because of their disability they are unable to access the fixed route, and, if requested, documentation of disability.
Green Bay Metro shall accept the certification of another transit agency for visitor service.
Individuals from outside the Green Bay Metro service jurisdiction may also self-certify that they are unable to use the fixed route system for visitor service.
Green Bay Metro allows riders to bring medical equipment such as respirators and portable oxygen tanks on board vehicles. Oxygen tanks should remain upright at all times and must be secured to the mobility device or held in an upright position.
Each eligible rider is allowed to carry on up to four (4) carry on. This includes personal belongings and grocery bags.
The purpose of the rider policy is to set guidelines for refusal or suspension of transportation services administered or provided by Green Bay Metro.
This policy applies to circumstances and/or behavior that occurs on Green Bay Metro property, vehicles, or while boarding Green Bay Metro vehicles.
A rider that refuses to comply with posted safety rules or driver instructions may be refused service.
Riders must be able to physically board and alight from the bus. If a rider can not physically board or alight from a bus, the rider will need to acquire the resources needed to overcome their disabling condition, such as, a mobility device and/or personal care attendant.
The vehicle operator has the authority to refuse service on the day of the violation. Violations of these rules will be reviewed by Green Bay Metro staff for further action.
The Transit Director, or his/her designee, is authorized to suspend or refuse the provision of service to riders who: (1) violate Green Bay Metro’s no-show policy; (2) engage in violent, seriously disruptive, or illegal conduct; (3) pose a public health threat; (4) refuse to pay the applicable fare; or (5)refuse to comply with safety rules. The term of the suspension or refusal of service shall depend on the nature and seriousness of the prohibited conduct.
To the extent feasible, the rider shall be notified in writing. The written notification will state the specific basis for the proposed action, the proposed sanction, and the appeal process.
Green Bay Metro is responsible for ensuring Paratransit service performance complies with the Americans with Disabilities Act. Service oversight of the provider is completed through review of monthly trip records, on-site meetings, feedback received through the complaint and comment process, and periodic surveys of riders. In general, the ADA requires Paratransit service provided to riders with disabilities to be comparable to what is provided to riders of the fixed route bus system. Green Bay Metro has developed standards based on regulatory requirements and nationally recognized guidance related to Paratransit service. Below is a list of performance measurable to ADA Paratransit service and established standards within each measure.
A Paratransit vehicle is on-time if the vehicle arrives with a 30 minutes pick-up window. This is defined as fifteen (15) minutes before and fifteen (15) minutes after the scheduled pickup time. Green Bay Metro monitors trip records from all ADA trips to track on-time performance. The goal is for 95% on-time performance. Will-calls trips and other non-ADA trips are not included in this goal. When on-time performance falls below 95%, Green Bay Metro will meet with the contractor to determine factors that impact on-time performance and corrective actions, if needed.
The standard is to minimize call hold times. Our goal is for 95% of calls to be answered within 3 minutes and 99% answered within 5 minutes. Green Bay Metro analyzes this measure by randomly monitoring the provider’s phone access and documenting call hold times. Rider complaints are also used to determine if phone access capacity constraints occurred.
On occasion, Green Bay Metro may conduct a survey of all or a segment of ADA Paratransit riders. Riders may be asked to rate their satisfaction with on-time performance, dispatcher courtesy, driver courtesy, driver sensitivity, vehicle cleanliness, and overall ride quality. The survey also allows riders to write in comments and provides valuable information about customer satisfaction over time. The results are reviewed with the provider to identify areas of improvement and areas of success.
Green Bay Metro’s Paratransit system is prohibited from having any capacity constraints. Trip demand must be adequately served to provide equivalent access when compared to the fix route bus system. Green Bay Metro monitors the following to ensure adequate capacity: trip denials; no-shows; subscription rides; customer complaints; and vehicle used.
ADA Paratransit programs are designed to provide transportation for individuals with disabilities that are unable to board, ride or alight from a bus; or when environmental or architectural barriers prevent a rider with disabilities from getting to or from a bus route stop. When these conditions are not present, riders with disabilities must utilize the fixed route bus routes to meet their mobility needs.
The fixed route bus offers a cost effective and accessible service. By presenting your Paratransit program identification card, you qualify to ride the fixed route buses for free.
Each bus contains accessible features, including: kneeling capability (bus lowers to make the first step easier); a ramp for wheelchair boarding; on-board wheelchair securement areas; and stop announcements by drivers.
Due to the unsafe nature of a rider incapable of negotiating steps to board the vehicle, Green Bay Metro requests such riders utilize the boarding chair (standard wheelchair) to board the vehicle. This recommendation is for the protection of all riders. Should a rider deny this request, he/she shall be asked to sign a release form prior to boarding.
Due to the high center of gravity of scooter-type mobility aids and the recommendation by scooter manufacturers, Green Bay Metro recommends that riders not be seated on the scooter either while the lift or the vehicle is in motion. It is recommended also that riders utilize the boarding chair during these instances. This recommendation is for the safety of the riders. Should a rider deny this request, he/she will be asked to sign a release form prior to boarding.
Each vehicle carries a boarding chair (standard wheelchair) for use by riders that cannot climb the steps to board the vehicle. Riders in scooters or riders whose mobility device does not fit on the lift and are able to transfer without assistance to the boarding chair may also utilize the chair.
Riders can sit in the boarding chair while the lift is in operation. This chair is provided for the safety of the rider.
Green Bay Metro drivers are trained to safely secure wheelchairs. Mobility aide tie-downs are used to secure mobility aides. The vehicles are designed to utilize four (4) straps to secure the mobility device in a forward facing position. All four straps must be secured to the mobility device prior to the vehicle moving. Each vehicle provides seatbelts for all riders. It is required that all riders utilize them for their safety. Green Bay Metro drivers also assist with the use of ramps and securement devices.
Green Bay Metro does not provide assistance when safety to drivers or riders is at risk. When a driver’s or rider’s safety is at risk, Green Bay Metro staff may recommend use of a personal care attendant or Paratransit service for the rider.
Green Bay Metro will provide to its riders, upon request, service materials including maps, applications and policies in an accessible format for disabled riders. If an accessible format is unavailable, Green Bay Metro will accommodate the rider’s request to the best of its ability.
When can I start riding the Paratransit van?
What if I run late at the doctor?
Does the cancellation left on the answering machine count as the time the ride was cancelled? | 2019-04-20T12:45:05Z | https://www.greenbaywi.gov/337/Paratransit-Policy |
The Baltic Sea spa town of Soport, Poland, was this year’s destination for the Tensar Partner Conference.
The event ran for 2 days, Tuesday 19th & Wednesday 20th March, and was an opportunity for TCS to meet with distributors and Tensar’s technical and sales teams from around EMEA (Europe, Middle East & Africa).
TCS Geotechnics have been distributing Tensar TriAx® and Biax since June 2014. It is a partnership that has flourished based on a mutually clear understanding of the UK Geotechnical market.
This was my first Partner Conference with Tensar and accompanying me on the trip were Mark Maloney (Owner / Director ) and Ian Fraser (Technical Director).
Over the two days, we had presentations on various aspects of the Tensar business, including; Energy, Rail, Pavement Optimisation, Walls & Slopes, and New Product Technologies. We were very proud to have Ian Fraser present on behalf of TCS Geotechnics in the discussion of Pavement Optimisation, despite him managing to insert an image of Scotland’s Rugby Union Captain holding the Calcutta Cup!
What was clear from all the presentations – and has always been so – is Tensar’s continual investment in research, testing & development, which is second to none.
In between all of the presentations, there were breakout sessions in what was dubbed ‘The Market Place’. This was a valuable opportunity to liaise with the Tensar Team about their particular field of expertise. As well as the presentations mentioned above, there was a chance to speak to the Marketing Sector, the Ministry of Defence Supply Chain and also Tensar’s Software Team. All of this provided an invaluable opportunity for us to offer input and have a clear understanding of the business direction.
In all, for me personally, it was a wonderful opportunity to see more of what lies behind the products and systems we distribute. I have seen the testing first hand at Tensar Head Office in Blackburn but the ethos is consistent throughout the world. A market leader constantly engaging with its team and its partners to change an ever-growing geotechnical market.
I am very grateful to Chris Buchanan (Director of Marketing and Product Management EH) and Richard Abell (Regional Director – UK & Ireland) for the invitation to Soport and very much look forward to the next event.
The use of recycled polymers in geosynthetics and implications for durability statements made under the European Harmonised Standards and the CPR.
It occurred to me recently that if I didn’t sit on BSI, CEN & ISO technical committees I would be considerably less well informed about geosynthetics standards, changes to those standards and their implications. Consequently, I have decided to occasionally highlight topics which are hopefully of relevance and assistance to those of you who deal with geosynthetics regularly and are not immersed in the world of standardisation. The first topic is the use of recycled polymers in geosynthetics and the implications for durability statements made under the European Harmonised Standards and the associated Construction Products Regulations 2013.
It may seem obvious but please be sure that your Declaration of Performance (DoP) is being made against the EN current standard. The current EN standards for geosynthetics (other than barriers) are dated 2016 (EN 13249 to 13256 & 13265). In the UK the current published geosynthetic barrier standards (EN 13361, 13362, 13491, 13492, 13493) are dated 2018. Please note that there are changes to the requirements from the old to new standards.
Firstly we should clarify that a manufacturers’ own rework material is not classified as recycled for the purposes of the EN standards and therefore this discussion. Rework is material that is waste from the same production process in the same plant in which the product is made, for example, offcuts from the edges of geosynthetic production being shredded and reintroduced. There are limitations on the use of rework material so this should be checked for the polymer and process involved.
The relevant section of the above standards is Annex B – Durability Aspects. In simple terms, for products which offer a CE Marking Declaration of Performance under the EN geosynthetics standards, the inclusion of recycled polymers (Post Industrial Material (PIM) or Post Consumer Material (PCM)) means it is ONLY possible to declare a service life of up to 5 years AND ONLY for non-reinforcing functions. For reinforcing functions where the recycled polymer is included effectively no declaration of service life is possible. In other words, it is not possible to use recycled polymer in a reinforcing product and obtain a CE mark for this product under the EN Harmonised Standards. Furthermore it is not possible to declare a service life of greater than 5 years for ANY geosynthetic product which contains recycled polymer under the current EN Harmonised Standards.
I am sure that a number of you are thinking that’s a disgrace and we should be using more recycled polymer. Whilst in principle I might agree with you, the information above is based on the current rules as they stand and if you want to change those rules then the case needs to be made and evidence presented. It is my understanding that the group responsible for setting these rules, the Durability Working Group (WG5) in CEN TC 189, considered this long and hard and concluded that, in general, manufacturers could not guarantee a sufficient consistency of supply of recycled polymer to ensure reliable durability prediction. We must bear in mind the fact that these products are used in sensitive applications like lining hazardous landfills, supporting roads and railways, constructing bridges and retaining walls etc where failure could lead to loss of life and not just your apples falling through a hole in your shopping bag!
Another point of clarification is that products not covered by the above EN application standards do, and can, use recycled polymer. So, for example, it is common for plastic paviours to use recycled material but these products tend to be made of thick polymer sections, which typically increases their resistance to weathering, and are generally applied in non-critical applications.
Lastly, if you are in the UK and thinking I don’t need to worry because this won’t apply to us after Brexit, think again. It is extremely unlikely that the UK will leave CEN even after Brexit because membership of CEN and the EU are not tied. Norway, Switzerland & Turkey are all members of CEN and are not in the EU.
I hope that this was of some assistance and I would be happy to try to field any questions – or refer you to someone who can!
In our first blog in the series themed ‘Geosynthetics – A Personal Touch’ Joanne Murray mentioned the apprenticeship scheme that TCS participate in. I thought that a blog covering this in a bit more details might be useful to anyone considering this route.
I started on the TCS apprenticeship scheme after my first year at college and I am pleased to say that it has given me an excellent foundation on which to build my growing understanding of the geotechnical products we stock and sell. I have learned about our varied and extensive merchant network customer base and have developed my knowledge of the geosynthetic market.
I started college in 2013 and studied Physical Education, Sociology, Psychology & Business Studies without fully knowing what I wanted to do as a career. I passed all my exams in the first year but felt I wanted to do something within a working environment and to learn on the job whilst practicing the skills I had picked up in my first year in business studies.
So I started the second year looking out for potential apprenticeship opportunities. I didn’t want to rush into anything so I took my time and waited for the right opportunity. After some time came across an advertisement for an apprentice sales advisor at TCS Geotechnics. At the time I had no geotechnical background so the products and services TCS offer was completely new to me but that made the opportunity all the more interesting. I applied for the position, was given an interview and not long after, received an offer. I quickly accepted and started in April 2015.
The scheme at TCS offered me on the job training relating to the products, services and sales techniques utilised by TCS. I also received training on the accounting and CRM software packages and became proficient in all the various transport and logistics portals. TCS also gave me time within the working day to study a level 2 Business Administration NVQ qualification. I completed this course and progressed to Level 3 Business Administration NVQ qualification which I completed in May 2018.
I think there have been many benefits to learning on the job. Not only does it help to focus on the specific products and processes that TCS have in place but it allowed me to start to build up key relationships with my customers and the associated confidence. Responding to enquiries quickly and offering a rapid and informative level of service is one of the key qualities TCS pride themselves on.
The training I have received has allowed me to develop the skills needed to do this and it is clearly very much appreciated based on the positive responses I receive from customers. Converting a quotation into an order always gives me that sense of achievement and motivates me to continue to develop in my role. I have recently started to visit my customers at their branches to further extend and build on those relationships. By representing TCS and meeting the customers face to face, it gives an extra dimension to our growing relationships.
For the future, I want to gain as much experience as I can in the geotechnical industry, as I feel I am yet to even scratch the surface of this dynamic and growing market. This would involve learning more about the specialist geotechnical products that we can offer and also gaining further knowledge of the markets TCS operate in. The natural progression on from this would be for me to take on more of a leadership role at some point in the future.
I am actively involved in mentoring our current apprentice and I enjoy passing on my knowledge, knowing that I was that new starter a couple of years ago and feeling proud of how far I have progressed since.
National Apprenticeship Week (NAW 2019) takes place 4 to 8 March 2019.
Here at TCS Geotechnics & Versa, we have seen huge benefits over the past 10 years of the National Apprenticeship scheme. Many of our staff have gained valuable qualifications and experience going through this process and this week, we take the opportunity to celebrate their achievements and thank them for their continued service.
Lauren Brown – Lauren has completed her NVQ Level 2 in Business Administration and is currently working towards her Level 3. Lauren currently works in our Administration team.
Megan Mcloughlin – Megan completed her NVQ Level 2 in Business Administration back in April 2016. She currently heads up Versa’s procurement team and also project manages all aspects of manufacture within our street furniture works.
Connor Parkinson – Connor has completed both his Level 2 & Level 3 NVQ in Business Administration. He is an integral member of the TCS Sales Team and has been since joining the business in April 2015.
Dan Cox – Dan recently joined the TCS team back in September 2018 and is working towards his NVQ Level 2 in Business Administration. He currently works in our logistics department liaising with all of the TCS Sales team.
TCS & Versa take great pride in developing apprentices and the most pleasing aspect is to see so many go on to take full time employment.
We look forward to the next intake of apprentices as we move further along in 2019.
Now four months into my new role at TCS Geotechnics and starting a new year, I have been reflecting on how I got to where I am now. To join a company straight from school, when you don’t really know which direction you want your career to take, then to end up staying for 15 years, speaks volumes about that positive experience. Finding your feet and taking your place in an industry you originally knew nothing about was an achievement in itself. Additionally, learning about geotechnics and geosynthetic products has been very interesting and satisfying, particularly as many of these products work in clever and innovative ways giving effective and sustainable results.
To learn on a job and grow and develop as a person within a company is very special. Having the support of geotechnical and civil engineers and other related professionals, plus regular training all the way through my career has been very important to me. Tensar® was my one constant throughout all of my major life events including marriage, buying my first house, two children and university.
When the time came to spread my wings and gain new experience elsewhere the thought of leaving one company after 15 years and going to another was a scary one. However, the beauty of moving to an existing geotechnical distributor of Tensar products, was the familiarity with those products. The opportunity to continue to contribute to the growth and sale of those innovative products and systems but from a different angle. However, the welcome challenge is that I am now dealing with a different set of customers; the merchant network and also a wider new range of geotechnical and geosynthetic products. In addition to Tensar Geogrids, there are new products for me to learn about such as geocellular confinement systems (Techcell), woven geotextiles, invasive weed barriers (Plantex) and gabions to name a few.
The support from suppliers to stock their market leading products such as Tensar TriAx geogrids, Terram Bodpave, Dupont Plantex and Formpave Aquaflow, shows how dedicated we are to supplying only the best products to our customers.
Selling geotechnical and geosynthetic products to the market via the merchant network is an interesting business model built on excellent levels of service and customer relations. Our approach allows us to build trusting relationships with our merchant customers, which is a very important core value to TCS and something that was born out of Mark and Phil’s original experience when working in the merchant sector before they set up TCS 10 years ago.
Following my former Tensar Director, Ian Fraser, to TCS helped me to feel very much at home straight away. From the word go, I settled into TCS as they have a close family-like feel. How many companies can you say the owners/directors work in the same office, joining in with the laughs but, more importantly, the day to day running of the business? Discussions about our business strategy and product ranges take place in an open and inclusive way creating a professional and team-driven environment, reflecting the type of company that TCS is and one that is a pleasure to be involved in.
I am also proud to say that I work for a company that actively supports an apprenticeship scheme helping young school leavers learn on the job and through college placements, to be the future of TCS. I was once that school leaver and the start to my career at a successful company was an extremely important step for me.
We are closely finding ourselves leaving the year of 2018 and heading into a new decade of business for TCS Geotechnics. 2018 marked the tenth year since the start of this ever expanding company, a milestone of achievement from where TCS Geotechnics originally started from.
The vision of the company is still exactly the same today as it was when the business set out 10 years ago. Building long standing relationships with our customers and suppliers and providing great service. We often say we want to be easy to deal with, it’s a simple ethos but, not as simple to deliver. Hopefully this concept has help us create a positive reputation with our customers and suppliers alike.
TCS Geotechnics was founded in September 2008, initially with two employees Mark Maloney and Philip Cox. Between them they have over 50 years working in the construction material industry. The story of TCS began in an small office on Bridgeman Terrace in Wigan. Over the last 10 years the business has grown significantly which now finds us owning our current head office and warehouse facility on Martland Park in Wigan and also a satellite office in Finchhampstead, Berkshire . This investment has been a customer service driven, our ever increasing stock range has enabled us to offer next day delivery nationally on a wide range of Geosynthetic products. The business now employ’s in excess of 30 staff who continue to deliver the simple ethos of being easy to deal with which we believe is the key ingredient to the ongoing success of the business.
Below is a timeline of important events for TCS Geotechincs over the last 10 years.
TCS joins with Tensar to become an official distributor of Tensar TriAx.
The Southern TCS office, situated in Finchampstead is opened and occupied by Ian Fraser.
A membership to join the IGS UK as UK Chapter Sponsor is accepted.
TCS become an official distributor of the Formpave Aquaflow products.
The expansion of the premises began and TCS bought the building next door to the current unit.
TCS gets onboard with Dupont and become an official distributor of Plantex weed and root control products.
In line with so many others this week, TCS Geotechnics want to thank our current and past crop of apprentices who have added so much value to our business. TCS has invested in the National Apprenticeship programme for over 4 years with a high degree of talent now fully employed by the business. The pathway to a great career is clear from the first day and we look forward to our current apprentices being part of our team for many years to come!!!
TCS would like to introduce the newest member of the team, Megan Hall.
Megan joined the business on June 19th 2017 and takes up the position of Sales Administrator. Alongside this, Megan will also be working towards her Level 2 NVQ in Business Admin. This emphasises the continuing commitment TCS has investing in the apprenticeship programme and developing key skills from a young age.
Megan has jumped straight into her role with her aspirations in sight for her progression within TCS. | 2019-04-23T06:04:21Z | https://www.tcs-geotechnics.co.uk/category/news/ |
Being a new parent can be challenging and fearful at times. New parents have to learn the different types of cries their newborns will make, and what needs they need to meet. Is your baby tired, hungry, in pain, sick, or do they need a diaper change? It is common for newborns to develop conditions within the first four to six after bringing them home from the hospital. There are common conditions your newborn may have such as jaundice or colic. Here are some of the common conditions your newborns may have within the first few months after they are born.
A lot of babies have a higher inner core temperature than their parents have. You may think that your baby has a fever when they do not have one. However, it is common for newborns to have some type of infection that will also make them have a fever. If your baby feels warmer than usual, you should check their temperature. If the thermometer reads more than 100.4 degrees, then they have a fever and may be sick. Newborns can have infections passed from the mother at birth, and can get fevers easily at birth if the birthing room is too hot. They can also get colds easily and might have a runny or stuffed up nose.
Diaper rash is also very common for newborns and older babies. Their skin is so sensitive that rashes come very easily to their skin. Wearing diapers for long periods of time is a common trigger for a diaper rash. As a new parent, you also have to find a brand of diapers that does not irritate your baby’s skin. You may have to try different brands and materials used for diapers. If your baby gets diaper rash often you may need to use cloth or chlorine free diapers. Some baby wipes can also cause irritation, and an organic diaper wipe companion can help clear the rash. It is important to use an organic diaper ointment with every changing as well to help prevent a diaper rash.
Skin conditions such as cradle cap, jaundice, thrush, and eczema are very common for newborn babies. Eczema is a dry skin condition that can cause blistering, itchy skin, inflammation, and a reddening of the skin. It is very common for young children and babies. Cradle cap is similar to eczema and it causes the skin on the scalp to become very dry. Both of these skin conditions can be treated with organic eczema oil. Thrush is caused from yeast infections which are commonly caused from moist diapers. Thrush occurs in the mouth and appears with white spots and patches on the tongue and inside the mouth. If your newborn has yellow skin they most likely have jaundice. Your baby needs more sunlight to clear up the yellow tinting of the skin.
If your new baby has any of these common conditions, there is no need to over react or become too scared. If you are treating any of the skin problems, always use organic products. They are safer and more effective for healing. They do not contain any synthetic ingredients that can cause further problems. If your baby is sick or has a fever do not ignore their symptoms. Treat the fever or cold properly to ensure their health. If you are worried the illness is severe or does not heal within 24 hours, contact your doctor.
When you are getting ready to leave your house for a day out, you probably only need to grab your purse or wallet and a sweater or light jacket to be on your way. However, when you have a newborn baby or small child leaving the house is not as easy. A day out or even a short trip to the grocery store requires a little planning and a lot of preparation. It can be helpful to have a diaper bag packed and ready to go at all times to make things a little easier on you when you have to go out. Pack the bag with all the necessities you may need at night, and refill what you have used during the day.
First and most important is to have a diaper bag that fits your needs as the parent. You want a bag that has enough space for your babies’ necessitates, but you also want a bag that is easy to carry. It is also important to have a bag where you can pull items out with ease because there are times in the car when you are desperate for a bottle or a toy to give your baby. Some parents prefer to use a backpack, and others prefer a stylish bag that resembles a purse. Be sure that the bag you choose is big enough for all the items your baby needs.
Babies eat a lot of small meals throughout the day. If your baby is still bottle feeding, you know that you go through a lot of bottles. It is important to have bottles, formula, and water in your diaper bag. If your baby does not drink formula, you may want to have some formula packets in the bag for emergencies. You can also find soy or rice milk in small containers for lunches that you can keep in the bag. Have some bottled baby food in there if your baby is eating solid food. Depending on the age of your baby will depend on what food or snacks you keep in the bag.
Besides the diaper bag being the most important essential, the most necessary item to have in the bag are diapers and diaper changing items. You never know when your baby will need to be changed, and as parents we know that babies can go through ten or more diapers a day. In addition to diapers, you will need wipes, diaper ointment, baby wipe companion, and disposable changing pads. A great tip when you are out is to also have plastic bags in case you are changing a diaper in your car and there is not a trashcan nearby. In case there is a mess or accident, a change of clothes is also very helpful.
You never know when your baby will get cranky or tired. Having comfort items in the diaper bag is another necessity. You can pack a few small stuffed animals or toys that your baby likes to snuggle or play with. Soft blankets are another great comfort item. Depending on the age of your child, you may need to pack pacifiers or teething rings as well. If your child gets a scratch or cut, you should have band aids or some type of first aid materials to comfort their wounds.
An important milestone in your child’s development is potty training, also referred to as toilet training. It is a time when your little baby becomes a big girl or big boy, and they are one step further in their independence. If you are prepared and research tips, facts, and methods on potty training the experience can be less daunting and stressful for you and your child. You should have all your supplies before you start in on the process and teaching, and encourage your child to shop with your for the supplies you need. Here are some potty training tips and list of supplies that you will find helpful as you begin your journey towards potty training.
Although most parents don’t want to spoil their children too much, candy and rewards during the process is very necessary. Also, don’t feel too guilty when you bribe your child with new toys or candy when they use their potty chairs or toilets. Going to the bathroom is a good thing, but you should also teach your child that they won’t get a special treat every time they use the adult bathroom. Candy and toy rewards should be small, and for example you can give one piece of small candy not an entire bag. Giving small rewards and keeping an encouraging attitude will make your child want to be potty trained and they will feel good about themselves too.
Being prepared is the most important tip. You should prepare for the worst and expect the best during potty training. There are going to be accidents because that is an inevitable part of this process. Things you will include diapers, pull up diapers, diaper ointment, underwear, and some type of children’s potty training seat or toilet. You can buy potty chairs or attachments that go on top of your toilet. Some parents like to use a potty chair and then focus potty training using the regular toilet.
You shouldn’t throw out any diapers that you have because you may need to put diapers on your child at night. You should focus on teaching your child the feeling they have when they need to go to the bathroom during the day. A lot of kids are heavy sleepers, so you will still need them to wear diapers at night during the first part of the process. Your child can still get diaper rashes from wearing them at night, so you will still need to use diaper ointment so that rash doesn’t get out of control. You should use pull up diapers or underwear during the day.
As a parent, you will need to practice patience with your child. Potty training can take a lot of time because it is so new for a child. They have to learn where to go the bathroom, how to undress themselves, how to tell their parents when they need to go, and how to control the muscles that control when they go to the bathroom. You will have to teach them how to feel when they need to go and to hold it in until they are properly situated on their potty chair or toilet. There will be accidents and clean ups on a daily basis. Remember to be patient with your child and not to scold them for having an accident. Keep the tone and mood positive and encourage your child often.
There are different signs and symptoms that let a parent know when their child has a diaper rash. It can be a chronic issue that is very uncomfortable and sometimes painful. It should be treated properly and not left ignored. Diaper rash itself can also be a symptom of another underlying problem that your baby may have. Thrush is a form of a yeast infection just like other rashes are. Some rashes are caused by Candida albicans which is a type of yeast. If your baby does have thrush, it is not uncommon that they will also have a rash from their diaper.
There are side effects that thrush causes that will help you determine if your baby has it or not. The symptoms look different from a rash caused by a diaper. Thrush only occurs in the mouth and there will by small white patches on the roof of the mouth, the sides, and on their tongue. Most parents say that it looks like there is milk stuck on their baby’s mouth. Usually newborns develop this type of rash and it’ll occur up to four to six weeks after birth.
Unlike other rashes, thrush can go untreated. It usually doesn’t cause a lot of pain or irritation. If your child does appear to be uncomfortable, you may need to treat it with an antifungal like you do with other rashes such as diaper rash. If there is discomfort, it will usually only be when they are feeding. The rash should clear up within a couple of weeks on its own. If it doesn’t, you may need to consult your doctor about the rash.
Unlike a diaper rash, there is nothing that can be done to prevent thrush from occurring. A rash caused from diapers can be prevented and treated with diaper ointment. Thrush is not as severe as some other types of rashes that cannot be left untreated. If your child does develop thrush, it is more important for you to treat the diaper rash that may also appear because of the Candida albicans. If you are breastfeeding, you also need to watch for thrush to appear on your own body. It can pass from child to mother and vice versa. You can treat thrush on your body with an antifungal.
If your newborn develops these types of rashes, be sure to give them a little extra love and attention. Be sure that the rashes don’t get too severe or bothersome to your baby. Thrush isn’t dangerous to your child’s health but it shouldn’t be ignored either. Treat any rashes that may develop.
Around four to six months your baby will start to have more control of their own bodies. For example, they will have better head control and will start to sit up. At this time, you may also start to notice your baby gaining weight at a steady, healthy rate. You will also see your baby become more curious about foods that you and your family are eating. When you see these changes, you will know they are a sure sign to start your baby on solid foods. Introducing solid foods is an exciting time to learn and educate yourself and your baby about what foods are healthy and what they like or dislike.
Introducing solid foods should be done with caution and care. Your baby is now getting more nutrition and vitamins than milk or formula has to offer. They are also trying new flavors and textures some of which they will like and some they will spit out. As a parent, you also have to be aware of food allergies. It’s really important to record any foods that your baby doesn’t like or experiences food allergies with.
Starting solid foods wills also need to be supplemented with milk or formula (preferably a raw milk formula). You don’t want to drastically make the switch to solids, but gradually work your way to only feeding your baby solid foods. It is best to start at feed your baby once a day with foods that are easy to digest for one meal, and have them bottle feed or nurse the rest of the day. Some good first foods are organic, soft boiled egg yolk from pastured hens, banana, avocado, papaya or mango. Feeding grains at this young age could lead to grain allergies as they get older. As they reach 10 months you can start incorporating more fruits, vegetables, and meats into their diet.
When preparing foods, remember not add any other seasoning or sweeteners. Sugar is very unhealthy for young children, and this also includes honey. Anything with honey or corn syrup can make your child very ill, and should only be introduced into their diets after they are one year old. Fruit juice should be avoided as well, they provide empty calories and may keep your baby from eating more nutrient dense foods. You may start to notice that your baby will start to get really bad diaper rash with the solid food, so be sure to use diaper ointment when you change them.
The introduction of solid foods should be done at a gradual rate. Let your baby get used to using the muscles in their mouths to swallow food. The taste and texture will be new. Also, you should introduce one type of solid food at a time., and then when adding a vegetable or fruit only try one type a day. Introduce bananas one day and peas the next day for example. Your baby will start to develop an interest in certain types of flavors.
Preparing to bring your newborn home can be just as challenging as taking care of your baby. Taking care of your new child involves being prepared for any situation or normal occurrence that will arise. A newborn will need their diapers changed often throughout the day, will need to eat eight to twelve times a day, be changed into new clothes, and will have other needs throughout the day and night. Preparing for your newborn should be done before they are brought home from the hospital. Here are some nursery room essentials you will need to prepare yourself for bringing your baby home.
Decorating the nursery room can be a lot of fun and also educational for your baby. Choose colors or wallpapers with primary colors or soft pastels. You can choose colors that will stimulate your baby or soothe them if it’s a room you plan on using for sleep only. Also, there are certain pieces of furniture that are essential in a nursery. You will need a crib that is safe, sturdy, and reliable. A diaper changing table or a designated area for changing is critical because you will be changing diapers so often. Your baby will also have a lot of toys, blankets, and clothes so organizational pieces such as a dresser or shelves will be very helpful.
Once the decorating and filling the room is complete, you can purchase other items such as bedding, clothes, and toys. Your crib will need blankets, mattress pads, and crib sheets. An essential for safety is having a monitor hung on the side of a crib. To help your baby fall asleep you can buy a mobile that plays music and turns little toys. Your newborn will also need a lot of clothes. They will accidents during the day, and you’ll see that their clothes will get dirty from spit ups. You should have a lot of socks, onesies, soft clothing, and bibs. A newborn doesn’t necessarily need a lot of toys, so you can worry about buying them after they are a few months old.
The diaper changing station will need to be stocked with essential items at all times. You will utilize this area of the nursery a lot because babies need to be changed often. Besides having a lot of diapers on hand, there are other items that will be helpful. If you are using wipes, a wipe warmer is nice because your baby won’t have to be bothered by a cold diaper wipe. You should also have a baby wipe companion because it can help prevent diaper rash. diaper ointment is essential because rashes come often when babies are in diapers.
As your newborn develops a routine and has their own wants and needs, you may need other nursery room essentials. You might need items such as humidifiers, baby swings, a rocking chair, clothes hamper, or sleep soothers. | 2019-04-20T07:02:16Z | https://homesteadcompany.wordpress.com/tag/parenting/ |
2002-07-18 Assigned to EXPANSE NETWORKS, INC. reassignment EXPANSE NETWORKS, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ELDERING, CHARLES A., GILL, KOMLIKA K., FLICKINGER, GREGORY C.
A subscriber selected ad display and scheduling system which allows subscribers to request any one of a plurality of advertisements they wish to view from a library of advertisements stored at the set-top box. Generally, the set-top box stores a plurality of advertisements that have been targeted to the subscriber. Two different embodiments are provided. In one embodiment, the subscriber may view different available advertisements via an advertisement guide, and select one or more advertisements wherein upon selection, the contents of the selected advertisements are immediately displayed at the subscriber display. Alternatively, the subscriber may select one or more advertisements from a list of advertisements with the help of an advertisement guide. In this embodiment, the selected advertisements are scheduled for displays, i.e., as soon as the next avail (advertisement opportunity) is identified, the next selected advertisement is inserted in the avail.
PCT Application PCT/US01/25261, filed on Aug. 10, 2001 entitled “Targeting Ads to Subscribers based on Privacy Protected Subscriber Profiles” (Docket No. T741-10PCT).
By creating ways to allow subscribers to select ads which are potentially of interest the present invention solves the problems associated with the skipping of advertisements in video systems having digital storage capabilities.
FIG. 10 is a functional block diagram illustrating advertisement insertion according to one embodiment of the present invention.
In a typical digital cable network 20, multiple channels of television information are transmitted from a head end or central office 22 via a cable network 23. Particularly, the channels are transmitted via cables 24 to nodes 26. The nodes are essentially switching/routing stations which service multiple homes (usually a few hundred). The nodes 26 route the signals to individual subscribers 28. The individual subscribers will have set-top boxes 27 that select a particular channel from the transmit stream, demodulate it and forward it for display on one or more monitors or televisions (not shown). Upstream information may be sent from the set-top box to the central office via a dedicated upstream channel over the cable. In cable systems that do not support two-way communication, the upstream “channel” can be through the telephone as described above in connection with DBS systems.
In a digital broadcast satellite system, a programming stream comprising upwards of a hundred channels of television programming is delivered directly from a geo-stationary satellite transmitter 12 orbiting the earth to a receiving antenna 14 mounted on or near each subscriber's house and from the antenna via a cable to a satellite receiving station 15 in the subscriber's house 16. The satellite receiving station 15 (which is a form of set-top box) selects a channel and demodulates the signal for delivery to a monitor (e.g., a television, not shown). Most DBS systems are arranged such that data also can be sent in the upstream direction, that is, from the set-top box 15 to the DBS provider. In most DBS systems, the set-top box also is coupled to the telephone line and is designed and programmed to place telephone calls to the DBS service provider to periodically send information in the upstream direction. Such information commonly may comprise requests for Pay-Per-View programs or requests for changes in the subscription (e.g. a request that one or more premium channels be added to the service).
In accordance with a third common type of system, namely, Switched Digital Video (SDV) 30, television programming is transmitted over a telephone type point-to-point network such as a VDSL network. Particularly, television signals are transmitted from a broadband digital terminal (BDT) 31 via wire, typically fiber optic cable 32, to a universal service access multiplexer (USAM) 34 which then delivers the data to multiple individual subscriber households 35 via regular telephone twisted wire pair 36 using VDSL modems and protocols.
The USAM 34 receives a wide bandwidth signal comprising some or all of the television channels. However, because of the bandwidth limitations of twisted pair wire, typically only about one channel of television programming at a time can be delivered from the USAM to the household. Accordingly, the subscriber has a set-top box 38 that is similar in functionality to the set-top box of a digital cable system or DBS system, except that when the subscriber changes channels such as by operating a remote control, the remote channel change signal is received by the STB and transmitted to the USAM 34 which switches the channel for the subscriber and begins sending the newly selected channel to the household. SDV systems are essentially fully modern asynchronous two-way communication networks. Accordingly, the set-top box can transmit information upstream via the same VDSL modem that receives the downstream signals. SDV systems typically operate using an asynchronous transfer mode (ATM) protocol which is well-known in the networking arts. Fiber based networks such as Fiber to the Curb (FTTC) or Fiber to the Home (FTTH) can also be used for SDV.
VoD systems are well known to those skilled in the art and can be implemented on any 1 of the aforementioned networks by utilizing storage (at the STB, head-end, or elsewhere in the network) to allow the subscriber to selectively playback the programming.
FIG. 2 is a block diagram showing the basic components of a typical set-top box 200 within which the present invention may be incorporated, whether it is for DBS, SDV, digital cable or any other system. The set-top box 200 includes an input port 202 for coupling to the input signal, e.g., a coaxial cable in the case of analog or digital cable TV, a telephone line in the case of SDV or an input cable from an antenna in the case of DBS. The television input signal may be analog or digital.
The STB includes a system control unit/processor 204 which controls the operation of the components of the STB. The system control unit/processor 204 essentially is a Central Processing Unit (CPU) and may be any Digital Processing Device, such as a microprocessor, Finite State Machine (FSM), Digital Signal Processor (DSP), Application Specific Integrated Circuit (ASIC), or general purpose computer.
The system control unit/processor 204 receives commands from the subscriber, such as through infrared (IR) reception of commands from a handheld remote control unit (not shown) through an IR receiving circuit 208, decodes the commands and forwards control signals to other circuits in the set-top box 200 in order to carry out the subscriber's commands, such as changing the channel. The STB further includes a read only memory (ROM) 210 containing software and fixed data used for operating the STB, and a random access memory (RAM) 212 for storing changeable data.
The STB may also include a separate internal or external memory device, such as a hard disk drive 214 or optical disk drive for storing the data that comprise digital multimedia data, e.g., television programs and advertisements. Addition of mass storage can result in the STB serving as a Personal Video Recorder (PVR) which has the basic functionality of a Video Cassette Recorder (VCR) along with a host of additional digital based features.
The SCU/processor 204, RAM 212, ROM 210 and hard disk 214 are coupled to a master bus 216 over which the units can communicate with each other.
The input signal from input port 202 is passed through a tuning circuit 218. Under control of the system control unit/processor 204, the tuning circuit selectively parses out the data corresponding to the particular channel selected by the viewer. That data is passed to a demodulator 220 that demodulates the data. A channel processing circuit 222 takes the demodulated channel data and processes it as needed. The necessary channel processing may be very simple or may comprise significant processing of the data depending on the particular form of the input data and the features of the STB. The required channel processing is well understood by those skilled in the art. Exemplary functions that might be performed in the channel processing circuitry include decoding an encoded data stream (e.g., MPEG, Dolby SurroundSound) or inserting advertisements into the data stream in accordance with the present invention.
For the insertion of advertisements, cue tones can be utilized. Digital cue tones are specified in the Society of Cable and Television Engineers (SCTE) DVS- 253 specification and the related DVS-380 messaging specification.
If received data is to be stored locally at the STB, the channel processing circuit can pass the data to one of the memory devices 212 or 214 through the system control unit/processor 204.
An advertisement database 252 can also be coupled to the master bus 216, wherein the advertisement database 252 comprises the targeted advertisements directed at the STB 200 It is to be noted that the targeted advertisements may be pre-loaded in the advertisement database 252 or may be delivered to the STB 200 via various different means (described later in detail). Within the advertisement database, the advertisements may be identified by unique identifiers (AD_IDs).
The output of the channel processing circuit typically is coupled to a demultiplexer 224 which separates the audio and video portions of the channel and forwards them to audio and video output ports 226 and 228, respectively.
Tuning circuit 218 and channel processing circuit 222 may be controlled by the system control unit/processor 204. However, the demodulator and demultiplexer may also need control.
Many STBs also can transmit data upstream to the head end. Such STBs would include a modulator 230 coupled to the system control unit for modulating data generated in the system control unit/processor 204 for transmission to the head end as well as an output port 232 for coupling a cable or other link to the head end. It will be understood by those skilled in the art that the input port 202 and output port 232 might comprise the same physical port.
The system control unit/processor 204 is also coupled to client application module 252 wherein the client application module 250 may be a software module. The client application module 250 is capable of receiving information from the advertisement database 250 and creating an advertisement guide, the advertisement guide presenting a list of available advertisements in a user-friendly graphical interface. The list of advertisements may be provided in a variety of different ways. Some of the exemplary formats are described in detail later.
The present invention supports the targeting of advertisements through a variety of mechanisms including market segmentation techniques. The actual formation of groups for targeted advertising can be accomplished by creating multiple lists or tables (subgroups) of subscribers that share one or more subscriber characteristics. The subgroups may be based on (1) geographic segmentation, (2) demographic segmentation, (3) psychological segmentation, (4) psychographic segmentation, (5) sociocultural segmentation, (6) use-related segmentation, (7) use-situation segmentation, (8) benefit segmentation, and (9) hybrid segmentation. More information may be found in a book entitled Consumer Behavior, by Leon G. Schiffinan and Leslie Lazar Kanuk published by Prentice Hall, New Jersey 1999.
The analysis of different segmentations permit the advertisement to be directed to specific subscribers or groups of subscribers who fit certain criteria. For instance, an advertisement for a baby stroller could reach parents of children under five years old—and only those individuals in that group. Information to place subscribers in the appropriate market segments can be obtained from a variety of public and private sources. Additionally, subscribers may be better understood through their interactions with the television or their purchases (either through the television or through a store). Data from a large number of sources may be mined to form a subgroup of subscribers which has a common characteristic 2 which matches the characteristics of the target group.
FIG. 3 shows several ways in which a high bandwidth ad channel could be transmitted, digitally or in analog form. As shown in FIG. 3, a conventional analog dedicated 6 MHz channel 305 may be used to carry advertisements. Generally, the ad channel in this instance is a 6 MHz digital channel transmitted along with the programming, e.g., ABC (301), NBC (303).
One or more ad channels may be carried within a 6 MHz digital channel. FIG. 3 shows a contiguous sequence of five advertisement channels within a dedicated digital ad channel 307. The digital ad channel 307 may be transmitted along with a digital programming channel 309. Furthermore, multiple digital ad channels may be carried within one 6 MHz digital channel and carried along with the programming (311).
Alternatively, a mixture of analog and digital may be chosen, e.g., an analog channel 313 may be used to carry programming and a digital channel 315 may be used to carry programming as well as the ad channel.
FIGS. 4A-4C illustrate ad channels being sent on low-moderate bandwidth channels, both at constant bit rates and variable bit rates. As shown in FIG. 4A, an example of such low bandwidth channels would be a dedicated channel 401 in which the advertisements are continually sent but at a low bit rate, and ultimately stored as a complete advertisement file on the STB. In FIG. 4A, the time is shown at the X axis, and the bit rate is shown on the Y axis.
Alternatively, one or more advertisements may be delivered at “off-peak” times (i.e., when the overall demand for bandwidth is comparatively low) and may be stored in the memory of the set-top box. In this embodiment, bandwidth usage can be monitored and statistically predicted, either for the entire network, a sub-portion of the network, or an individual subscriber. By anticipating or predicting a period of decreased bandwidth demand (either network-wide or individually), the advertisement delivery would coincide with such decreased demand. Such a scenario would allow operators to conserve bandwidth during “peak” times for other services. In off-peak download, the ad channel can operate at comparatively high bandwidth. FIG. 4C illustrates an off-peak download ad channel 407. It is to be noted that the off-peak download ad channel can be a medium to high bandwidth channel.
The advertisement guide may list the advertisements in a variety of manners. FIG. 5 illustrates an exemplary menu 501 wherein the advertisements are identified by unique identifications (AD_IDs) and their titles. For exemplary purposes, the menu 501 comprises two columns, a first column 503 for AD_ID, and a second column 505 for titles. Different AD_IDs and their corresponding titles are illustrated in the form of different rows 507.
Alternatively, the advertisement guide may list the advertisements via different categories. For illustrative purposes, FIG. 6 illustrates another exemplary menu 600. In this menu, the advertisements are listed in different categories. For exemplary purposes, three different categories, cars 603, home appliances 605 and cosmetics 607 are shown. Within the categories, different subcategories may also be added. For example, the category for cars 603 comprises the different subcategories of Sport Utility Vehicles (SUVs) 609, luxury cars 611, and mid-size cars 613. Within each subcategory, a list of different advertisements is also provided, e.g., under the subcategory of SUV, the list includes advertisements for the Ford Explorer, the Nissan Pathfinder, and the Chrysler Xterra.
Furthermore, the advertisements may be listed via different advertisers. FIG. 7 illustrates another exemplary menu. In this embodiment, the advertisements are sorted via different advertisers. For exemplary purposes, the advertisement guide menu 700 lists three different advertisers. Advertiser #1 703 corresponds to Ford, advertiser #2 705 corresponds to Chrysler, and advertiser #3 707 corresponds to Nissan. For each advertiser, a plurality of subcategories is also defined. For advertiser 703, three different subcategories are shown, cars 709, SUVs 711, and trucks 713. Each subcategory may also comprise a list of available advertisements.
It is to be noted that FIGS. 5, 6, and 7 only illustrate exemplary menus. Other menus to assist the subscriber in their selection of different advertisements may also be provided. The display of available advertisements can be based on the market segment which has been determined to be appropriate for the subscriber (market segment based menuing). Alternatively, the subscriber may be presented with a set of market segments descriptions and asked to select one. In this way, a couple with a new child may themselves select the “growing family” market segment and will thus be presented with lists of advertisements which are appropriate for them.
Once the subscriber selects an advertisement for display, the processor (e.g., SCU/processor 204 of FIG. 2) retrieves the contents and transmits the contents of the selected advertisement for display. Alternatively, the processor may schedule the display of the selected advertisement by inserting the selected advertisement in the next avail. The insertion of the advertisement in the avail is explained with reference to FIG. 10 and related text.
FIG. 8 illustrates the functionality associated with one embodiment of the present invention. In step 801, the processor recognizes the subscriber issued command, i.e., the advertisement selected by the advertiser. In step 803, the corresponding advertisement identification (AD_ID) is determined. In step 805, the processor retrieves the corresponding advertisement from the advertisement database. In step 807, the processor transmits the contents of the selected advertisement to the subscriber display, wherein the contents of the selected advertisements are immediately displayed to the subscriber.
FIG. 9 illustrates the functionality associated with another embodiment of the present invention. At step 901, the processor receives a subscriber issued command, e.g., the selection of a particular advertisement by the subscriber. In step 903, the processor determines the identity of the corresponding advertisement. In step 905, the processor retrieves the corresponding advertisement from the advertisement database. In step 907, the processor schedules the display of the selected advertisement. Subsequently, the contents of the selected advertisement are inserted in the next available avail. If the subscriber selected more than one advertisement, the advertisements are inserted for the next few identified avails, the number of identified avails being equal to the number of selected advertisements.
FIG. 10 is a functional block diagram illustrating advertisement insertion according to one embodiment of the present invention. In this example, the received programming stream 1001 is in the form of a DVB transport stream, i.e., a multiple program transport stream (MPTS). In the tuner function 1002, the channel selected by the subscriber is extracted and demodulated from the MPTS. This channel carries digital cue tones, which are detected by a cue detection module 1010. The advertisement to be inserted in the next detected avail has already been retrieved, e.g., from the scheduler 1012 using the avail data and prioritization or other scheduling algorithm. The advertisement insertion module 1004 inserts or splices the advertisement according to the queue tone timing. The resulting program stream 1005 with the substituted advertisement is decoded by decoder module 1006 and sent to the television 1008 or other display device.
The scheduler 1012 is the retrieval circuit, which receives the instructions for organization of the advertisement in the memory and then organizes the advertisement in accordance with the received instructions. In this exemplary embodiment, the scheduler retrieves from a dedicated control channel 1015 in the media stream 1001. However, as previously noted, this is just one of many possible transport streams instructions. The scheduler also provides a schedule and notifies the advertisement insertion module 1004 of the schedule.
When the cue tone is detected by cue detection module 1010, the advertisement database 252 requests the appropriate advertisement from the advertisement database 252 which then sends the advertisement to the insertion module 1004. The advertisement insertion module then inserts the advertisement with the proper timing.
In this exemplary embodiment, the advertisements that are stored into the advertisement database 252 are received over a dedicated advertisement channel in the media stream. For instance, the scheduler 1012 may include circuitry for picking out the appropriate advertisements for the particular STB from a continuous stream of advertisements as previously described and writing them to the advertisement database 252. The avail data module 1018 provides information about available avails (advertising opportunities). The watchdog module 1020 notifies the scheduler 1012 of any changes that may require a queue update or switching among multiple queues as previously described. For instance, a profiler-identifier module 1022 can process information such as data as to the program being watched and remote control operation, such as volume control and channel change control, to attempt to determine which particular viewer in a subscriber household is viewing the television in order to choose among the various queues as previously described.
The advertisement insertion module 1004 generates and stores an advertisement insertion event log 1016 of all insertion events. This is essentially the schedule of the ads inserted and whether or not they were inserted successfully and/or displayed. The insertion logs will eventually be sent upstream to the central office to be used for billing advertisers based on the ads that have been played at each subscriber's location.
Since FIG. 10 is functional block diagram, the blocks in FIG. 10 do not necessarily correspond to separate hardware components, such as illustrated in FIG. 2. For exemplary purposes, however, blocks 252 and 1016 represent portions of memory and might correspond to any one of more of the memories 210, 212, 214 shown in FIG. 2. Functional blocks 1004, 1006, 1010, 1012, 1020, and 1022 represent processing steps and might correspond to the system control unit/processor 204 and the channel processing circuit 222 shown in FIG. 2. As processing steps, these blocks may correspond to software executed by any form of digital processor in the system control unit. However, any one or more of these functions could be performed by dedicated hardware (e.g., an analog circuit) within the system control unit or separate therefrom. It should be understood that the term circuit as used in this specification is intended to be all-inclusive and to encompass analog circuits and digital circuits, including finite state machines, digital signal processors, computers, central processing units, ASICs, and programmed general purpose processors. Functional block 1002 corresponds to one or more of tuner block 218, demodulator block 220 and demultiplexer block 224 in FIG. 2.
scheduling the at least one stored advertisement for presentation.
2. The method of claim 1, further comprising presenting the at least one stored advertisement to the subscriber.
3. The method of claim 2, wherein said scheduling includes scheduling the at least one stored advertisement on-demand and said presenting includes immediately presenting the at least one stored advertisement.
4. The method of claim 1, wherein said scheduling includes placement of the at least one stored advertisement in an upcoming avail.
a video presentation and playback module for presenting the at least one advertisement.
6. The system of claim 5, wherein the storage mechanism is part of a Personal Video Recorder (PVR).
7. The system of claim 5, wherein the storage mechanism is a part of a Video on Demand (VoD) system.
9. The method of claim 8, wherein said targeting includes using at least one market segmentation technique to determine which advertisements to selectively display in the advertisement guide menu.
10. The method of claim 8, wherein said targeting includes monitoring subscriber selections to determine the set of advertisements to selectively display in the advertisement guide menu. | 2019-04-23T16:19:28Z | https://patents.google.com/patent/US20020178445A1/en |
Your sabotage of Darth Jadus's flagship will not likely go unnoticed. Should the crew discover your plan, a little insurance could go a long way.
Disable the dreadnaught's power relays to guard yourself against this potential threat.
Pay attention and stay on guard, Bugboy.
This isn't the time or place to celebrate.
* Influence gains assume a player level of 45+. Lower level characters gain less influence.
- Speak. Is Darth Zhorrid dead?
4. Option - Yes.Player - She is, my lord.
12. Option - She fought well.Player - She was Sith until the end. You should be proud of your daughter.
- No. I take pride in her corruption, her decaying spirit. Those were my gifts.
16. Option - You're the Sith. You tell me.Player - Can't you feel it in the Force?
- The Force creates bonds through emotion. Her life meant nothing to me.
- With Zhorrid gone, I may return. The Eradicators will continue their bombardment, and the Dark Council will kneel.
- In the years to come, the Empire will be remade in my image--and Imperial Intelligence will bring our enemies under control.
22. Option - Of course.Player - As you say, Lord Jadus.
24. Option - You promised me riches.Player - What about my reward?
30. Option - Anything you say.Player - I suppose we'll see "in the years to come."
- You have proven your loyalty and your strength, and I name you my Hand--my personal agent in this new age.
- As the Hand of Jadus, you will continue to serve Intelligence... but you serve me before all others. As will all creatures, in time.
36. Option - Thank you.Player - Your trust will not be misplaced.
38. Option - And if I refuse?Player - What if I'd rather not be your servant?
- You no longer have that choice.
42. Option - That's... quite a plan.Player - You've got ambition, Lord Jadus--I'll give you that.
- Await my coming, and spread word of the changing order.
- Find Darth Zhorrid on Dromund Kaas, and contact me when she is dead.
- You will remember this day, Cipher.
- Your cage cannot hold me. Whatever you hope to achieve, your moment will pass.
- Cipher Nine--this is Keeper. We have a fleet in position to destroy this vessel. Please report.
56. Option - Hold your fire.Player - Situation is under control. You can see for yourself.
- Understood. We'll proceed with restraint.
60. Option - The Sith is here with me.Player - Maybe you should talk to Darth Jadus.
68. Option - Finally got here, huh?Player - It's about time you people arrived.
- We left Dromund Kaas as soon as we heard. It wasn't easy to coordinate with the Eradicators active.
- Lord Jadus? Be advised that a boarding party of Sith and honor guards is on its way. I suggest you not draw their ire.
- Cipher--I understand you have control over the Eradicators. Can you disable them?
78. Option - Yes, sir.Player - I'm on it.
83. Option - Let's hope so.Player - If I can't, this was all for nothing. They're my responsibility.
86. Option - Don't rush me.Player - You want this done fast, or you want this done right?
- People are dying. Do it now.
- We can discuss why you activated the weapons later--but I expect the Dark Council will approve of the result. I'll see you shortly.
- The Song of the Universe is resuming. The nest must now regenerate.
94. Option - Huh?Player - What does that mean, Vector?
- It means... it will take a long time to recover from this day.
102. Option - You're crazy, but you're fun.Player - I love it when you talk insect.
- We're glad it pleases you.
- It's part of our nature. We hardly notice anymore.
109. Option - I don't have time for this.Player - Pay attention and stay on guard, Bugboy.
- The Joiner is unnerved by your actions--your callousness toward your own kind.
- You know what this means, agent? It means we won.
116. Option - Excellent.Player - You better believe it, Kaliyo.
- I believe in blasters, drinks and taking the fastest hyperlane. Think we did pretty well.
120. Option - [Flirt] Time to party.Player - What do you say the two of us celebrate?
- With Jadus watching? I'm game for that.
- With Jadus watching? I don't need to give him his kicks.
- Next, we take on all of them.
130. Option - Not now, Kaliyo.Player - This isn't the time or place to celebrate.
- Come on--it's too late to start complaining.
- Tell me, Cipher Nine: Was your victory worth it? How many lives would you have sacrificed to capture me?
137. Option - You had to be defeated.Player - I don't regret what I did.
- I don't expect you do. I merely wanted to know your threshold.
149. Option - Shut up.Player - Don't bait me.
- The response of one who cannot face the truth.
145. Option - You piece of filth.Player - Not as many as I'd have sacrificed to kill you.
- Raw, unchanneled hatred. My daughter would approve, but I am a different breed.
- Under my control, the Eradicators' purge would have cut out the Empire's rot.
- Now the Dark Council will reassert its strength. They will punish me--or destroy me. And without a revolution, their cruel, pointless reign will go on.
155. Option - I'm no hero.Player - Terrorists lead revolutions--not me.
- Then be content with the Empire you've made.
159. Option - Whatever you say.Player - I'm sure your cruel, purposeful reign would've been better.
- That was the vision.
167. Option - You're a dead man.Player - I hope they broadcast your execution to the galaxy.
- If they execute me, it will be one of the council's many secrets.
- Leave one squad here; the rest of you, sweep the ship. And if that force field so much as dims, tell Keeper to fire.
173. Option - Don't worry about me.Player - I'm fine, Watcher Two. Really.
- Fine enough to put up a good front, anyway.
185. Option - That was horrible.Player - Do I look alright to you?
- You look like you've been through worse than anyone deserves.
189. Option - Get rid of Jadus.Player - Once this freak is dealt with, I'll be better.
- The Dark Council will take care of Jadus. They're coming aboard as soon as we're secure.
- The Sith and the military will be cleaning up awhile, and the damage from the Eradicators will take time to assess.
- You should get out of here. You've done your part--get some rest.
195. Option - Rest can wait.Player - Later. Just because we've dealt with one threat, it doesn't mean there aren't others.
- Of course. Consider yourself awaiting reassignment.
197. Option - Let's talk later.Player - I'll see you soon?
- You're with Imperial Intelligence for life, Cipher... and I'll be there for your next assignment.
200. Option - Time for a vacation.Player - Truth be told, I could use a break. And I've got plenty to keep me occupied.
- Just don't take too long. Our work doesn't permit much downtime.
- You've not won yet!
- After what you've done, you still return. How bold.
- I never expected you would pay such a price to betray me. So many innocents burning in their homes... because of you.
213. Option - Give up.Player - You've lost, Lord Jadus. Surrender now.
219. Option - Because of you!Player - You're responsible for those deaths, not me.
- Is that so? The Eradicators kill at your command.
223. Option - I'm innocent!Player - I don't know what you're talking about, my lord. I swear it.
- Save your oaths. I know of your sabotage; I know a fleet is on its way.
- My defeat may be inevitable now. I do not know.
- But your perfidy must be answered. You will die--along with many others.
- The attack has begun. Watch, agent--watch the Empire burn.
- You will not escape me. Your cage cannot hold me!
- I still live. You will not escape this place.
- But I acknowledge my error, and I am willing to bargain. You may have this ship. You may have the Eradicator codes. I will leave.
237. Option - Really?Player - Just like that?
241. Option - Then what?Player - Once you're out... what do you intend to do?
- What I have always done.
- It is the only concession I am prepared to make.
- You win, agent. I shall withdraw from this battle before it becomes a war.
- Did he really just...?
- Pursue no vendettas, and I shall pursue none. But I will rebuild--and years from now, I will return to the Dark Council.
253. Option - We'll see.Player - I can't make any promises.
257. Option - It's a deal.Player - We have an agreement, my lord.
259. Option - Stay out of trouble.Player - Hurt anyone else, and I'll come looking for you.
- I will remember this.
- Farewell. Know that few creatures survive earning my hatred and my respect.
- We're free... ha! We're free.
- I've got confirmation--Jadus's shuttle is jumping out of the system!
275. Option - Neither did I.Player - I'd rather not do that ever again.
- Hopefully, there won't be other rogue Dark Council members.
279. Option - I'm pretty great.Player - Don't ever say I don't have tact.
283. Option - You should've known better.Player - Have a little more faith in me next time.
- Entering command codes to deactivate the Eradicators. The threat has been neutralized.
- We were a diplomat for many years... but that was impressive.
289. Option - Thank you.Player - You're too kind, Vector.
- The feeling's genuine. If that's how you handle a Dark Lord, imagine handling a Republic Senator.
293. Option - Learn anything from it?Player - Bring back any memories from before your Killik days?
- A few. Standing up at summits and hoping no one draws a blaster... we'd like to remember negotiating with humans.
297. Option - [Flirt] Glad you liked it.Player - I can show you all sorts of tricks... if you'll let me.
- Maybe a private negotiating session?
- Of course. We're always interested in learning more.
308. Option - You weren't much help.Player - I could've used some advice, there.
- We might've tried to rub antennae at the wrong moment. You were the more capable negotiator.
- So--that whole thing, agent? It took brass. I'll give you that.
313. Option - Thanks, Kaliyo.Player - I appreciate the compliment.
- Any time. Glad I could help.
322. Option - That's it?Player - Come on, I deserve better than that.
- Tell you what--give me a chance at this ship's turbolasers, and I'll see what I can do.
326. Option - Sorry you couldn't kill Jadus.Player - I know you wanted to blast the Sith.
- Would've been fun, but I liked seeing him humiliated.
- Jamming field is down. I'm broadcasting an all-clear signal to the Imperial governors.
- Jadus's experiments. We'll debrief them before we send them home.
341. Option - Your master was a monster.Player - Trust me, you're better off without him.
345. Option - It'll be okay.Player - Come on, we'll make sure the medical droids fix you.
937. Option - Lunatic.Player - Out of my way, worm.
- He showed us our strength. Some of us will still die for him!
- You will die--unmourned. And I will reactivate the devices and begin my assault.
357. Option - Not if I blow up this ship.Player - You won't do anything if this place is dust.
361. Option - You think so?Player - Really, Jadus--have more faith in me.
- Whatever you think you are capable of, or believe you have accomplished--all of it is dust. Only I am eternal.
- He'll kill you, Cipher!
369. Option - Watcher Two? A little help?Player - I could really use some advice right now.
- You can't fight Jadus, but you might slow him down. This ship can generate internal ray shielding.
- Now--kneel before your doom.
- If you can reroute the power, we can trap him in a force field. Then get to the reactor core and destroy this ship!
- It may take some time, but we can trap him in a force field. Then get to the reactor core and destroy this ship!
- Use the controls to trap Jadus in a force field. Then get to the reactor core and destroy this ship!
- The distress calls, the cries of fear and pain--these will be routed to the ship as the Eradicators work.
- A thousand voices, screaming in terror. Will you savor them, agent?
403. Option - Of course.Player - I'll do my best to appreciate them.
- I sense doubt in you. But it changes nothing.
409. Option - That's horrible.Player - I think I need to go be sick.
- There is nothing that will let you forget. Let your loathing bring you strength.
- Go, Cipher! Casualties are mounting.
- Take out the jamming signal, hyperdrive and shields. Once you do, I can call in reinforcements--and Jadus will be at our mercy.
- A wise decision, agent. Our new age begins.
- Across the Empire, the Eradicators will burn cities and destroy the prizes of my enemies.
- You can still reconsider, Cipher. You don't have to ally with Jadus.
- He trusts you. Get off the bridge so we can sabotage the ship. We can make this plan work.
- So. You have an accomplice. Keeper's favored analyst?
444. Option - [Whisper] All right.Player - I'm in. Let's bring down a Dark Lord.
- All right, Cipher. Jadus is distracted. Make your excuses so you can get off the bridge and sabotage the ship.
448. Option - [Whisper] Let's do it.Player - I'm on my way. Just hold on.
452. Option - [Whisper] You better be ready.Player - I'm going to need your help. Don't fail me now.
- I won't! Now make your excuses and go!
- Your thoughts are confused; a temporary condition, for which I have an anodyne.
- I see. I applaud you for your loyalty to me.
- You'll regret this, agent. I swear.
- What was that? Fine, sell her out--but to Jadus?
- My guardians will take her alive, if possible. She may prove useful.
- But affairs are moving quickly, and we must ensure no other surprises await us.
472. Option - Oh?Player - How do you mean, my lord?
478. Option - Need something done?Player - Sounds like you've got a job for me.
480. Option - We will prevail.Player - The new age will arrive on schedule, I promise.
- The Eradicators' purge will ready the Empire for my coming--but there is one death you must see to personally.
- Go to Dromund Kaas and kill Darth Zhorrid; her seat on the council belongs to me.
381. Option - As you wish.Player - I hear and obey, my lord.
383. Option - Can't you do this?Player - Surely you could kill her yourself?
- I must prepare to approach the Dark Council--and she cannot be allowed to interfere.
387. Option - But she's family!Player - You want me to assassinate your own daughter?
- Her usefulness is at an end.
- When Zhorrid's blood cools, contact me from her chambers. Then I will return home.
- Eradicators are offline. Repeat, the Eradicators are offline.
- I expected more of you. Disabling the Eradicators will not stop me.
- Enter your codes into the terminal, and give control over the Eradicators to me.
- So. You've arrived at last.
- I expected too little of you. You served me well on Hutta and on Dromund Kaas; I should have known you would serve me again.
512. Option - Darth Jadus...Player - Are you responsible for this?
- Everything that has transpired has been at my command. My will is the destiny of lesser men.
517. Option - You're still alive?Player - I thought you died aboard the Dominator.
- No. This is what remains of the Dominator and its passengers. This is the world as I have remade it.
522. Option - Thank you.Player - It is an honor, my lord.
- An honor that you have earned.
- Okay, you're going down right now.
- Your follower believes she has been betrayed. She is contemptible... and beneath me.
- Once before, you were inoculated by the dark side. I will speak now as I spoke then.
- Accept the gift of your life, agent... and we will discuss terror, the Empire and the Sith.
535. Option - Let's do that.Player - You talk. I'll listen.
539. Option - You almost killed her!Player - You want to talk? After what you did to Kaliyo?
- The creature will live. But my tolerance has limits.
543. Option - Or I could shoot you.Player - Give me one good reason not to open fire.
- My tolerance has limits. Your destruction serves neither of us.
- Don't, Cipher. You know what he's capable of.
931. Option - Yes, my lord.Player - It will be done.
- Be careful, Cipher. Please be careful.
- It was my desire that the Eagle unite the terror cells. It was my desire that my flagship be destroyed.
- I required a weapon that the Dark Council would overlook. The terrorists became my unknowing servants and carried out my plan.
565. Option - You committed atrocities.Player - You sanctioned the murder of Imperials. You faked your own assassination.
- Only to achieve something greater.
561. Option - The Dark Council?Player - What does the Dark Council have to do with this?
- Everything. A member of the council is forced to politick, to struggle against his rivals. The waste is unimaginable.
569. Option - [Whisper] Watcher Two?Player - Are you getting all this?
- With my false death, I escaped the eyes of the Dark Council and of Imperial Intelligence.
- After the Dominator, I came here, bringing with me those passengers worthy of elevation. I maneuvered my pieces into place.
575. Option - But why?Player - What's the point of it all?
577. Option - How did you survive?Player - I was there for the terrorist attack. Intelligence was sure you were dead.
- The shvash gas incinerated only part of the ship. My power held together the remains.
581. Option - I won't be "maneuvered."Player - I'm not one of your game pieces, Lord Jadus.
- You were once, until I allowed you independence.
- Keep him talking. Damn it, we can't fight him on our own--his power is second to the Emperor's.
- I accomplished two things during my absence. First was the diminution of the Dark Council.
- Upon my death, my former enemies began warring amongst themselves, vying to claim my resources.
- Darth Zhorrid's arrival escalated the chaos. My daughter is doomed... but she is an adequate distraction.
- I can't call for reinforcements so long as that jamming field is active. But he'll annihilate anything less than an army.
595. Option - [Whisper] We'll find a way.Player - It doesn't matter who he is. He's not going to win this.
- You've never fought a true Sith Lord or a Jedi Master.
- They're not like us. They're not human. You can't win this with a blaster.
607. Option - Continue, my lord.Player - You said your death accomplished two things. One was weakening the council. What was the other?
- Throwing the Sith into disorder was only the start. The rest of the Empire had to be prepared as well.
- That was the Eagle's purpose, to sow fright and hatred.
- All this while, my Eradicators were growing. Now they are ready, and my victory is close at hand.
613. Option - Your victory?Player - What victory? What are you talking about?
623. Option - This is madness.Player - You're as crazy as your daughter.
- You fail to understand.
- The Eradicators will destroy the strongholds and apprentices of my enemies on the council. So too will the Eradicators terrorize the Empire.
- Then I will return to the council and lead the Empire into a new age--an epoch of terror.
641. Option - Impressive.Player - It's an ambitious plan.
631. Option - What about the innocents?Player - Why do so many civilians have to die?
- How better to mark the change of an era?
635. Option - You're forgetting the Emperor.Player - The Emperor won't let you get that far.
- The Emperor is... distracted. I could resculpt the Dark Temple into a monument to my glory, and he would fail to object.
- Perhaps I shall do exactly that.
- Under my rule, all people will revel in fear and degradation. These prizes will no longer be hoarded by Sith.
- Under my rule, all people will revel in fear and anger and degradation. These prizes will no longer be hoarded by Sith.
- But without both halves of the Eradicator codes, my weapons cannot be targeted; they will merely cause chaos.
649. Option - Your plan requires more.Player - Mere chaos isn't enough for you, is it?
- No. The Eagle's death--your acquisition of his codes--has forced me to adapt.
653. Option - About those halves...Player - I have half the codes; I assume you have the other?
- Yes. Embedded within this ship.
657. Option - Too bad.Player - It sounds like you're in trouble.
- Perhaps. But your position is more tenuous. I know you have the second set of codes.
- Without orders, the Eradicators will fire blindly. This serves neither of us.
- Enter your codes into the ship so the Eradicators can target my enemies. You will be rewarded. You will be my herald.
671. Option - Not interested.Player - You expect me to betray the Empire for you?
- The Empire fails to recognize your potential.
- Soon I shall be the Empire.
675. Option - Why should I trust you?Player - Last time you promised me something, you faked your own death.
- I misunderstood your role. Consider what I can offer now.
679. Option - Rewarded, hm?Player - Tell me about these rewards.
- Authority, wealth, a place in my vision. The respect Intelligence has denied you.
- Blood purity is a notion whose time is past. Consider an Empire where there is no limit to what an alien might become.
- Power, wealth, a place in my vision. When I rule the Dark Council, Imperial Intelligence will have a mandate uncompromised by Sith politics.
- Imagine a world where you could act with true authority, and fear controls the populace. Together, we can create a stronger Empire.
685. Option - What if I refuse?Player - If I don't cooperate, what will you do?
687. Option - Let me consider it.Player - I need some time. It's... a lot to take in.
693. Option - You have a good point.Player - Your reasoning is... persuasive, my lord.
- There is no other way.
- If you refuse, you will die at my hand. The Eradicators will still reap untold destruction; your "sacrifice" would mean nothing.
- I can be merciful. Take the time to consider your choice. Then we can begin the true work.
699. Option - Perhaps.Player - We'll see about that.
705. Option - But if I die, you get nothing.Player - You haven't thought this through. Kill me, and I take the codes with me.
- A bold sentiment--but not a wise one. With your death, neither of us achieves our desire... and only I will be in a position to form a new plan.
933. Option - So what?Player - You say that like I should care.
- To sacrifice your life knowing that the Eradicators will ravage the Empire would be foolishness. And you are not a fool.
709. Option - I know something you don't.Player - You're wrong, Jadus. You won't be in a position to do anything.
- Cipher! What are you doing?
- Tell me, agent--what possible advantage could you have over me? You are in my sanctuary, and my power is infinite.
717. Option - My allies are listening.Player - This conversation is being recorded. Even if I'm dead, other people will know your plan.
- Your friends at your ship? They're incapable of defeating me. Their lives are forfeit.
773. Option - They'll blow up this ship.Player - They have orders to destroy this place. Survive that.
719. Option - Not if they flee.Player - You can't kill all of them. Someone will escape... and they'll tell everyone your plot.
- And then what? Let them tell the world that I live, and I will still prevail.
723. Option - The Dark Council will learn.Player - Darth Zhorrid and the others will put aside their differences--ally against you.
- You are a fool.
729. Option - Everyone will be your enemy.Player - Are you ready to face the Sith? The Jedi? Your own terror network?
- I am prepared for any eventuality.
- You think my foes are capable of doing me harm? That I am so vulnerable?
733. Option - Why else fake your death?Player - You already admitted it. You destroyed the Dominator so you could go into hiding.
735. Option - This is your one weak point.Player - You need secrecy to work. I can expose you.
739. Option - Oh, yeah.Player - I think sooner or later, you'll be in trouble.
- Suppose your allies scatter across the galaxy, spreading word of my existence. Suppose they rally an army.
- I am still capable of destroying you. You cannot withstand me.
- Cipher, enough! He's going to kill you!
- Are you so willing to die before you give up the codes? So confident of victory in death? Shall we test it?
- ...Yes. Perhaps I have.
- It seems I should have been more cautious--taken steps to stop you before you found the Eagle.
759. Option - You called my bluff.Player - We'll do this another way, Jadus.
761. Option - Maybe not.Player - Let's leave that question open, shall we?
765. Option - I don't know.Player - Someone will find a way to stop you.
- No. You seek hope where there is none to be found.
769. Option - What if I gave them to you?Player - You could have them as slaves. They're skilled, valuable.
- I would accept them as tribute--but not as a price.
783. Option - I have a secret weapon.Player - There are explosives aboard my ship, powerful enough to take out a dreadnaught.
- I survived the destruction of the Dominator. You cannot kill me.
785. Option - Think about it, ugly.Player - I'm better-looking than you'll ever be.
- Enough. My time will not be wasted. Consider my offer.
794. Option - Point taken.Player - That would be... unacceptable.
- Then you must reconsider my offer. I will leave you to your thoughts.
- You are bold, but I do not believe you would waste your life.
932. Option - Of course.Player - As you wish (my lord / Master).
- Think on my words, agent--and embrace my will.
- I can be magnanimous. Take time to consider, and you will see the value of embracing my will.
- All right. Stay focused and don't look at Jadus.
- How are you holding up? Can we put together a plan?
808. Option - Let's work.Player - I'm alright, but I don't think we have much time.
812. Option - I already have a plan.Player - I know what I'm going to do. It wasn't a hard choice.
- Before you make any decisions, please--hear me out.
816. Option - Are you joking?Player - You think there's a way out of this mess?
- There has to be. Unless you intend to join him.
- We need to re-examine our priorities. We came here to stop the Eradicators, but we weren't prepared for reality.
- Our plan now has to focus on neutralizing Darth Jadus--everything else is peripheral.
822. Option - What about the Eradicators?Player - There's still an imminent attack to worry about.
824. Option - Explain.Player - What are you talking about?
- I'm sorry, Cipher. The numbers... aren't in our favor.
828. Option - Get to the point.Player - I'm aware that Jadus is a threat. That is not useful information.
- Fine. Then I'll be frank--people are going to die.
- ...but to keep Jadus from reactivating them, you'd have to blow up the ship's reactor. It's a suicide run--and chances are, Jadus will escape.
848. Option - It would stop the attack.Player - The Eradicators would be disabled. That was our mission.
850. Option - I'm not scared.Player - I've survived suicide runs before.
- It's not that simple. If Darth Jadus escapes, he'll come back. Not next year, maybe, but eventually.
- There's another way--a way to stop him from hurting anyone again.
- We can lure him into a trap by earning his confidence. Give him the codes to the Eradicators... and let him launch his attack.
866. Option - What?Player - This is your plan--do exactly what he wants?
- Prove your loyalty, and he'll turn his back on you. He's too arrogant to do otherwise.
864. Option - I'm listening.Player - Say what you have to say.
870. Option - Have you lost your mind?Player - There better be more to this plan.
- Damn it--of course there is.
854. Option - What's the alternative?Player - You have another suggestion?
- We trick Jadus. We give him the codes and let him launch his attack.
- Once the Eradicators start their bombardment, you slip off the bridge and take this ship apart. You sabotage the jamming field, hyperdrive and shields.
- Then I can call in reinforcements--the military, the Dark Council--forcing Jadus to surrender. The Eradicators are deactivated as soon as feasible.
886. Option - But the Eradicators will fire.Player - How many people, how many worlds are sacrificed?
890. Option - That's your best plan?Player - Is it really better than blowing up the ship?
- It's cleaner. More precise. More thorough.
- Let's be clear: If we give Jadus the command codes, then yes, he'll murder thousands before we stop him.
- But the human cost is acceptable. The only alternative is to let Jadus escape--and do worse down the line.
900. Option - You're right.Player - All right. Let's set the trap.
- You're making the right choice, Cipher.
- Enter the codes at the bridge console. Let Jadus target the Eradicators however he wants. Then we sabotage the ship.
- I promise his victory will be short-lived.
907. Option - Absolutely not.Player - The "human cost" isn't acceptable to me!
- I can't tell you what to do, Cipher.
913. Option - What if I join Jadus?Player - You're assuming I want to stop his plan. But maybe I agree.
- You're not serious! Whatever he has planned for the Empire, it can't be beneficial!
915. Option - He made a good offer.Player - I wouldn't be doing it for the Empire. I'd be doing it for me.
919. Option - I have my reasons.Player - I could explain it all to you--but you'd never understand.
- Cipher, please--I'm begging you to reconsider.
923. Option - Just kidding.Player - Learn to take a joke, Watcher Two.
- You're a piece of work.
- If you disable the Eradicators here and now, I'll help you. We'll destroy this ship, save a lot of people... in the short term.
- But my advice is this: Use the codes to let Jadus launch his attack. Sacrifice lives and seize this chance. We can end his threat forever.
- This is not your time, agent.
- You are a speck of waste upon my perfect world. Begone.
[JournalText] => Your sabotage of Darth Jadus's flagship will not likely go unnoticed. Should the crew discover your plan, a little insurance could go a long way.
[enMale] => Your sabotage of Darth Jadus's flagship will not likely go unnoticed. Should the crew discover your plan, a little insurance could go a long way.
[frMale] => Votre sabotage du vaisseau amiral de Dark Jadus ne va certainement pas passer inaperçu. Au cas où l'équipage découvrirait vos plans, il serait bon de prendre une petite assurance.
Sabotez les relais d'énergie du cuirassé afin de vous protéger contre cette menace potentielle.
[frFemale] => Votre sabotage du vaisseau amiral de Dark Jadus ne va certainement pas passer inaperçu. Au cas où l'équipage découvrirait vos plans, il serait bon de prendre une petite assurance.
[deMale] => Die Sabotage von Darth Jadus' Flaggschiff wird nicht unbemerkt bleiben. Sollte die Crew deinem Plan auf die Schliche kommen, könnte eine Rückversicherung nicht schaden.
Sabotiere die Energierelais des Schlachtschiffs, um dich gegen diese mögliche Bedrohung zu wappnen.
[deFemale] => Die Sabotage von Darth Jadus' Flaggschiff wird nicht unbemerkt bleiben. Sollte die Crew deinem Plan auf die Schliche kommen, könnte eine Rückversicherung nicht schaden.
[enMale] => Pay attention and stay on guard, Bugboy.
[frMale] => Faites attention et restez sur vos gardes, homme insecte.
[frFemale] => Faites attention et restez sur vos gardes, homme insecte.
[deMale] => Passt auf und bleibt wachsam, Käfer.
[deFemale] => Passt auf und bleibt wachsam, Käfer.
[enMale] => This isn't the time or place to celebrate.
[frMale] => Ce n'est ni le lieu ni le moment de faire la fête.
[frFemale] => Ce n'est ni le lieu ni le moment de faire la fête.
[deMale] => Dies ist weder die Zeit noch der Ort, um zu feiern.
[deFemale] => Dies ist weder die Zeit noch der Ort, um zu feiern. | 2019-04-21T02:33:58Z | https://torcommunity.com/database/mission/VW30hM4/power+play/ |
In the same manner that Mexico has established itself as a nearshore manufacturing alternative to China, the country is also increasingly showing up on the radar screen of companies seeking a nearshore alternative to India for IT services or outsourcing related work. In fact and in the latest A.T. Kearney Global Services Index, Mexico ranked #11 (between Vietnam and Brazil) out of 50 countries surveyed and this ranking has not significantly fluctuated since the index’s inception in 2004 when the country ranked #14 out of twenty-five countries surveyed. However, does Mexico really have the potential to establish itself as the premier nearshore alternative to and even compete head-to-head with India?
What are the key characteristics and drivers for IT services and outsourcing markets in Mexico?
What is the government doing and not doing to encourage the growth of these markets?
What are the key operating factors, costs and risks to be aware of when outsourcing to Mexico?
Mexico is estimated to have a population of over 110 million people making it the second most populous country in Latin America after Brazil and the largest Spanish speaking country in the world. Mexico also has the second largest economy in Latin America after Brazil and the 11th largest economy in the world.
Just prior to the global downturn, market research firm Research and Markets estimated that Mexico’s total IT market generated approximately US$10.1 billion in annual revenues with 14% growth rates while outsourcing accounted for approximately US$1.6 billion in annual revenues with 35.2% growth rates.
Meanwhile, Mexican consultancy firm Select estimated the country’s outsourcing services industry accounted for 37% of IT sales (US$3.1 billion) at the end of 2007 and they estimated that outsourcing will account for over 50% of total Mexican IT market revenue (US$4 billion) by 2010.
In addition, Select expected data center services to remain the largest revenue source for outsourcing with revenues expected to grow from US$235 million in 2007 to US$370 million in 2010. Additional growth drivers identified by Select includes the applications management sector where revenues were expected to grow from US$193 million in 2007 to US$368 million in 2010 and the security services sector where revenues were expected to grow from US$64 million in 2007 to US$155 million in 2010.
1. The enterprise management application segment due to the fact that many companies are starting to replace, upgrade, or expand their ERPs and are in need of new hardware infrastructure.
2. Security as large companies are beginning to invest in the physical security and protection of their data while middle market companies are starting to invest in managed security and smaller companies are now acquiring security software.
3. Services (excluding software) as many companies are now realizing that processes are needed in order to make their IT systems.
4. Mobility now that the use of laptops and other mobile devices are starting to move beyond the residential segment and into the corporate world.
5. Technology convergence as Mexico (like other countries) starts to follow existing global technology market trends.
Traditionally, the Mexican public sector has accounted for 11% of overall IT investments and the sector is a significant source of revenue for IT services firms. However, this figure dropped to 8% in 2007 due to an austerity decree that was meant to cut operational expenditures by 5% though the use of leasing and service contracts in lieu of purchasing. And while this policy has saved an estimated 26.2 billion pesos (US$4 billion), it left a number of public sector IT projects in limbo with many IT services vendors without the resources to position themselves to take on new projects.
Today, there are over 2,000 Mexican companies delivering application development, consulting, systems integration testing, security, captive center and other IT related services in Mexico. In addition, there are a number of global IT services firms such as Infosys, Tata Consultancy and Wipro have set up IT service centers in the major Mexican IT service hubs of Mexico City, Monterrey, and Guadalajara to take advantage of their close proximity to the USA. However, local vendors still largely lack the size or maturity to undertake large-scale IT services or outsourcing related projects.
Nevertheless, a few local and cross border merger and acquisition deals have taken place involving Mexico based IT services or outsourcing vendors but so far none of these deals have been particularly eye catching. Moreover, the performance of the Mexican economy along with its services sector in general are closely tied the economy of the USA and hence, the initial credit crunch along with the USA economic downturn has and will continue to impact the ability of Mexico based IT services and outsourcing vendors to win new projects, raise capital for organic growth initiatives or carryout merger and acquisition deals.
With that said, several local or regional IT services or outsourcing vendors are starting to emerge as industry leaders in Mexico (or for all of Latin American) with Monterrey based Softtek in particular leading the way. Although perhaps not a household name just yet, Softek was founded more than 25 years ago and helped pioneer the concept of Mexico and the city of Monterrey in particular as a nearshore alternative to India. Today, Softek is a leading provider of IT and BPO services with 17 of the 50 biggest corporations in the USA as clients and now has more than 5,000 employees based in Europe, Latin America and USA.
Hildebrando, a 20+ year old near-shore provider of systems integration, application development, BPO and captive center services, now has more than 2,000 employees and a presence in the Panama, Spain and the USA.
Neoris, a Miami headquartered subsidiary of CEMEX that was launched in 2000, is now the largest IT consulting and systems integration company in Mexico and the second largest in Latin America. In fact, Neoris now has more than 3,000 employees and operations in the US, Europe, Latin America, Africa and the Middle East.
Praxis, a 10+ year old provider of IT consulting, development, integration, and outsourcing services, now has more than 600 employees and a presence in Canada, Panama, and the USA.
World Software Services (represented by Internacional De Sistemas), a 23+ year old provider of near-shore IT consulting services, now has more than 1,200 employees and a presence in the USA, Europe and Latin America.
To encourage investment in Mexico’s IT and outsourcing industries, the Ministry of Economy Mexico has created the Program for the Development of the Software Industry (PROSOFT) to aggressively promote both software and IT exports, attract foreign investors, support IT related education and training programs and create necessary legal framework to support the industries. Under the program, both foreign and local companies may avail of cash grants from the federal and state governments to cover up to 50% of the total cost of an IT related project while other incentives include tax credits of up to 30% of total R&D expenses, lower corporate taxes and no value added taxes (VAT) for exported services.
Moreover, the 1994 North American Free Trade (NAFTA) agreement between Mexico, Canada and the USA will allow Canadian and American companies to avail of benefits in Mexico that are generally unavailable in other countries. Under NAFTA, most tariff and other trade barriers between the three countries were lifted or eased. Furthermore, there are few if any visa hurdles when sending employees to Mexico as a special non-immigration status known as TN (Trade NAFTA) status was also created under NAFTA specifically for citizens of Canada, Mexico and the USA to work in each other’s respective countries for three year increments.
In addition to offering special incentives, the Ministry of Economy together with the National Chamber of Electronics, Telecommunications and Information Technologies or CANIETI (an industry association of IT companies in Mexico) created MexicoIT to assist foreign and USA based companies in particular to setup IT services and outsourcing operations in the country.
While NAFTA helps to underpin the laws regarding foreign investment and trade, Mexico still utilizes the civil legal system that is characterized by a centuries old system of closed door and written inquisitions that are legacy of Spanish colonial rule. Hence, the country’s legal system is notorious for its corruption, abuse of defendants, opaque legal decisions and plenty of red tape that can easily drag the simplest court case on for years.
However and as the country’s prisons have filled from the recent crackdown on drug trafficking, Mexico is slowly introducing US-style elements into the country’s legal system in an effort to speed up trials and reduce the amount of corruption plaguing the system. These changes include public oral trials where victims and the accused will be able to confront one another before a panel of three judges while defendants themselves will now be presumed innocent until proven guilty (instead of the other way around). Moreover, the police will begin to use more forensics and fact-gathering investigative techniques while mediation, plea bargains and probation will be tried for the first time and become standard practice.
Nevertheless, these changes will take time to implement as all key stakeholders in the legal system will need to undergo further training and so far four states (Baja California, Chihuahua, Nuevo Leon and Oaxaca) have begun implementing the new trial system with its advocates intending to have all 31 states following it by 2016.
Credit: This map is a work by Javitomad.
The NAFTA agreement outlines minimum standards for the protection of intellectual property and enforcement is governed by the domestic laws of the country where IP rights are sought to be enforced. Furthermore, NAFTA requires that any civil action in Mexico must conform to the legal standards that are familiar with Americans and Canadians and hence, it could be said that foreigners enjoy a better measure of IP protection in Mexico than in most other developing countries.
Moreover, Mexico ranked #16 (between South Korea and the United Arab Emirates) out of 24 countries surveyed and ranked by their IP regimes in the 2009 TaylorWessing Global IP Index report. In fact, the report singled out Mexico in particular for improving its rank and position in the index with one explanation for these gains being the January 2009 creation of new and specialized first instance and appeal chambers to specifically hear IP cases (the report even noted that their creation could lead to further gains in future surveys). Nevertheless, it should be noted though that Mexico remains on the United States Trade Representative’s (USTR) Special 301 Watch List for 2008 without any particularly positive comments on recent developments regarding IP protection.
The Taylor Wessing Global Intellectual Property Index is based upon an analysis of surveys of senior industry figures globally plus an array of published empirical data.
globally plus an array of published empirical data.
Compared with other developing countries and with much of Latin America, Mexico’s physical infrastructure is fairly developed. In fact, the country has the most extensive paved-roadway network in the region and the most number of flights to the USA for any foreign country while the Mexico City International airport is the largest in Latin America.
However, other statistics about Mexico’s infrastructure are mixed. While the mobile penetration rate has risen from 29.1 per 100 people in 2003 to 57 per 100 people in 2007, the number of households owning a personal computer (15 per 100 people in 2007) and are broadband internet subscribers is relatively low (4.2 subscribers per 100 people in 2007) even by Latin American standards and statistics may vary considerably from region to region within the country.
In addition, Mexico’s ranking in IT readiness surveys has also been mixed. In the 2009 E-readiness report from the EIU, was Mexico was ranked 40th (between Poland and South Africa) out of 70 countries profiled and was also ranked as the runner up to Chile for the E-readiness of its business environment and for consumer and business adoption among Latin American countries. However, Mexico ranked 67th (between Panama and Bulgaria) out of 134 countries surveyed for networked readiness by the World Economic Forum’s Global Information Technology Report 2008-2009 with the report noting that Mexico fell nine spots from its 2007 ranking and that the country suffers from an overregulated market environment, low R&D investment, a poor-quality educational system and rather low rankings for ICT readiness and usage by both individuals and the business sector.
The Economist Intelligence Unit (EIU) assesses the world’s largest economies on their ability to absorb information and communications technology (ICT) and use it for economic and social benefit. Mexico’s ranking (#40) was ahead of Brazil (#42), Argentina (#45), the Philippines (#54), China (#56), India (#58), Vietnam (#64) and just about all other Latin American countries except for Chile (#30). However, it was behind the rankings for Malaysia (#38) and several Central and Eastern European countries.
The World Economic Forum’s Networked Readiness Index takes into account the presence of an ICT-conducive environment and the degree of preparation needed to use ICT along with its actual use by individuals, the business sector and the government. While Mexico’s ranking (#67) was ahead of Vietnam (#70), the Philippines (#85) and Argentina (#87); it was behind the rankings for Malaysia (#28), China (#46), India (#54), Brazil (#59) and some Central and Eastern European countries.
However and by far the biggest disadvantage for Mexico in the past regarding infrastructure is the near monopoly enjoyed by the fixed-line operator Telmex, which operates 92% of the country’s fixed lines and controls much of the country’s telecom infrastructure; and Telmex, which controls 72% of the country’s mobile market. This near monopoly has long given Mexico some of the highest telephone charges and lowest teledensity rates among OECD countries while anti-trust and other efforts against Telmex have largely proved unsuccessful.
Recently though, foreign competition, technological trends and the global economic downturn have helped to bring prices down to levels enjoyed elsewhere in Latin America. Furthermore and in an effort to create a more level playing field, the government is planning to sell access to fibre-optic cables installed to monitor the country’s electric grid – giving both smaller telecommunication players and consumers alike an alternative to Telmex. These plans are expected to further reduce long-distance rates in much of the country while also significantly improving internet access for much of the population.
According to MexicoIT, Mexico’s IT services industry employs an estimated 500,000 IT professionals and attrition rates are in the 5-12% range. In addition, 121 Mexican universities were identified to be teaching global industry requirements and the country is said to have the highest IT undergraduate workforce in Latin America (+100,000) with as many as 30% of current undergraduates enrolled in IT related fields and close to 65,000 new IT professionals entering the workforce from either universities or technical schools every year. In addition, literacy rates are relatively high for Latin America and there are abundant numbers of non-IT professionals (such as lawyers and CPAs) entering the workforce every year who can be employed by BPO type operations (although the extent of the professional workforce may vary from region to region).
However and despite these statistics, Mexico’s public education remains in poor shape in part due to a stranglehold on education by the teachers’ union and the fact that the country only spends roughly one-seventh of what USA schools spend per student (approximately US$1,522 compared with $10,071 a year). Moreover, many Mexican children (especially those in the countryside) must work to support their families and hence only 47% of students who enter vocational high schools will graduate while the graduation rate for college-prep high schools is only 60% (verses 75% for the USA).
This combined with the fact that Mexico already has a much smaller population and labor pool than India or China to draw upon, means that setting up a team of thousands in a short period of time would be very difficult. Moreover, Mexico’s pool of fluent English speaking IT and other professionals is considerably smaller than that of India with unverified (Internet) estimates of the English speaking population to be close to 5 million or roughly 5% of the country’s total population. Nevertheless, many educated Mexican professionals are bilingual and this is a particular advantage when IT or outsourcing projects from the USA require both English and Spanish language skills.
However, Mexico still has rigid and cumbersome labor laws and regulations that generally make it difficult and costly to hire and especially fire employees while the rules themselves tend to favor labor unions in any negotiations with employers. Efforts to introduce any type of reform by both the current and the former president have largely stalled due to strong opposition from powerful public sector unions.
While Mexico has a more expensive operating environment than India, IT services and outsourcing firms will find that the cost gap between the two countries is not particularly large. In fact, Business Week recently pointed out that an engineer’s salary in Mexico will start at around US$12,000 per year and although the hourly rates in India are 25% to 30% lower, when adding the indirect costs of high Indian staff turnover, travel to and from the site and communicating with colleagues half a world away, the cost gap closes to approximately 15% to 20%.
Moreover and despite a long history of high and volatile inflation together with an unstable Peso that collapsed in 1994, Mexico has managed to largely attain both price and currency stability over the past decade through sound fiscal management policies. In fact, average annual consumer price inflation has fallen from 35% in 1995 to only 3.6% in 2006 and has largely stayed in the low single digits for the past several years. However, the global economic downturn and a slowdown in political reforms have caused the Peso to depreciate by one fifth of its value during the first half of 2009 when compared with the same period in 2008 – putting the country on the radar screen of manufacturers and outsourcers alike who are looking for further cost savings.
As a relatively new player in the IT services and outsourcing industries, Mexico still has a ways to go before building up a track record for quality. However, Mexico’s close proximity to the USA allows for more collaboration and much better control over the work outsourced to third party vendors based there or to a shared services center set up in the country. Moreover, many Mexico based IT services and outsourcing vendors have experience working with USA based clients and according to PROSOFT, 3 have CMM-5 certification, 15+ have CMM-4 and 3 certification and 53+ firms are engaged in model implementation and assessment while ISO-9000 certification and adoption is widespread.
Hence and while the local IT services and outsourcing industries along with the local labor workforce may not be as developed as India’s, Mexico is well positioned to move up the value chain. In fact and in an effort to improve the quality of the local IT workforce, 25 educators from universities in Monterrey recently spent eight months studying the training methods used at the Infosys campus in Mysore India.
Mexico along with other Latin American countries have traditionally offered a more stable exchange rate and inflationary environment for USA based companies and given that it is not uncommon for some outsourcing source and destination countries to experience shifts of 30% or more in exchange and IT labor rates, this relative stability makes the entire region an attractive destination for outsourcing USA based work. Moreover, Mexico itself generally follows a pro-market economic policy and for better or for worst, it has an economy closely tied to that of the USA while membership in NAFTA underpins the country’s legal and regulatory policies towards foreign investment.
Nevertheless and as noted in the latest EIU risk assessment for Mexico, the country faces significant macroeconomic risks and has already been badly hit by the recession in the USA with the economy set to shrink by up to 7% in 2009. And although the pace of the decline has slowed to 1.1% in the second quarter from 5.9% in the first quarter, poverty is rising while unemployment has soared to 6% and a further 13% of the labor force is considered to be underemployed.
In addition, the EIU also noted problems with the Mexican legal system together with institutional shortcomings that continue to undermine the enforcement of regulations and laws while efforts to reform the country’s complex tax system, further privatize and reform the energy sector and to increase the flexibility of the labor market remain stalled. Furthermore and although President Felipe Calderón remains popular, his political party suffered seriously losses to the former ruling party (the PRI) in the July midterm elections and his ability to introduce new reforms will largely depend upon the approval of opposition parties in Congress.
However, the biggest risk faced by Mexico is a continued deterioration of or perceived deterioration of the country’s security situation due to rising drug related violence and crime. In fact, the Council on Foreign Relations has estimated that drug related deaths rose from 2,500 in 2007 to 4,000 in 2008 while the Mexican media places the figure at above 5,000 for last year. Moreover, the EIU noted that Mexico’s kidnapping rate is higher than the rate for Brazil and second only to Colombia (although kidnapping gangs do not single out foreigners). And while the strength and visibility of certain armed left-wing rebel groups has diminished in recent years, their very existence could still pose a security risk as social unrest is likely to rise as the local economy continues to feel the effects of the global economic downturn.
However and although much of the recent upsurge in violence is concentrated in border regions while armed rebel groups have tended to operate in more remote areas of the country, many observers from outside of Mexico are increasingly under the impression that the country is one step away from complete lawlessness. In fact, a February 2009 article in Business Week has even suggested that the surge in murders and crime linked to drug trafficking is starting to solidify the country’s reputation as a risky outsourcing site.
The EIU concludes that the operating risk of doing business in Mexico is moderate. However, the EIU notes in particular that security risk is high due to rising violent crime.
Although both India and China have much larger populations and domestic economies, Mexico’s closer proximity to the USA gives it a distinct advantage as a near-shore destination for small and medium scale work outsourced from the USA. Moreover, strong government backing along with a legal and regulatory environment underpinned by NAFTA gives the country a further advantage over both nearshore and more distant offshore locations. However and by far the biggest threat to Mexico’s future as a leading nearshore outsourcing hub and even a competitor to India is the country’s perception for lawlessness and violence stemming from drug trafficking. If Mexico can overcome these perceptions and further increase the depth of its talent pool, the country has the potential to not only solidify its position as the leading nearshore IT services and outsourcing hub for the USA but to also compete head-to-head with India for business from the USA market.
1. “New Report Finds that Mexico’s Internal IT Market is Growing a Shade Below 14% While its Outsourcing Services is Growing at 35.2%.” Business Wire. February 13, 2008.
2. “Outsourcing Services to Contribute 50% of Total IT Sales in 2010.” Business News Americas. May 29, 2008.
3. “IT Industry Set to Grow 13.8% to $12US.5 Billion.” Business News Americas. June 13, 2008.
4. “Govt to Boost IT Investment Levels This Year.” Business News Americas. February 25, 2008.
7. “Mexico: Business Is Standing Its Ground.” Business Week. April 20, 2009.
8. “U.S. Business Turns to Mexico’s Growing IT Industry as Nearshore Outsourcing and Investment Option.” US Newswire. June 26, 2007.
9. “Mexico Country Report 2008.” Economist Intelligence Unit (EIU).
10. “Talking and saving: Competition comes to Mexican telecoms.” The Economist. August 22, 2009.
12. Carrera Riva Palacio, Director General of Domestic Commerce and Digital Economy, Ministry of the Economy (www.mexiconearshore.com/Prosoft.ppt).
14. “Mexico’s objective: Better education = better jobs.” USA Today. May 1, 2008.
15. “China’s Eroding Advantage.” Business Week. June 15, 2009.
17. “Mexico Is a Growing Destination for Information Technology Services; Global Inflation and Currency Fluctuations Shake Up Sourcing Market.” Market Wire. May 19, 2008. | 2019-04-22T05:58:27Z | http://outsourceportfolio.com/mexicos-potential-nearshore-services-outsourcing-leader/ |
Did you ever get your luggage back? The same thing happens with my mom. She was coming from Tunisia 2 days ago.
I've come from Barcelona directly to Casablanca and the Royal Air Maroc lost my baggage. I have no news since 5 days ; If i have one recommandation to all the golf players who want to come and play golf in Morocco, DO NOT TAKE THE ROYAL AIR MAROC or you can say Goodbye to you golf bag.
Has anyone had a response from Royal Air Moroc following reporting missing luggage? I have tried via the Royal Air Maroc world tracer process, and directly with the airport as an enquiry and still no response. Its ben 24 days now since my suitcase went missing in Casa Blanca on the 15 July. It should have been transferred straight from Dubai Emirates flight to Royal Air Maroc to go to Gran Canaria. Emirates have responded stating it made it to Casa Blanca but no response from Royal Air Maroc. I was reassured in Dubai and Casa Blanca airport that my suitcase would be transferred without me having to collect it and check it back in. A response at least would be great for insurance purposes.
This’s my third flight with this airline always very pleasant never had any issues till my return flight from Dakhla to London Heathrow via Casablanca on the 9th of may 2018 I had a connecting flight in Casablanca for 3 hours stop and once at my final destination my luggage didn’t appear made the claim and kept calling the airport and the airline almost every day none seems to know anything they’re telling me the Casablanca airport not even responding to them and it’s been 18 days now!
I will not go into detail because it is not a very pleasant story to tell. This is the most unprofessional airline ever, I cannot believe that they are still in business. I wouldn't take this airline even if the ticket was free.
Did you ever get your luggage back?
I never knew how crappy this airline was till the day of my flight... and then I hear others (even locals) sayig they will never fly with them. My flight first delayed with no vocal announcement, just noted on the digital board only in Arabic and French (we do not speak any of these languages) - in tiny fonts. 11:30pm departure to 3:00am... We were at the airport from 7:30pm (because this was a connecting flight), and the area we were in had no currency exchange booth and only 1 small snack shop which didn't accept credit cards. It was an incredibly LONG wait, and at 1am the airport staff speaks in Arabic, which later we found out our flight was cancelled. It took then 2+ hours to sort out what they were going to do. In the end they prepared a bus to take us to our final destination. We arrived at our hotel, 6:30am. Of course we had to complain. Couldn't believe we had to wait for almost 2 months for them to get back to us with a response. A response saying we will get a refund in 4 - 6 weeks max. Not surprised to see that after more than 6 weeks - no refund. Plus they do not issue you a flight cancellation certificate, which we needed to file a claim for our travel insurance. They never responded to our multiple requests for this and I just gave up, since the deadline to file the claim was approaching by the time they were replying to me. I feel like this is going to be a long battle and it is already draining me... I hope others are getting somewhere with their customer service. Such a horrible airline!
Had same experience also with royal air maroc last sept 2017 delaying my 2 luggages for 2weeks. Received few email from their client service telling me that im eligible for compensation and ask me to send all the documents needed, but until now feb 2018. Nothing arrive in my account and no one replying back again. Now, im considering to sue them. THEN MAYBE WE CAN TALK IN SAME LANGUAGE.
3 weeks later, this useless airline have not giving me any sort of response to my claim. Luggage now lost, no calls being picked up. Only way to illicit response is on twitter where they give meaningless generic responses. Only option is to open case against them.
The worst airline I ever experienced, horrible costumer services, we were ripped off. Sad!
Terrible service and no one picking my calls to explain where my daughters bag is!
It’s the worse airline company one can use unless you are white and Moroccan. At the JFK airport, I was stood for hours before my baggages were checked in because the lady was so busy making calls and cracking jokes with her colleagues. She didn’t know what she was saying about the timeline and the layover and I had to talk to the manager before she realized her mistakes and let me go. Once I landed in Morocco after a delayed flight, there was no room to stay in for my 20hours layover!!! I got to the hotel Fly at 8:30am and I finally got a room at 7pm not to mention that they have public filthy and smelly bathrooms to shower. I was abused verbally by the receptionist, discriminated and yelled at. I complained to a manager who in her turn told me she has nothing to say about the matter but I just have to wait until they call me. I started asking for names to complain to a higher person in the hierarchy but no answers were given to me therefore I decided to record videos of them. The receptionist walked towards me and aggressively fought me to grab my phone out of my hand to delete the recordings. I was hurt physically and emotionally after that trip. I will never use that company again and I’m planning to sue them once I go back to the U.S. for bad treatments and discrimination. They are breathtakingly rude, mean, insulting, racist and all the other worse things one can think of.
I flew from Brazil to Paris in last day of 05/2017, in which my suitcase was completely damaged. I've made the registration when I landed at Paris airport and then in the Royal Maroc Airlines website. Since 07/2017 I have made contact by customer service center and the closest thing I've gotten to solve my problem was a return email requesting the qualification of records, bank account for reimbursement and details of the flight. At the moment, they completely ignore me. TOTAL LACK OF CONSIDERATION AND RESPECT WITH CONSUMER !!!
Hi, I Was one of your flights from Nigeria to Montreal on 30th of Aug 2017. Your services as an airline is very terrible, expecially getting people's bag missing is a regular occurrence with you. I will never use your airline again, and will never allow anybody I know to use it.
I booked in march royal maroc business sept 4 from casablanca to fes returning sept.11.they emailed me the flights were cancelled due to operational problems.i could not accept their dates due to pre paid hotel and tour booking plus I was coming from Asia and could not change international flights.I called the USA toll free number and they promised a refund.I had to book roundtrip taxi service.just out of curiosity,I checked their website and they reinstated Sept 4 flight to Casablanca.i hope i get a refund.
I flew from Brussels to Washington DC with a transit/plane change in Morocco. My bag never arrived in washington DC. I am completely upset as I had items in that bag that money cannot buy or replace as well as clothing and shoes that I love and spent alot of money on. I am so upset. If my bags don't arrive in the next 5 days I will file a complaint with the Better Business Bureau and tell all of my friends and family to NEVER fly this airline. EVER!!! I am beyond disappointed.
Flying Air Maroc was the worst experience of my life (along with my families). We usually fly Egyptair but after an agent took 10k from us, reserved but never issued tickets, we were forced to book with whatever airline was available. Fortunately on the way to Egypt, we were able to fly Airfrance. The customer service was great and the flight attendants were attentive to our needs from NY to Paris and from Paris to Cairo. Unfortunately, on our way back we were forced to fly Air Maroc. Air Maroc flight attendants were unfriendly and unprofessional. Multiple times, my family members or myself requested water that was not delivered. A flight attendant approached my sister, stating that one of her children had been pressing the button that calls for a staff member. In reality, my sis just needed some water for her kids! Flight attendants were never smiling. The actual flight was smooth. Not much turbulence and the pilot had a soothing voice. That was the only positive. Let's go back to the experience in Morocco while waiting for our connecting flight. My mom went to the bathroom and when she came back she realized there was a line to enter the gate. She frantically went to look for us. The man at the gate stated that we went through security already. Why? Really not sure. Then we see my mom. They search her a second time and mistreat my sister, traveling with her two kids. She is approached by a lady that seems to be the head of the staff there and is told to go on one line then to switch lines with her double stroller. The man who was checking my bag, was so unprofessional that it makes me cringe. He was talking to me in Moroccan dialect and I only understand Egyptian Arabic and English. I told him this and he proceeded to make fun of me and mock me. Then he took some items such as zzzquil in containers that I believe fit the weight requirements. I am fine with airlines taking additional safety precautions, and to be honest I didn't check to see what the criteria was for liquids entering the U.S. through Morocco. Perhaps he was right in taking my zzzquil. However, they were so disorganized and so unprofessional. It was a really unpleasant experience. In addition, when we got on the flight there was a woman who was extremely upset that she was separated from all her kids on the flight. Let me play devils advocate for a moment. Perhaps the customer came late. She didn't take a proactive approach to reserving the seats to be with her children. However, reach out to the customers! Provide a level of transparency that will eliminate anxiety. Tell your customers the risk of not reserving seats when you book electronically. Agents, while customers are purchasing tickets, tell them the risks of checking in last minute. This is good customer service! Not waiting for a woman to get on a flight, only to realize she's separated from her 5 children who are flying for the first time! The nightmare with Air Maroc hasn't ended. Let's discuss overbooking and the anxiety and hysteria caused by this airline. My fiancé and my 16 year old brother were traveling back from Cairo to NY on Air Maroc. I was still in Hurghada at the time and in contact with my fiancé throughout his nightmare at the airport. Him and my brother go through security, only to be told by the agent that the flight is overbooked. They tell him they will put him on a direct flight to NY by Egyptair. I knew this was a lie because Egyptair is almost always fully booked. The next lie was "we will put you on a connecting flight from Jordan to NY". An hour passes and Egyptair representative says "sorry no flights into JFK today, stay in a hotel". At this point, I am at a beautiful all inclusive resort in Hurghada hysterical! I feel completely responsible for my fiancé, who has traveled for the first time to Egypt to meet my extended family. Eventually, after my soft spoken overly polite fiancé raises his voice with the reps, they put him and my brother on a flight to Munich, Germany and then NY. I am so displeased with Air Maroc.
This airline is Horrible...When you arrived at their Airport they act as thought they do not understand English, and speak french. When you speak French in return to them the respond Arabic. The people at the Casablanca Airport are ignorant and rude and are of no help. Never again they will receive my money and anyone I know who is traveling to Africa from the US. I have already stop 10 people from flying with them. They need to address their poor costumer service at the airport and immigration and airline levels.
I've had a terrible experience with Royal Air Maroc last month! I found the forum as I'm searching for the dollar limit for lost luggage reimbursement. I flew from JFK to Madrid with a layover in Casablanca. I was told it is checked to my final destination but it never arrived! I checked both airports twice - nothing in their lost and found closets. I think the lady at the JFK check-in stole it because as I transferred a bag of clothing from my carry-on into my checked-in bag (my carry-on was too heavy), her eyes were all in my bag - and when I arrived back to New York a week later, I was told that there is NO RECORD of my bag! The 800-customer service line never called me after creating a ticket in Madrid - until I went on Twitter and blasted them - on their twitter account and Direct Message. That is the ONLY way I got a response - I had to tweet both in Morocco and NYC to get a phone call. I emailed everyone I could find on the board of JFK and filed a report with the Port Authority. My attorney asked them to retain video at the counters - I was ignored. The 800 number wouldn't give me the airline's JFK manager's name and extension, and they're never at the counter unless a flight is taking off, which is when I'm at work. This has been a NIGHTMARE experience and I highly recommend selecting ANOTHER airline, regardless of how cheap these prices are!
I lost my luggage on June 10,2017 I flew from Paris-DC via Casablanca, I filled a form at the IAD airport, but no tracking number provided to me. The staff told me he will send me an email but after 24 hours, NO EMAIL!I contacted the RAM airline,NO response!! what shall I do next!? I really need my luggage!
Could not find an agent in Doha, called the call centre in Casablanca and waited for 46 minutes and eventually had to hang up with no answer. and after paying an expensive overseas phone call.
Hi, I arrived at JFK yesterday 5/28/2017 and they lost one of baggages, they gave me the same contact number as others but I haven't gotten any info on where possibly my luggage is, they say they can not locate in anywhere like it has disappeared! Anyone lucky enough to get a response from them?!
This is the worst company I have ever seen.please don't take this airplane if you have other choices.because if there are some problems,nobody will help you and they will be always lying to you.
I travel with Air Maroc to Freetown during December unfortunately we missed our flight and we have to pay another £2,600 for return flight for 3 passengers back to London after we already brought the ticket for £2,500. I brought the ticket from an agent Jays Enterprises LTD. I think that I have been treated unfairly.
Hi good evening , I'm portia amoako please I want to know if I can travel with the receipt of my documents, if I may the documentime will expire coming February 4 and I have done the processing but will be going for it in aprile and I want to know if I can travel with my receipt.
I last posted on 21 December when serviceclient@royalairmaroc sent me a standard letter stating that they would try to reply in 30 days. Guess what? 30 days have passed, and I've received no reply. When I chased, I got another automatic reply (in French) apologising that they couldn't deal with correspondence directly, and referring me to www.royalairmaroc.com/ma-fr/Nous-contact... These guys are jokers.
One more here, I flew fr om Casablanca to Berlin and now it's been two weeks since RAM lost it and no one knows wh ere is it. Berlin airport just passed the responsibility to RAM and now I'm totally sure after seeing so many negative responses that my baggage is lost forever. Crappy airline DON'T USE IT PEOPLE!
Unfortunately I have to report one more case of disappearing luggage in Casablanca. We arrived from Ouarzazate last week ot be transferred to MAsterdam. It was chaotic at the airport, and in Amsterdam onoy on eof our bags appeared. Seen to the number of complaints here and other fora I wonder if it makes sense to take luggage anyway with you when travelling over casablanca airport.
My sad experience with Royal air Morocco. I boarded their plane fr om Lagos(Nigeria) to Casablanca and Casablanca to JFK(New York) on Saturday 24/12/2016 on getting to NY one out of two my baggages were no wh ere to found. I laid a complained on their desk a form is given to me and a card. On the card were a claim number and a phone number(718 751 2691). I was to call the number after 2 workings day which I did, but it was "No information about your bag" response I got from them. After that the phone number which was given to has been called time without number but nobody picked the call. Up till now after 14days of boarding their aircraft I have not received any information concerning my bag. It is my first time of using their airline and it was a very bad experience and they say "first impression last long" I have written emails to [email protected], [email protected] and [email protected] no response whatsoever. Pls, can someone tell me what next to do? I am highly disappointed and in so much distress now.
Dear customer I fact you let me getting crazy about my luggage,you let my trip becoming useless,disappointed because without that my luggage am disappointed my marrying ceremony the luggage is full of my wife dress,shoe etc and including me too I need it this week and look at what you are doing to me you let me regret for your bad service,my question is if I didn't get it in time with this week what am I going to do with my program?
I boarded flight number AT201on the 17/12/2016 from New York to Morocco and flight AT515 from Morocco to Ghana . I arrived in Ghana on the 19/12/2016 and I have still not received my two baggages. They have gone missing and no one is telling me anything. What kind of bad services is that . You haven't only lost one customer but you have lost a million of customers. I'm still hanging on waiting to get my baggages.
I'm the guy who posted the saga about 20 November. Apologies that it came up twice - one of the problems of managing without my laptop! So, a week goes by and I get a nice phone call from a lady in London. I'm being even-handed, here. She tells me that the right place to direct my correspondence is serviceclient@royalairmaroc. I think this email address was mentioned in one of the other threads posted. The lady also apologised that I got no response on 020 7307 5870, as it's only manned Monday to Friday in office hours. Note that. My email to serviceclient generated a response in French that they would endeavour to reply within 30 days. We shall see.
On Sunday 20 November, I flew fr om Freetown/Lungi to Casablanca (Flight AT564) then Casablanca to Heathrow Terminal 4 (AT800). I checked in two cases at Freetown for transfer through to Heathrow. Once at Heathrow, I was scheduled to fly on to Delhi with Air India the same evening. So I had to do a further check in and had limited time on my hands. I went straight from Arrivals to Departure, wh ere I unlocked and opened both cases. I found my tablet laptop, packed in Freetown, was missing. The case padlock was in tact, but the case zip wasn’t properly aligned. The laptop had been in the middle of the case, not in any way visible. I judge that the laptop was picked up by an X-Ray scanner, then the case forced open somewhere along the baggage handling process, and the stuff expertly removed. I went straight to the Royal Air Maroc counter in Area E. No staff were present. I asked what I should do at the main Terminal Enquiry Desk. They said I needed to report at Arrivals, so I went back. There I was referred back to the RAM desk in Departures. On my phone I found the main UK contact number from the Royal Air Maroc web site - 020 7307 5870. After ringing for a time, the call terminated with no answer. Back in Area E, staff from another airline said that the correct procedure was to return to Arrivals via Customs. But I would need authorisation or permission. I got the contact phone number left on the vacant RAM vacant desk – 020 7307 5800. I rang this, and spoke to a customer service assistant. I explained that I needed to report the loss because I was due to fly out within a few hours. The lady told me that she was unable to take such a message and pass it on. My situation could only be helped at Heathrow. I repeated that I had already spent over an hour trying to do this. I spoke to the supervisor. She confirmed that I couldn’t even leave a message. RAM’s own claims conditions specify that contact must be made in five days. Neither of these members of their staff said they were sorry about my situation. Neither did they offer any alternative solution. I went online again and rang your main international customer service line – 00212 5 2248 9797. I was helpfully passed to someone who spoke English. I explained that I’d reached a dead end with their UK staff. I repeated my request for a message to be recorded. I got the same response: no. Except, that I was told that because all baggage handling is contracted out, that I should send an email. I sent an email from my phone to the customer service claims @royalairmaroc.com. It bounced back – not able to be delivered. I redirected it to [email protected]. It also bounced back. This is the main international internet contact address. So I sent it to [email protected]. I believe that was delivered. I have had no replies. I can see that some aspects of my situation were unusual • Having to go directly and hastily from Arrivals to Departure because I had an onward flight connection; • The incident happening on a Sunday afternoon when (as far as I could tell) there were no further Royal Air Maroc flights that day. But who can explain: • Why the published phone number 020 7307 5870 didn’t get answered? (My daughter also Googled it and texted it to me) • Why the UK customer service team couldn’t even take and pass on a simple message? • Why no-one in Heathrow could tell a Royal Air Maroc passenger how to progress the predicament? (I picked up a standard claim form on my subsequent return to Terminal 4, but Royal Air Maroc wasn’t displayed at the counter.) • Why the international customer service team didn’t offer to back-stop the situation? • Why the main international internet address didn’t work? I sent these incident details to the following RAM Offices: • London Office, 32-33 Gosfield Street, W1W 6ED • Head Office, Director of Customer Services, Aeroport de Casablanca-Anfa, Casablanca, Morocco • Baggage Service, PO Box 978, 1111 PRAHA 1, Czech Republic Over a week has gone by and I’ve had no response either by phone, letter or email from any of these three offices. So I’ve now written again. Originally I was mainly concerned to get an incident notification as promptly as possible to support an insurance claim. But now I feel like writing to King Mohammed VI and telling him his airline isn’t worth his patronage.
Royal Air Maroc aka RAM. I have a little inside knowledge of the company. It's a shambles. They treat their staff abysmally. The cabin crew are paid so poorly they live ten to a house. They are incredibly racist to non Moroccans who work for them. They have foreign pilots paying them to work so they can build their hours. These foreign pilots are treated like trash. They receive no income or benefits from the company. There is a culture of manipulation, fear and mistrust throughout. The airline is propped up by the king. They do not declare incidents in the way they legally should. They have so many safety incidents they should be shut down. The whole company is organisational chaos. It's run by game players and lieing self serving hypocrites. An atrocious company. Stay away!
My wife she comeback from morocco and she have extra luggage first one of 23 kg and the second one with 10 kg they charge her $1500 dh for the first one which is okay but they charge her$ 2500 dh for 10 kg .oh my god they rap their customer . I did call my agency Oussadane and they said that RAM have no right to charge you $2500 dh for the second bag according to RAM policy they suppose to charge 1500 dh not 2500dh. I did send email to service client of RAM they respond after 30 days with no result.
We flew with ram back on 16/8/2016, fr om Casablanca to JFK, we lost a luggage, we did a declaration in the airport, we left to another state, I called every day at least 3 times a day, no answer. I send a friend to the airport to check for me, he could not get any answer. Still waiting for a respond from RAM. Anybody know a good contact # wh ere I can reach them please. Thank you very much.
RAM lost a checked bag of mine on 9/3/16. After continual calls to Casablanca over the course of the past 4 days, I cannot get through to anyone who will help. They tell me to contact Swissport at JFK. They insist the bag was loaded on a flight on 9/4. After trekking out to JFK last night and speaking directly with the handler who unloaded baggage from the flight on 9/4, he confirmed it is not at JFK. RAM insists the bag was sent and to contact Swissport at JFK. I've emailed and called Nancy Caruso at their office in NY, but have not received a reply. Does anyone have contact information for one human being at this airline who will reply and provide customer service? I will make a personal visit to their NY office if I cannot get through to a helpful person.
Guest : Pathetic airline. We boarded flight on 30th from Madrid to JFK via Casablanca with two baggage and none of them arrived. It had expensive shoes and clothes in it which we shopped during our vacation in Europe. They gave us a number to track our baggage but no one is picking up the phone goes to voicemail. Most pathetic airline. Did you finally find your two bags ???? They lost one bag of mine and refuse to help in any way !
Delayed baggage no reason given. It was just left behind. Will not travel with air maroc. The flight from london gatwick to rabat was good so it is a shame.
Guest : Pathetic airline. We boarded flight on 30th from Madrid to JFK via Casablanca with two baggage and none of them arrived. It had expensive shoes and clothes in it which we shopped during our vacation in Europe. They gave us a number to track our baggage but no one is picking up the phone goes to voicemail. Most pathetic airline. Hi ! did you get your baggage finally. This is a Fascist Airline suffering from a severe form of mental disease !
Same here. Travelled from west africa to jfk got 1 bag on the 31 of july and 4 days later they sent me a wrong bag. You call million times, voicemail. I am stuck with someone else bag and they are still looking for solution to take the wrong one back to the airport since i am living in Philadelphia.
I was on the same flight and did not get my luggage either. I am furious it has been 3 days and not answers. I went to Europe for my Birthday and Anniversary and this was the worst experience of my life.
Pathetic airline. We boarded flight on 30th from Madrid to JFK via Casablanca with two baggage and none of them arrived. It had expensive shoes and clothes in it which we shopped during our vacation in Europe. They gave us a number to track our baggage but no one is picking up the phone goes to voicemail. Most pathetic airline.
You need to improve on your services.i travelled from Charles De guelle from 18th to marakesh and today is 22nd up to now I haven't received my luggage.i am forced to start buying new clothes.
Once you've got any trouble with your baggage, You'll understand that this is the worst airline ever. Customer service would never help you.
Hi I bought two ways tickets from your airline.. My flight is in 31 of may from istanbul to Rio de Janeiro, and a long stop i= n casabilanca.. I am from iran , i need a transition visa for casablanca?????? I have just brazile visa? What's your rule for iranian passengers? They need= Morocco visa or not?
The worst flight ever, that is all I can say.
I am an experienced traveler and travel frequently around to different parts of the world in my line of work , with all kinds of different airlines, but I have never in my life been through such a terrible experience that i have experienced on Royal Air Maroc. I was officially invited to represent my organization in Sweden by the MASA festival, having my flight booked and paid for by MASA. To start, the journey on 8/3/16 fr om Stockholm to Abidjan via Casablanca went well, I had a good stay in Abidjan during the three days, but my life's worst experience started when I was supposed to fly home from Abidjan to Stockholm during the night of 11 March. On March 11, 2016, I was on time at the check-in at Abidjan airport to go home to Stockholm. At the airport I received the unexpected message that the plane was full /over booked and I could not fly home as planned, even though I had a confirmed ticket and was there on time. Many of my fellow travelers on site were * and complained loudly at that they could not fly even though we all had confirmed tickets. After some very vague and unclear explanations from the staff on the site, the situation forced me to return to the hotel wh ere I was staying again and spend yet another full day in Abidjan. However, I behaved very calmly and tried to be understanding, which can not be said for other travelers who were very * and argued louldy with airport staff. In fact the ambiance at the airport felt hostile and aggressive. The day after I arrived at the airport as agreed and got my boarding card – but only as far as Casablanca i.e not my final destination whcih was Stockholm, in contrast to the others who received boarding cards all the way to their final destination after Casablanca. One of the desk officers, told me that I would get my second boarding pass when I land in Casablanca and must contact staff on the spot, I asked several times if he was sure that I would get the boarding pass for my onward journey from Casablanca, and he responded by saying "Yes, 100%". Just to make sure, I talked to the country manager for Royal Air Maroc in Abidjan about my further travel to Stockholm and he guaranteed me there would be no problem, and took a copy of my boarding pass to send the message to Casablanca and also said that I will go to Stockholm via Geneva the same day when landing in Casablanca. I thanked him and flew on to Casablanca. Arriving in Casablanca early in the morning, I went directly as agred with the manager in Abidjan to Royal Air Marocs ticket office and asked to get my boarding pass to Stockholm via Geneva. I was then was told that they could not help me and I just had a trip to Casablanca and they had no further details about it. I was sent to a female manager at the Check in at the airport in Casablanca, again I told her about my situation and asked for help with my trip to Stockholm. It was the same answer: that she can not help me. Finally I found a cellphone number to the person who arranged the boarding passes in Abidjan and called and explained the situation, he asked to speak directly to the manager in Casablanca – who inretuen the refused to talk to him on the phone. He then in return gave me the phone number to the country manager of Royal Air Maroc in Abidjan, who promised to organise my trip all the way to Stockholm. I started to call the manager early in the morning and proceeded to call all day, but he responded by closing off the phone several times. I also sent more than 10 text messages asking him for assistance but he completely ignored me. After a whole day of waiting for some sort of info or help that never came, I decided to arrange my trip by self and go home via Paris – i.e spend overnight there and then on to Stockholm. I have been cheated, lied to and unprofessionaly and poorly treated by the country manager for Royal Air Maroc in Abidjan and his staff and reveived a very very bad attitude from the staff of Royal Air Maroc at the airport in Casablanca.
THE WORST COMPANY EVER! I lost my bag and not only that I did not got it back, but no one answers the phone. These are the phone numbers that "customer service" gave me: 0522499583, 0522499584, 0522499587, 0522499548, 0522499559, 0522499558, and imagine what?! No one answered on any of these nearly for a week. This police officer hang up the phone because I do not speak French. They do not have Lost&Found Service, and they tell you it cannot be reached by phone, only by email. But then, if you ask them for email, they spell: www.royalairmaroc.com?!?!?! Thefts and cheaters, that is what they are!!!!
Never travel to Europe with Royal air Maroc. They will stop you from boarding even if your boarding passes and schengen are visas in order. I just lost 3000€ on tickets and no answer to complaints on mail or by phone. I wouldn't recommend anybody to travel with such a bad service company.
DO NOT FLIGHT WiTH RAM. THEY WILL STEAL YOUR BAGGAGE, WILL NOT COMPENSATE AND WILL BE UNREPENTANT. | 2019-04-21T08:31:56Z | https://forum.airlines-inform.com/Royal_Air_Maroc/ |
:"For opposition to all forms of government, social hierarchy or authority, see Anarchism. For other meanings see also radical, extremism, far-right and far-left. Radicalism as a political movement should be distinguished from the modern American usage of radical merely to denote political extremes of right or left."
The term Radical (Latin "radix" meaning root) was used during the late 18th century for proponents of the Radical Movement and has since been used as a label in political science. It can be described for those favoring or trying to produce thorough political reforms which include dramatic changes to the social order of a society. Historically, early radical aims of liberty and electoral reform in Great Britain widened with the American Revolution and French Revolution so that some "radicals" sought republicanism, abolition of titles, redistribution of property and freedom of the press. Initially identifying itself as a far left party opposed to the liberal Orleanists, the Legitimists and the Bonapartists in France in the nineteenth century, the Republican, Radical and Radical‐Socialist Party progressively became the most important party of the Third Republic (1871 – 1940). As historical Radicalism became absorbed in the development of political liberalism, in the later 19th century in both the United Kingdom and continental Europe the term Radical came to denote a progressive liberal ideology.
According to "Encyclopedia Britannica" the first use of the word "Radical" in a political sense is generally ascribed to the English whig parliamentarian Charles James Fox. In 1797, Fox declared for a "radical reform" of the electoral system drastically expanding the franchise to the point of universal manhood suffrage. This led to a general use of the term to identify all supporting the movement for parliamentary reform. The "Britannica" biography of Fox mentions his dismissal from the Privy Council in 1798 for reaffirming the doctrine of the sovereignty of the people in a public speech. However, the biography does not describe the specifics of Fox's declaration. Fox was no democrat: he would never have countenanced the notion that property would be safe in a democratic society in which the property-less voters would obviously be in a majority. Fox stated his view as being that property was the true foundation of aristocracy, and a country best prospered whose government was in such hands. These sentiments appear to be at odds with the Radical cause, but at this time parliament operated on shifting patronage rather than party lines, and Fox was noted for inconsistencies.
The word was first used in a political sense in 18th century Great Britain. Initially confined to the upper and middle classes, in the early 19th century "popular radicals" brought artisans and the "labouring classes" into widespread agitation in the face of harsh government repression. More respectable "Philosophical radicals" followed the utilitarian philosophy of Jeremy Bentham and strongly supported parliamentary reform, but were generally hostile to the arguments and tactics of the "popular radicals". By the middle of the century parliamentary Radicals joined with others in the Parliament of the United Kingdom to form the Liberal Party, eventually achieving reform of the electoral system.
The Radical movement had its beginnings at a time of tension between the American colonies and Great Britain, with the first Radicals, angry at the state of the House of Commons, drawing on the Leveller tradition and similarly demanding improved parliamentary representation. These earlier concepts of democratic and even egalitarian reform had emerged in the turmoil of the English Civil War and the brief establishment of the republican Commonwealth of England amongst the vague political grouping known as the Levellers, but with the English Restoration of the monarchy such ideas had been discredited. Although the Glorious Revolution of 1688 had increased parliamentary power with a constitutional monarchy and the union of the parliaments brought England and Scotland together, towards the end of the 18th century the monarch still had considerable influence over the Parliament of Great Britain which itself was dominated by the English aristocracy and by patronage. Candidates for the House of Commons stood as Whigs or Tories, but once elected formed shifting coalitions of interests rather than splitting along party lines. At general elections the vote was restricted to property owners, in constituencies which were out of date and did not reflect the growing importance of manufacturing towns or shifts of population, so that in many rotten boroughs seats could be bought or were controlled by rich landowners, while major cities remained unrepresented. Discontent with these inequities inspired those individuals who later became known as the "Radical Whigs".
William Beckford fostered early interest in reform in the London area. The "Middlesex radicals" were led by the politician John Wilkes, an opponent of war with the colonies who started his weekly publication "The North Briton" in 1764 and within two years had been charged with seditious libel and expelled from the House of Commons. The Society for the Defence of the Bill of Rights he started in 1769 to support his re‐election developed the belief that every man had the right to vote and "natural reason" enabling him to properly judge political issues. Liberty consisted in frequent elections. For the first time middle‐class radicals obtained the backing of the London "mob". Middlesex and Westminster were among the few parliamentary constituencies with a large and socially diverse electorate including many artisans as well as the middle class and aristocracy, and along with the county association of Yorkshire led by the Reverend Christopher Wyvill were at the forefront of reform activity. The writings of what became known as the "Radical Whigs" had an influence on the American Revolution.
Major John Cartwright also supported the colonists, even as the American Revolutionary War began, and in 1776 earned the title of the "Father of Reform" when he published his pamphlet "Take Your Choice!" advocating annual parliaments, the secret ballot and manhood suffrage.
In 1780 a draft programme of reform was drawn up by Charles James Fox and Thomas Brand Hollis, and put forward by a sub‐committee of the electors of Westminster. This included calls for the six points later adopted in the "People's Charter" (see Chartists below).
The American Revolutionary War ended in humiliating defeat of a policy which King George III had fervently advocated, and in March 1782 the King was forced to appoint an administration led by his opponents which sought to curb Royal patronage. In November 1783 he took his opportunity and used his influence in the House of Lords to defeat a Bill to reform the British East India Company, dismissed the government and appointed William Pitt the Younger as his Prime Minister. Pitt had previously called for Parliament to begin to reform itself, but he did not press for long for reforms the King did not like. Proposals Pitt made in April 1785 to redistribute seats from the "rotten boroughs" to London and the counties were defeated in the House of Commons by 248 votes to 174.
In the wake of the French Revolution, Thomas Paine's "The Rights of Man" (1791), written as a response to Burke's counterrevolutionary essay "Reflections on the Revolution in France" (1790), encouraged mass support for democratic reform along with rejection of the monarchy, aristocracy, and all forms of privilege. Different strands of the movement developed, with middle class "reformers" aiming to widen the franchise to represent commercial and industrial interests and towns without parliamentary representation, while "Popular radicals" drawn from the middle class and from artisans agitated to assert wider rights including relieving distress. The theoretical basis for electoral reform was provided by "Philosophical radicals" who followed the utilitarian philosophy of Jeremy Bentham and strongly supported parliamentary reform, but were generally hostile to the arguments and tactics of the "popular radicals".
Popular Radicals were quick to go further than Paine, with Newcastle schoolmaster Thomas Spence demanding land nationalisation to redistribute wealth in a penny periodical he called "Pig's Meat" in a reference to Edmund Burke's phrase "the swinish multitude". Radical organisations sprang up, such as the London Corresponding Society of artisans formed in January 1792 under the leadership of the shoemaker Thomas Hardy to call for the vote. One such was the Scottish "Friends of the People" society which in October 1793 held a "British Convention" in Edinburgh with delegates from some of the English "corresponding societies". They issued a manifesto demanding universal male suffrage with annual elections and expressing their support for the principles of the French Revolution. The numbers involved in these movements were small, and most wanted reform rather than revolution, but for the first time working men were organising for political change.
The government reacted harshly, imprisoning leading Scottish radicals, temporarily suspending habeas corpus in England and passing laws prohibiting public meetings and demonstrations. Throughout the Napoleonic Wars the government took extensive stern measures against feared domestic unrest. The corresponding societies ended, but some radicals continued in secret, with Irish sympathisers in particular forming secret societies to overturn the government and encourage mutinies. In 1812 Major John Cartwright formed the first Hampden Club, named after the English Civil War Parliamentary leader John Hampden, aiming to bring together middle class moderates and lower class radicals.
After the Napoleonic Wars, the Corn laws (in force between 1815 and 1846) and bad harvests fostered discontent. The publications of William Cobbett were influential, and at political meetings speakers like Henry Hunt complained that only three men in a hundred had the vote. Writers like the radicals William Hone and Thomas Jonathan Wooler spread dissent with publications such as "The Black Dwarf" in defiance of a series of government acts to curb circulation of political literature. Radical riots in 1816 and 1817 were followed by the Peterloo massacre of 1819 publicised by Richard Carlile who then continued to fight for press freedom from prison. The Six Acts of 1819 limited the right to demonstrate or hold public meetings. In Scotland agitation over three years culminated in an attempted general strike and abortive workers' uprising crushed by government troops in the "Radical War" of 1820. Magistrates powers were increased to crush demonstrations by manufacturers and action by radical Luddites.
To counter the established Church of England doctrine that the aristocratic social order was divinely ordained, radicals supported Lamarckian Evolutionism, a theme proclaimed by street corner agitators as well as some established scientists such as Robert Edmund Grant.
Economic conditions improved after 1821 and the United Kingdom government made economic and criminal law improvements, abandoning policies of repression. In 1823 Jeremy Bentham co‐founded the "Westminster Review" with James Mill as a journal for "philosophical radicals", setting out the utilitarian philosophy that right actions were to be measured in proportion to the greatest good they achieved for the greatest number. Westminster elected two radicals to Parliament during the 1820s.
From 1836 working class Radicals unified around the Chartist cause of electoral reform expressed in the "People's Charter" drawn up by six members of Parliament and six from the London Working Men's Association (associated with Owenite Utopian socialism), which called for six points: Universal suffrage, equal‐sized electoral districts, secret ballot, an end to property qualification for Parliament, pay for Members of Parliament and Annual Parliaments. Chartists also expressed economic grievances, but their mass demonstrations and petitions to parliament were unsuccessful.
Despite initial disagreements, after their failure their cause was taken up by the middle class Anti-Corn Law League founded by Richard Cobden and John Bright in 1839 to oppose duties on imported grain which raised the price of food and so helped landowners at the expense of ordinary people.
The parliamentary Radicals joined with the Whigs and anti-protectionist Tory Peelites to form the Liberal Party by 1859. Demand for parliamentary reform increased by 1864 with agitation from John Bright and the Reform League.
When the Liberal government led by Lord Russell and William Ewart Gladstone introduced a modest bill for parliamentary reform, it was defeated by both Tories and reform Liberals, forcing the government to resign. The Tories under Lord Derby and Benjamin Disraeli took office, and the new government decided to “dish the Whigs” and “take a leap in the dark” to take the credit for the reform. As a minority government they had to accept radical amendments, and Disraeli's Reform Act of 1867 almost doubled the electorate, giving the vote even to working men.
The Radicals, having been strenuous in their efforts on behalf of the working classes, earned a deeply loyal following; British trade unionists from 1874 until 1892, upon being elected to Parliament, never considered themselves to be anything other than Radicals, and were labeled Lib-Lab candidates. Radical trade unionists formed the basis for what would later become the Labour Party.
In the aftermath of the Napoleonic Wars it was technically illegal in France to openly advocate republicanism until 1848, so republicans usually called themselves "radicals" and the term "radical" came to mean a republican (who, by definition, supported universal manhood suffrage). From 1869 a faction, led by Georges Clemenceau, calling themselves Radicals claimed to be the true heirs of the French revolutionary tradition and drifted away from the moderate republicanism of Léon Gambetta. At Montmartre in 1881 they put forward a programme of broad social reforms. At that time, Radicals located themselves on the far left of the political board, opposed to the "Republican opportunists" (Gambetta), the liberal Orleanists, the Legitimists (both monarchist factions) and the Bonapartists.
These radicals then formed the Radical-Socialist Party (or Republican, Radical and Radical-Socialist Party, to give it its full name) in 1901, which was the first French left wing modern party. Four years later, the socialist French Section of the Second International (SFIO) party was formed by the fusion of Jean Jaurès's and Jules Guesde's rival tendencies; and the French Communist Party (PCF) was created in 1920. The Radical Socialist Party continued to be the main party of the Third Republic (1871 – 1940), but was discredited after the war due to the role of Radical members of the National Assembly in voting for the establishment of the Vichy regime. The Democratic and Socialist Union of the Resistance was established after World War 2 to combine the politics of French radicalism with credibility derived from members' activism in the French resistance.
Opposing Gaullism and the Christian Democrat People's Republican Movement (MNR), Pierre Mendès-France tried to anchor the Radicals to the left wing. Although he managed to put an end to the First Indochina War through the Geneva Accords signed in 1954 with North Vietnam's Premier Pham Van Dong, he finally left the party in 1961 to join the Unified Socialist Party (PSU) which advocated workers' self-management, while the Radical Party split into the more conservative Radical Party "valoisien", the legal successor of the Radical Party, and a faction advocating alliance with the left, named the Left Radical Party. The "Parti radical valoisien" moved to the center right and affiliated itself first with the pro-Giscard d'Estaing UDF, then with the conservative Union for a Popular Movement (UMP), while the Left Radical Party, which claims to be the political heir of the Republican Radicals, has close ties to the Socialist Party.
In continental Europe and Latin America, as, for instance, in Italy, Spain, Chile and Argentina, Radicalism developed as an ideology in the 19th century to indicate those who supported, at least in theory, a republican form of government, universal male suffrage, and, particularly, supported anti-clerical policies. In northern and central European countries, like Germany this current is known as Freisinn ("Free Mind" — German Freeminded Party from 1884 to 1893, then Eugen Richter's Freeminded People's Party — and the Free Democratic Party of Switzerland). However, by the twentieth century at the latest, radicalism, which did not advocate particularly radical economic policies, had been overtaken as the principal ideology of the left by the growing popularity of socialism, and had become an essentially centrist political movement (as far as "radicalism" survived as a distinct political ideology at all). | 2019-04-20T02:18:02Z | http://enacademic.com/dic.nsf/enwiki/1060120 |
The dry ground crunched with every step Moira took into the deserted village. Kakariko was never the same after the invasion of Twilight a century ago. It had made a small resurgence after the war's end, but the threat of the Dark One had sent its inhabitants into hiding. From the look of the decrepit buildings, no one would ever guess that people still lived there. But Moira knew better.
A gust of wind came through the canyon, blowing her sandy-colored hair into her face. She brushed it away and kept walking. Dust from the road covered her traveling clothes; the green vest she wore over her cream tunic looked almost grey, and her brown boots fared no better. The hem of her dark green cloak was stained with dirt. It had been a long journey.
Passing the ruins of the old bell-tower, she climbed the steep path towards the graveyard. When she made it to the top of the path, all was as she expected. The dead trees stood, with crows perched on their branches. The ancient tombstones, cracked and weather-worn, lined the path. And the Kakariko messengers stood at the end of the path.
Moira approached them. One was a young man, about 21 years of age, with fair hair and skin. The other man was older, with grey-streaked brown hair and tan skin. "I'm not going to pretend that anything's different." she said bluntly. "You don't need to tell me that." the young man curtly replied. "Doren hasn't changed his mind, and neither will your father." "Kairen, this is ridiculous!" exclaimed Moira. "The colonies can't not trade forever just because of a silly dispute over weapons. What does Doren think he can do with a few more swords and axes?! And if I have to make this journey one more bloody time with the same bloody answer...."
"Actually..", said the older man. "I wouldn't call your journey pointless, messenger. There is something I would ask of you." Moira looked at him. That is odd, she thought. Endor had never acknowledged her before, much less spoken to her. She knew what he thought of Ordonians.
Endor pulled a small leather pouch from his pocket. "I don't know what this is." he said. "None of us do; but we've had it here, among us, for decades. Our wise woman says it is a cursed object, but we've not dared to touch it, so we do not know for sure. But yesterday...."
He opened the pouch and showed its contents to Moira. Inside the pouch was an object about the size of a fist. It was black, and pointed at both ends, with odd markings and lines carved onto its surface. Except that the markings glowed a bright blue.
Endor continued, "Yesterday we saw a stranger pass through the streets of the villiage. A woman, with red hair, and wearing strange clothes. She went into the old shop building. When she came out, she took the north gate. If she took that route, she was either heading for Castle Town or the Bridge of Eldin. In any case, when she was close by, this thing...no, the entire pouch even, began to glow. And it hasn't stopped glowing since then."
Moira stared at the object in fascination and horror. She didn't know what she was looking at, but she knew magic when she saw it. And she knew that magic, in these times, was dangerous. The Dark Hylians could sense it, smell it in the air. Slowly she began to realize what Endor wanted her to do.
"You want me...to take this...this thing? So that it won't attract the Dark One to Kakariko?"
"Why, so that you can stay safe while I take this magic back to Ordon and wait for them to find US? You can't be serious!"
"No!" Kairen interjected. "We wouldn't do that to you! We just....can't keep this here, don't you understand? If you take the north gate, you can cross the Field to the gorge on the far side..."
"...and throw this accursed thing as far as you can.", finished Endor. "Dark Hylians are powerful and dangerous, but they aren't all-powerful. They won't find whatever this is down there."
"But, what about that woman? The one who came here" asked Moira. "Whoever, or whatever she is, she must know something about this...?"
"Do what you will; find the woman or get rid of this trinket. Just take it now and leave!" said Endor.
Ryoo had taken a detour from his normal route to try and prove suspicions he had developed when he was on his first route. He could feel there was something wrong. Standing in the middle of the Eldin side Hyrule field, he felt the feeling grow. He started to look at the landscape for an anomaly.
Coming out of Kakariko, an Ordonian noticed the most peculiar thing; a Hylian in a robe was looking around the field with a dazed look on his face, as if searching for something. Suddenly, the boy cried out "There!" and looked directly at her. "You, come here! There's something weird with you."
Whatever reason she had, she felt inclined to go to him and know what he was talking about. when she got there, she saw the dazed look was now incredibly serious.
"You have a twilight sensor on you. The Dark Hylians used it to find and kill the twili. If you look at it, it's glowing at different levels at random times." He was right about that.
"But their not really random. It is entirely dependant on where that girl who ran past is in relation to that stone. Toss it or keep it, I don't mind. I require the fact that your a messenger."
6. forgive her about the 's I didn't put on the paper."
She had to speak up. "You sent her on this quest and now your sending me on it!? Are you mad?"
"No, you have an advantage now. You can find her in Snowpeak and that stone has a small being in it. Now, I'll be off. Good luck."
He simply decided to walk south as there were no more imminent detours and this was the fastest way to the lake.
She, however, stood there watching him leave, questioning that encounter.
Moira stood, holding the horse's halter in one hand and the yellow stone in the other. She gazed at it. "What...." she murmered to herself. "...in the name of Ordona have I gotten myself into?" She shivered and placed the stone in one of her pockets. If she was carrying around something alive, she wanted to be rid of it as soon as possible.
The stranger had said the mysterious woman had gone to Snowpeak. Moira had never been there, but she knew the way to Zora's Domain. She mounted the horse and headed for the bridge of Eldin. She didn't trust the stranger, but she didn't have any other ideas, so she hoped he was telling the truth.
She shuddered at the thought. The Twili had incredible powers. They had powers of teleportation, but more frightening were their powers of transformation. During the invasion, the Usurper King had transformed his own subjects into Dark Beasts. Was this similar magic....?
Moira gasped and immediately halted her horse. "Oh, dai'sha...." she said, cursing in Hylian. She had passed the Bridge and had made good progress into the barren North Lands. If she went a few miles more, she would re-emerge in Hyrule field, where she could find the path to Zora's Domain. But she would go no further with the Twilight relic. She dismounted and ran ahead as fast as she could.
She had ridden this far with that thing? What was she thinking? Her fingers would barely have to brush the object for its powers to work on her! She knew there was a crevice up ahead, with a small bridge over it....she would get rid of it. She would throw that thing in the abyss!
she reached the bridge. The ground gave way to darkness on both sides of her. She reached into her pocket and pulled out the small pouch. It glowed more than it had when she recieved it. Her heart pounding, she raised her fist to throw.
That's when the black form emerged from behind the rock and came at her.
Moira barely had time to think; it all seemed to happen in slow motion. A hooded and cloak figure lunged at her, with a knife in one hand with the other hand reaching for the object in her hand. She could hear her horse shriek in panic and flee. She reached out her arm to block the attack, but was knocked from her feet. The pouch flew from her hand, into the air, and as it did the glowing stone slipped free of its concealment. The Dark Hylain, for that's what she knew it was, raised the knife again, preparing to lunge.
The stone fell, and Moira's outstretched hand grasped its cold, and yet burning, surface.
was to get to the twilight realm and kill dark link, but little did Nyfer know that he would have to endlessly go threw a maze of which no one has ever returned from!
Ooc:I just got back from Ottawa.So I'll be here more now.Gael your accepted.
bic: Ayame finally arrived on top of the Snowpeak Mountain."Finally!Now I have to find Nyfer or whatever that light dweller called him." When she looked at the snowboard course and she heard movement behind her.Ayame turned around and saw "No it can't be!" Dark Link! Dark Link smiled and then Ayame saw nothing else.
Slowly, Moira regained conciousness. Her head ached, and her vision swam. She was lying on a cold, hard surface.
Where....am I?, she thought. It's so cold here....what happened...?
Her memory began to come back to her. She remembered the bridge...she was trying to get rid of that thing...and then..
She gasped. The Dark Hylian. Yes, it was all clear now....but then....he let her live? Why did he not kill her...?
She looked around her. She was in a cell, lined with stone. The air was close and dank, and bars lined one side of the cell. There was a room outside of the bars, with a table at the center. The realized with shock that those were her things layed out on the table. Her weapons, her provisions....and that strange yellow rock the man in Hyrule Field had given her!
Oh no......what if that was important? What have I done?!
Desperately, she tried to stand, but fell. Looking down at her feet, she realized why.
Ryoo sat on the ledge, looking down at the calming waters. But he could then sense it. Something was wrong. They were all in trouble. He had to find out more. He telepathically spoke with the closest thing to them he could.
That was the end of his little chat. Ryoo went back to looking at the waters beneath him. But even they couldn't sooth him now.
Moira's mind raced while her unfamiliar, four-legged body raced around the confines of her cell.
What's happened to me?! What did that magic do to my body...?! And where am I?!?! I want to go HOME!
She rammed herself against the bars of her cell. It did no good. She knew she was not alone. In each corner of the room beyond, a sentinal stood. All four were Dark Hylians; three were men, one a woman. They were hooded and cloaked in black, with their unnerving red eyes gazing off into nothingness.
Moira was helpless and she knew it. She flung herself at the cell walls one more time, before sliding down to the floor and closing her eyes.
Ayame woke up and looked around she was in an unfarmiliar room.Everything felt strange as if...it was engulfed in Darkness.She struggled to her feet and the room looked a lot higher than usual.She looked at herself and saw she was an imp! Outside of Ayame's dream consiousness,Dark Link was watching a monitor and yelling orders at different Dark Hylians."Go check on the other prisoner!" A couple of Dark Hylians left the room and after several hours the monitor went haywire. "Huh? What's happening?"said Dark Link.Ayame woke up at that exact moment."NO!GET HER!"Dark Link yelled.Several Dark Hylians ran into the room,Ayame was too quick for them and ran out of the room.She ran down many corridors before reaching and dungeon-like room.She saw four Dark Hylians,three men and a woman.She remained silent watching.
The sound of scraping metal hinges came to Moira's ears, and she lifted her head. Two Dark Hylians, men, entered the room. The other four stood at attention. One of the new arrivals, apparently of higher rank than the others, peered through the bars at the beast in the cell.
"Yes. It thrashed about after it awoke. But it cannot escape."
The Dark Hylian stared at Moira with contempt. "Hylian filth..." he muttered. "Meddling in the affairs of the Dark One. You'll not live to see the dawn...but you've served your purpose. You've brought valuable magic to aid us." He grinned, a sight that sent a chill up Moira's spine. "His Majesty will be pleased."
He turned to the others, his serious composure returning. "A second prisoner has escaped. I want all of you to search the lower levels. Be warned...it is a Twili monster. His Majesty prefers it captured alive, but if you have no other choice, destroy it."
He turned to leave, sparing Moira one last glance. "Pity....lowly thing that you are...." He flashed his disturbing smile again. "You might have been a pretty thing to keep." He turned and ascended the staircase.
The others left their posts and went off in different directions, scouring the tunnels for a sign of the escapee.
ooc:Gael are you a wolf?
As soon as the Dark Hylians left Ayame walked into the room and saw a wolf in the cell.She approached it cautiously wondering what or who it was.
History: When he was exiled from his friends and family due to rather reckless behaviour, Dark Link offered him a position as servant and sometimes, a fighter. He accepted feeling that Dark Link had saved his life, by giving it purpose. He is now willing to die for Dark Link. However, he is the polar opposite of reckless after he was exiled from his own family for being reckless.
History: Born in the Twilight Realm. Raised by fellow wolves. There are few wolves left in the Twilight Realm, there were more, but when the army of Hyrule attacked, they slaughtered his parents and may others who tried to stop them. The soldiers left him and his brothers to die defenseless. He managed to scrape together enough food to survive, but, being one of the strongest of his siblings, he was one of the few who has survived. He vowed revenge against the army of Hyrule and all the inhabitants of Hyrule.
Good or Evil: Good (His intentions are good, but the fact that he is fighting against Hyrule may make him evil), but with his young mind he could easily be turned the other way.
Note: His story may have no connection to Dark Link. Only the Army of Hyrule. I haven't decided if he will turn on his people though.
And this character is not connected to my others in the RP universe. I'm just using the same name.
ooc:Both of you are accepted!
Perfect chance for a... Plot Twist!
Rio raised his head from the ground, his eyes widened at the sight of the red haired Twili girl. Rio, being from the twilight realm himself was not intimidated by her presence. He stood up and ran up to Ayame happily, he looked up into her confused face.
'A- A puppy? Who locks up a puppy?', these words meant nothing to Rio as he was but a wolf. The truth was that Rio wasn't a puppy, but due to his malnourishment, he was small and weak, but still stronger than his siblings, who had been taken away to places unknown. If he was ever to see them again, he did not know.
Rio sat, still looking at Ayame. Ayame looked behind her. She seemed calm, but anxious, she looked at the oddly thin bars of the cell. This cell was definitely built to suit Rio.
Rio's keen ears picked up a sound from one of the upper floors. He looked up, as if trying to find the source of the disturbance. Ayame had not heard the sound as it was very quiet.
There was the sound of speaking, though quiet, even to Rio's strong hearing there were two voices, 'She must be close. She wouldn't have made it past the guards on the upper floors and we've checked the others. She must be on the next floor. It's as low as this prison descends.' one hissed.
'Do we kill her? Or must we take her alive? It has been long since I have tasted blood.' said the other.
'No. We must take her alive. If we must, we will have to kill her. But I am sure the other inmates will be willing to attack you on sight, so we may have the satisfaction of the kill once more.' The other said, it was something in the way he said this that made Rio think he was grinning.
Still, Rio never understood a word of their conversation, but he knew evil when heard it. And something made him think they were after this girl. She seemed worried as she paced the cell. Pressing against the wall, as if looking for a passageway.
She gave up and walked out of the cell, she paid no attention to Rio, who followed close behind. He followed her through the prison, checking the walls of the empty cells. They reached the final cell. The only other cell other than Rio's that housed a prisoner. The prisoner was another wolf. She raised her head tiredly.
She began to bark up at Ayame, 'Help! Please! They caught me!', Ayame understood nothing of what Moira said, but Rio did.
'You're a prisoner too?' Rio asked as Ayame opened the cell door, and begun to look around the cell. Moira looked like one of his own kind, but there was something in her eyes that looked human.
'Yes. When were you captured?' Moira asked.
'I was captured when I was searching for food out in the forest to the south. I can't believe there are more wolves in the Twilight realm.' Rio said with a smile.
'W-What? No. I'm not from the Twilight Realm. I'm from Hyrule. Weren't you transformed too?' Moira asked confusedly.
'No. My family was killed by the Army of Hyrule. If you're from Hyrule, I don't suppose you would understand.' Rio said sadly.
'Oh... I'm sorry. I'm sure they didn't mean to kill them. They must have attacked them. The Army isn't so cruel as to leave cubs like yourself out to die.' Moira said defensively.
'Not everybody in the army is like that! They are honorable!' Moira barked back.
'Yeah sure. Honorable. It doesn't say much about your people. I seek revenge against the ones who killed my parents.' Rio growled.
Moira growled back. Not saying a word, but intimidating him nonetheless. Rio stayed where he was. Staying back. Moira was much bigger than himself. And Rio took that into account. He had never seen a bigger wolf since his parents died. And this one was hostile. Rio stood still, saying nothing, making no sound at all.
Ayame, meanwhile, let out a cry of delight, 'Got it! I knew there was a way out!'.
'You found a passage? Great!', Moira barked happily. Ayame looked at Moira.
Ayame could tell that Moira had understood her. Rio didn't though. But he did understand Moira. 'She's letting us out?' Rio asked.
'I'd rather you didn't come with us. I don't trust you. You're an enemy of Hyrule. You stay here.' Moira growled in answer to his question.
'B-But. Why?' Rio asked, his last hope of escape shattered in an instant. 'You're just going to let me die here?!' he barked angrily.
Ayame finished removing the final stone that sealed the passage. 'Let's go.' she uttered quietly.
Moira began to walk away towards Ayame. 'What did she say? You understood her right?' Rio asked.
'Yes. I did. She wants you to stay. She doesn't trust you either. And you would be a burden. She doesn't want you.' Moira asked, attempting to get rid of Rio.
Why should a horrible person like you get to live a full, enjoyable life. When I have had to live in fear since the day I could understand the horrors of this world. And now I die at the age of 18 months. After living a life of misery. I never knew what hope was until that girl arrived at my cell.' Rio stopped talking. He lay down, his head on the floor, staring at the black, stone wall of Moira's cell.
Moira looked at Rio for a few seconds, before leaving him in the cell, alone. Moira hopped into the passage in the wall. The sound of her paws scraping against the passage floor echoed into silence.
Rio sat in silence. The far off sound of talking could be heard on his floor. They were the voices of the people he heard earlier. They were entering the corridor. The door creaked open. Slammed against the stone wall. Slammed shut. The sounds of footsteps echoed up the corridor and met Rio's ear.
Rio felt a sudden change come over him. His acceptance of his fate disappeared. And was once again replaced with a horrible. His heart began to race. He was wide awake. Filled with fear. The footsteps were gaining speed. Rio ran for the passage and jumped to the edge. His paws holding onto the edge as he pulled himself up. The footsteps were getting louder and closer. Rio struggled.
'The cub is missing!', roared one of the men.
'That girl is here! Find her! And the cub!' The other roared.
The men were running and Rio still struggled to hoist his small, weak body into the passage. He growled in frustration. 'I hear something in the end passage!' Rio heard this as he finally got into the passage. He managed to get in just as the men rounded into the cell. 'I saw something run into that passage. Quickly! Get it!'.
Rio sprinted down the passage. Quickly. The men behind him seemed to speed up the passage as quickly as he did. There was a slithering sound echoing through the passage. Rio didn't dare turn around to look. He kept running blindly. He heard the sound of Moira and Ayame further in the passage. He was gaining on them quickly. 'Keep moving quick! The guard are here and I they're catching up to my quick!' Rio barked into the darkness.
He heard Moira let out a yelp and Ayame said something Rio didn't hear. Rio was running quickly. but not fast enough to completely escape the guards. He was sure to be caught soon, but he kept running. suddenly, out of the darkness, Moira's face appeared, ferocious and alert, she snapped at Rio, thinking he was a guard, Rio quickly dodged and ran past Moira and jumped over Ayame's hand as she crawled through the passage. Rio ran, he only heard the yell of one of the guards and a cry of anger. Rio sprinted through the passage to an unknown destination. The passage moved upwards, and began to steepen. Rio had slowed down, first, because it was steep and second, he suddenly noticed how tired he truly was.
He pulled himself up, into a room. It was inside the unknown building.
So. What's going on with you? | 2019-04-23T00:30:16Z | http://www.hyrule.net/forum/topic/8652-the-legend-of-zelda-the-dark-race/?page=2 |
I get home weary, with shoulders slumped. My movements to the front door fluctuate between shuffle and ooze. Dazed, blank, I turn the key and step into the living room and, each time, it’s such a warm and energetic shock what I see.
Each time, for about the last month or so, I get to enter the house and see my daughter’s masterwork. I get to see the joyful product of her newest, most dedicated hobby.
You see, my daughter is a radical librarian. And a damned systematic one, at that.
Pretty much each morning, afternoon, and evening, she race crawls into the living room, grips our bookshelf and lifts herself up, then proceeds to pull my books from their homes one, by one, by one. We put them back, she crawls back and does her work again. She will not be deterred.
I think about those books today, and their soggy corners from all the chewing and slobber…and I can’t stop thinking about the news.
Guatemala. The historic, heroic trial of the dictator Efrian Rios Montt–the architect of the worst of the Guatemalan genocides in 1982-3. Just before damning testimony will be shared about the current president, Otto Perez Molina, and his involvement in the genocides as a young officer…the trial is annulled. There is video of those days, when his code name was Major Tito. He is standing over the bodies of some radical peasants. Their skin is dark brown, like Glendi’s brothers. Her dad.
The peasants had radical books on them. Like mine. They were killed.
Seattle and the Pacific Northwest. Today. FBI agents in Hawaiian shirts are visiting activist houses. Not so subtle intimidation before May Day. They even visit Left Bank books, where so many of these books–now on the floor–once came from. Where so many times I thought about which titles would be most useful for building a revolution.
All the death and all the fear of so many generations who have struggled for a different world than this one. So many legacies are in those pages, now squeezed between those craggy, tooth-pocked gums of my baby. How many people have had to hide, or burn, or justify their possession of those books I come home to? How many comrades in danger, or shock, just because they happen to be more active than I am?
If, one day, my daughter chooses to agree with what those books are about? And she chooses to act?
So, like 2 years ago I wrote part 1 of a series of reflections about my time in revolutionary groups. I had part 2 almost done, and I had part 3 outlined…and then I just stopped.
I just found part 2 in my drafts folder. It’s got some interesting stuff that shouldn’t just be forgotten. Here it is.Part 1 focused on lessons around handling conflict. Part 2 is focused on addressing oppression, and then the final part is about improving revolutionary praxis. Like I said in the first part of this series, these are my thoughts as I got them down on the page, and I reserve the right to change them, add to them, and delete them as I feel more clarity.
Have a holistic, intersectional perspective. My own political trajectory has taken me all over the map about how I theorize oppression, and whether I think there are core oppressions or linchpin systems or anything. And although I feel fewer and fewer comrades at my side about this, as so many of them move toward more materialist perspectives, I still remain unconvinced that oppression has only one source, one foundation, or one weak point (such as class struggle, white supremacy, patriarchy, etc.).
People are complex, our relationships are complex, and that means our social systems–and the dynamics of hierarchy and oppression underlying them–are complex. It makes perfect sense for radicals to seek out powerful, and efficient means of understanding these systems in order to identify priority areas, and I do think there are priority areas, but in the end I believe that revolutionary organizations are best served by a perspective that acknowledges and seeks to address–at least at the personal level–the ways that power and oppression manifest across all differences of identity and experience. That is, I think organizations should work from a holistic perspective that believes that all forms of oppression need to be addressed simultaneously–even if there are sometimes strategic priorities within that work.
I don’t say this because I believe all struggles are equal in their revolutionary potential, but rather because all forms of oppression actively live, grow, and do their damage within each of us, and we need to build organizations and a revolutionary culture that can hold us and help us heal and grow from where we’re at and what we’re feeling. We need organizations that can see us as whole people, which means we need organizations that can deeply understand the complexity of what keeps us boxed in.
It’s important to expect and offer personal accompaniment, but it’s a trap to expect and offer personal liberation. There can be a real cheerleading element to revolutionary work, where, in an effort to stave off feelings of desperation and futility in the face of an overwhelming enemy, we rah rah about will, and transformation, and living completely new lives. This hopefulness is essential–because I do believe that social transformation is possible if we’re able to hold it as a vision–but it can also shoot us in the foot.
Revolutionary organizations–and larger social movements–cannot deliver total personal liberation, and often our cheerleading to the contrary causes us big problems. I would bet that thousands of potential organizers pass by the radical left each year because of the disconnect they see between our lofty promises and ideals and our less-than-stellar, very human realities. People get frustrated when we can’t solve their problems in timely ways, and especially when they see that our organizations and movements can’t alleviate the pain of living in this society.
What we can and should do as organizations is be present with people, and accompany them in their struggles. If a person is abused, downsized, evicted we can’t always win the fight, but we can be there fighting with them, and then–and this is critically important–we can still be there the next day as their comrades and community members. That presence, that essential solidarity is less fancy than the poetry of “build total liberation now,” but it’s far more lasting when things get hard in the movement.
Also, as people within a thoroughly messed up society, we are individually thoroughly messed up. We have weird hangups, prejudices, triggers, desires and compulsions that have evolved out of our daily practices while trying to get by in this world. These are deep within us, and we have to be patient with ourselves and each other as our perfectly clean and clear radical ideals crush up against our dirty and weird realities. That contradiction, and our presence and growth within in it, are the struggle.
Our lives don’t fit in their boxes, so our organizations shouldn’t be boxy. Okay, so our society is constructed around systems of oppression and exploitation that create social dichotomies and then box us into identities based on those dichotomies. At the same time, we know that society’s identity boxes don’t match who we actually are. They are social constructions, which often have been imposed on us through force.
So, if we are seeking to create something new, our organizations are not served by structuring ourselves around those same boxy identity forms that never fit us in the first place. Separatist groups, people of color or white only groups, women only spaces, or other identity based formations that key off of identities that the system made for us are not lasting formations. Sure, they are potentially very important for specific functions and caucus type spaces in order to make space to build skills and consciousness without the disruptive presence of privileged people’s defensiveness or entitlement. That makes sense. But in the end, the movement has to be multiracial–race being a social invention after all–intergenerational, multi-gender, accessible, and even cross class in the sense of multiple layers and cultures within all the non-owning classes.
I believe that building a winning movement means working with each other across identity, seeing and feeling commonality, and even holding each other’s pain–even if we feel that it’s coming from a more “privileged” place than our own.
We are who shows up, and we work from there. There are times when groups have a majority of one or another identity, and if that identity is more on the privileged side of things, then groups can sort of freeze up into this, “if we don’t get more diverse than we can’t do anything.” This is garbage, and it often only leads to either navel-gazing or awkward “diversity recruiting” drives. No thanks.
Instead, when groups gather, they should acknowledge who’s there, honor who’s there, and then have honest conversations about how best to move the group’s work forward. If the group happens to be majority white, for example, that doesn’t mean that the group doesn’t have legitimacy until it meets some quota or something…it still has the potential to do fantastic work. However, the group does need to recognize the dynamics of being majority white, understand why that might be, recognize what unique responsibilities and perspectives such a formation might have, and realize that in the end the group will probably have to dissolve into a larger multiracial organizational form rather than ever having the possibility of recruiting people of color into its existing form. Sure, sometimes groups do need to just dissolve and start from scratch if they are incapable of authentically and respectfully participating in community struggles because of their makeup…but I think the pattern of groups just stopping and starting around purely demographic issues is often a waste of time.
The multiple forms and strands that leadership can take in groups can really help a group explode in creative directions if it is nurtured in the right way. Now, if only I remembered all my original thinking about this point!
All the other great reflections I forgot to write down. I can’t remember the specifics, but I know that I wanted to talk more about some of the specifics of personal improvement work vs. public political work. I wanted to talk about specific ways that oppression and superiority get internalized and play out in groups. I wanted to specifically talk about addressing oppressive dynamics in groups. I didn’t get any of that written down. That’s a shame. Right now it’s a school night so I certainly don’t have the energy to remember all this stuff…but here’s hoping that I come back and add more reflections in time.
2)Dispersing Power: Social Movements as Anti-State Forces by Raul Zibechi. This is the first non escapist sci-fi book I’ve read in awhile. It’s awesome. It explores how social movements in El Alto, Bolivia have been able to maintain such militant and prolonged mobilization that has transformed the politics of their country–while still refusing to be co-opted by the state. His central argument is that the movements are not separated from daily life, but rather completely enmeshed in people’s whole lives–it’s this community and relational aspect that gives the movements their potency. Yes. Lot’s of lessons for us in there, which I’d like to talk about when finished. I’d highly recommend this book for book groups to read and discuss.
3) I’ve come back to pre-writing for a novel I’ve been working on for awhile. A long walk around Vancouver was perfect for my inspiration, as I worked through some long-standing story blocks. I don’t want to talk about it much, but the inspiration is that I love fantasy and sci-fi novels that build deep and convincing worlds–Middle Earth, Game of Thrones, China Mieville’s cities. I believe that a revolutionary and post-revolutionary world could offer similarly exotic and escapist settings, and I’m disappointed in radical fiction writers because they always hover around the moments of insurrection, but they don’t describe the world to be built afterwards. I don’t mean utopia, but what actually would be there afterwards. Le Guin’s The Dispossessed is a great exception, but I wish there were more. So, that’s what I’m playing with.
So, I fell off the world again….
Glendi knows me so well! For my birthday on Wednesday, she gave me a quite unexpected gift: a 3-day trip to be alone with my thoughts in Vancouver, BC. Here I am, beginning the 3rd day, and it’s no coincidence that I’m coming back to my blog–and clearing out the copious amounts of spam comments–during this special time alone. Something still isn’t quite working in my daily life.
Here I was in December and January, reading, writing, eating with people, balancing my workload and my social anxiety all quite well. Then, pretty much exactly when Glendi and the baby came home from Guatemala, the old patterns crept in. It’s not them. It’s me and my introversion.
Introversion is not shyness. It’s a shorthand way of talking about where our energy comes from. My energy comes from having ample time alone–first to decompress from exhaustion and any person struggles, then to ease into more creative and inspired work. I like being around people, and I love my time with Glendi and Amanecer. But social interaction, even with them, drains me. When we are all in the house, I don’t know where to find my energy. I only know how to energize myself when I have hours and hours laid out before me. When I have to find my alone time in scraps of 30 or 45 minutes here or there, I get cranky and then just fill that time with electronic mind-mushing. In this way, I have frittered away 3 months since last writing. I’ve read almost nothing, I’ve talked with very few people beyond my family and co-workers, and I haven’t been to a single political event.
Don’t get all mopey and down on yourself. Just acknowledge it, take responsibility, and move forward.
1) I need to more realistically understand a father’s time limitations. I will not have more than a few 1+ hour stretches of free time. Free time is there; hours and hours of it. But it’s all chopped and chunked up into 10-20 minute moments. I grumpily cast this off as lost time and waste it. I need to become a scavenger and salvager. I want to try positively embracing and playing with these fragments of alone time.
2) I need to own up to my exhaustion. When I am teaching, I feel energized. When I get home, I am drained. I’m only sleeping 6-7 hours a night, so I’m physically tired also. It’s silly to have high creative expectations of myself in the weekday afternoons when I’ve spent so much creative energy trying to teach well. As I get more practiced at teaching, this might change, but for now it’s just plain true that I don’t have that much mind or social power left after work. Do I just designate my weeknights as recuperation time, then? Not quite. I just need to prioritize work that will also be restful–low stakes social stuff, lighter reading, lighter writing.
3) My social anxiety is more debilitating than I want to admit. Intellectually, I can recognize and rationalize around it, but the truth of my daily life is that I live in a constant white noise of anxiety about email, mail, and phone messages. It takes me days to find the courage to go through my email and phone messages, even just to delete unwanted stuff. The longer I wait, the worse it is. I feel like I’m currently standing underneath a tidal wave of correspondence that I owe to so many people…but then I think that they all must be so disappointed in me…so I can’t contact them…so maybe another day…and so it goes.
See, these three realities work in wicked concert together. Because it takes so much strength and energy to face my social correspondence, I never feel like I can do it with just a 10 minute fragment of time. So I spend those 10-20 minutes trying to find escapes to avoid thinking about the mounting social anxiety. I play and consume. This is my cycle. This is how I self-medicate and what I’m self-medicating for.
If I’m going to accomplish my goals, healing from my anxiety and pain need to be priorities for me. I need friends again. If not, then I need a therapist.
Dear Blog: I need you.
When people stop being polite…and start getting real! | 2019-04-18T18:45:23Z | http://2eyesopen.com/2013/04/ |
The probabilities are infinite when you try out your hand at these paper craft Strategies which can be enjoyable and simple to create although becoming light-weight in your budget. Check out the projects to produce with printable web pages beneath to start.Believe it or not, you are able to flip coloring internet pages for Grownups into some amazing paper crafts you may not have thought of if not. Go on the enjoyable when you use your attractive masterpieces to build customized Do-it-yourself decor for your home. Whether or not you need to make Do-it-yourself wall art or desire to try out your hand at a do-it-yourself candleholder, there’s one thing here to inspire you. Don’t be afraid to branch out and try one thing distinct with your coloring book webpages right now.No-one mentioned the enjoyment has to end if you finish a printable coloring web site.
Use motifs out of your completed coloring internet pages to produce any of The gorgeous DIY cards down below. Card creating Suggestions like these are typically so easy to complete. Only speak to your closest coloring e-book for the completed picture that will make a gorgeous embellishment over a handmade card.You should not miss your possibility to give a handmade present this year! You may transform your coloring web pages into attractive presents that any individual in your listing with cherish. From sweet coloring site kits to terrific present wrap ideas, We have got you included Together with the Concepts under.From time to time you have to get a tiny bit creative to find strategies to de-strain. One among the most recent crazes is coloring. Split out the crayons or coloured pencils and Allow your inner kid out; do not just could it be enjoyable, but several check out it to be a method of meditation. When you’re over a spending budget, you will find a lot of cost-free sites with numerous visuals to print and colour; if you like utilizing your Pc to paint, You can utilize built-in paint plans, far too.
In this article, you could either print or help save pictures to be a PDF file for later coloring. They also offer a destination to obtain some in their doodle coloring textbooks and counsel ideas for doodling/coloring activities.The act of coloring can assist to boost motor techniques in young young children. The steps, motions and exact grip involved with coloring can help in the event of the muscles of your fingers, arms and wrist. Wonderful motor talent progress will help young children create much more skillfully in addition to manipulate compact objects. They will then Create on these techniques to be superior typists and even more adept in sports activities and also other things to do.Young children’s education will take area in a very classroom with a good volume of composition. Classes are issued on paper by way of assignments, checks and various published study course work. Coloring sheets, books and web pages is often integral in making ready kids for the greater structured Focus on paper forward of them.
Grownup coloring e-book webpages can provide hrs of enjoyment and relaxation for crafters of all ages. These paper crafts are not merely strain-relieving, they generate beautifully colored pages every time they are concluded. Even so, It can be sometimes tough to know what to do with your beautiful, printable coloring pages when you are finished with them. With no obtaining projects to create with coloring internet pages, its not as likely your creations will get the appreciation they should have.Dread not, because this remarkable listing of jobs to create with adult coloring web pages is your response. Using these astounding Tips for how to proceed with coloring guide internet pages, prior to deciding to realize it you will need various crafts ranging from Do-it-yourself house decor to paper crafts for kids.
Use motifs from a finished coloring internet pages to generate any of The gorgeous DIY playing cards down below. Card earning Concepts like these are generally really easy to complete. Only talk to your nearest coloring book to get a completed impression that may make a beautiful embellishment on the handmade card.Will not skip your chance to give a handmade gift this 12 months! It is possible to convert your coloring webpages into attractive presents that anyone in your record with cherish. From cute coloring website page kits to good reward wrap Tips, We have you covered Along with the Strategies down below.Sometimes You should get a tad Inventive to search out tips on how to de-tension. One of the latest crazes is coloring. Split out the crayons or coloured pencils and Allow your internal child out; not simply could it be relaxing, but quite a few view it as a method of meditation. In case you’re over a spending budget, you will discover plenty of cost-free websites with many photos to print and shade; if you want utilizing your Personal computer to paint, you can use developed-in paint programs, far too.
Allow me to share various web-sites You can utilize to locate coloring textbooks for Grown ups without cost.Probably the most comprehensive collections on the market with by far the most structure range is simply Shade. They supply pictures from mandalas to nature to holidays, and just about anything between. The complexity in their photos features less complicated, extra baby-like coloring e-book illustrations or photos and very intricate zentangles, that is the art of drawing creative patterned types that could use almost any condition or line design. There is even has a piece for children, and people who are children at coronary heart.Just Color provides the choice to download or print directly from the web site, and if you would like to pin it for afterwards, they assistance Pinterest. Other social networking buttons are presented for individuals who desire to share their potential artwork. The internet site also incorporates a entertaining website and occasional contests.Coloring Existence has a nice variety of classes for anti-anxiety coloring, which includes some photographs which were digitized and coloration stripped away to offer a lot more reasonable photographs to color.
The chances are infinite once you consider your hand at these paper craft Suggestions which might be fun and straightforward to generate even though being mild in your spending plan. Check out the initiatives for making with printable web pages down below to start.Truth be told, it is possible to transform coloring pages for Grownups into some amazing paper crafts you may not have thought of normally. Continue the fun when you make use of your stunning masterpieces to create personalized Do-it-yourself decor for your house. Whether or not you need to make Do-it-yourself wall art or wish to try your hand at a handmade candleholder, there’s a little something right here to inspire you. Don’t be scared to department out and check out a little something distinctive with the coloring reserve internet pages today.No one explained the enjoyment must conclusion once you complete a printable coloring site.
You can find a ton of photos to pick from, culminating in hrs of coloring leisure.Coloring Internet pages for Grownup has a decent collection of distinct image themes, which includes a fairly extensive assortment of mandala pictures, great for meditation or soothing. Additionally they deliver some primary pencil tutorials to aid get you began on developing a extra artistic final merchandise to the coloring webpage.You will discover primary Guidelines regarding how to print, but note the dimensions of your paper is A4, a structure most European international locations use. You will have to generate some changes for the picture for it to print accurately. A pleasant contact on This great site is they go to the trouble to elucidate some of the subject matter, including the mandalas.A site with some genuinely delightful shots to color is Doodle Art Alley. While this web site is about doodling on the whole, they do Use a nice array of visuals to color.
After i must shift my aim or apply my own pressure reduction, I split these books out. They have got lots of uses and applications a large number of usually are not aware about, beyond the apparent outcomes of beauty and delight. Let is look at their takes advantage of just a little closer.Adult coloring textbooks can assist with many emotional and mental health problems. For many, boredom, deficiency of structure, and pressure are the best triggers they have. This is applicable to individuals with obsessive-compulsive Diseases, stress and anxiety Issues, pressure disorders, depressive Diseases, consuming and binge consuming Ailments, anger administration troubles, and compound abuse issues. Enough time and emphasis that Grownup coloring usually takes will help the person eliminate the main focus in the adverse difficulties and patterns, and target them in a secure and productive way.These actions might help immensely with people today with PTSD, stress, and tension concerns, as they serene down our amygdala. [two] Here is the Section of the brain that controls our struggle or flight response, and retains people today within a heightened state of fret, worry, and hyper-vigilance, when it is Energetic.
The possibilities are endless any time you test your hand at these paper craft Suggestions which have been fun and simple to help make even though becoming light with your spending budget. Look into the projects to produce with printable internet pages beneath to get started.Truth be told, you may flip coloring internet pages for Grown ups into some wonderful paper crafts you might not have thought of or else. Continue the exciting if you use your stunning masterpieces to build customized DIY decor for your private home. No matter whether you need to make DIY wall art or need to try your hand at a do-it-yourself candleholder, there’s a little something listed here to inspire you. Don’t be afraid to branch out and try one thing various with all your coloring ebook webpages nowadays.No-one stated the exhilaration has to close after you complete a printable coloring website page.
This great site is not as organized as Other individuals but does give The web site, a person-click on printing choice to get you on the meditative, coloring way. In case you’re additional into coloring on your own Computer system, It can save you a duplicate onto your hard disk drive.Among the list of nicer touches to Coloring Lifetime is it is in eight different languages, rendering it fairly internationally friendly to non-English speakers. The positioning also indicates Bodily coloring publications to invest in, which is actually valuable to those new to adult coloring.In case you’re no Rembrandt or Picasso but want to check out this coloring craze for Grownups, Why do not you look at a web site with less complicated photographs. While a lot of the images from Absolutely free Coloring Pages appear like they are from outdated-school coloring guides, they supply a superb selection to have you begun on this coloring recreation.
And that’s alright! All You must do is obtain these sweet printable Thanksgiving location cards intended by little ones’s e book illustrator and creator, Melanie Hope Greenberg, pull out a bucket of colored pencils or crayons so you are with your approach to inserting crotchety Uncle Joe and chatty Aunt Cathy at different ends of the holiday dinner table.There are plenty of moments Once i suggest Grownup coloring guides to clients, and they look at me like Possibly we should be switching seats. On the other hand, time and again, they come back to me and convey to me how effective they uncover them for being. Many psychologists and therapists "prescribe" these to individuals for numerous good reasons, and lots of occupational therapists prescribe them also! I may also Enable you to are aware that I exercise what I preach, Once i was laid up in bed for 8 weeks immediately after important surgery, I devoured adult coloring guides.
With these festive paper crafts ideas, you are able to convert an adult coloring guide website page into something for a celebration or birthday. In the occasion hat ideal right down to the thank you cards, there’s a paper craft For each purpose when you need to generate the next celebration a bit more vibrant. These dazzling layouts will go away you happy with your get the job done and able to commence a lot more if you’re finished with them.Upon getting your finished Grownup coloring pages, it is possible to change them into enjoyable paper crafts for children. Regardless of whether you try your hand at an origami craft or perform together with your Children or grandkids to build gorgeous paper projects, there’s something to obtain you started here. There are such a lot of Resourceful means to remodel printable coloring pages, and these are definitely just some samples of what to do along with your creativeness.
Even Little ones who slide in the “normal” variety of emotional wellbeing can gain from processing their inner thoughts, frustrations and feelings though The straightforward but profound act of coloring.Most Children really like to color, and it seems it’s much more than just a recreational exercise. It can also foster Bodily and psychological advancement in A selection of regions. Obtain your Children commenced with coloring as early as you possibly can, therefore you’ll lead to the life time of constructive Added benefits.Earning selfmade Thanksgiving place playing cards was a annually custom Once i was A child. There are numerous ways for making them and I generally experienced a superb time having crafty. Not each individual baby really wants to make put cards entirely from scratch, nevertheless.
Consider all the areas of retraining on the brain and competencies coaching that can be completed with coloring more and more challenging patterns. The person can start out on less complicated goods, and get the job done their way up.This is another technique of practising mindfulness, that has therapeutic and health and fitness benefits. This can assist us substitute adverse views with constructive and pleasurable types. Undertaking therapeutic artwork will help cut down feelings of nervousness and unpleasantness connected to prolonged clinical solutions. The focus we spot to the venture at hand, and on an item can swap damaging and unhelpful feelings from moving into our minds. The step of performing and executing vs. observing is a powerful deterrent to concentrating on Bodily or emotional discomfort.
Whether or not they stay in the traces or not, coloring fosters a Resourceful spirit and an appreciation for visual distinctions. Coloring can stoke the imagination and encourage Youngsters to brainstorm and discover to think about new Tips on their own Normally.Dexterity, hand strength and a spotlight to depth are all needed to create both equally printed letters and cursive script. Starting out with coloring internet pages early may also help to develop these features in order that producing will come more conveniently and By natural means.Coordination and the opportunity to aim is simply building in youthful children, and undertaking activities to foster and fortify this budding expertise helps in economical, healthy enhancement. The act of holding crayons, choosing hues, applying the color in The best spot and even sharpening crayons can all help with cultivating solid hand-eye coordination in youngsters.
The names and hues of colours needs to be realized, and coloring on coloring pages fosters practice and recognition of Most important and common shades and much more nuanced color recognition of lesser-regarded, far more delicate hues inside of a direct fingers-on method.Adhering to boundaries is a vital part of juvenile and adolescent enhancement. Although he / she gets a renegade artist later on in everyday life, it Gains all kids to begin out being aware of The principles in advance of breaking away. Coloring sheets can assist with anchoring a way of composition and the need and advantage of owning boundaries. Coloring also helps kids to study traces, styles, shades/hues, viewpoint, designs and forms.Coloring is also calming and therapeutic for youths, especially if they have got no other outlet for uncomfortable or perplexing feelings.
This might seem Bizarre, and like Probably the usefulness is being stretched, however it is all genuine. Our frontal lobes are accountable for these higher level pursuits and capabilities of your brain, and coloring specific photographs activates all All those Qualities. Think about thinking about sophisticated coloration strategies, and using the brain to equilibrium and make the picture aesthetically satisfying.Coloring utilizes both equally hemispheres of the Mind, correct and still left. After we are contemplating balance, color choices, applying coloured pencil to paper, we are focusing on difficulty fixing and great motor competencies. We have got talked an excellent offer about in which they would be advised by psychologists, but this is where they will very practical for occupational therapy as well.
Adult coloring ebook internet pages can offer hours of enjoyment and relaxation for crafters of any age. These paper crafts are not only tension-relieving, they yield beautifully coloured pages if they are concluded. Even so, It is really sometimes difficult to know how to proceed with your spectacular, printable coloring webpages when you are accomplished with them. With no finding assignments to produce with coloring internet pages, its not as likely your creations will get the appreciation they are worthy of.Concern not, for the reason that this exciting list of projects for making with Grownup coloring webpages is your remedy. Using these astounding Thoughts for how to proceed with coloring e-book internet pages, prior to deciding to know it you will have several different crafts ranging from DIY house decor to paper crafts for youths.
Here i will discuss many internet sites You can utilize to uncover coloring guides for Grown ups totally free.Just about the most intensive collections available with the most layout selection is simply Coloration. They offer visuals from mandalas to nature to vacations, and pretty much almost everything in between. The complexity of their photographs involves less complicated, more child-like coloring reserve visuals and very intricate zentangles, which can be the art of drawing creative patterned types that may use almost any form or line style. You will find even has a section for youngsters, and people who are kids at heart.Just Colour offers the choice to obtain or print straight from the web site, and in order to pin it for afterwards, they help Pinterest. Other social media buttons are furnished for individuals who wish to share their future artwork. The internet site also includes a enjoyment blog and occasional contests.Coloring Daily life has a pleasant variety of classes for anti-worry coloring, including some images that were digitized and colour stripped absent to supply much more realistic visuals to color.
This might audio Odd, and like Probably the usefulness is currently being stretched, however it is all accurate. Our frontal lobes are chargeable for these bigger stage activities and capabilities of your brain, and coloring in-depth pictures activates all Individuals Houses. Consider thinking about intricate shade schemes, and using the brain to stability and make the image aesthetically satisfying.Coloring makes use of equally hemispheres in the brain, appropriate and left. Whenever we are contemplating balance, coloration choices, implementing coloured pencil to paper, we have been working on dilemma solving and wonderful motor skills. Now we have talked a fantastic offer about where by they would be suggested by psychologists, but This is when they will very practical for occupational therapy too.
Use motifs from a finished coloring pages to create any of the beautiful Do-it-yourself playing cards below. Card producing Tips like these are typically really easy to finish. Simply just talk to your nearest coloring guide for a completed impression that would make a gorgeous embellishment on a handmade card.Really do not miss your possibility to provide a handmade reward this yr! You may turn your coloring pages into lovely gifts that everyone on your own record with cherish. From lovable coloring page kits to great reward wrap Concepts, We have you coated Along with the Strategies down below.Sometimes It is important to get a tiny bit creative to find solutions to de-worry. Considered one of the most up-to-date crazes is coloring. Break out the crayons or coloured pencils and let your inner little one out; not only could it be calming, but many check out it to be a method of meditation. If you’re over a finances, you can find a lot of totally free web sites with many illustrations or photos to print and coloration; if you prefer utilizing your Laptop or computer to color, You can utilize created-in paint systems, far too.
The names and hues of colors must be learned, and coloring on coloring pages fosters follow and consciousness of Main and customary colours in addition to much more nuanced coloration consciousness of lesser-acknowledged, more subtle shades in a immediate fingers-on fashion.Adhering to boundaries is a crucial A part of juvenile and adolescent improvement. Even when they gets a renegade artist later on in everyday life, it Added benefits all little ones to begin out figuring out the rules ahead of breaking away. Coloring sheets can help with anchoring a way of composition and the need and good thing about obtaining boundaries. Coloring also helps young children to learn about traces, styles, shades/hues, perspective, patterns and kinds.Coloring can also be calming and therapeutic for children, especially if they have got no other outlet for unpleasant or perplexing emotions.
This could seem Weird, and like perhaps the usefulness is getting stretched, but it is all correct. Our frontal lobes are to blame for these bigger stage pursuits and functions in the Mind, and coloring thorough pictures activates all those properties. Think of contemplating complicated coloration strategies, and utilizing the brain to equilibrium and make the image aesthetically pleasing.Coloring makes use of each hemispheres from the brain, appropriate and left. After we are considering harmony, colour selections, making use of coloured pencil to paper, we have been engaged on difficulty solving and high-quality motor expertise. We now have talked an incredible deal about where they would be instructed by psychologists, but This is when they are able to incredibly helpful for occupational therapy at the same time. | 2019-04-25T21:48:19Z | http://giant-tours.com/tag/coloring-pages-zootopia/ |
I just finished another midnight shift at a job I did not like. I smiled, my eyes were open, I felt good about myself. I said my usual goodbyes to a friend and sprung into my car. My friend reversed his car before I had the chance to leave my car park. He had beaten me this time. It was an unspoken game that took place each time we left work. I waited for him to get out of the way before I reversed to make my way home.
As I drove, the open car park gave me an invitation to have a little fun with my car. If landscapes could talk, this one was whispering into my ear that I should spin the wheels. “Besides, it’s late at night. No one is around. It’s an open car park with no danger. Do it!” Like a vulnerable teenager succumbing to peer pressure, I accepted the invitation.
My foot pressed the accelerator as I spun the wheel left to get quick around the first corner. The rear tires lost their stability as the car slide side-ways. The car became an extension of my body as it mimicked my ecstatic mood. I entered the next turn and spun the wheel right. The sound of screeching tires was water fertilizing my increasing smile. Smoke filled the rims of my tires and a shot of adrenaline filled my body.
Following the two consecutive drifts, I straightened the car and approached a set of traffic lights on the main road that would take me home. Had this been during the daytime, about seven cars would be in front of me before the upcoming traffic lights.
My friend who had left before me had passed through the traffic lights three seconds ago so the lights were still green. Keeping in the mood, I put my foot down to catch the green light. I would safely make it. I turned around the corner with a soft screech of the tires. 20 meters in front of me on the side of the road were two police officers beside their vehicle. Lucky me.
The police pulled me over. Opposite to what you might be thinking, I was not concerned. I was still in my elevated state. I smiled. I wound down my window and an angry officer came charging at me, yelling, “What the hell are you thinking? What the hell is going through your mind?” I paused momentarily, unaffected by his aggressive state. I said smilingly, “I’m just happy, I guess.” Not a smart response. Not a smart response at all.
As I thought how to approach this difficult situation, I was still happy then it hit me. I knew I should have said something else. I gulped. My mind rushed to think of some communication techniques I could use as a life boat to save me from drowning in the conversation. All that came to mind were some techniques on getting out of a speeding-ticket. I annoyed the officer enough so surely it couldn’t get worse.
My smile began to lower. I no longer made eye contact with the officer. The officer’s raging mood began to infect me. He was making me feel angry. It was as if my body was overcome by an emotional virus from the officer who was the virus’ host.
The officer was still enraged and continued to threaten me with a ticket. I knew he could easily write me a ticket, but he was not writing one. I kept myself aligned with the officer’s reality by remaining in a “Yes I’m wrong, stupid, and shouldn’t have done that” mood. I continued to play psychological judo, and match my mood with his own, until two minutes later he said to drive away. And oh, no ticket!
I drove off – though feeling pleased I had beaten a reckless driving ticket – in an irritated state. The officer had destroyed my happy mood. It took two minutes of talking with the officer to completely transform my happy state into a joyless, gloomy mood, which I remained in for another two hours until I went to bed.
My story depicts your reality with emotions. Everyday you interact with people in different moods. Sometimes you are happier than people; other times they are happier than you. Emotions transfer between people. This is a fascinating peculiarity with emotions. Have you ever noticed how we feel in our interactions is not only dependent on our internal state?
How did you feel when someone really annoyed began talking to you? You became more annoyed.
How did you feel when someone unhappy began talking to you? You become unhappy.
How did you feel when a depressed person shared their misery with you? You felt depressed and miserable.
How did you feel when a charismatic person talked to you? You felt his energy and you began to feel happier.
You can catch an emotional cold.
Psychologists call this phenomena “emotional contagion”. It is a psychological and physiological process – a transference of emotion that can occur from mimicking body language. Elaine Hatfield, a professor at the University of Hawaii, in a study with John Carlson and Christopher Hsee, had college students watch a videotape of a man describe two very emotional experiences: his life’s happiest and saddest events. While the college students watched the tape, they were taped so the researchers could record the students’ emotional responses. The students were also asked what feelings they experienced for each story at the end of the video.
Researchers found that students showed and expressed the recorded person’s emotions. The student’s felt happy when they watched the man describe his happiest event. The students felt sad when they watched the man describe his saddest event.
When you really listen to a friend, empathy puts you in their shoes to experience what they talk about. The friend describes an argument with an ex-partner, the yelling, the misunderstandings. You vividly see what your friend talks about. The experience lets you feel the pain your friend feels. Well-known psychologist Albert Bandura says the shared experience results in a shared feeling. That is the price of listening: not only can you catch a cold, but you can catch an emotional cold.
There is a scientific explanation behind how our emotions – an experience of mind and body – transfer to somebody else. In 1980s, three Italian researchers made what is said to be one of the greatest neuroscience breakthroughs in recent times: discovering the mirror neuron. Three researchers in an experiment attached electrodes to a macaque monkey’s brain. This enabled the researchers to determine what movements caused what neurons to activate. As the monkey reached for food, the researchers took note of single neurons being fired.
One time when the electrodes were still attached to the monkey, the researchers grabbed a piece of food themselves, then handed it to the monkey. To their surprise, the researchers saw the monkey’s neurons fire! By accident, the researchers had discovered that when they grabbed a piece of food, the monkey had the same neurons light up as if it picked up the food. The researchers came to name these neurons “mirror neurons” because they were like the mind’s mirror. The mirror neurons reflected what the person or monkey saw.
The finding may appear insignificant, yet the breakthrough discovery has lead to researchers to better understand autism, empathy, altruism, and general learning. Mirror neurons are responsible for tuning-in to another person’s behavior. The neurons are responsible for an awareness and shared-feeling between two people. This one type of neuron is responsible for the significant role of learning, understanding, and feeling.
Smile at a baby, or almost anyone for that matter, and the baby’s mirror neurons fire to trigger an automatic smile. That is why the age-old saying, “smiling causes the whole world to smile with you”, is true. Not only is emotional contagion a replication of another’s emotions, but it is a biological dance. It is an interlinking of mind and body.
The biological dance is an important part in group dynamics. Janice Kelly, a professor of psychological sciences at Purdue University, says emotional contagion causes people to converge into an affective homogeneous group. In other words, group members experience the same emotions overtime as their fellow members. Kelly says that people with highly expressive body language are more able to impose their emotions on others. The distinctive nonverbal signs allows individuals to pick up on the person’s emotions and become infected by their emotional state. Here we see another age-old saying, “monkey see, monkey do” proven.
Another age-old theory of staying away from toxic people because they pull you down is now a physiological and psychological fact. Being around suppressing or uplifting people affects your body and mind. We were born for interaction and connection with one another. We are a social animal.
If you study self-help, you know the benefits of making friends with wealthy people if you want to be wealthy. If you want to be happy, you make friends with happy people. If you want to be confident, you make friends with confident people. If you want to be funny, you make friends with funny people. Observance creates transference.
Athletes often play their sport better after watching superior athletes excel in the same sport through the magic of transference. You come to pick the characteristics you see in others because they infect you with their style, knowledge, and emotions. Being around people you want to be like is a secret of self-transformation to stimulate that emotional desire needed for growth.
Whether you intend to be infected by someone or not is irrelevant to mirror neurons because they are responsible for imitating other people. You do not decide to take in the exposure – the adaption from mirror neurons is an automatic process. Our parents told us to avoid hanging out with the wrong people for a reason. “People are like dirt,” said the classical Greek philosopher Plato. “They can either nourish you and help you grow as a person or they can stunt your growth and make you wilt and die.” It is reality that you absorb the characteristics of people you observe.
Put yourself in a group where the individuals are depressed and you will become depressed. Put yourself in a group where the individuals blame others and you will blame others. Put yourself in a group where the individuals are prejudice against blacks and you will become prejudice against blacks. Or in my case: do something stupid on the road in front of a police officer to make him angry so you become angry.
Mirror neurons are not all bad news. In fact, they can be wonderful! Mirror neurons do not have to be the only source of influence on your mood or way of thinking. You can still be with depressed, blame-filled, or prejudiced individuals without taking on their characteristics. Therapists, social workers, and doctors are a few categories of professionals who need to work with people in the “don’t infect me with your emotional disease” category. Even so, people in such professions have a harder time making themselves immune from emotional diseases because mirror neurons are a part of the brain every moment of life.
While emotional contagion is an important variable of the formula to become who you want, it is also important you do not rely on other people to make you feel good. Letting the emotional parts of your brain (mostly the almond-shaped amygdala located deeply beneath both sides of your temples) roam like a child on the street is dangerous. Neuroscientists say you can control emotional responses to a certain extent.
When our ancestors faced a dangerous predator, they had to make a quick decision, an emotional response void of time-consuming rationalization that puts the person’s life at risk. Their eyes would widen and pupils dilate to visually take in more information. They received a shot of adrenaline to increase the supply of oxygen and glucose to muscles for strength and speed. Unnecessary bodily functions like digestion became suppressed. In terms of brain functions, neurological signals detour the slow responding “high road” and take the “low road” to produce a quick response. (I recommend you grab Daniel Goleman’s Social Intelligence to better understand the neuroscience behind emotions).
In a low road response, the sensory signals bypass the cortex and go straight to the amygdala to produce a reflexive response. Going straight to the more primitive amygdala produces reflexive, unconscious decisions. Neuroscientists say these primitive parts of the brain are difficult to change.
One low road response could be your reaction to a loud bang. The ear-busting sound causes an adrenaline response like widened eyes, dilated pupils, and increased supply of oxygen all in the first few milliseconds you hear the sound. You quickly look towards the bang to rapidly calculate whether it signals danger. If you cannot see the source of the sound, you unconsciously resort to social proof by looking at people’s faces to see their reactions and how you should respond. These decisions take less than a second.
Babies are frightened by loud noises because they have yet to discover that loud noises can be safe. You would scream, cry, and sprint away from loud noises if your brain overtly emphasized the low road in everyday living. This is where the high road, a more analytical neurological path in your brain, comes in to better control your emotional responses.
The high road is a slower response path that uses the logical parts of the brain like the frontal cortex and the hippocampus (your memory) to respond appropriately to stimulus. These brain parts are vulnerable to neuroplasticity that describes physical change. The brain gradually shapes itself by learning that all loud bangs are not dangerous.
After the first seconds following a loud bang, your brain transitions over to the high road by analyzing the situation. While the low road is responsible for reflexive decisions beyond your control, the high road can jam a cognitive wedge in the low road to help you better adapt and survive. A cooking saucepan dropping on the hard kitchen floor does not trigger you to bash on a neighbor’s door for help.
Some neuroscientists say it is impossible to control all emotional responses due to the brain’s low road producing a quick response for survival. Researchers agree you can put your brain’s high road to better use. When you think about an emotional response, you use the logical prefrontal cortex to override the signals received by the emotional amygdala. This is where neuroscience meets personal development.
One of my favorite techniques that uses my high road to take me to happiness, stability, and understanding is reframing. In reframing, you manipulate your initial interpretation, often a quick-response, in a situation to produce a response that benefits you and your relationships.
A powerful reframe described in my Communication Secrets of Powerful People program is positive intention framing. In positive intention framing, you identify the positive intention relevant to the limiting situation. Let’s say you are in a serious argument with your spouse. Most people in such an argument let: 1) the low road control the argument as they react impulsively and later regret what they said during the heated disagreement and 2) emotional contagion infect themselves with a negative mood for hours following the argument. You can have a degree of control over impulsiveness and emotional infections by reframing.
A positive intention reframe could identify your spouse’s yelling as their need to be heard, understood, and received; instead of a personal attack. Alternatively, you could positively reframe your spouse’s yelling as a welcomed release of frustration so you can listen to what concerns him or her.
Contrary to what you may think when someone is angry, happy effective communicators do not think positively to stop themselves becoming angry. Let’s say an aggressive person talks to someone with effective communication skills. The effective communicator is able to defuse the aggression through their communication style even though the emotional aggression is still received. A good communicator feels the aggression, but they reframe their response, which enables them to control emotional contagion and a destructive low road reaction. They see it in frames such as, “He’s trying to get me to understand him.” or “I enjoy the problem coming to surface instead of it remaining hidden where it eats away the relationship.” These frames let the effective communicator efficiently respond.
The happy effective communicator does not avoid anger. The happiest people get angry, cry, and accept emotions. Happy effective communicators are so because they embrace all emotions and open their minds to other interpretations.
Happy effective communicators embrace all emotions.
Happy people express anger by owning it (“I am angry!”). The problem of emotional contagion in bad communication, therefore, is not the current emotion, but how it is expressed. Blaming someone for your anger (“You’re a ****en idiot!”) makes them angry. When you harmfully express anger, the emotional infection escalates. Alternatively, suppression of anger avoids reality as resentment builds and the relationship withers away to its death.
In terms of depression, emotional contagion and reframing is no different. Depressed individuals seek isolation to feel better about themselves. The isolation compounds their depression – an ironic effect. The solution to depression is too complex for discussion in this article, yet sufferers are better off interacting with happier people to beat depression than being in isolation. They need destructive interpretations (“I’m a loser”) reframed into ownership and empowerment (“I’m feeling down today”). Similarly, they should make mirror neurons benefit themselves by smiling – even if it feels artificial – as it forces the body to be happy.
Emotional contagion can work for you or against you. Its affect is decided by how you use the high road of your brain.
We now see how reframing controls your responses to situations. What about other people’s responses? Should you let other people react in whatever way they happen to react? Can you use a technique to uplift other people and have emotional contagion help your relationships?
In general, do not worry about people’s responses because your response is what matters. Worrying over people’s responses is a powerless concern for the future. Trouble results the moment you try to directly manipulate a person’s emotions just like your own emotions.
Do not worry about people’s responses because your response is what matters.
Forcing your happiness on someone unhappy, negative, or angry is counter-productive. When I was happy and smiling, the angry police officer became more infuriated.
The next time someone around you is angry, look them in the eye, smile, and tell them, “What a beautiful day!” The person will become more angry and say something like, “It’s a disgusting day.” At times your happy attitude may change someone’s unhappy perspective, but the technique is unreliable because it suppresses present emotions. What is an effective communicator to do when emotional contagion creates an ineffective, unproductive environment?
Emotionally out of control conversations (or monologues) start with one person injecting an emotion into their conversation partner. When the partner is a poor communicator who reacts impulsively, his mirror neurons mimic the person’s harmful state. The newly infected person becomes a carrier, reciprocating the infection to the original carrier who’s emotional disease worsens.
Once the emotional infection becomes too much for the individuals, they leave the conversation only to contaminate other people. An emotional infection outbreaks. A simple disagreement escalates into a large – sometimes life-threatening – conflict with innocent people.
On one level you need to prevent yourself from being a carrier. When you talk to a friend in need, you are faced with the challenge of empathizing with your friend’s pain. You draw yourself into your friend’s struggle and feel the same pain. (True empathy does not make you a carrier.) At another level you need to prevent other people from being carriers. Sometimes people go nowhere productive and you need to put them into an emotionally empowering state. These mood challenges exist when you want to bring the best out of people.
The technique of reframing minimizes the likelihood of you carrying a dangerous emotional virus, while a technique I call “emotional-leveling” helps you prevent people from remaining in states that do them and others harm. Doing these two things controls emotional contagion to build happiness, power, and healthy relationships.
Again, you firstly connect at their level. Do not fight anger with happiness nor should you reciprocate verbal aggression. If the person is aggressive or depressed, take on a similar emotional level to build empathy and understanding. If an aggressive person walks around, walk around with him or her. If someone talks fast, you should also talk fast. For a depressed person, show you are also feeling depressed without developing depression. Be slower in your movements, speak softer, and have similar facial expressions as the person. Your goal is to enter their state without escalating the problem.
Once you connect at the person’s level and let him or her process present emotions, you then raise your emotional state. Make a joke or use a reframe on the situation. How does the mindset of this technique differ to being an annoying happy person smiling at everyone? Instead of reaching down to pull the person out of their emotional hole only to have them reject your assistance, you jump in the hole and let them stand on your shoulders to climb out.
If you combine the reframing technique with the emotional-leveling technique, you control your emotions and thoughts and help other people control their emotions and thoughts. These two skills help you and others express, share, and manage emotions that otherwise harm relationships. You transform what would normally be a destructive emotional outbreak into a positive outbreak.
Emotional contagion is a fascinating topic. You can make the psychological and physiological phenomena work for you instead of feeling you are its victim. Interact with people you want to be like. Reframe situations to travel along the high road to happiness. Make people’s mirror neurons mimic your rising state and their biology will become like yours. It seems like magic, but it is science.
It was a great experience going through this amazing stuff.
I have been happier since I started to control my mirror neurons. And yes I have been a little successful in controlling my anger. I was very short tempered 😈 . I have raised my temper threshold now. . And I started cracking jokes in stressful situations, which helped in my professional life 😉 .
Your articles do help in creating a better environment at home and work place. Thanks for the same.
This article is a classic. The techniques mentioned, when coupled with good body language techniques can deliver great results. However, I would love to have your opinion on this: Do you think that when one makes an effort to bring another person out of their negative emotional state, they are risking bringing their own emotional state down? especially, if the person hasn’t yet mastered some of these techniques? Therefore, the decision whether one wants to use their skills to change someone else’s state or withdraw from the situation, should depend on how good a relationship the two people share?
Ash, absolutely. In order to bring someone out of their negative emotional state, it’s helpful to enter into their state – which is what the emotional-leveling technique is all about. If you haven’t mastered the technique, then I think you are more vulnerable to remaining in a destructive state.
As for your last question regarding who you should use the technique on, because the technique can be time-consuming and emotionally draining, I use it only on people I care for. The two of you may have a not-so-good relationship, but if you care for the person or the relationship, use the technique. Remember to let people feel their emotions though.
I read your article on emotions, it was more than ethereal. I am reading your articles regularly, your research has made me your fan and i have felt wonderful personal development.
You are really great and amazing, I have used your articles to help some friends of mine in their marriages and people are really getting on well. For me you have been a blessing, thanks big time.
You’ve really a God gifted talent to write these type of very professional and useful articles Joshua.
I’m really impressed by your articles and am applying these all in my real life and am feeling a very beautiful change in my professional and personal life.
Wish you very best of luck for your future articles Joshua..
I absolutely love you and this site. I used to be, sometimes still are, a depressed person and always made people around me irritated. Now I’m more like when I was young and shone brighter than the sun, and everyday I become more and more happy and people around me notice that. I hope that I can be a great light in people’s lives and affect them the way you affect me. You really saved me. I love you.
Emotional Contagion is an eye-opener for me. This science of human relations undoubtedly has its practical implications. Thank you Joshua, you have taught me what to accept in life and how to reject (negativity) in life.
Really good and helpful for all who’d wish to avoid unnecessary interpersonal strife and who’d want to believe that better resolutions to any crisis in human relationships are always round the corner.
Please keep up,you are the source of reasonable knowledge.
You have no different with Isaac Newton in the world of wisdom.
I was actually thinking I was a very sensitive person and get carried away with people whom I come in contact. After I went through your article, I came to see that it is but natural and it can be an advantage to be like this. I am very eager to implement this technique in my day to day life.
Can you throw more light on how to train the mind to be on the high road all the time. We would have done irreparable damage due to our low road decisions.
Hi, Josh. I am so appreciative to all articles that you consistently send me. Honestly they have brought me on “BOARD” as far as communication ethics are concerned. Thank you very much. Keep up the spirit. | 2019-04-22T16:48:34Z | https://www.towerofpower.com.au/how-to-make-people-happy-and-yourself-feel-great |
Only take the chance to produce a solid functional resume. If you are asking to get a job and also you wanted to make a new look on your resume which is nice, clean and presentable, then you arrived into the most acceptable spot. If you’re browsing for employment as an account executive, then your resume must prove you have the wisdom and experience necessary to notify customers and take care of financing. Also, inside case you usually change jobs, you may additionally consider a operational restart. If you’ve held momentary tasks which have been in maintaining the job that you are applying for, cite these briefly. There was an range of explanations for why someone could like to take up a project through this company.
Just visit their site also create and edit your own Resume if you’d like. These kinds of resumes are excellent for those who have gaps in their employment foundations or are somewhat brand new to a particular industry. Your resume ought to be formatted in an effortless, professional way. Your resume must perhaps not mention that your personal hobbies, unless these have an immediate bearing in your own preferred career path. Useful resumes are ideal for folks who actually don’t possess plenty of function experience about the job they are looking for.
Your resume needs to start out using the going. It’s the exact same together with resumes. Useful and conventional resumes are not the sole resume types to choose from.
Based on your own work history, you might want to look at utilizing a resume that is operational. You want to use a chronological study once you have extensive work history that is certainly seeing the task that you’re applying for. If you have found an executive-level occupation and years of experience, you might not have the ability to fit all of your capabilities, skills, and achievements onto a single web page. As an alternative , you also have to take into consideration your many years of experience.
That you really don’t will need to sign up to be capable of utilizing their website. The very best thing of the website is you might return to Resumizer Free Resume Creator Online to edit your file you’ve created with them. The following site in creating your CV could be the cvmaker. You will find lots of free on-line sites which provides free of charge downloadable Demo Vitae and Effectiveness programs. Educational information is contained together with certificates and abilities that were exceptional. Activity lists aren’t likely to force you to stand out by the crowd. For knowledgeable bookkeeping professionals, so it’s urged to check at a list of abilities that are essential.
A supreme superior sample bookkeeping resume will comprise each of the important terms and phrases that an employer will likely soon be hunting for several of instances through the resume. Lots of accountant resume samples you will see on line tend not to offer the degree of depth required to assist you to composition yours. Many employees windup feeling their existing companies find it extremely hard to supply the things that they want and move to scan the market.
If you are considering a non invasive resume format, then it really is even more reason you need to get it assessed before you use it as a way to employ for jobs. First you need to choose a particular format for the own resume. Both major formats used today times are chronological and functional arrangement. At Primer Magazine, there are 7 downloadable templates that you find it possible to select from and an additional 1 2 templates they have added lately. Therefore it’s going to be quite easy to pick out of their many templates. You’ll find 20 totally free Resume templates that you may download from Resumetemplates.in. Additionally you ought to select the design of one’s own resume.
Utilize our bookkeeping resume samples to find a clearer concept of these advice companies may possibly be trying to find in you. Compatibility testing is part of non invasive evaluations carried on the software part or even the full applications to rate the compatibility of the program with the calculating atmosphere. It’s crucial notethat should you opt for guide testing, then it is an accepted reality that the occupation will be laborious and dull. Thus, effectiveness testing is your task to make sure determine the performance of a software. Additionally, there are some industry-recognized certifications that might support them catch the best jobs within the business.
You have to target more on your education and techniques. The real-life surroundings will help to discover the defects in the machine and guard against costly bugs already been detected at a subsequent period. It also includes a concise group of expertise, and an exhaustive assortment of expertise. Work experience also needs to be in reverse chronological purchase. The comprehension of of the latest technology is important. To the contrary, it centers on the skills you have developed that suit the requirements of the job for which you’re applying. In addition, it is advisable to work out ways to demonstrate your analytic abilities along with also detail-oriented strategy.
Designers cannot have the job done alone without a object design crew can function using a bothersome artist. A programmer ought to be more at a position to edit fashions since an application evolves through the ages. Before you begin composing a graphic designer restart, don’t forget to ask yourself exactly what you will need. If you truly have to be a designer that is quick, you want to create an effort to be one. As an alternative, designers learn how to draw in order that they can extract their own ideas. This way the programmer may concentrate on the means by which the parts go collectively instead of continually designing or copying the exact identical factors. Like wise applications feature designers desire to encompass the circumstance where this characteristic has been assumed to be used, from an individual, to find the comprehensive potential.
This informative article discussions whether pupils ought to utilize rev-it. Qualitative investigation comprises a little selection of participants, so determined on criteria characterized by the researcher. That you really don’t will need to become a professional whatsoever, but also you also ought to demonstrate that a pristine fascination from the width of one’s adventure.
The template looks clean, simple, and nominal, is well famous for spaciousness and capability to adapt most of your firm specific articles in a full page website. As an example, it could be handy with an expert design because it will give a great opinion to any one of your long term companies. Design your resume and then also see a project Do not let me tell you how important the resume is and also the way it may effect you in acquiring the job. Or you love the specific style and style and also you take pleasure in the method of creating your theme with diverse pre-made designs and choices. So it’s irrelevant how you show it upon your own design resume. Architecture isn’t a nine to five profession. You are definitely going to write a killer architecture resume.
In case the object isn’t reachable, instead of celebrating every single notification, it may be more appropriate to fix the problem by adjusting your structure. If possible, focus on visible aspects, and emphasize just a handful of images. Along side the work expertise, the skills section another significant role to acquire within an resume.
Communication is one of the countless capabilities designers need to carry inside their own arsenal. Notifications are frequently compared comparison to delegates. It may look like a very simple remedy to difficult troubles. As software grow in percentage, retaining an eye on the all its personal components say and information flows can get tedious, and are usually hard to deal with and also purge. Think about an intensive resume as an expert application that will help you then feel detected among the rivalry employed. The procedure for picking a worker in massive and smaller corporations is not likely to shift dramatically or be significantly disrupted. Volunteeringin your business or in a field of experience into another business, is one way to lessen the transition back to fulltime employment.
You must definitely send me a restart whether you may browse through the whole item. It is fast and simple to make use of. Though there are tons of methods in which ATI advertises, Bruce conveys that societal network is your predominant way at which the company creates buzz regarding the things they are able to give. If you’d prefer ideas, look at these sample visual resumes under control. The specific very same idea relates to a website. Taking into consideration for circumstance was shown valuable in so a range of those experiences. Quite simply, the lack of circumstance consideration generally seems to cause cases of bugs and usability problems which may have already been prevented.
Even the entire winter season is practically overspring is right round the corner. You can find quite a lot of spots online where it is likely to find free of charge. The above fold is one of many chief regions of one’s organization. A resume to get architecture is not a laundry list. A in depth knowledge of 3 d modeling software such as AutoCAD is likewise critical. After a very long amount of unemployment, a person could potentially be fearful that his abilities have escalated to the idea he’ll not be able to use in a new position.
Let’s look at each and every single section of the electronic mail carefully to recognize what is incorrect. A great email could cause business accomplishment. Professional mail today is a very brilliant instrument to make work much less intense and time intensive as it has 1 benefit of utilizing today’s tools.
E mails aren’t exactly the exact same as business meetings. Moreover, be certain that your mails signify that you are within the actual universe. So if you are not too convinced about just how to compose an expert email, then it is probably advisable to adhere to a pro e mail template. As it is often discussed it is essential to compose properly styled professional emails.
Along with maintaining your emails following a typical arrangement also allows you to write quick. You are composing a resignation e-mail to the very first time and you end up staring at a blank piece of newspaper or word record. Prior to signing off your own email, ensure that you incorporate a closing line. As email becoming increasingly more often employed means of communicating, it is very important this one must understand how to compose a formal emailaddress. It is quite tricky to write an official email for a expert entity.
E mails are frequently utilized to obtain first hand data in senior school and school essays. Assess your e mail more usually, and should you get a contact, response it whenever potential whenever needed. Therefore it’s important that should sending a contact , it should possess an issue that may get the attention of the receiver. Therefore, maybe not all company email should be formatted and written at the specific manner. The absolute most efficient business mails are considerate and do not contain slang or violent conditions. Typically, they’re the ones given to you by your business, normally including yours along with your company’s title. Business mails written to coworkers are normally direct and get for particular activities to be taken.
Your message should be distinct and clear. Subsequent to the message is routed, the document is going to be downloaded again and also joined into this message mechanically. The significant thing is where your recipient gets clear about this use of this official email. In case you write the most eloquent, persuasive message in the Earth, a defectively designed touch will make you look to be an newbie.
A filled topic line to alert the reader precisely what the letter is about. Once you have done that, you’re prepared to write a resignation letter that is formal. The sample letters are assumed to supply a concept of the way to compose effectively for an assortment of predicaments. Earlier composing, jot down the situations you wish to set within your letter. The business letter also conveys an impression of the institution in many different methods. An expert business hint has to make a beneficial and deep effect on the heads of their recipients and ought to carry out part in raising the disposition of the business.
Finding the most suitable phrases to compose is rather hard and you’ll discover it is easier to get hold of a boss in person. Email still remains the basic method of communicating for assorted documented and business specials. From the email over, the use of the email had been initially clearly said.
The standard person utilizing electronic mail for organization sends and receives more than 100 mails each day, as shown by means of a study released by the Radicati Group. Furthermore, your subject shouldn’t be overly long but briefly explained. The topic of one’s email needs to ready your receiver upon what things to anticipate inside the important body of this mail address.
Only have a little time to analyze the case and see whether you’ll explain to what is wrong because of it. The 2nd example illustrates how to compose a everyday emailaddress. The very first example illustrates just how to compose a proper small business emailaddress.
Broadly speaking, the advice included on your correspondence should be prepared in a succinct fashion, with the message you prefer to convey clearly stated. Ensure to get the info that you’re on the lookout for. Whether is critical to deliver negative info in a contact, it needs to be done at a positive, pragmatic method. CCing some one is crucial if there is relevant data while inside the email or whenever you’re linking them with the recipient. In the event you’ve acquired little numerical info to present, it needs to be clarified from the text from your own paper. That you don’t need to get worried in the event that you missed important information. Before sending a sales letter, then it really is vital that you’ve gathered the maximum amount of info about the consumer as you possibly can.
Type of Resumes Resume is needed for each and every kind of job that you just apply. Traditional, history-based resumes advised companies about earlier times today’s executive resume must indicate strategies to create an impact in the future. Opportunely, technology resumes have a very straightforward format.
If a provider would like to acquire hydraulic equipment, it might require the inhouse hydraulic technicians to get more information concerning the market and identify products and providers in giving the ideal price and overall functionality. Find out more about the field you wish to input and the organization you prefer to utilize with. Companies are competing at the parts of responsiveness and personalization. From then on, join with those who work on the business you’re seeking employment in.
You can find a great deal of employers who promote their staff to dress semi-formal too, however, you’ll find companies which can be strict as it pertains to dressing inside the appropriate small business apparel. They will need to realize that you understand how to go over your knowledge in a manner that generates value for these and presents your accomplishments in the finest possible light. Manufacturing potential consumers also try to locate brand new services and services which may raise their organization’s performance. An fabricating company and planner can be a person who manages the organization and buy of merchandise and services for a organization.
Each business and livelihood includes special key terms. Computer-integrated production (CIM) in engineering is something of manufacturing at which in fact the entire manufacturing procedure is controlled by personal computer. Besides being the ability to switch roles in a business, you can test out a different industry should you’d like a change. The aerospace firm is just one robust sector.
Some engineering specialty it will be possible to acquire your work in document pdf entirely free. There is an assortment of tasks out there for engineers. Industrial Assemblyline work increases generation and allows your employer to train employees. For an start in your hunt for an upcoming job, take a look at the Engineering Job Research page. None the less, the tasks are absolutely different in one another. Around the reverse side, you can also get a lucrative job in research to support find advanced techniques to extract and refine oil.
In depth comprehension of largescale manufacturing and production is necessary. Previous relevant knowledge is often mandatory or favorite far too. Any appropriate experience out of the telecom sector is going to be a bonus.
You could possibly be attracted to engineering because of its creative element. Manufacturing engineering is an exceedingly essential discipline globally. It’s just 1 facet of the engineering manufacturing industry. Afterward it can be your ideal professional option. Industrial technology is just a remarkable career discipline. While it isn’t the most famous engineering field, it is by far the absolute most diverse amongst the many professional engineering areas of analysis. The outstanding industrial technology restart has the suitable blend of relevant advice, strength-highlighting and formatting.
Not many engineers call for the programming skills to generate types, however you’ll need to know how models work you know what sorts of issues can be simulated and that which exactly the simulations me-an for your undertaking. No matter quantity of job knowledge you have being a engineer, then it’s quite important that you just create an eye-grabbing resume. In the end, mechanical engineers have to take on quite a couple of team assignments on the length of these career. You will find numerous important things you have to take into consideration while creating a profitable resume to find industrial engineer’s article. It isn’t mandatory that if you are an excellent engineer then you’ll undoubtedly get a great job. Thus, the very first step in becoming an avowed electrical engineer would be always to learn the requirements on a own condition. Licensed electrical engineers who go to some other state can find they need to generate a permit inside their new nation.
Health insurance and safety engineers are very just like industrial engineers. In order to detect ways to minimize waste and boost effectiveness, industrial engineers start off by studying commodity criteria and requirements. To discover more on what it must be an Industrial Engineer, then take a look at our comprehensive Industrial Engineer Job Guide. Industrial engineers also handle the design and workings of these mills which make products. In addition, many industrial engineers pursue a MBA level in the place of a master’s degree once they are at the project power. Budding industrial engineers know how to organize, design and implement complex systems for a particular trade. High quality assurance engineers are located in nearly every manufacturing organization, along with their principal task is always to make sure that products are consistently large quality.
Just see their website also make and edit your Resume if you’d like. Resumes in the united states must maybe not include any family, marital, or even health advice. Your resume will property at the precise same tune, which generally means you should measure up your game. The things which will make people interesting or unique can not be seen within their resumes. The tips created for shifting career are made by placing several hard work and spending extra time. Along side this, the recruiter will really like to be sure he can set you in the front of the client and look convinced, practitioner. You’ll find quite amazing recruiters around who’d love to put you in opportunities that are amazing.
Practical formats aren’t suggested unless there’s a really unusual situation. A functional template or sample is the one that may be adapted for the purposes of people searching for a career swap. You’ll find 20 totally free Resume templates that you can down load out of Resumetemplates.in.
What you should get to is the work. Mark’s present role is undefined. For any applicant who’s applying for a particular position that would involve all technical experience and processes, employing these resume structure samples 2017 is very likely to work to their own advantage, letting them emphasize it and earn a hiring manager along with recruiters recognize you’re appropriate to the project. It truly is great for those who’ve been working in the exact area or business, meaning to those planning to stay inside the exact same market.
There aren’t any two viewpoints concerning the portion of resumes for changing your career. In addition, it is advisable to always check the job description to discover whether the employer needs a certain file form. It will serve as a beneficial reference for a number of one’s questions as you commence your journeys in turning into an internet programmer. In addition, at the situation where one’s last job mention was not the perfect 1, a person may wish to decide on the help of a practical resume template.
A practical resume is very beneficial for somebody who’s trying to switch tracks, professionally talking, who might desire to go into a different area of interest or different market altogether. It is a lengthy, exhausting grind which often feels thankless and also endless. It is worth time to demystify the provisions because you can find lots of assortments of recruiters.
Should you want any guidance, you may look at a number job descriptions which will be able to help you choose which keywords to incorporate on your own resume. You are going to acquire comprehensive wisdom and hands-on expertise when developing or fostering the abilities required for HR pros and alternative organizational leaders. The abilities that the chronological restart might be unable to highlight are all set to become highlighted in a resume that is practical. People are searching for leadership capabilities, and construction that type of neural effect is an exceptional means to prove that, Cramm clarified. There are definite restart formats which exist and that you can choose from. You are able to write an updated resume in several steps. Along the precise traces as punctuation, you will find infact a superior offer of opportunities to exude self confidence within your resume.
The domain name is often the firm or functional area which you want todo it . The very best issue of the site is you might possibly return into Resumizer Free Resume Creator on the web to edit the file that you simply have created together with them. You can find lots of free online websites that provides totally free downloadable cv and Resume programs.
When you’re hired, you would like to meet the essential specifications of one’s role without worrying. This form of restart writing is effectively acceptable for applicants who would like to transfer towards another job marketplace. You are going to become cranking out software and will require a method to keep track of those. The application form is now open up. The process might be quicker, particularly if it is during BMC.
Applicant monitoring methods have to maintain a position to browse your resume. These candidate monitoring methods utilize computer software to scan your own resume and also choose whether you’re a great fit for the circumstance. It might perhaps not function as only real technology they utilize however, its own the backbone of every one of them. | 2019-04-21T10:19:15Z | https://www.artresumes.com/5-6-functional-resume-example/ |
Beginning programmers quickly discover that the textual representation of a number differs distinctly from a numeric variable on which programs can perform mathematical operations. For example, "123" is not the same as a true numeric value of 123 or hex 0x7B. Programs must use an algorithm or conversion routine to obtain a number from text -- especially if the text is formatted with grouping or decimal separators (such as commas and decimal points in U.S. number formats). Text-to-numeric conversion is primarily a concern for interactive programming but is also frequently encountered with HTML, XML, and many other file and communications formats that deal with data as text.
That requirement is reasonable for programmers and code, but users expect to enter and view numbers in the common format for their local culture. The Java SE API's java.text.NumberFormat class includes a convenient parse(String source) method that most programmers use to parse locale-specific formatted text into numeric values. Unfortunately, that method can yield unexpected -- and inaccurate -- results. This article explains the rationale for NumberFormat, reviews its functionality, exposes the class's parsing gotchas, and offers guidelines for using it reliably.
This article's example program (see Download) -- NumberInput, shown in Figure 1 -- is a Swing application that lets you explore several methods for converting textual input to a numerical value. In addition to input fields, the program displays the default locale name, the values as originally keyed, their original length, and the number of positions parsed (when applicable). At startup, it loads the input fields with the double value 123456.7 and the integer value 1234567, respectively. Both values are formatted for the default locale as a native user would expect. Because I reside in the United States, the program displays "123,456.7" for the double value and "1,234,567" for the integer value.
The reason for the error is the comma used as a grouping separator for the U.S. locale. Once the comma is removed so that the input is "123456.7", the program accepts the double value.
What about negative values? Keying in a leading sign (and removing the comma) makes the program happy, but the result for a trailing sign is: NumberFormatException for input string: "123456.7-".
Integer parsing displays similar behavior, for the same reasons. The code invoked for the NoCheck button is in NumberInput's noCheckInput() method. It uses Double.parseDouble() for input from the JTextField jtD and Integer.parseInt() for input from the JTextField jtI. These outcomes are normal according to the rules and should be expected behavior to most Java programmers beyond the absolute beginner stage.
Completely aside from typos and other user-input errors, there's always been an uneasy relationship between displaying formatted numeric text and receiving numeric text input from the same field. We've probably all known programmers who decide that the solution is just to display a message that says approximately, "Key numbers with no commas and a leading minus sign." Heads-down, data-entry staff often don't have much of a problem with this approach, but users typically want to see formatted numbers and then often key directly over the formatted display, maintaining separators and groupings. Generally, after some grumbling, the U.S. programmer's first step toward resolving the issue is to write a routine that strips out commas and moves any trailing minus sign to the front of the input value. Many programs written roughly that way have had long lives in production. In some sense, this was even the programmer's first foray into internationalization (I18N) and localization (L10N) (see Related topics). The problem is that this kind of code effectively localizes a program for only one or a limited set of locales.
Java programs are touted as being capable of running on any enabled platform, and many people take this to mean in any country and language too, in a familiar way. The Java SE SDK provides APIs to make much of this expectation a reality. However, a program written like the first effort I just described soon begins to break down when used outside of its assumed sphere. In various countries, the value 123456.7 can be formatted or keyed as "123.456,7", "123456,7", or "123'456,7", among other possibilities. Any program that assumes the same grouping and decimal separators (again, the U.S. example here uses "," and "." respectively) for all locales just won't work. In anticipation of this issue, the API includes java.text.NumberFormat. The class provides externally simple parse() and format() methods that are automatically locale aware, including knowledge of formatting symbols. In fact, NumberInput uses NumberFormat for formatting the values displayed in the input fields.
A Java Locale object represents and identifies a specific combination of language and region or country. It does not, in and of itself, provide localized behavior; classes must provide localization themselves. However, the Java platform does support a consistent set of locales, and many of the standard classes implement consistent localized behavior. These classes usually have two versions of methods: one that takes a Locale argument and another that assumes the default. The default locale is automatically determined at program startup or overridden by arguments passed to the Java runtime.
NumberFormat is an abstract class, but it provides static factory getXXXInstance() methods for obtaining concrete implementations with predefined, localized formats. The underlying implementation is normally an instance of java.text.DecimalFormat. The code and discussion in this article use the defaults returned by NumberFormat.getNumberInstance() for formatting and parsing double values and NumberFormat.getIntegerInstance() for integer values.
Parse a String to a Number.
Grab the appropriate numeric value.
As of JDK 1.4, you can use the user.country system property instead of user.region. To determine locales supported by the Java platform, see Supported Locales in the Internationalization section of the JDK documentation (see Related topics). A program can determine locale support at run time with java.util.Locale's static getAvailableLocales() method.
Listing 1 shows the relevant code for NumberInput's NFInput() method, which is invoked when the NF button is clicked. The method uses NumberFormat.parse(String) for validation and conversion.
At this point, it's useful to review briefly both what happens when a NumberFormat is asked to getXXXInstance() and the role of the DecimalFormatSymbols class. The discussion is based on a review of the reference implementation source code shipped with J2SE 1.4 and is subject to change.
The basic flow of events is that NumberFormat consults an internal ListResourceBundle for an appropriate pattern based on the associated locale and returns a DecimalFormat object created with the pattern. When there's no explicit negative pattern, a leading minus sign is assumed in combination with the positive pattern. During the process, a locale-appropriate DecimalFormatSymbols object is created and the DecimalFormat instance obtains a reference to it. Because the NumberFormat.getXXXInstance() methods are based on a factory pattern, other implementations or future reference implementations may return a different class. For that reason, any custom code must ensure that a DecimalFormat is actually returned before attempting to access the associated DecimalFormatSymbols instance.
The DecimalFormatSymbols object contains information such as the appropriate decimal and grouping separators and minus sign symbol. NumberInput collects much of this information and displays it in a dialog when the Info buttons are clicked. Figure 3 displays an example using the en_US locale. This information is critical to parsing and validating a number in a localized format.
Try clicking on the NF button and you'll see that the values are accepted properly even with the commas or other local grouping separators. Minus signs are also accepted when placed in accordance with the current pattern. What about when the minus sign is in another position? That, along with several other issues, is the topic of the next section and the impetus for this article.
Multiple contiguous or irregularly inserted grouping separators prior to a decimal separator are ignored.
For example, "123,,,456.7" and "123,45,6.7" are accepted and both return 123456.7.
After a great deal of thought, I came to the conclusion that, while this behavior is technically in error, no data is lost and any solution causes more work than it's worth. You should be aware of the behavior, but the NumberInput application doesn't correct it, and I won't refer to it further in this article.
A grouping separator that occurs after a decimal separator results in truncation.
"123,456.7,85" is accepted as 123456.7.
Multiple decimal separators result in truncation.
"123,456..7" is accepted as 123456.0; "12.3.456.7" is accepted as 12.3.
For patterns with a leading minus sign (negative prefix), truncation occurs at the point of a nondigit character, including embedded minus signs.
"123,4r56.7" is accepted as 1234.0; "12-3,456.7" is accepted as 12.0 (positive value).
For patterns with a trailing minus sign (negative suffix), truncation occurs at the point of a nondigit character excluding embedded minus signs. Embedded minus signs are accepted but any additional data is truncated.
For the Saudi Arabian locale (ar_SA) "123,4r56.7" is accepted as 1234.0; "12-3,456.7" is accepted as -12.0 (negative value).
If the pattern specifies a leading minus sign for negative input, a trailing minus sign is ignored.
"123,456.7-" is accepted as 123456.7 (positive value), and "-123.456,7-" (Dutch locale nl_NL) is accepted as -123456.7 (negative value).
Figure 4 and Figure 5 show an example of some of these behaviors when the NF button is clicked. Although it can be difficult to interpret what was intended by the original entries, it's a safe bet that a double result of 1234.0 was not anticipated, nor did the user mean to have the last two digits dropped from the integer input. Again, no exception is thrown, and there's no indication that portions of the input were ignored.
These results, which were consistent over many tests with JDK 1.4 and 5.0, are difficult to understand given the amount of work that went into implementing the NumberFormat and DecimalFormat classes. On the other hand, code can't be much more straightforward than passing an argument to a method and examining the result. The only real clue is in the JDK documentation for NumberFormat.parse(String source), which says, without further explanation, "The method may not use the entire text of the given string."
Seeming anomalies like these are troublesome, and at first glance, it may seem better to return to the "Key it my way or else" method of programming. "Garbage in, garbage out" is a cliche in computing, but that only means that a program can never guarantee that data is correct; the programmer's obligation is to ensure, as far as possible, that all of the input is valid. Rather than being a bug, it appears to be the design of NumberFormat.parse(String) to return a number from some portion of an input string if at all possible. Unfortunately, that behavior includes an unstated assumption that the data has already been validated. The end result is that the programmer cannot determine when the input is invalid, which breaks an implicit contract with users and the data itself.
On discovering these issues several years ago, my first response was to write what amounted to a front-end preprocessor for the parse(String) method. That worked, but the cost was additional, partially redundant code and more time to process the data. Fortunately, it turns out that an existing NumberFormat method, when used with care, can resolve the problem.
The parse(String source, ParsePosition parsePosition) method is unusual in that it doesn't throw any exceptions. It's normally intended to be used when you're parsing multiple numbers from a single string. However, upon method return, the value from ParsePosition.getIndex() is the last position parsed in the input string plus one. If the code always begins with the index set to zero, after processing, the index value will equal the number of parsed characters. The key to using the method for validation is to compare the updated index to the length of the original input string.
To avoid confusion, I should mention that ParsePosition also has a getErrorIndex() method. This method is essentially useless for the conditions discussed here because no errors are detected. In addition, when it is used, the error index must be reset to -1 before each parse operation; otherwise the result can be misleading.
The NumberInput application displays the ParsePosition index under the Length/PP column when either the NF or NFPP button is clicked. If the length of the original value is greater than zero and matches the index value, both are shown in green; otherwise the values are shown in red. This operation is done separately from the specific validation methods. If you look at Figure 4 again, you'll see that the values are in red, indicating an error, even though the NFInput() method associated with the NF button accepted the data.
For the final validation version, the NFPPInput() method is invoked when the NFPP button is clicked. This method uses parse(String, ParsePosition) to validate input and obtain numeric values. Figure 6 and Figure 7 show that the invalid input from Figure 4 is detected in NFPPInput(). In my testing, the method properly handled all of the conditions missed by NumberFormat.parse(String).
Remember that the method never throws an exception.
For clarity and demonstration purposes, the code here just displays Acceptable/Unacceptable dialogs. In a general-purpose case, you should throw a ParseException to be more in line with normal expectations.
Always reset the ParsePosition index to zero before invoking parse(String, ParsePosition).
A reset is necessary because, with this method, parsing begins at the ParsePosition index within the input string.
Use NumberFormat.getNumberInstance() for parsing double values and NumberFormat.getIntegerInstance() for parsing integer values.
If you don't use an integer instance (or, alternatively, apply setParseIntegerOnly(true) to a number instance) for integers, the method parses past any decimal separators to the end of the input string. The result is that the length and index match, and you have accepted invalid input.
In addition to comparing the length and index values for equality, you must also check for either a null Number after parsing or an empty input string ("" or length of zero).
Get an appropriate NumberFormat and define a ParsePosition variable.
Set the ParsePosition index to zero.
Parse the input value with parse(String source, ParsePosition parsePosition).
Perform error operations if the input length and ParsePosition index value don't match or if the parsed Number is null.
Otherwise, the value passed validation.
A tremendous amount of work has been incorporated into the Java SE API to allow "write once, run anywhere" not only at the bytecode level, but also to accommodate internationalized and localized applications. NumberFormat and DecimalFormat are classes that Java programmers who intend to write world-class applications can't live without. However, as this article has shown, developers also can't live with the parse(String source) method as it stands, unless perfect input can be assumed -- something that is seldom the case in the real world. The information and code I've presented in this article give you the alternate technique of using parse(String source, ParsePosition parsePosition) to determine when entries are invalid and obtain correct results.
Literals: This section of the Java Language Specification gives the rules for numbers represented as text.
Supported Locales: The Internationalization section of the JDK documentation lists all the supported locales and their IDs.
Internationalization and localization: Uncertain about I18N and L10N? Look over their definitions and information at Wikipedia.
"Java internationalization basics" (developerWorks, April 2002): Check out the author's introductory tutorial on Java I18N and L10N. | 2019-04-21T10:10:30Z | https://www.ibm.com/developerworks/java/library/j-numberformat/index.html |
Chairman Lamar Smith (R-TX) questions NOAA Administrator Kathryn Sullivan at a budget hearing of the House Committee on Science, Space and Technology.
After a brief relaxation of hostilities, the House Committee on Science, Space and Technology and the U.S. National Oceanographic and Atmospheric Administration are again at odds over the committee’s demand for internal agency emails.
Following the uproar, in December, the committee backed down on its request. But on February 22, Chairman Smith wrote NOAA claiming the “slow-pace” of its response “creates the perception that the Agency is deliberately attempting to impede and hinder the Committee’s oversight.” He then broadened the search parameters for internal communications to include the words “climate,” “change,” “temperature,” “ship,” and “president” among others, effectively requiring NOAA staff to review many thousands of agency emails in a search for any of those words.
The controversy lies not in the fact that the committee wants, or is challenging, the study’s data, but that its Draconian request for internal communications is designed to have a chilling effect on the work, and workings, of agency scientists. The data are online, available for expert review — which makes Chairman Smith’s requests for communications between NOAA employees seem all the more like a witch-hunt. Smith defended his actions stating that “whistleblowers” had said that NOAA rushed publication of the paper without first obtaining internal approval. He and the committee have maintained that no information regarding the position or identify of the whistleblowers will be forthcoming.
The notion that this paper was rushed to publication is false. In December 2014, the co-authors of the study submitted their findings to Science — a leading scientific journal. Following a rigorous peer review process, which included two rounds of revisions to ensure the credibility of the data and methodologies used, Science informed the authors that the paper would be published in June.
On March 16, 2016, NOAA Administrator Kathryn Sullivan testified before a committee budget hearing. Rather than focus on the agency’s proposed 2017 funding, Chairman Smith used the opportunity to launch into a climate debate with Sullivan stating NOAA should be focused on weather, accusing the agency of “hyping a climate change agenda” and proclaiming “climate alarmism often takes priority at NOAA.” Sullivan has still not fully complied with Smith’s subpoenas, which she says are “too broad”. Smith continues to assert that the study published in Science was rushed to publication. However, Science has told NPR that the study was subjected to extra oversight and scrutiny given the controversy surrounding the topic.
To the scientific community, the committee’s agenda is clear. Smith has taken an unshakable position that climate change is “science fiction” and his committee has reposted an Investor’s Business Daily article on its website questioning NOAA’s integrity and suggesting the agency is engaged in “junk science” and fraud. A better question is whether the committee is wasting taxpayers’ money to defend the lie that climate change is a fallacy and to obstruct new agency findings that climate change is continuing.
Robust debate is healthy for the advancement of science. But the tactics employed by the Committee on Science, Space and Technology are beyond the realm of debate. If science is to continue its unbiased pursuit of truth, it should be through a forum of healthy, respectful discussion and deliberation, far from the intrusive hand of politically motivated congressional committees.
Bethany Ordonez will graduate from the Pace Masters in Environmental Science program this May. She holds a BS in biology from Mercy College and is originally from South Africa. Bethany is interested in the marine environment, especially the effects of climate change on oceans, such as ocean acidification and rising sea temperatures.
I thought only certain extreme Republicans believed climate change was not a real thing. It never occurred to me that actual environmentalists could make the claim that climate change is slowing down. If you take this weekend for example with the dramatic weather change, it felt like there was winter and summer in the same weekend. That is not exactly proof that climate change is happening, but it has to be a by-product of climate change. Sometimes I have issues with listening to the big groups like the NOAA and the committee of science because I think they have too many people and too many different inputs going on that could potentially throw off our concerns. If climate change really is not happening, then the corporations and extremists who have not believed in climate change win. With that being said, there would be serious changes coming our way. I mean on the good side, there are people looking at the possibilities and analyzing what is happening in our world and environment. However, I do believe climate change is happening and it is at its most extreme point today than it was a few days ago. It constantly changes.
After reading this post and hearing of many more instances of similar reactions to climate change from American politicians my only question is simply, why? As I sit here thinking about the fact that numerous cities across the country experienced their warmest December on record, yet we just had snow a week ago in April, I simply cannot grasp how anyone can deny climate change. It is disheartening to see that representatives elected by our own people are not only failing to act on something that can very likely devastate our world and everyone in it, but also wasting tax payer resources to pursue such a ridiculous witch hunt in order to refute it. What could possibly be the reasoning behind Chairman Smith and many other politicians’ rejection of a scientifically proven phenomenon? Do they really not believe what is occurring right in front of their eyes, or are they acting to pursue someone else’s agenda?
Climate change deserves way more press then it has in the past. Society as a whole is more educated on the topic and is in no position to dispute the existence of climate change. Congressman Smith is pursuing an investigation for inconsistencies that don’t exists. I’m not surprised he has to go to such lengths in attempt to disprove an already widely accepted phenomenon.
The dispute over climate changed is exhausted and the only way we can make a positive change is when we stop fighting over it’s existence and start compiling solutions. Smith is investigating irrelevant inner communications between NOAA employees. The underlying fact that needs to be emphasized is that the NOAA released their data online for experts to review, which only leads me to believe that Congressmen Smith willingly ignored the opportunity to inform himself. Science has no political agenda, it simply exists to educate and enlighten the public with raw facts. My only question is why try and punish a process that has and will continue to benefit our society?
This is the problem with American politics. Scientific research has proven climate change is true, and a serious issue that should be taken seriously by the House Science Committee. The committee exists to accept the facts and make decisions that help people, rather than ignore the facts and waste taxpayer’s money denying climate change. The actions by Chairman Smith are cowardly and an injustice to the American people.
They are definitely an injustice, and yet we need to ask ourselves, how many of the American people are actually aware of what is going on? It seems to me that such a huge waste of taxpayer money should be in more headlines, but it is not. I also wonder how often this actually happens that we are not aware of?
I can’t believe that I am reading something like this. How is it possible that people like Lamar Smith (R-TX), who clearly displays little to no education in science, are able to get on the House Committee of Science, Space and Technology? The people on this committee should at least have some type of educational background in science. For Chairman Smith to ask the scientist’s at the NOAA to give up all of their emails that mention anything about climate change is absurd. He is acting like scientists don’t double, triple or even quadruple check their work before sending it to their peers, where their work gets checked over again. This is how science works and how it always worked. All of mankind’s scientific discoveries and advancements went through the same process. I believe Smith is conducting this witch-hunt out of desperation. Global warming is real and the facts that prove it are stacking up. This search through all the scientist’s emails is just a desperate attempt to find any little thing that could diminish the credibility of the scientists. Global warming is real; we all have witnessed some type of unusual weather pattern or severe storms due to global warming. The time for debate over, the time to solve these issues has begun. I have one question for those in Congress who continue to deny that global warming is real, how much money are the oil companies paying you?
I agree that to serve on the Science committee that some education is needed, however this is sadly not the case. It seems unbelievable that the people making decisions about funding for science don’t have much of a background in the sciences.
The issue that haunts me the most and is endemic in every subject is inconsistency. How can both Democrats and Republicans, but especially Republicans, deny the issue of climate change as a substantive variable in the pursuit of global leadership? The United States military has found time after time, strong security implications due to climate change that could exacerbate terrorism. How can a military-loving Republican then believe climate change is a lie?
I might be aggressive in my tone here, but a simple way of correcting wrongs is pointing out inconsistency. How can a member of the House deny the scientific findings of the military? If they can’t, then how or why would they deny the science behind a civilian scientist?
The bottom line, and really the only way to stop corporate and crony politicians is to end money in politics. Once politicians are not corrupted by big oil, finance, or corporate interests, we can truly have a level playing field where the opportunity for scientific ideas can be respected.
I completely agree this witch hunt is a complete waste of taxpayers money in the attempt to defend the lie that climate change doesn’t exist. My opinion is that those who deny climate change at this point, with all the science backing it up, will only change their opinion once some drastic disaster occurs that is undeniably the result of climate change.
What seems shocking to me is the fact that this huge waste of taxpayer dollars is not being halted. It seems that Mr. Smith is standing by his request for all these emails and had paid no mind to the cost of his request. I would like to know who he has in mind to read all the emails if he ever was to receive them.
I am surprised that the committee is trying to argue with the data collected. This have been tested and written down so why argue with facts?
Climate change is anything but fake. All around us there is proof of human activity changing the world and not always for the better. There should be no question that climate change is real. With 99.9% of scientists agreeing and the research to back it up how can believers like the cornucopians say they are right. From ice core samples to just dating climate patterns, the green house effect and so on show how our world is changing. The government is afraid because when it comes to whose most responsible for the clean up America is the most responsible. From coal emissions and other fossil fuels we started the industrial revolution and so created a chain reaction. China may be in the lead now but the top ten countries such as China, the US and India need to start thinking green and do it now. There is nothing “fraud” or “junk science” testing about it. It is definitely a witch hunt going on because like it is written, information is posted online for people to see and review. Climate change isn’t a lie. It is a basic fact that humans need to step up and admit they are ruining the world they live in. Those who believe that climate change is not real stay focused on how it’s snowing in spring and that means global warming isn’t real there is a difference between weather and climate and if these senators and house of reps. looked more deeply into the issues and educated themselves they would know the difference. Hopefully people start believing in climate change now and work for the future and not just now because witch hunts as these are why we won’t be able to fix what we can now. There’s no going back but we can prolong the enevitable.
Very well written. I agree, how could anyone argue against climate change?
Political polarization results in the marginalization of issues that aren’t typically the subject of debate. Because most political candidates base their stances on controversial issues such as foreign and domestic policy, civil rights, immigration, etc, science and environment issues elude the public eye. If issues, such as the aforementioned policy, rights, immigration, didn’t result in such hostile debate, there would be time to debate other issues. Quite unsettling.
This article provides excellent insight into the scientific world and how the publication process is extremely important and requires critical peer-review. To hurry such an important article which can contain controversial materials only makes it even more controversial. The argument also debated within the article which can be found online. as per stated in this article, is about climate change and the ideology on how its slowed down. This argument should be ridiculed and not looked through the rose-colored glasses that the NOAA seems to have on because the perspective of climate change is a global and ever-changing issue.
I thought the article was very well written and had great detail. Climate change is something that should not be ignored.
I think they stand so firmly behind their climate change denial because to accept climate change as real would have wide-ranging implications that they do not want to even consider. For example, it would mean setting limits on the oil companies and I am sure that is not something that they would like to think about doing. What I find most frightening though, is the political meddling in the scientific process. It seems that Mr. Smith is trying to scare scientists so that they don’t ever disagree with him or any other politician, and if that happens it would have disastrous consequences.
It doesn’t shock me that people and even scientific groups are still so fully rejecting any claims about climate change and the serious threat it poses to not only the environment, but society. Admitting problems, such as rising sea levels and temperatures, are real will mean that those problems then have to be addressed on a large-scale, and that is not easily done. What is easily done, however, is refusal to believe any claims that there is a problem in the first place. The desire to do this is almost understandable- no one wants to face climate change. Despite that unpleasant truth, intrusive actions are not justified. As long as studies and research articles are published in the manner that the scientific community has deemed appropriate, then there is no reason to try and disprove claims by crying “fraud”. Just because something is controversial does not necessarily mean it is wrong. The only proper and mature way to counter a scientific argument is with facts and more research that supports the new claim. This is, of course, a difficult and time-consuming process. So while it is deplorable that climate scientists are disregarded and doubted by their peers because of fear of controversy, it is not exactly surprising. | 2019-04-26T08:58:13Z | http://earthdesk.blogs.pace.edu/2016/04/04/the-lie-the-witch-hunt-and-the-war-on-climate-change/ |
Pittsburgh welcomed Tennessee to Heinz Field last Thursday night and the Steelers thumping of the Titans offered Steelers Nation a sight for sore eyes, as the offense exploded for 40 points while the defense delivered no fewer than 9 splash plays. This week brings Green Bay back to two, but before we can focus on stuffing our Thanksgiving Turkeys, this corner of Steelers Nation must first resolve these 5 Smoldering Questions on the Steelers.
1. While many areas on the depth chart have performed well throughout this season, one position area that has excelled without any need to tack on any qualifiers what so ever is the Steelers 2017 defensive line. It’s hard to find a game where Cameron Heyward, Stephon Tuitt, Javon Hargrave and/or Tyson Alualu haven’t stepped up and made a play.
Do you think it is appropriate to start comparing this line to the trio of Aaron Smith, Casey Hampton and Brett Keisel? If not, defend your decision to decline. If so, expound upon your reasoning and offer and assessment of which line merits a higher rating.
2. Our own Homer J. began his postgame assessment by asserting, “Yinzer Cult of Doom’s weekly post-game Bitchfest and Kvetching Bee has been postponed for lack of material.” Nice as that would be, the morning after the game found no shortage of naysayers who used the game as “proof” of Todd Haley’s incompetence, given the success of the no huddle.
We’ll side step that debate here, to a point. While the Steelers did score 40 points, they did so employing an offensive attack that more resembled the West Coast offense than the NFL equivalent of Daenerys Targaryen and her Dragons as much of Steelers Nation expected to see.
Do you think that Chinking and Dinking is the way for this offense to go, given how effective Ben looked Thursday night?
3. The Steelers Secondary had four interceptions against the Titans, yet it has now given up 3 touchdown passes for over 60 yards in the last 6 quarters of play. Which tendency do you think will prove to be more relevant going forward?
4. As you know, the glow of the Steelers’ five straight wins was mitigated slightly by the news of Marcus Gilbert’s four game suspension for performance enhancers. Gilbert wasted little time in apologizing for his “inadvertent use” of the said enhancers.
Do you believe his use was “inadvertent” and if you do and his use was in fact inadvertent, do you think he was right not to appeal the suspension?
5. The upside to the suspension of Marcus Gilbert means that the Steelers did not have to send out the Turk to free a roster spot to activate Cam Sutton. Cam Sutton’s IR activation is perhaps the most highly anticipated IR activation since that of David DeCastro in 2013. Bob Labriola reminded fans just last week that Sutton has only played a handful of quarters in in preseason.
Nontheless, fans remain enthusiastic about his arrival to the active roster.
Will this kid make a contribution down the stretch or not? You Make The Call!
1) I think the Steelers current d-line is an outstanding unit. They are not quite as smoothering as the Smith, Hampton and Keisel group in run defence but they generate much more pass rush. Enough pass rush that I think it could be considered something close to a draw.
2) Imo what this offence has shown, is the ability to play a variety of offensives, depending on the defence they are facing. I think this is what Mike Tomlin was looking for in a balanced offence. Take away the short pass? We will run. Take away the run? We will pass. This offence has the personnel to adjust and adapt.
3) Besides the picks, this defence is getting sacks and fumbles. The occasional deep pass is more than compensated for by the big plays that were made. That said, it would be nice if the defence can quit giving up quite so many deep passes.
4) It is impossible to know if his use was inadvertent or not. A lot of athlete’s have been burned by using protein powders they thought were safe only to find out they were not. It is also possible he was being given something for his back problem that was problematic. I don’t see the point in appealing unless he had 100% proof he was not using a PED. The silver lining is it will give him time to heal his back.
5) I wasn’t anticipating Cam Sutton to any great extent. I was worried that he might come and go before we had a chance to see what he was capable of doing in a game setting. We still might not see that as he will likely play special teams if he gets a shirt on game days.
1. Tough to compare, because it’s 3-4 apples and 3-4 oranges. Smitty’s gang stonewalled the run and crushed the blockers. Wreck-its’ guys do much more sacking the QB. Different skills, different roles. But it IS time to START comparing them. 91-98-99 were there on an extended tour, and that alone puts them in a class by themselves.
2. Naaah. You go in ready to do anything, knowing the D can’t concentrate on everything. Then you take what they give you. If they sell out to stop the run, you pass. If they sell out to stop the pass, you run Bell down their throats all day. And you factor into that how much time you want to run off the clock….and how to keep your defense fresh.
3. Giving up the bomb is always more relevant. The guess here is that the picks will be more plentiful against the lesser quarterbacks, but, then again, there’s Brady, and he’s thrown like 647 TD’s against the Steelers since he last threw a pick.
4.We don’t know, but we do know that by appealing, he would have been able to play against Green Bay, but that would have pushed the suspension back, and they need him back for the last game of the year and the playoffs.
5. Reports are he’s been impressive in his early practices, as he was in his limited training camp action. Certainly, if somebody gets hurt or could use a rest, he gets a hat. He might also get a hat against the Browns, just to see what he can do. If he gets a hat, the guess here is he’s back on punts and maybe gets some snaps on D.
1. I agree with everyone else. Greatness is defined (in part) by tenure. It’s also a totally different role than Smith-Hampton- Keisel. The other part of greatness is defined by beards. And none of them have as awesome of a beard as Keisel.
2. If I’ve had one complaint about Tomlin it has been his (or the Steelers) inability to adjust during a game. Whether by a change of heart or good fortune, that seems to be the hallmark of the Steelers this year. I think the offense should be whatever works. Clearly teams are trying to take away Bell. After Ben’s performance, and the emergence of JuJu, that becomes a much more dangerous strategy.
As a side note: it seems to me linebackers are playing the waiting game with Bell. They are letting him make a move and then react, as opposed to trying to crash the line of scrimmage. If that’s the strategy, it SHOULD open up HUGE opportunities for those mid range throws that Ben hit so well in last week’s game. Hesitation is the enemy in a game as fast as football. That’s why Bell’s running style is so unique. But the hesitation should cause some windows for Ben to hit.
3. I worry about the long TD pass. Tim Tebow has scarred me for life!
4. I want to believe that it was an accident. But if sports has taught me anything – if it’s too good to be true, it is too good to be true. Too many scandals have rocked the sporting world to assume innocence over stuff like this. Plus there is SO much pressure to get “healthy” and “back on the field”. I think he probably took something intentionally with the hope he would get healthy. I doubt it’s systematic cheating for years. Take the 4 games, get ready for the playoffs. There’s no point in dragging it out and possibly missing important games at the end of the season.
5. The backup is always the most popular guy on a team, because there’s hope he’s going to be a star. I hope Sutton’s the real deal.
1. It is difficult to compare the 2 lines as they are different defensive sets, 4:3 vs 3:4. I would still put the Keisel/Hampton/Smith line as better though. With that line, we were the top defense in the league for a large portion of their careers together. The gap is getting smaller and smaller between the 2 though as time goes by.
2. I don’t really care how they do it, just that they do it. Part of the success was the approach to the game. We played to their weakness. Tennessee is a good run defense, with their pass defense not as good. That approach was not all Ben.
3. I really hope it is the INT’s. The long td’s/pass plays has been troubling the last couple of games. Hopefully adjustments are made to stop that from happening. 3 of the INT’s also were great plays by the defense, not just gifts from a bad throw, like the first INT.
4. I think Gilbert made the right decision. Whether or not it was a conscious decision to take a PED, it happened. Unfortunately (for him) it will cost him A LOT of money. I think it shows maturity on his part in owning up to his own mistake, which was either taking the PED in the first place, or not checking with the League on what he wanted/was instructed to take prior to taking the meds. There is a lot to be said about CYA. This could very well be an example of that.
5. I hope so. If I remember correctly, he was doing well in the preseason.
1. As others have said, the disclaimers are that it is in a sense apples and oranges as to what each group has been asked to do, for the current group it is still early. But the comparison is wholly appropriate. They have suffered a bit of inattention because of the deserved accolades being given the offensive line, and our bias in focusing upon linebacker play. This is a great, deep unit that if they continue on this trajectory will achieve its own exalted position in Steelers’ lore, which given the fact that this is a franchise whose only two retired numbers are that of defensive linemen is no small thing.
2. The beauty of the potential of this offense is that it can dominate in a variety of ways. Most teams are capable of shutting down at least one dimension of an offense. It has been clear in recent weeks that the dimension that must be stopped is Bell, with the hope that they can cope with Ben, AB and the passing attack. To be successful, this offense must be nimble enough to take what is given to them, and then when to opponent adjusts, take something else. They can win, and do so spectacularly in a variety of ways.
3. The cheap touchdowns are particularly annoying because few teams have proven that they can simply steamroll this defense. That being said, the ability to generate interceptions will, as demonstrated on Thursday, more than offset the occasional negative splash play, and is a huge winning difference.
4. I cannot credibly comment on whether Gilbert did it on purpose or not. But not appealing the suspension was the smartest response. The team needs him later, not so much now. The only important thing now is to secure a playoff position, and hopefully a bye. The New England game will be great entertainment and will have some psychological value, but at the end of the day is not necessarily determinant of anything since both the Steelers and the Pats are capable of getting big wins on the road. I want Gilbert available for that potential January meeting regardless of where it is played.
5. I am hoping that Sutton will be the next Sean Davis as it relates to his manifest potential. But Davis and Burns weren’t made in a day. And, amazingly, things have flipped so dramatically with the fortunes of the secondary personnel that with both seasoned veterans like Haden, Sensabaugh and Gay, as well as emerging players like Davis, Burns and Hilton playing at such a high level, any contributions from Sutton can be viewed as a luxury at this point.
Seriously. The Steelers need to take care of business. No more Chicagos no more Jacksonvilles — and don’t over look the Ravens.
With that said, I do think the matchup at Heinz against the Patriots is critical, because I think that getting home field advantage during the playoffs will be critical.
New England is going to be tough no matter where or what. They’ll be favorites in the game and rightly so.
1. In their prime Hampton and Smith were considered the best 3-4 nose tackle and defensive end in the game. In fact Smith was arguably the best 3-4 DE to have ever played. Granted, at that time, there were far fewer 3-4 defensive linemen, and their responsibilities were different. Hampton, Smith and Kimo/Keisel were supposed to tie up blockers to allow the outside linebackers to get to the QB. They didn’t get many opportunities for splash plays. They could collapse the pocket and bring pressure but that wasn’t their primary responsibility. These guys were very very good at their jobs.
It’s hard to compare them to Heyward, Tuitt and Hargrave who have completely different responsibilities. In Todays NFL, there are far too many QBs who get the ball out in 2 seconds or less. I believe Brady averages 1.8. The outside linebackers just can’t get there fast enough, unless there is inside pressure. So these guys have different responsibilities, their job is to get after the QB, And they are also very good at their jobs. Heyward was really good in either scheme.
I can’t really see that it is possible to really compare them, they have the same titles, but different jobs.
2. Whatever works. Right now, teams don’t really know what to expect.
3. I think the the deep ball problem will go away once Hayden comes back. Hopefully sooner. If you don’t know the out come of the game and see that one team had 4 takeaways and the other team had 0, you have a pretty good chance of picking the winner. I hope the interceptions is the trend.
4.No way of knowing if it was inadvertent, but I am not so cynical that I believe that everyone is always lying. I own up to my mistakes and I have no reason to think that he does not. He was absolutely correct in not appealing the suspension. No one wins the PED appeals, and it would just delay his suspension and make him miss playoff games.
5. Sutton will most likely be inactive unless someone else gets hurt. He has practiced very little and right now each game counts in playoff seeding. Maybe he will see the field on special teams, but I really doubt if he will on defense.
You get a (black &) gold star for #1.
No idea why so many people are hanging on to the old way, in their minds.
Thanks. I’ve been a fan since the mid 70s so I have seen a lot of changes in the way the game is played. As the game evolves, the teams have to adapt. The front of Hampton, Smith and Keisel (the way they played then) would get picked apart by the short passing game, aka the dink and dunk offense. Heck, Brady did it to them several times and now there are a bunch more teams that can and will play that game.
I never understood the mindset that keeps people living in the past. The game changes and teams change with it. I think some of it is fueled by national media, who are always a couple of years behind when they talk about the teams strengths or weaknesses. If I recall correctly, I heard the commentators in a game this year talking about the D line was supposed to tie up the blockers for the O backers. Hasn’t been the MO for years, In LeBeau’s last year, he turned Heyward loose, and Butler continued it.
1- I will start with this, Aaron Smith will always be a favorite player of mine so I may lean toward that group. It’s hard to compare one unit versus the other. The group of Aaron,The Snack and The Beard, as we all know made their living as less heralded lineman, eating up blocks making life better for everyone else. They were certainly better at STOPPING the run.
My my my times have changed. While not like the other group, they have been stingy in run defense but not near as dominant. They are making their way in other parts of the game and that is getting after the QB. Cam is having an awesome season and has been unstoppable at times. Tuitt, who is currently my favorite player, is a beast in his own right. This isn’t a knock on Alualu but we need him healthy for the stretch run. Hargrave has one of the quickest steps for a man that big is only going to get better. I love this group but they are still writing their legacy.
2- I loved the up tempo but every game and game plan is different. If we hit a bump in the road and things get stagnant it’s nice knowing Ben still can command the No Huddle to jump start things.
3- I honestly believe it’s our time so I expect more play making from our guys.
4- I don’t know for certain but the track record for this sort of thing isn’t a favorable one for the person suspended. I do believe it was taken for the right reason and that is to get back on the field.
5- This shouldn’t be taken as knock on his talent but you gotta hope he isn’t seen. That means we have remained injury free and that is always a great thing. I fully expect this guy to be prepared and work his tail off while waiting. | 2019-04-19T01:25:07Z | https://goingdeepsteelers.org/2017/11/22/5-smoldering-questions-on-the-pittsburgh-steelers-remembering-the-titans/ |
Turn-of-the-century Detective Isaac Bell takes on the upstart leader of a vicious crime organization in this novel in the #1 New York Times–bestselling series.
It is 1906, and in New York City, the Italian crime group known as the Black Hand is on a spree: kidnapping, extortion, arson. They like to take the oldest tricks and add dynamite. When a coalition of the Black Hand’s victims hire out the Van Dorn agency to protect their businesses, their reputations, and their families, Detective Isaac Bell forms a crack squad and begins scouring the city for clues. And then he spots a familiar face.
The stakes grow ever-higher, with the Black Hand becoming more ambitious, and their targets more political. If Bell can’t determine the role played by the face from his past, the next life lost could be one of the most powerful men in the nation.
The Black Hand locked twelve-year Maria Vella in a pigeon coop on the roof of an Elizabeth Street tenement. They untied the gag so she wouldn’t suffocate. Not even a building contractor as rich as her father would ransom a dead girl, they laughed. But if she screamed, they said, they would beat her. A vicious jerk of one of her glossy braids brought tears to her eyes.
She tried to slow her pounding heart by concentrating on the calmness of the birds. The pigeons murmured softly among themselves, oblivious to the racket from the slum, undisturbed by a thousand shouts, a piping street organ, and the thump and whirr of sewing machines. She could see through a wall of wooden slats that admitted light and air that the coop stood beside the high parapet that rimmed the roof. Was there someone who would help her on the other side? She whispered Hail Marys to build her courage.
Coaxing a bird out of her way, she climbed up on its nesting box, and up onto another until she glimpsed a tenement across the street draped with laundry. Climbing higher, pressing her head to the ceiling, she could see all the way down to a stretch of sidewalk four stories below. It was jammed with immigrants. Peddlers, street urchins, women shopping, not one of them could help her. They were Sicilians, transplanted workers and peasants, poor as dirt, and as frightened of the authorities as she was of her kidnappers.
She clung to the comforting sight of people going about their lives, a housewife carrying a chicken from the butcher, workmen drinking wine and beer on the steps of the Kips Bay Saloon. A Branco Grocery wagon clattered by, painted gleaming red and green enamel with the owner’s name in gold leaf. Antonio Branco had hired her father’s business to excavate a cellar for his warehouse on Prince Street. So near, so far, the wagon squeezed past the push carts and out of sight.
Suddenly the people scattered. A helmeted, blue-coated, brass-buttoned Irish policeman lumbered into view. He was gripping a baton and Maria’s hopes soared. But if she screamed through the wooden slats, would anyone hear before the kidnappers burst in and beat her? She lost her courage. The policeman passed. The immigrants pressed back into the space he had filled.
A tall man glided from the Kips Bay Saloon.
Lean as a whip, he wore workman’s garb, a shabby coat and a flat cap. He glanced across the street and up the tenement. His gaze fixed on the parapet. For a second she thought he was looking at her, straight into her eyes. But how could he know she was locked inside the coop? He swept his hat off his head as if signaling someone. At that moment, the sun cleared a rooftop and a shaft of light struck his crown of golden hair.
He stepped into the street and disappeared from view.
The thick-necked Sicilian stationed just inside the front door blocked the tenement hall. A blackjack flew at his face. He sidestepped it, straight into the path of a fist in his gut that doubled him over in silent anguish. The blackjack, a leather sack of lead shot, smacked the bone behind his ear and he dropped to the floor.
At the top of four flights of dark, narrow stairs, another Sicilian guarded the ladder to the roof. He pawed a pistol from his belt. A blade flickered. He froze in open-mouthed pain and astonishment, gaping at the throwing knife that split his hand. The blackjack finished the job before he could yell.
The tall golden-haired man stood stock still with empty hands. Terrified, all Maria could think was that he had a thick mustache that she had not seen when he glided out of the saloon. It was trimmed as wonderfully as if he had just stepped from the barbershop.
He spoke her name in a deep, baritone voice.
She trusted him and squeezed them shut. She heard the man who was crushing her shout, again, “I kill.” She felt the knife sting her skin. A gun boomed. Hot liquid splashed her face. The kidnapper fell away. She was scooped inside a strong arm and carried out of the pigeon coop.
They were standing on the open roof. He was wiping her face with a handkerchief, and the pigeons were soaring into a sky that would never, ever be as blue as his eyes.
A cold wind and a crisp sky promised an early winter in the Catskill Mountains. But the morning sun was strong and the city men stood with coats open, side by side on a scaffold atop the first stage of a gigantic dam high above a creek. Laborers swarmed the site, but roaring steam shovels and power hoists guaranteed that no one would overhear their private bargains.
“A mighty enterprise,” said Branco.
The valley behind them was a swirling dust bowl, mile after mile of flattened farms and villages, churches, barns, houses and uprooted trees that when dammed and filled would become the Ashokan Reservoir, the biggest in the world. Below, Esopus Creek rushed through eight-foot conduits, allowed to run free until the dam was finished. Ahead, lay the route of the Catskills Aqueduct—one-hundred miles of tunnels bigger around than train tunnels—that they would bury in trenches, drive under rivers, and blast though mountains.
Antonio Branco had mastered English as a child. But he could pretend to be imperfect when it served him. “Bigga hole in ground,” he answered in the Vaudeville-comic Italian accent the American expected from a stupid immigrant to be fleeced.
He had already paid a hefty bribe for the privilege of traveling up here to meet the superintendent. Having paid, again, in dignity, he pictured slitting the cloth half an inch above the man’s watch chain. Glide in, glide out. The body falls sixty feet and is tumbled in rapids, too mangled for a country undertaker to notice a microscopic puncture. Heart attack.
But not this morning. The stakes were high, the opportunity not to be wasted. Slaves had built Rome’s aqueducts. New Yorkers used steam shovels, dynamite and compressed air—and thousands of Italian laborers. Thousands of bellies to feed.
“A freighter is possible,” Branco said noncommittally.
“I know a fellow with a freighter,” Davidson said casually.
Antonio Branco’s pulse quickened. Their negotiation to provision the biggest construction job in America had begun.
A cobble stone crashed through the window and scattered glass on Maria Vella’s bedspread. Her mother burst into her room, screaming. Her father was right behind her, whisking her out of the bed and trying to calm her mother. Maria joined eyes with him. Then she pointed, mute and trembling, at the stone on the carpet wrapped in a piece of paper tied with string. Giuseppe Vella untied it and smoothed the paper. On it was a crude drawing of a dagger in a skull and the silhouette of a black hand.
“Dear you will tell father ransom must be paid. You are home safe like promised. Tell father be man of honor.
“They still want the ransom,” he told his wife.
His wife became hysterical. Giuseppe Vella looked helplessly at his daughter.
The Knickerbocker Hotel was a hit from the day John Jacob Astor IV opened the fifteen-story Beaux-Arts building on the corner of 42rd and Broadway. The great Caruso took up permanent residence, three short blocks from the Metropolitan Opera House, as did coloratura soprano Luisa Tetrazzini, the “Florentine Nightingale,” who inspired the Knickerbocker’s chef to invent a new macaroni dish, Pollo Tetrazzini.
Ahead of both events, months before the official opening, Joseph Van Dorn had moved his private detective agency’s New York field office into a sumptuous second floor suite at the top of the grand staircase. He negotiated a break on the rent by furnishing house detectives. Van Dorn had a theory, played out successfully at his national headquarters in Chicago’s Palmer House and at his Washington, D. C. field office in the New Willard Hotel, that lavish surroundings paid for themselves by persuading his clientele that high fees meant quality work. A rear entrance, accessible by a kitchen alley and back stairs, was available for clients loathe to traverse the most popular hotel lobby in the city to discuss private affairs, informants shopping information, and investigators in disguise.
Isaac Bell directed Giuseppe Vella to that entrance.
Bell led the Italian into the working heart of the office, the detectives’ bullpen, which resembled a modern Wall Street operation with candlestick telephones, voice tubes, clattering typewriters, a commercial graphophone and a stenographer’s transcribing device. A rapid-fire telegraph key linked the outfit by private wire to Chicago, field offices across the continent, and Washington, where the boss spent much of his time wrangling government contracts.
Bell commandeered an empty desk and a chair for Vella and examined the Black Hand extortion letter. Half-literate threats were illustrated with crude drawings on a sheet of top quality stationery.
Vella pulled a strand of butcher’s twine from his pocket.
The elegantly dressed, redheaded Detective Abbott looked to Vella like a Fifth Avenue dandy until he slid automatic pistols into twin shoulder holsters, stuffed his pockets with extra bullet clips, sheathed a blackjack, and loaded a shotgun shell into his gold-headed walking stick.
Isaac Bell took the Black Hand letter to Joseph Van Dorn’s private office. It was a corner room with an Art Nouveau rosewood desk, comfortable leather armchairs, views of the sidewalks leading to the hotel entrances, and a spyhole for inspecting visitors in the reception room.
Van Dorn was a balding Irishman in his forties, full in the chest and fuller in the belly, with a thick beard of bright red whiskers and the gruffly amiable charm of a wealthy businessman who had prospered early in life. Enormously ambitious, he possessed the ability, rare in Bell’s experience, to enjoy his good fortune. He also had a gift for making friends, which worked to the great advantage of his detective agency. His cordial manner concealed a bear-trap swift brain and a prodigious memory for the faces and habits of criminals, whose existence he took as a personal affront.
New York Police Detective Joseph Petrosino, a tough twenty-year veteran with an arrest and conviction record that was the envy of the department, had recently received the go ahead from Commissioner Bingham to form a special squad of Italian-speaking investigators to fight crime in the Sicilian, Neopolitan and Calabrese neighborhoods.
Bell passed Van Dorn the Black Hand letter.
“I’ll think about it,” said Van Dorn.
Isaac Bell strode uptown from the 125th subway station through a neighborhood rapidly urbanizing as new-built sanitariums, apartment blocks, tenements, theaters, schools and parish houses uprooted Harlem’s barnyards and shanties. He was a block from 128st Street, nearing a jagged hill of rock that Giuseppe Vella was excavating for the Church of the Annunciation, when the ground shook beneath his feet.
He heard a tremendous explosion. The sidewalk rippled. A parish steeple swayed. Panicked nuns ran from the building, and Convent Avenue, which was surfaced with vitrified brick, started to roll like the ocean.
Bell had survived the Great Earthquake in San Francisco only last spring, awakening suddenly in the middle of the night to see his fiancee’s living room and piano fall into the street. Now, here in Manhattan, he felt his second earthquake in four months. A hundred feet of the avenue disintegrated in front of him. Then bricks flew, propelled to the building tops by gigantic jets of water.
It was no earthquake, but a flood.
A river filled Convent Ave in an instant.
There could be only one source of the raging water. The Croton Reservoir system up north in Westchester supplied New York City’s Central Park reservoir via underground mains. The explosion in Giuseppe Vella’s excavation—an enormous dynamite “overcharge,” whether by miscalculation or sabotage—had smashed them open. In an instant, the “water famine” predicted by Catskills Aqueduct champions seemed unbelievable.
A liquid wall reared out of Convent Ave and raced down it, tearing at first-story windows and sweeping men, women and horses around the corners and into the side streets. Its speed was startling, faster than a crack passenger train. One second Isaac Bell was pulling the driver from a wagon caught in the ice-cold torrent, the next, he himself was picked up and flung into 127th Street. He battled to the surface and swam on a foaming crest that swept away shanties the full block to Amsterdam Avenue.
There the water careened downhill, following the slope of the land south. Bell fought out of the stream and dragged himself upright on a lamp post. Firemen from a nearby station were wading in to pull people out.
Bell charged up Amsterdam Avenue at a dead run.
A third of a mile north of the water main break he found a sturdy Romanesque Revival brick and granite castle. The lintel above its iron doors was engraved Water Department. A structure this big had to be the main distributing point for the Westchester reservoirs. He pushed inside. Tons and tons of Croton water were surging up from a deep receiving chamber into four-foot diameter cast iron pipes. The pipes were fitted with huge valve wheels to control the outflow to the mains breached seven blocks away by the explosion.
With the dynamite explosion no accident, thought Bell, but a coordinated Black Hand attack to blame Giuseppe Vella for flooding an entire neighborhood, the extortionists must have left the helper bloody in an alley.
Isaac Bell threw his weight and muscle against the wheel and pulled with all his might. The old engineer clapped hands on it too, and they fought it together, quarter inch by quarter inch, until the gate wheel finally began to turn with a metallic screech.
As soon as they closed the last gate, Isaac Bell raced back to Vella’s excavation.
The streets were littered with the corpses of drowned dogs and chickens. A dead horse was still tied in a wrecked stable. Trolleys had stalled on their tracks, shorted out by the water. House and business cellars were flooded. A hillside had washed away and fallen into a brewery, and the people who had lived in the upended shacks were poking in the mud for the remains of their possessions.
An angry crowd was gathering at the excavation site.
Bell shouldered through it and found Giuseppe Vella barricaded in the board shack that housed his field office.
“Sante Russo. My foreman. The blaster. He was afraid those people would blame him.” Bell exchanged a quick glance with Archie Abbott, the Van Dorn shadow he had assigned to protect Vella. Abbott had managed to station himself near the door, but he was only one man and the crowd was growing loud.
Policemen pushed through the crowd.
The cops pounded on the door. Bell let them in.
Isaac Bell issued quick orders to Archie Abbott before he accompanied Giuseppe Vella home. When they got to 13th Street, he confirmed that Harry Warren’s detectives were keeping an eye on the man’s home. Then he went to his room at the Yale Club where he changed into dry clothes and oiled his firearms. He was retrieving the soaked contents of his pockets and smoothing a damp two-dollar bill, which would dry no worse for wear, when it occurred to him what the high quality paper that the Black Hand letter had been written on reminded him of.
Copyright © 2016 by Clive Cussler and Justin Scott. All rights reserved. No part of this excerpt may be reproduced or reprinted without permission in writing from the publisher. | 2019-04-22T18:22:37Z | http://prhinternationalsales.com/book/?isbn=9780735215818 |
Tommy Tracey of Springburn is almost a forgotten man as far as the Scottish distance running fraternity is concerned and this profile is an attempt, however slight, to put it right. He is very highly spoken of by those who knew him, and the reports of his running and racing indicate that he was a quality athlete. His career was almost all within the period 1948 to 1957.
Season 1948-’49 and Tommy’s first run was in the McAndrew Relay at Scotstoun and although there was no outstanding time this time, John Emmet Farrell in the ‘Scots Athlete’ commented that ‘Tracey, who proved best of a well-balanced Springburn quartette, looks a good prospect.’ Two weeks later he was in the team for the Kingsway relay in Perth as part of a Springburn team that finished second with McLean, Reid and Jim Morton (who was fourth fastest on the day). In the Midlands Relays in December 1949 he was in the Springburn team which finished down the field: he himself had a good run though and was equal second fastest in the race. In the Midland Championship on 5th February 1949 he finished sixth. Then in March, he was nineteenth in his first National in a Springburn team which finished fifth and not far from the medals. There were two Edinburgh to Glasgow relays in 1949 and Springburn only participated in the earlier race, in April. Tommy made his maiden run in this event running on the second stage and pulling the club from seventh to fifth time on the leg. Emmet Farrell reported in September 1949 when reviewing the summer season that “The steady running of the Springburn Harriers in the Two Mile Races was a feature. Jim Morton and company certainly demonstrated that good team running can often defeat brilliant individualism and a weak tail. In the Three Miles Scottish Championship, Tom Tracey and Jim Morton ran above themselves to finish third and fifth and handsomely beat the standard time into the bargain.” So he was not just a winter season runner – the times for the event were not published in the magazine which only gave the winner’s time.
“With Victoria Park’s Andrew Forbes still troubled with his leg and out for the season, Tom Tracey, 22 year old painter of Springburn Harriers has stepped right into his shoes as king-pin of Scottish distance men. Delighting his clubmates most with his recent National 3 Miles championship win, he has been unbeaten in Scotland so far this season over 2 and 3 Miles. His best 2 Mile time yet is 9:32.8 at Helenvale, and at Belfast he clocked the equivalent of a 14:37 3 Mile when finishing second to H Ashenfelter (USA) in a special handicap on a grass track.
He started running at 14 and was sixth in a Scottish Youths Cross-Country Championship running for South Glasgow AAC, but gave up the sport for a couple of years with his club going defunct. Joining up with Springburn in 1947, he came under the eye of Jim Morton and nursed into the 2 Mile team the club were patiently building. Honours came over cross-country, winning his club championship in 1949 and 1950, and he gained his international jersey at Brussels by finishing third in the National.
In the McAndrew on 7th October, Victoria Park won from Shettleston with Springburn third and there were two Springburn runners in the top six times but Tracey led them all with15:42 followed by Andy Forbes on 15:45, the second Springburn runner being McLean in fourth (equal to Ben Bickerton) with 16:08. On 21st October in the Dundee Kingsway Relay, Springburn were second to Victoria Park with Tom Tracey having second fastest time of the day with 13:47 to Andy Forbes’s 13:44. Revenge for the senior athlete! After praising Forbes’s return to form, Emmet Farrell said that Tracey is going great guns showing form equal to Forbes himself and is proving himself a grand leader of a splendid Springburn team. he ended by looking forward to the Forbes Tracey duels. In the District Relays on 4th October, Springburn were second to Victoria Park, and Tommy had fastest time ahead of Andy Forbes. The Edinburgh to Glasgow settled into the place that would become its own in November, 1950, and Tommy ran the sixth stage for the team that would finish fifth. Second fastest on the stage behind Andy Forbes, he picked up one place from sixth to fifth. The report in the ‘Scots Athlete’ refers to Springburn Harriers deserving sympathy for their plucky and courageous fight back after the mishap to their first and incidentally one of their best runners. It goes on to say, “Tom Tracey of Springburn excelled in the long 7 miles sector”. Looking ahead to the Beith Harriers New Year race, Farrell said The individual struggle may be the high-light with Forbes and Tracey setting a merry pace in front of the others. Both men have been within seconds of each other for fastest lap times this season with honours fairly even except in the ‘News of the World’ race where Forbes had the edge. This will, however, be the first time this season that they have met in actual scratch competition and fit and well they should provide an epic race with the winner anybody’s choice. For myself, I have a feeling that Forbes’ experience will still prevail against the Springburn crack’s youth.” The Beith race was not reported on but the Nigel Barge Five Miles Open Road Race on 6th January 1951 was and victory did indeed go to the older man with Forbes winning in 23:41 to Tracey’s 24:31 with Farrell himself in third in 24:48. The Midland Championships in February 1951 were held at Millerston with “under Arctic conditions with 7″ of snow lying” according to the ‘Scots Athlete’. It went on to report on the race, “The seven mile race served up some surprises when it was seen that Bannon and Tracey were alternately setting the pace and slowly dropping Forbes. Tracey ran out a worthy winner with Victoria Park taking the team award, coming away in the second half to wipe out Shettleston’s earlier points advantage.” Springburn was the third team with their counting runners being Tracey, John Stevenson seventh, Jim Morton eighth, J Wallace twenty sixth, N McGowan Twenty ninth and A Stevenson thirty seventh. Looking ahead to the National, Farrell thought it would be between Forbes and Reid before saying, “I cannot just see Tracey and Craig as serious challengers for the individual title yet I feel they are reasonably certain of forward places and international selection.” The story is told of Tommy, a month later, virtually missing the start the National of 1951 because he was on the wrong side of the fence talking to some club mates when the gun went off! He was not the only one to be caught out – the start was generally reckoned to be a wee bit early. Nevertheless, he made up enough ground to finish in second place behind Andrew Forbes who was also behind the line at the start.
The photograph above gives the first six places. Tommy went home that day with two silver medals since the club had been second team. The ‘Running Commentary’ said: Despite a most indifferent start which caught Forbes, Tracey and others napping a most engrossing duel ensued between these two runners which ended in a narrow 20 yards victory for the former in a nip and tuck finish. These two were really out on their own. Andrew Forbes ran superbly and with magnificent judgment. Tom Tracey’s display was equally impressive and it is obvious that there is little to choose between these two grand athletes. When it is considered how much Tracey lost at the start and how near he was at the finish it looks only a question of time before he adds the cross-country to his three mile title.” The international in 1951 was a good one for Tommy Tracey. He was twenty fourth and the first Scot to finish, but the race was not without incident – “Tracey – Scotland’s Star. Despite the loss of a shoe, Tom Tracey ran a grand and gallant race to finish twenty fourth.” Shortly after the International, there was an invitation Festival of Britain 9 Miles Race in which Tom Tracey ran a sensationally brilliant race to take third place beating among others ‘laughing boy’ Saunders the International champion. Even though Saunders may be suffering from reaction after his brilliant Newport victory, nothing can gainsay Tracey’s great performance. Tom Tracey and Eddie Bannon have both put up performances worthy of great intrinsic merit and could prove a great Scottish spear-head for next year at Hamilton. Their deeds should also instil into Scottish runners a greater ‘conceit’ of themselves, should supply them with that confidence which has been lacking.” .
The Forbes-Tracey duel carried on into the summer. The preview of the SAAA Championships contained this paragraph from Emmet Farrell: “Unless Anglo-Scot AT Ferguson enters, the Three Miles may develop into a tussle between present champion Tom Tracey and former champion and present record holder Andrew Forbes. The versatile Victoria Park man has up to the present revealed a slight edge over the Springburn man. But it should be a great battle between experience and youth. My preference is for Forbes who I believe has not entirely given up hope of Olympic selection next year. After Andy’s superb Three Mile win in 14:18 at the London Caledonia Games, he looked unbeatable but the Springburn star is ever-improving and has subsequently beaten Forbes over Two Miles in 9:25 and so this obviously looks the race of the day.” The race was at Hampden Park on 23rd June and the result was a win for Forbes. 1. A Forbes 14:28.8; 2. T Tracey 14:47.1; 3. I Binnie 15:05.0. The report read: “The Three Miles did not turn out to be the race it promised to be. Holder Tom Tracey who seemed off form a bit, could not match the pace of the machine-like Andrew Forbes who won it in the second fastest championship time of the series – and his own second best in Scotland with the time 14:P28. Andy complained of the track being slow and heavy.” The season’s rankings produced by the ‘Scots Athlete’ had Forbes first, Tracey second, Ferguson third, Binnie fourth and MacDonald (Maryhill) fifth. The actual best performances were first Forbes with 14:15, second Tracey with 14:45.5, third Binnie with 15:05.6.
The McAndrew relay signalling the start of the cross-country season was on 6th October and the result was a win for Victoria Park with Springburn second. On the third leg Tracey lowered the course record by seven seconds – only to see Eddie Bannon take it even lower on the last leg by another four seconds to 15:20! In the Midland Championships of November 1951, Springburn struck gold and won from Shettleston by 20 seconds. The report in the ‘Scots Athlete’ read, Showing a return to form, Harry Fenion handed over a surprise lead for Bellahouston, with a five second advantage over Springburn’s John Stevenson and eight seconds ahead of holders – and favourites – Victoria Park (I Binnie). Running sweetly through, Tommy Lambert (14:36) took Springburn into the lead. Meanwhile Johnny Stirling (VP) was not his usual and dropped six places to ninth, and was passed by the club’s second string runner, R Kane who kept his team in fifth. At the end of the third lap, Springburn still held the lead through RF McLean but Victoria Park made ground through young Syd Ellis moving through from fifth to second, returning with 14:38, and Chic Forbes bringing the A Team to fifth with 14:32. With the last leg in the capable hands of Tom Tracey with easily the fastest time of 14:01. Springburn were proud and worthy winners with the total time of 58:27. Times and places: 1. Springburn Harriers 58:27, (J Stevenson 14:57, T Lambert 14:36 , RF McLean 14:53 , T Tracey 14:01); 2. Shettleston Harriers 58:47 (J McNeil 15:12, B Bickerton 15:08, RC Wallace 14:40, E Bannon 13:47. Fastest times: Bannon 13:47, Tracey 14:01. Then in the Edinburgh to Glasgow later in November, the team was third at the end of the first stage after a good run by John Stevenson and they were third at the end of the final stage after Tommy Lambert had a good run home. Tommy himself ran on the sixth stage again and was third fastest behind Bannon and Forbes. The team was Stevenson, McFadden, Morton, Wallace, Rankine, Tracey, McLean and Lambert. On 5th January 1952, Tom was third in the Nigel Barge (25:13) behind Forbes (24:48 and Binnie 24:58 and won the Inter-Counties contest at Westerton from Nelson and Gibson – all three from Lanarkshire.
The Midland Championships were held in the extensive grounds of Woodilee Hospital in Lenzie on 2nd February, 1952. Bannon won again but Tommy was down in fifth position with the team third – they had three men in the top ten though – Tom was fifth, J Rankin was sixth and John Stevenson eighth with the their counters being Jim Morton, D Wallace and N McGowan. In his preview of the National Championships, Emmet Farrell said, “Coming to the individuals, Scotland’s big three are undoubtedly Eddie Bannon, Andy Forbes and Tom Tracey, and of these Bannon is the bright particular star and on present form must be a strong favourite to win our National cross-country title. Up to the present he has shown devastating speed and last year’s brilliant fourth in the English national demonstrated that he has the stamina to go with it. Andy Forbes, present National holder, despite some worry over foot trouble continues to reveal remarkable consistency of form and with his ability to rise to the occasion is a hard man to beat. Tom Tracey is also running well though perhaps not at the peak of his form.” In the National at Hamilton in March Tommy was third behind Eddie Bannon of Shettleston and AT Ferguson of Highgate Harriers in London but in front of Andy Forbes, Tom Stevenson (Greenock Wellpark) and Charlie Robertson of Dundee. He still qualified for the International Championship where he was twenty third and a scoring member of the team.
In November 1953, Springburn were again out of the medals in the District relays, but that was not down to anything Tommy Tracey did or didn’t do! Fastest time of the day was by Eddie Bannon with 13:42, Tracey was second with 13:46 and Clark Wallace of Shettleston was third with 14:20. The Springburn team of McFadden, O’Reilly, A Stevenson and Tracey was seventh. In the E-G Springburn missed out on third placed medals by just four seconds to Edinburgh Southern Harriers. Tommy ran on the sixth again where he was third quickest behind Binnie and Bannon but picked the team up from ninth to fifth. S McFadden had the fastest time on the final stage but could not quite get to the Edinburgh runner. There were some new faces in the West District Championships at Lenzie in 1954 with the race being won by Harry Fenion of Bellahouston from John McLaren of Shotts with Tommy in third place leading the team to bronze medals. Emmet Farrell forecast the finishing order for the Nation thus: 1. E Bannon; 2. J Stevenson (Greenock); 3. R Reid (Birchfield); 4. T Tracey; 5. J McGhee (Shettleston); 6. H Fenion (Bellahouston; 7. WA Robertson (ESH). In the actual race, Tommy Tracey was second individual with the team in fourth position, only eleven points down on third placed Edinburgh Southern Harriers. After the E-G, then this – again losing out to ESH by the smallest of margins. How close was the individual race? 1. Eddie Bannon 50:19; 2. Tommy Tracey 50:42; 3. Harry Fenion (Bellahouston) 50:49; 4. R Kane (VP) 50:50; 5. F McKenzie (Shettleston) 50:51. His fourth and final run in the IAAF Championships was in 1954 and he was placed fifty first.
2nd October 1954 was the official start to the winter season because that was when the McAndrew Relays were held. Shettleston defeated home club Victoria Park as winners and had three teams in the first five. Springburn was third team and Tom Tracey was fifth fastest, behind Bannon, Andy Brown, Fenion and Russell. The 1954 Midlands Relays were held at Stepps Stadium again and the Springburn lost third place by six seconds to Shettleston B with Shettleston A and Victoria Park in the first two slots. Tommy Tracey ran the last lap in the fifth fastest time of the day (16:46) behind Bannon, Andy Brown, Harry Fenion, and Jim Russell. The exact same order as in the McAndrew. Tommy was again on the long sixth stage of the E-G in 1954 and again he was third fastest – this time behind Binnie and Joe McGhee. The team had been eighth at the end of the first leg but thanks to good runs by McLean, A Stevenson, O’Reilly and Futon, Tommy took over in third and handed over in third – from third to third in third fastest time – and the team was third in the race! In the Springburn team for the Midlands of 1955, Tommy Tracey was only second counter for the club: first scoring runner was Peter McParland who had had a glittering career as a Junior and on this occasion finished sixth with Tommy twenty first and the team again third. In his preview of the National, Emmet Farrell said: “Tracey, Fenion and Binnie: In normal circumstances, Tom Tracey, Harry Fenion and Ian Binnie might appear racing certainties and even now they could make up the first nine but leg injuries have severely limited the training of Tracey and Fenion and they may find their task of finishing in the first 8 or 9 by no means an easy one but they have class and the knowledge of past success to sustain them. Binnie on the other hand has rarely shown up well on cross-country but Hamilton race course should be made to measure for him.” But 1955 was the second time in three years that he missed the National at Hamilton and the team was fifth, probably regretting the absence of their top man. There were no appearances at all in the top rankings that summer for Tom Tracey.
Tommy Tracey was in the Springburn Harriers C team for the McAndrew Relay on 1st October, 1955, but his time of 15:45 was faster than any of the runners in the A team and only fifteen seconds behind Gordon Nelson of Bellahouston who was fourth fastest. In the Lanarkshire Relays at Cambuslang he ran the first stage for the Springburn team that was third behind Shettleston A and B teams. In Stepps on 5th November 1955, the race for the Midland Relay Championship brought the club more medals. It was a much closer race than the previous year with Shettleston first in 56:16 and then Garscube 57:13, Springburn 57:29 and Bellahouston 57:42. Tommy was third fastest in 13:53 behind Bannon 13:46, Brown 13:51 and in front of Everett 13:57 and Nelson 13:58. In November, Tommy had the four thirds again! Still the man for the sixth stage he was third quickest behind Bannon and Binnie – and this time Tom Tracey was only one second slower than Binnie – he maintained third place and by the finish that’s where the club was. Despite this fine running, he was down to third club counter in the Midland District championship with another new face ahead of him: the first three scorers for the team were John McCormack in sixth, Peter McParland eleventh and Tommy Tracey in twentieth. The team was second with more new names – John McGale ( a friend of McCormack’s) twenty second, Eddie Sinclair thirty fifth and John Ballantyne forty fifth. March, 1956 was to be his last run in the National and it was his lowest finish of all – he was twenty seventh, eight places lower than his first run in the event.
In the Midlands Relays in 1956, Tommy ran the last stage for his club team of O’Reilly (15:10), Rooney (14:28), McCormack (14:08), and himself (14:24). The team was fourth, missing medals by only fourteen seconds. He ran Stage Two of the Edinburgh to Glasgow in 1956 but was clearly injured or out of sorts because he dropped from the third place handed to him to thirteenth. The club was tenth.
For Scottish endurance running, the period just after the War was a high spot. There were good committee men who had some drive – the Scottish Marathon Club is an example of that – and the standard of running, maybe in part caused by the level of fitness in the general population after the War, was very high. Victoria Park in the 50’s were Kings of the Road, Shettleston nearly Kings of Country, both being hotly pursued and not at all held in awe by Bellahouston Harriers, Springburn Harriers and many other clubs. For Tommy Tracey to maintain his position in open competition for as long as he did, is quite remarkable – look at the list of names he was competing against and then see his second and third places in the National for what they were. When I asked why the career was so short, the word was that his occupation as a painter did not help because of the constant exposure to paint fumes in sometimes very confined spaces and was possibly the cause of his lengthy absence in 1952-53. Whatever the reason, Scottish athletics was the poorer for the departure of Tom Tracey. | 2019-04-24T10:27:55Z | http://www.scottishdistancerunninghistory.scot/tommy-tracey/ |
As a small business owner your second biggest challenge is keeping the customers you all ready have. Using the internet to focus on superior customer service can help you do just this. Just check out the attached post.
Once upon a time, small businesses had to think small. Mom and pops were the mice of the business world, scrambling for crumbs and scratching out an existence in their niche market, hoping that the big guys didn’t open next door.
One core problem facing smaller companies’ growth are the lack the resources. That’s true today as it was 50 years ago. Without capital, small businesses are limited in many important facets needed to facilitate growth.
Without resources, small businesses have to choose between how best to invest their dollars. If you have only so much budgeted to grow; where do you put it? Marketing? Infrastructure? Customer support?
There’s a case to be made for investing in marketing, technology and infrastructure, but in this post, we’re going to focus on why putting aside budget to improve customer service is your safest bet. Given that as much as 71% of customers would end a relationship with a company because of poor customer service, it makes sense to build out your customer service, whatever that may look like.
With armies of customer support staff and vast pools of resources at their disposal, huge companies are more capable of delivering top-notch customer service, and many have the customer retention rates to prove it.
However, with the arrival of the ubiquitous communication tool which came to be known as ‘the internet’, things began to change very, very rapidly.
Now, two decades later, the internet has grown into a worldwide network of easily-accessible information, low-cost online tools, and free web applications, those small businesses which were once in danger of being crushed underfoot have leveraged the power of the internet to even the playing field.
The Internet was not only in critical in gaining new customers, but made retaining customers easier for the smaller guys. Thanks to the World Wide Web, things are only going to improve.
The client/business relationship is a unique one. On the one hand, it’s important to recognize that any relationship will falter if neglected. After all, if you’re not actively swimming against the current, you are by default being pushed downstream. However, you don’t want to overdo things. Customers instinctively know that there are key differences between social and business relationships, and those businesses that cross the line and attempt to become ‘friends’ with their clientele risk alienating them.
Small businesses have classically had a certain amount of difficulty walking this line—with either their lack of resources preventing them from being able to follow up individual customer leads, or their over-eagerness to connect with their audience leading them to over communicate with too much attention.
The internet has changed that by providing an inexpensive and non intrusive way for small businesses to connect with their patrons. Email is the current preferred method, letting the customer know that you are available for direct communication should they desire it. But, as we move forward, email becomes only the tip of the iceberg. Small businesses can now level the playing field even further by availing themselves of today’s best Internet and communication technologies.
In January of 2014, for the first time in history, more people used smartphones and tablets to access the internet than personal computers.
With customer-focus drifting away from desktop and laptop access, no business can afford not to have a first-rate mobile presence. Why is that? Well, regular websites don’t render correctly on mobile devices, and websites designed to be operated with the click of a mouse don’t translate well onto a touchscreen interface. So, when mobile users land on these desktop-specific sites, they typically become frustrated and move on to greener pastures.
By upgrading a site to a responsive web design, which allows it to render correctly and effectively across all devices, businesses are able to cast a wider net, as well as keep customers as they switch between devices. Likewise, by creating a second, duplicate site that is optimized for mobile use, and then including a plugin on the original site that recognizes mobile users and automatically redirects them to the mobile version of the site, businesses can make the transition feel absolutely seamless. When people know they can access a site on the go, they’re more likely to keep coming back for more.
These days, customer loyalty hinges on engaging in conversations. The modern client would rather discover for themselves—through helpful blog posts and reliable facts—the benefits of a product or service, rather than have those benefits shouted at them through a commercial; pummeling people with aggressive marketing pitches just doesn’t work anymore.
Social media was perfectly designed to incite and guide these conversations. In fact, 97% of marketers participate in social media marketing. However, 85% of those marketers feel confused as to which social media marketing tools are the best. Fortunately, social CRM software is readily available and takes a lot of the guesswork out of making the most of social media, by making it possible to easily manage data points around single customers, and to tailor social output to more directly target a chosen demographic.
Given the number of devices and routes that customers can now use to engage with a business, it is becoming important for organizations to offer a seamless experience regardless of the channel being used. Large companies such as Amazon have taken up this call, and now offer a number of customer support channels to ensure that users get the help they need, exactly when they need it.
There’s no reason small businesses can’t do likewise. 67% of online shoppers admit to having made recent purchases via multiple channels, so this kind of support is quickly becoming less of a luxury, and more of an expectation. The right software will automatically filter users into the optimal channels, where they can receive prompt, effective support, no matter what path they used to find it.
No customer is an island – the modern customer expects to be able to connect with everyone involved in the buying process, from the the CEO, to the vendors, to the other customers who’ve also experienced the products or services being offered. In essence, the customer is no longer content to be an individual; they now want to be part of a community.
The Community Cloud is a platform designed to connect those within the organization and those with whom they do business together in various online communities. Those involved in these communities also gain the benefits of being able to access all relevant data, content, and business processes.
A community makes it possible for businesses large and small to actively engage with their customers, understand their needs, and address any issues that might negatively affect retention.
If your customers come back, find a way to reward them. 54% of consumers say they’d consider increasing the amount of business they do with a company in exchange for loyalty rewards, and 46 percent say they already have. Facts don’t lie; loyalty programs work. If customers know that they will be able to earn valuable rewards in addition to the already beneficial relationship that they have with your company, then they’ll have no reason to want to take their business elsewhere.
The internet—and by extension, the various technologies that have grown to take advantage of it for business purposes—has made it possible for even small businesses to stop being mice, and to instead run with the big dogs. Of course, all of the customer retention tech in the world won’t do anyone any good if it doesn’t get used. Decreasing customer churn rate by 5% can increase profits by as much as 95% long term, so, if your small business finds itself stuck in the gutter, consider making a change or two.
If you are running a small business (or would like to start one), one of your biggest challenges is how you are going to market yourself. A lot of small business owners think they don’t need to try internet marketing, or they don’t have time for it. Think again! The attached post gives some very good reasons for getting yourself on the internet.
There are many ways you can market your brand. You can send mail, host events, provide newsletters, and advertise to the world on television and magazines. However, while these are all excellent options, the list is missing one crucial method and that is internet marketing.
The importance of internet marketing is nearing its peak. Internet is the medium where most consumers get their information and it is also the easiest ways for the consumer to engage and get in touch with the brand.
Adopting a strong and effective internet marketing strategy can do wonders for your brand. Below is an overview of the benefits of internet marketing and why you should consider making it your key marketing medium.
Designing and implementing a marketing strategy is a great deal of work, but if there is a way for you to be more efficient and to make things easier, then you should adopt it. Internet marketing is the most convenient form of marketing.
It is a way for your company to establish a presence even when the doors are closed and its afterhours. Consumers can get in touch with your brand through social media channels, email, chats, and so much more. Another great advantage is that this form of marketing is essentially costless afterhours.
All you need to do is to maintain your accounts and have chats available for the consumer. The rest will take care of itself. Lastly, consumers will also be able to stay up to date with your brand and what it offers by browsing your online selection of products, reading online content about those products, and issuing comments about what they think. The more feedback and interactivity that your brand has, the more success you’ll notice.
Mail and newsletters only go so far – and if you choose to go farther, then you are driving up the cost of your marketing campaign. Internet marketing is drastically different in that it doesn’t require you to put in as much cost while also allowing you the freedom to reach consumers everywhere.
You can gain a global reach by emailing consumers abroad, by converting your website and content to other language-friendly options, and designing content that is for a specific target audience. By expanding the reach of your content, you’ll be able to issue information to users worldwide.
This will create more interest in your product, it will increase sales, and it will also ensure that your marketing campaigns are more successful. In addition, you also don’t need to put in as much effort as you may think. Online marketing is the easiest and most convenient form of marketing.
The cost of designing, providing, and marketing content is constantly increasing. Markets are required to come up with new strategies, content writers need to be more effective with key words and their writing, and designers need to be creative in how they reach the consumer.
Each of these methods is requiring brands to add more funds to marketing campaigns. However, if you need to come up with a less costly solution, the online marketing is the answer. Online marketing costs less because you don’t need to market your brand through a physical retail location.
It also reduces transaction costs because you aren’t working with another store or brand. With low transaction costs and low costs overall, online marketing is an a useful marketing strategy to undertake in the coming year.
Now more than ever, consumers are looking to establish long lasting and solid relationships with brands. If better customer relationships is a goal for your brand, than online marketing can help you achieve your goals.
Because most consumers get their information from the web, you’ll be able to widen your reach and to ensure that the consumer gets your content. Another way that online builds customer relationship is through social media.
By jumping on the social media bandwagon, you can establish a social media presence that allows you to interact with your customers, understand their needs and concerns, and to tailor your brand to their expectations. Most consumers are certainly not shy about voicing their beliefs on social media, so keeping yourself open to social media and to marketing online can provide you with a wealth of information.
One of your goals when it comes to online marketing should be to increase your website traffic. Luckily, this can easily be achieved if you take the right steps. Website traffic can be increased when you market online through your social media accounts, website advertisements, links in your online newsletters, and information about products in your brand’s emails.
By creating links from pre-existing online content, consumers will be more inclined to click on those links that reroute back to your website. In turn, this increases your website’s traffic and allows consumers to get an idea of what the latest products and items you are offering.
In addition, not only does this apply to those who are already familiar to your brand, but it also applies to consumers who know nothing about it. By creating links on the web through social media and email, existing customers can forward information to their friends and family, thus generating more views and hopefully individuals who will purchase your brand.
Consumers tend to get frustrated when they can’t get in touch with a company they’ve purchased a product from or one that will not hear their concerns regarding the product. One way to combat this product is to market your product online and to be available to the consumer.
With online marketing, the consumer can view your website anytime of the day, they can trend your social media accounts, and they can send you information about your brand so that you can get right back in touch. Keeping yourself active online can generate loyal customers that are going to continue buying into your brand while also sharing their positive experience with their loved ones.
To best maximize this benefit, you should be sure to keep the website available and running at all times. If there is an issue or you hear word of a problem, then the best thing to do is to reach out to IT and have it fixed. As they say, time is money. Staying online at all times means that you’re maximizing time and generating money for your brand.
Marketing opportunities come and go, which also affects whether you adopt a certain marketing strategy. However, one marketing opportunity that is here to stay is the internet. Not only is the internet staying, but it is also growing. This means that you can easily expand the reach of your marketing efforts for a long time to go.
As more users worldwide connect to the internet, you’ll have more people finding what they want online and hopefully your marketing efforts are going to point them in the right direction by providing them the links to your brand’s site and its content.
If you are a small business considering online marketing, then realizing how great of a tool the internet is can expand the potential of your business, it can generate revenue, and it can pose you as a competitive addition in the marketplace.
Consumers want to connect to brands that are going to keep in touch with them in the long run. They want brands that indicate interest in their consumers, that want to generate long lasting relationships, and that ultimately care how the brand is faring with those that use it.
The internet allows you to take your relationship with the consumer to the next level by providing the consumer with regular and consistent online subscriptions to information that you provide regarding your brand and the latest products offered by your brand.
This is a wonderful way for your brand to keep in touch with customer needs and for customers to remain up to date on what you have to offer. Therefore, just by creating a new product, you can easily draw in an entire consumer base through your subscription newsletters.
Subscription newsletters are also extremely easy to implement, they are accessible to most users, and they can be forwarded throughout the web so you reach consumers that you aren’t intentionally targeting.
Since the advent of the internet, both business and consumers are slowly realizing its full potential. The internet has unlocked an entire new system for how people and brands are doing business.
As the internet grows and as consumers realize how useful of a tool it can be, businesses can maximize by generating more revenue and followers. The good news about the above tips regarding internet marketing is that they are extremely easy to implement, they don’t require as much effort as traditional marketing campaigns, and they can be done by nearly any brand manager – experienced or not very experienced.
Starting a small business is definitely not for wimps. Overnight successes are rare if almost nonexistent. Here are some excellent guidelines from a guy who’s done it the hard way.
Bootstrapping is underrated. It took us longer than it might have, but after having reached critical mass, it’s really good to own your own business outright. It might have taken longer, and maybe it was harder — although who knows if we could have done it with investors as partners — but it seems like a good ending.
About the Author: Tim Berry is president and founder of Palo Alto Software, founder of bplans.com, and co-founder of Borland International. He is also the author of books and software on business planning including Business Plan Pro and The Plan-as-You-Go Business Plan; and a Stanford MBA. His main blog is Planning Startups Stories. He’s on twitter astimberry.
As small business owner, if you are not using twiiter, perhaps you should be. Twitter can give you an amazing amount of information about your audience. Check out this post.
Last week, Twitter launched a new, free dashboard that shows demographic information about your Twitter followers. You can see your followers’ interests, household incomes, net worth, occupations, their buying habits, education levels, and even what credit cards they have.
Having access to these insights is a great way to inform your content strategy. There are three great tricks that can guide creative and messaging, and even inform other areas of your brand’s marketing strategy.
1. Compare your follower demographics to the general Twitter population.
Add a comparison audience, and analyze “All Twitter Users” versus “Your Followers.” You’re able to see what the general Twitter population’s habits or interests are versus your brand’s, which will show you what resonates specifically with your audience. In the image below, this brand’s audience is much more interested in fast food than the average Twitter user, showing the brand that fast food is an area they can own on Twitter. | 2019-04-21T06:13:32Z | http://successfulcm.com/tag/small-business-internet-marketing/ |
On the Tuesday after Christmas my dear cat Golem passed away. We had been together for almost thirteen years.
He was a special boy. Not your ordinary cat. Some animals are like that.
I couldn't say what it was, but he was an uncommon and valued friend.
I feel that our home is not the same. I will miss him very much.
In all of our discussions, reading, research and personal history and experience, we've come to the conclusion that the most important part of celebrating festivals and marking the passage and holy days of the year is in the gathering.
This year for Solstice we came together with family and friends for a cookie exchange party and play time with crafts and snacks for the children. If you've not experienced a cookie exchange before, it's a really lovely holiday idea. We each baked four dozen of our favorite cookie and set them out in a delicious display. From the selection, we equally divided up all the different assortments so that we all ended up taking home the same amount that we each brought, except in a scrumptious eclectic variety! We then took these collections of goodness home to gobble up or perhaps re-package and gift out to family, friends or neighbors. It's a great way to get a delicious assortment of home made goodies without buying ingredients for all the different sorts.
The children, to celebrate the return of the sun, rolled beeswax candles and made pomander satsumas (oranges being a bit tough for their small hands to pierce with the cloves). Many thanks to our friends Patricia and Lisa for bringing these warm, wonderful, sweet smelling activities to our celebration.
We found and harvested this year's tree from the same family farm we went to last year. When the couple there even remembered us, it felt like a tradition was in the making.
We've been talking about the cats quite a lot lately. Golem has cancer and, to my great sadness, is not long for this world.
Naiya was asking if Golem and Frodo were going to get something in their stockings from Santa. I told her that Frodo might not because he's not been such a bad boy (he's been peeing on things). She then asked if she, mommy and daddy were going to get anything from Santa in our stockings.
"Of course," I told her, "we've all been very good, haven't we?"
"How does Santa know we've been good?"
"He has special powers of knowing because he's Santa," I told her.
"I think he must look it up on his computer," she said.
This morning Naiya woke to find that St. Nicholas had left some little gnomes in her boots. They had a grand play time introduction downstairs with the nutcrackers we had just taken out to begin our holiday decorating. With Naiya's help they were all putting on "puppet shows" for at least 30 or 40 minutes!
Long ago a poor man and his three daughters lived in a little village. The man had once been rich but now had almost nothing. He and his three daughters barely had food to eat or clothes to keep themselves warm.
Now, Nicholas was the bishop of that village. He heard about the man's family and their suffering and it made him very sad. He wanted to help but he didn't want to call any attention to himself. Finally, Nicholas hit upon a plan, and this was it: One night, the poor family went off to bed as usual. Nicholas though, didn't go to bed. He waited in his house until the middle of the night, when everyone in the village was asleep and no one would see him. Then he made his way quietly to the poor family's house and crept up to the window, keeping out of sight. When he was sure no one was nearby, he quickly stood up and tossed into the window enough gold coins for the family to get by— and hurried back to his own house before anyone there missed him.
Well, you can imagine the family's surprise and delight in the morning when they found the gift! The man gave the coins to his eldest daughter, to help her and her sweetheart get married, which they had been wanting to do. And he thought that perhaps she and her new husband could help by sending the family some money sometimes so they would have enough to live on.
Alas! The daughter and her new husband soon had a family of their own, and moved away, and couldn't help much. Before long, the man and his remaining daughters were just as poor as they had been before. Again, they suffered. But again Nicholas heard of their adversity. So once more, long after everyone had gone to bed, and everything was very still, Nicholas crept to the family's house, pitched his gift of coins through the window and ran home without anyone noticing him.
Once again the family found the gold coins in the morning with tears and joy. And once again the man gave the coins to his daughter, the middle one this time—thinking perhaps she and her new husband could give some help to him and his remaining daughter.
But you've probably guessed what happened. The second daughter too quickly had a family of her own, moved away, and couldn't contribute anything. And so the man and his remaining daughter were again destitute.
This time, however, the man didn't go to bed when his daughter did. He had a feeling that the bag of coins would come and this time he was going to find out how it happened. So he waited.
Last year I made these little Advent bags to replace the candy Advent calendar. Each morning Naiya awakens with a squeal wishing to open the day's bag. Most days the bag is filled with something to place upon the Advent wreath that sits on our table. The first week so far has held an amethyst crystal and two beautiful polished stones.
On November 11th we celebrated Martinmas at home with Naiya. We told stories of giving and sharing and one of the more well-known stories of Saint Martin himself. Naiya wanted to hear it over and over and also set up her dolls to act out the events. It was a sweet day even though the weather was quite dreary and we couldn't get her to go outside to walk the neighborhood with her lantern. There are many famous works of art of this tale of Saint Martin that we had copies of around the house.
Long ago, there lived a good young man named Martin. Even as a boy, he knew that one day he would be expected to serve in the military. His father was an important military officer. And, though he desired a peaceful life outside of the military, he knew that it would be his duty to follow the life of his father. So, Martin joined the military, became an officer, and was eventually assigned to garrison duty in the town of Amiens.
One bitterly cold winter evening, the young Martin rode through the gates of Amiens on his fine proud horse. He was dressed in the regalia of his military unit: gleaming armor, a bright helmet, and a beautiful red cloak, lined with lambs wool. It was nearly freezing outside, but his thick cloak kept him warm. He was hardly aware of the cold. But then, as he approached the gates of the town, he saw a poor man, a beggar, dressed with clothes so ragged that he was practically bare. The man was shaking and blue with cold, but no one reached out to help him. People would pass through the gates, looking straight ahead, so their eyes would not meet with those of the poor, desperate man.
Martin, seeing this, was overcome with compassion. He rode straight to the poor man and took off his red cloak. With one stroke of his sword he tore the lovely mantle in two. He wrapped half of the cloak around the freezing man and the other half around his own shoulders.
The people nearby watched in amazement. To see a fine military officer do such a thing was a ridiculous sight to many, but others were touched by the goodness that Martin showed.
That night, as Martin slept, he had a dream. A man appeared to him who looked so familiar, and he was wearing the half of the cloak Martin had given to the poor beggar. And then, Martin saw in the eyes of this man, and the light of the Divine which we all carry within us.
From that day on, Martin’s life was changed forever. He knew that he could no longer fight and harm other men as part of the military, for his true desire was to live a life of kindness, forgiveness, compassion and goodness.
This year we heard from some friends about the Sugar Sprite! Ah, what a dear little fairy this one is. The Sugar Sprite feeds in Spring, Summer and early Autumn on all the nectar, honey and fruits she can find. As the season turns colder and darker though, the flowers fade and fruits are scarce. The Sugar Sprite has hardly enough to keep herself and her family nourished. Luckily, she knows about how children on Hallowe'en collect more sweets than they can possibly eat. If those little children leave a bag of candy on their doorstep the night after it is gathered (and after they have selected a few of the choicest morsels for themselves), the Sugar Sprite will gather it up and have enough to make it through the Winter until the flowers and fruits again blossom in the Spring. In exchange for the kindness and generosity of the children who leave her such treasure, the Sugar Sprite leaves a small gift for them to find in the morning.
Each October/November we have a Lantern Walk to celebrate Martinmas, a celebration of inner light in the midst of the outer darkness of the approaching winter. Waldorf education places a special emphasis on festivals in community. Festivals anchor the human spirit to the year. It doesn't matter how festivals are celebrated --it's the celebrating, the ritual, the reverence, and the consistency within the cycle of the seasons that grows in a child (and in an adult!).
Saint Martin's legend is one of choices and service. The tale most associated with Martin is one in which he gives half of his cloak to a freezing beggar outside of the gates of the city of Samarobriva (Amiens). After splitting his cloak with his sword and sharing it with the suffering man, the soldier Martin has a dream in which he sees the beggar as a holy figure. Martin awakes and knows in his heart that he can no longer fulfill his duties as a soldier, but instead becomes a devoted man of God helping those in need.
Our walk this year wound through the candlelit Crystal Springs Rhododendron Garden with various stops where the children were given small gifts. (The children helped make their apple stamped wool capes in class earlier in the week.) We started at twilight and ended in darkness.
Back in the Summer, we were at the zoo and I saw a little girl in a really sweet dress. I asked her mom if I could snap a picture of it with my cell phone. If you haven't gathered yet, I'm a fervent do-it-myself-er and I'm also a penny pincher (that's the nice way to say it). I'm pretty sure this mom was not a dress maker so I figured the dress was from some expensive boutique. Upon reflection, maybe I should have just asked where she got the dress. Instead I made a number of assumptions about it's origin and likely outlandish cost. Anyhow, in the end, once again without a pattern, I put together this new dress for my dear little girl. That was back in May. Five months later, it fits!
Unlike in years past, this year I came up with a fun activity for the children at the party in plenty of time to prepare.
find the airplane with the name of each guest.
Follow the picture clues from there.
In the clip of each plane was a simple photograph of the garden gnome which the children had to find in his hiding place under a tree.
Inside the stem of the mushrooms was a simple photograph of the scarecrow hidden behind the rose bushes.
One tossing ring is for you.
This picture clue is too!
Choose a crown and go have more fun!
We held our grand birthday bash once again at Kruger's Farm on Sauvie Island. This is an actual working farm that we visit at various times throughout the year to pick different berries, flowers and whatnot. They also offer hay rides and during autumn have a corn maze and pumpkins galore. Some children from Naiya's class joined us as well as her cousins, aunts and uncles, her grandparents and a number of friends made in previous years. The kids decorated pumpkins, performed a treasure hunt, rode the hay tractor to pick pumpkins, visited the giant hog, snuck up on the hen with her brood of baby chicks hiding in the sunflowers and just played as the overcast morning unfolded into a lovely sunny afternoon. We baked four cakes (Ryan made the most impressive two) and this year got it together well enough to offer coffee for the grown-ups. At the end of the day we had a stack of sweet handmade cards, some crazy jack-o-lanterns and a bunch of tuckered out little kids. There were at least two totally worn out adults as well.
This morning for her special day, we had a sweet lighting of the birthday ring and a hunt for the four birthday fairies before heading to preschool. I was able to join the class for some play time and Naiya's birthday festivities. What a beautiful celebration of her coming and growing in the world. At circle time the story for all the children was of Naiya's birth into our family. Her amazing teacher gave her the most precious hand made felted bird in a soft flowery nest wrapped inside of four layers of tissue and wool cord: one for each of her years. I can't tell you the number of times that I have had tears in my eyes during the beautiful festivals held at this school. We fell incredibly lucky to be a part of this Waldorf community.
When we arrived home, grandma and grandpa had come for additional merrymaking. We opened a few gifts at home before they, along with her auntie, uncle and new cousin took her out to dinner while Ryan and I prepared for her party the next day. Naiya wanted to go to the "dinosaur restaurant" (Laughing Planet) and it seems they all had a fine time. Naiya was apparently chatting up several tables of other small children. I can't get over how social this kid is, especially given the shyness both Ryan and I suffered in our own childhoods.
Every year since she was born I have woken Naiya up at the minute of her birth. It's in the middle of the night before she wakes up one year older. I head into her dark room and gaze at this wonder that has changed my life. I sing her a birthday song; she wakes up, looks at me and usually just falls back to sleep. I remember that moment she came to us and how I knew everything had changed but I had no idea what that really meant. When she's asleep and still and so peaceful, all I see is what an incredible gift she has been.
When she's fourteen she might not appreciate this special ritual I have begun. Or maybe she'll lay in bed straining to stay awake in anticipation of her mother's loving harassment. Time will tell.
This year we began another pre-birthday ritual with this special poem just before we turned off the lights.
Four kisses when I wake.
Four candles on my cake.
Naiya: "How do you grow a green bean?"
Mommy: "You plant a bean, a green one :)"
Naiya: "But before there was... the first bean... before there was a bean, how do you grow a bean? When there was nothing? Only earth and people and houses?"
Mommy: "How do you think the first bean grew?"
Naiya: "Did god do it?"
Mommy: "Who told you about God?"
Naiya: "You did. You said children talked to gods in churches"
Mommy: "Do you know where God is?"
Naiya: "And Matthew, and Kelly, and Auntie Kelli?"
Naiya: "Even in other places?"
Naiya: "In all the people?"
1 new favorite song of the girl child.
View from the resort check-in and store at Olallie Lake.
Just up the road from Olallie is little Monan Lake.
We took this trip up the mountain and down a treacherous road to Olallie Lake in the first stretch of August. Ryan was up by himself for a couple of days fishing then Naiya and I joined him later in the week. There had been a fire there some years ago and the resort and cabins were closed until this year. They're rustic with no electricity and no running water but they do have wood burning stoves and two queen beds (with real mattresses) as well as cold water taps outside and a table, dresser and usable counter tops inside. We determined that these few comforts made all the difference for comfort in "outdoor" vacationing. It's sort of like camping but you can easily stand up, your feet stay somewhat clean and the beds are very cozy (unlike deflating camping mattresses). Ryan caught fish trawling from the small row boat he rented, but mostly we just relaxed and went on some really lovely hikes. It was our favorite lake of the summer.
Olallie Lake is one of Oregon's cleanest with snow melt as its main source of water. While only 40 miles from Portland, there are few signs of civilization there and in the lake itself, no motor boating or swimming are allowed.
This year in the garden we planted beans for the first time. What we learned is that you'd need A LOT more space to make enough beans to save them for the year. Other than that we had a bumper crop of garlic and quite a few onions as well. With the onions we learned that they have to be planted much further apart and thinned after they've started to bulb. Our tomatoes were late but some of the tastiest we've had since we've begun. We're only harvesting those now. Out on our park strip we planted 9 seed potatoes. Top side they look great and we'll be pulling them up soon. We've also already harvested blueberries, strawberries, cherries, lettuce, peas and rhubarb from our yard. In the learning curve of gardening, this year was full of spikes. Upon discovering that rhubarb returns of its own accord nearly twice the size it was last year, we'll be transplanting those two enormous plants into another area.
In other daily news, our three chickens are still thriving and we're getting enough eggs now to occasionally share with friends and neighbors. Our cats Frodo and Golem are a chipper duo (considering they're getting on up there) and, as usual, we three are a happy people. Summer blessings to you and yours.
We just returned from our first camping trip of the summer. We spent four days at Suttle Lake (west of Sisters) from which we also visited Scout Lake and grandma and grandpa. I've been on a quest to find the perfect lake on which to stay. This one would have been close if not for the road across the way that we could hear at night (and also during most of the day). A little cold for swimming in too, but we managed to get in on occasion due to the warm and near perfect weather. For two of the days we had the treat of a two hour thunder storm complete with my favorite weather condition - warm wind.
There's just nothing like warm wind. Mmmmm.
Also, Scout lake is a five minute drive up the road. That one IS perfect for swimming since it's smaller. We've been there for the past three years and it's one of our favorite spots. Warm water, no motor craft and these logs floating like rafts on which anyone can hitch a ride. One can see to the bottom of the lake even in its deepest regions. And oh, what excitement!... All on her own, this time around, Naiya swam! She just lifted up her feet (while wearing her life jacket bathing suit) and started to kick and paddle! She seemed nearly as surprised as we were. We had marshmallows for breakfast and, of course, those mini cereal boxes that I remember us taking camping as kids, hot dogs for dinner and crackers and cheese and fruit all day long. It was a decadent week of sweets and swimming, root beer, fishing and sleeping under the stars. | 2019-04-20T03:10:13Z | http://passengersonalittlespaceship.blogspot.com/2010/ |
It would be funnier, if people were not dying.
Iran's Supreme Leader Ali Khamenei on Saturday issued a message expressing his condolences to the Iranian nation on the terrorist operations in Iraq which killed or wounded hundreds of civilians including tens of Iranians. According to IRNA, the Iranian leader referred to the US as the main accused of the terrorist operations in Iraq, saying the US forces, under the false pretext of fight against terrorism have occupied the Islamic Iraq.
"The main accused in this crime and other crimes are the US security and military forces that have occupied an Islamic state under the pretext of campaign against terrorism and have killed or wounded tens of thousands of people so far and have intensified insecurity there," his message reiterated.
Abbas Djavadi is not correct about the reason for the boycott of the UN conference to support racism. The conference was boycotted because the draft summary document endorsed the previous draft, which had labelled Zionism as racism, and because Muslims are trying to make it illegal to criticize Islamist extremism.
But Dhavadi is right that Ahmadinejad is an embarrassment. He is not so much an embarrassment for the poor Iranians, who haven't got much choice, but he certainly embarrassed the UN and all the countries who applauded him.
In a first reaction to President Mahmoud Ahmadinejad's speech at the UN conference in Geneva, Ahmad Moussavi from Iran wrote on Radio Farda's Facebook page: "I am ashamed as an Iranian. And I don't know what else to say."
At the anti-racism conference on Monday, Ahmadinejad accused Israel of being "racist." "Using the Jewish suffering and the Holocaust as an excuse [...] they created a racist government in the occupied Palestinian territories," he said, pointing to the post-World War II Western powers.
Life proved right the U.S., Germany, Canada, Australia, and some other Western countries that had boycotted the meeting, fearing that the Iranian president would repeat his previous accusations against the Jewish state. Once Ahmadinejad started his speech at the conference with anti-Israeli attacks, representatives of 25 other countries including all remaining members of the EU walked out the meeting in protest.
No, Ahmadinejad has not learned from the damage he inflicted in the past on his own country's international standing with his inflammatory, hateful polemics. Contrary to the expectation of some moderation in rhetoric to pave the way for more engagement with the new U.S. administration and the EU, he once again demonstrated that he is either irreparably useless as a president of an otherwise respected old nation or he simply "plays crazy," as another Radio Farda listener suggested, to gather more votes in Iranian presidential election in two months.
One has to see if it will help Ahmadinejad to get re-elected. To be sure, he has further isolated Iran from Western powers that his own diplomats have been trying hard to win as friends — powers that are crucially important for Iran's stability and economic development.
While vehemently criticizing Ahmadinejad's "hateful rhetoric," the U.S. has said that Washington's policy of engagement and dialogue with Tehran would continue. And the EU is not expected to go to war against Iran just for a repeated diplomatic disaster its president has created for his own country. But engagement and dialogue will be extremely complicated and overly slow, should Ahmadinejad really be re-elected in June.
"I think that these suicide bombings ... are unfortunately, in a tragic way, a signal that the rejectionists fear that Iraq is going in the right direction," Clinton told reporters traveling aboard her plane ahead of her unannounced visit to Baghdad.
"I think in Iraq there will always be political conflicts, there will always be, as in any society, sides drawn between different factions, but I really believe Iraq as a whole is on the right track," she said, citing overwhelming evidence of really impressive progress.
If the bombings are evidence of "progress" and the lack of electricity and the lack of oil exports and the lack of health care - then yes, there has been impressive progress. The bombings were certainly impressive. When the opposition kills a thousand people in a day, Clinton will say "Now they are really desperate!"
It is not funny. People are dying. Nobody cares. Everyone makes believe it is a holiday. And U.S. influence in Iraq and the Middle East will die with those people. Don't imagine it can be any other way. Don't think it will not affect Afghanistan, Israel, the Gulf states and all other regional alliances. People are watching, and drawing conclusions.
U.S. officials say they are still committed to a June 30 deadline to move all forces outside major cities, including Baghdad. But the top U.S. commander in Iraq, Gen. Raymond Odierno, has said American troops could maintain a presence in some cities if requested by the Iraqis.
At the nearby Taliban headquarters in Imam Dehri, the Taliban spokesman, Muslim Khan, told the Guardian that their goal was the establishment of an Islamic caliphate – first in Pakistan, then across the Muslim world.
"Democracy is a system for European countries. It is not for Muslims," he said. "This is not just about justice. It should be in education, health, economics. Everything should be under sharia.".
It is not necessary to comment on any of this. Bombs speak louder than words.
BAGHDAD — Twin suicide bombers struck outside the gates of the holiest Shiite site in Baghdad on Friday, killing at least 60 people and wounding scores more, according to preliminary reports from police officials.
The blasts came a day after the single deadliest day in Iraq in more than a year, and punctuated a deadly outburst of violence in recent weeks.
Friday's bombings occurred near the shrine of Imam Musa al-Kadhim, one of the twelve imams of Shiite Islam, in the Kadhimiya neighborhood of Baghdad. Like the previous bombings, the attacks appeared to target Shiites in particular.
An interior ministry official said that most of those killed appeared to be Iranians making pilgrimages to the shrine. Two suicide bombers blew themselves as they mingled with crowds gathered in front of checkpoints at the main entrance to the shrine, the official said, speaking on condition of anonymity, because he was not authorized to speak publicly. In addition to those killed, at least 125 others were wounded.
The streets around the shrine have already been hit by two other suicide bombings this year.
On Thursday three suicide bombings — one in Baghdad and two in Diyala, the restive province northeast of the capital — killed more than 80 people. In barely 24 hours, five bombings have killed at least 120 people and wounded 230.
Thursday's deadliest bombing destroyed a restaurant in the city of Muqdadiya, killing at least 47 people, most of them Iranians travelling in buses. On Friday, a morgue official said the toll had risen to 56 killed, Agence France-Presse reported from Diyala's capital, Baquba.
While violence overall remains far below the worst years of the war here, a string of attacks so far this month has raised concern that insurgents, terrorists and other fighters have regrouped themselves with the intention of inflaming sectarian tensions and weakening Iraq's government and security forces as the Americans reduce their military presence on the ground in advance of a full withdrawal at the end of 2011.
"The government was treating the situation like they'd won a victory," said Sheik Jalal al-Din Saghir, a member of Parliament from the Islamic Supreme Council of Iraq, a Shiite political party. "They relaxed. We can't ignore that there were security successes, but that doesn't mean the story is finished."
The government may have scored at least one important security victory on Thursday, announcing the capture of a major leader of the Sunni insurgency, Abu Omar al-Baghdadi. But reports of his arrest, and even his supposed death, have been announced before, and some American military officials even question whether such a man exists.
Iraqi leaders say Mr. Baghdadi is the leader of the Islamic State of Iraq, an umbrella group of Sunni militant forces that includes Al Qaeda in Mesopotamia, the homegrown group that American intelligence officials say is led by foreigners.
The Iraqi military provided no further details about the arrest, and the United States military has not confirmed it.
On Thursday, Hussein al-Shami, a senior adviser to Prime Minister Nuri Kamal al-Maliki, defended the government's security gains.
"The security situation is still good, but there are some sleeper cells that are targeting the softer areas," he said. "They just want to send a message to the government and the world that they are still here."
The woman who blew herself up in Baghdad's central Karada district on Thursday resembled most of the other women crowded outside a food distribution site that was catering mainly to those displaced by the war.
She wore a black abaya and, like many of the other women, was walking with a child, in her case a young girl, according to Iraqi Army and police officials who interviewed survivors at the scene.
The woman stood out, the witnesses said, only because she began nudging her way through the crowd, which had been waiting patiently for the bags of flour, bottles of cooking oil and other staples that the police were handing out. The witnesses said she tugged the child, who looked about 5 years old, along with her.
Once she reached the center of the crowd, she set off the blast, with explosives that the police believe she hid under her flowing clothes.
Afterward, a tattered black abaya stuck to a wall on the first-floor balcony of an adjacent apartment building, singed by the explosion. The sidewalk was littered with bags of macaroni and loose leaf tea that had been part of the giveaway. Flies swarmed on bits of human flesh.
One woman sat on the ground, wailing as she beat the sidewalk with the palms of her hands. She said she had lost her husband, her son, her sister and six grandchildren.
An Interior Ministry official said 28 people had died in the explosion, including 12 police officers. Fifty others were wounded.
It was not immediately clear how many of the victims were children.
At nearby Ibn al-Nafis Hospital, women who were visiting the injured moaned loudly. The patients lay on stretchers, some with burns over much of their bodies.
"I was close to the area, wondering why there was a crowd,'" said Adnan Ibrahim, 25, who had a bandage over his left eye. "After that, I don't know what happened. It felt like there was something very heavy on my face. I discovered that I lost my eye."
Ali, a man in his 30s who had been selling fruit from a small cart with his brother Haider, said his brother had noticed the crowd of women and children gathering nearby and gone to find out what was happening. Ali had stayed with the cart.
Moments later, Haider was dead, and Ali, who gave only his first name, was wounded by shrapnel.
At the hospital, Ali sobbed and struck his head against the metal door of a large refrigerator where bodies had been placed.
"It's like I lost my ribs," he said.
In the second attack Thursday, in the city of Muqdadiya in Diyala Province, a suicide bomber set off his explosives in a popular restaurant where several busloads of Iranian tourists had stopped to get snacks, to pray and to use the restrooms, the Iraqi police said.
The restaurant, Khanaqin, is in a neighborhood known as being particularly violent and in a province where Al Qaeda in Mesopotamia remains active. The restaurant has been placed off limits to tourist groups traveling from Iran to some of Iraq's Shiite holy places, but bus drivers sometimes stop there anyway, the police said.
At least 47 people were killed and 70 injured in the blast, which brought down the restaurant's roof, the police said. Almost all of the victims were Iranians.
Five other people were killed Thursday in Diyala Province when a man detonated his suicide vest as a car carrying a local Awakening Council leader passed, officials said. The leader was killed, as were four bystanders.
The Awakening Councils, groups throughout Iraq that were paid to leave the insurgency and fight on the government's side, have been singled out in recent attacks.
Reporting was contributed by Suadad N. al-Salhy, Muhammed al-Obaidi, Mohamed Hussein, Atheer Kakan and Steven Lee Myers from Baghdad, and an employee of The New York Times from Diyala Province.
Iran-Israel-Palestine: Who linked what to what and what does it mean?
The new Israeli government will not move ahead on the core issues of peace talks with the Palestinians until it sees progress in U.S. efforts to stop Iran's suspected pursuit of a nuclear weapon and limit Tehran's rising influence in the region, according to top government officials familiar with Prime Minister Binyamin Netanyahu's developing policy on the issue.
"It's a crucial condition if we want to move forward," said Deputy Foreign Minister Daniel Ayalon, a member of the Israeli parliament and former ambassador to the United States. "If we want to have a real political process with the Palestinians, then you can't have the Iranians undermining and sabotaging."
"We will deal with the Palestinian issue as if there is no Iranian issue, and with the Iranian issue as if there is no Palestinian issue," Ayalon said.
"For Israel to get the kind of strong support it is looking for vis-a-vis Iran, it can't stay on the sidelines with respect to the Palestinians and the peace efforts. They go hand in hand," she told the House of Representatives Appropriations Committee.
Both sides have to realize that that the linking is a fact of life, if not a policy. There is no way to make peace with the Palestinians as long as Iran will continue to support Hamas and block peace efforts. Any peace agreement, especially one brokered by the USA, would be sabotaged by Iran's tame terror groups: Hamas, Hezbollah and Islamic Jihad.
On the other hand, it is hard to imagine a coordinated Middle East effort to deal with Iran unless there is either peace between Israel and the Palestinians, or, the Arab street and public opinion as well as American public opinion come to perceive Iran as a direct threat.
As Western countries in many cases advocate or implement friendly contacts with openly genocidal forces--Iran, Hamas, Hizballah, and Muslim Brotherhoods--they have just condemned the existence of Israel, a democratic state, and justified its extinction. Maybe they don't think of it that way--in most cases they don't--but they have just provided the rationale for its destruction. After all, if it is so evil, "racist," and oppressive why should it be allowed to go on existing?
What better way to mark the UN racism conference than sectarian violence? According to this story 69 are dead in two bombings, but a top militant or freedom figher, Omar al Baghdadi, has been reported captured. As the US withdraws from Iraq, the death toll inevitably rises. But almost every report reminds us that the death toll has gone down dramatically in the last two years. Not for long. With no soldiers, you will get no victory.
Iraqi security officials said they captured one of the most wanted leaders of the al-Qaida-linked Sunni insurgency Thursday, an arrest that could deliver a significant blow to an intensified campaign of attacks. Two separate suicide bombings killed at least 69 people.
The officials identified the arrested man as Abu Omar al-Baghdadi who leads the Islamic State of Iraq, an umbrella group of Sunni militant factions that is believed dominated by Al-Qaida in Iraq. However in the past, Iraqi officials have reported al-Baghdadi's arrest or killing, only to later say they were wrong. The U.S. military has even said al-Baghdadi could be a fictitious character used to give an Iraqi face to an organization dominated by foreign al-Qaida fighters.
In Washington, Pentagon spokesman Bryan Whitman said the U.S. military was working to verify who was captured.
"I can't confirm ... the capture of a senior al-Qaida member or that it was Baghdadi," he said. But he said he had no reason to doubt the credibility of the report.
"I certainly hope that it's true," he said, adding that his capture "would be very good news."
Al-Baghdadi has been a key target for U.S. and Iraqi forces for years. But little is known about his origins or real influence over insurgent groups. Those groups have staged a series of high-profile attacks in recent weeks, apparently including the two suicide blasts Thursday in Baghdad and north of the capital in Diyala province.
Iraqi state television quoted military spokesman Maj. Gen. Qassim al-Moussawi as saying al-Baghdadi was arrested in Baghdad. Security officials also told The Associated Press he was captured.
In 2007, Iraq's government reported that al-Baghdadi had been killed and released photos of what it said was his body. Later, security officials said they had arrested al-Baghdadi. In both cases, the U.S. military said at the time it could not be confirmed and the reports turned out not to be true.
In March, a 17-minute audio message attributed to al-Baghdadi called Washington's announcement of a troop withdrawal timetable from Iraq "recognition of defeat." The statement was carried on militant Web sites.
Thursday's attacks were the latest in a series of high-profile bombings that have raised concern of an uptick in violence as the U.S. military scales back its forces before a planned withdrawal by the end of 2011.
American soldiers who specialize in clearing bombs from roads boarded a plane Thursday from Iraq to the Taliban heartland in southern Afghanistan, part of the largest movement of personnel and equipment between the two war fronts.
In the Baghdad bombing, a suicide bomber blew himself up among a group of Iraqis collecting humanitarian aid in a mainly Shiite area, killing at least 22 people, the military said.
The attacker struck as police were distributing Iraqi Red Crescent food parcels in the central neighborhood of Karradah, the main Baghdad military spokesman said.
It not immediately clear who carried out the attack, but one witness said it appeared to be a woman. Women have been used in suicide bombings in Iraq, most recently during a Feb. 13 attack on Shiite pilgrims in Musayyib.
Muhanad Harbi, a shop owner near the blast site, said he saw a woman wearing a black robe wade into the crowd. He said it appeared she detonated an explosives belt.
Shanoon Humoud, 70, sat weeping amid burned food packages scattered on the ground. Her husband, her son and two grandchildren were killed in the blast.
"I came down to look for my relatives who getting the food," she said. "But I couldn't find them."
Abbas Ibrahim, a 24-year-old college student, described pools of blood on the ground and the smell of burned flesh in the air.
"We regret that violence has come back to Baghdad," he said.
Some police were among the 22 people killed and 35 people were wounded, the military said.
North of Baghdad, a suicide bomber killed 47 people, including Iranian pilgrims, in a crowded restaurant, said Iraqi and U.S. military officials.
Military spokesman Derrick Cheng said 47 people were killed and about 69 were wounded when the suicide bomber detonated an explosives vest near Muqdadiyah, an insurgent hotbed about 60 miles (90 kilometers) northeast of Baghdad.
All right thinking and progressive people support the resistance, right?
Some 125 parliamentarians gathered together last week for the historic founding conference of the Interparliamentary Coalition for Combating Anti-Semitism (ICCA), brought together by a new sophisticated, globalizing, virulent and even lethal anti-Semitism reminiscent of the atmospherics of the 1930s, and without parallel or precedent since the end of World War II.
Israeli soldiers take position during clashes with Palestinians following a demonstration against Israel's separation barrier in the West Bank town of Qalqilya.
The new anti-Jewishness overlaps with classical anti-Semitism but is distinguishable from it. It found early juridical, and even institutional, expression in the UN's "Zionism is racism" resolution - which the late US senator Daniel Moynihan said "gave the abomination of anti-Semitism the appearance of international legal sanction" - but has gone dramatically beyond it. This new anti-Semitism almost needs a new vocabulary to define it; however, it can best be identified using a rights-based juridical perspective.
In a word, classical or traditional anti-Semitism is the discrimination against, denial of or assault upon the rights of Jews to live as equal members of whatever host society they inhabit. The new anti-Semitism involves the discrimination against the right of the Jewish people to live as an equal member of the family of nations - the denial of and assault upon the Jewish people's right even to live - with Israel as the "collective Jew among the nations."
As the closing "London Declaration" of the ICCA conference affirmed: "We are alarmed at the resurrection of the old language of prejudice and its modern manifestations - in rhetoric and political action - against Jews, Jewish belief and practice and the State of Israel."
Observing the complex intersections between the old and the new anti-Semitism, and the impact of the new on the old, Per Ahlmark, former leader of the Swedish Liberal Party and deputy prime minister of Sweden, pithily concluded: "Compared to most previous anti-Jewish outbreaks, this [new anti-Semitism] is often less directed against individual Jews. It attacks primarily the collective Jews, the State of Israel. And then such attacks start a chain reaction of assaults on individual Jews and Jewish institutions... In the past, the most dangerous anti-Semites were those who wanted to make the world Judenrein, 'free of Jews.' Today, the most dangerous anti-Semites might be those who want to make the world Judenstaatrein, 'free of a Jewish state.'"
The first modality of the new anti-Semitism - and the most lethal type - is what I would call genocidal anti-Semitism. This is not a term that I use lightly or easily. In particular, I am referring to the Genocide Convention's prohibition against the "direct and public incitement to genocide." If anti-Semitism is the most enduring of hatreds and genocide is the most horrific of crimes, then the convergence of this genocidal intent embedded in anti-Semitic ideology is the most toxic of combinations.
There are three manifestations of this genocidal anti-Semitism. The first is the state-sanctioned - indeed state-orchestrated - genocidal anti-Semitism of Mahmoud Ahmadinejad's Iran, dramatized by the parading in the streets of Teheran of a Shihab-3 missile draped in the emblem "wipe Israel off the Map," while demonizing both the State of Israel as a "cancerous tumor to be excised" and the Jewish people as "evil incarnate."
A second manifestation of this genocidal anti-Semitism is in the covenants and charters, platforms and policies of such terrorist movements and militias as Hamas, Islamic Jihad, Hizbullah and al-Qaida, which not only call for the destruction of Israel and the killing of Jews wherever they may be, but also for the perpetration of acts of terror in furtherance of that objective.
The third manifestation of this genocidal anti-Semitism is the religious fatwas or execution writs, where these genocidal calls in mosques and media are held out as religious obligations - where Jews and Judaism are characterized as the perfidious enemy of Islam, and Israel becomes the Salmon Rushdie of the nations.
In a word, Israel is the only state in the world - and the Jews the only people in the world - that are the object of a standing set of threats by governmental, religious and terrorist bodies seeking their destruction. The London Declaration - again in a significant clarion call - recognized that "where there is incitement to genocide signatories [to the Genocide Convention] automatically have an obligation to act." This promise must now be acted upon.
Ideological anti-Semitism is a much more sophisticated and arguably a more pernicious expression of the new anti-Semitism. It finds expression not in any genocidal incitement against Jews and Israel, or overt racist denial of the Jewish people and Israel's right to be; rather, ideological anti-Semitism disguises itself as part of the struggle against racism.
The first manifestation of this ideological anti-Semitism was its institutional and juridical anchorage in the "Zionism is racism" resolution at the UN. Notwithstanding the fact that the there was a formal repeal of this resolution, Zionism as racism remains alive and well in the global arena, particularly in the campus cultures of North America and Europe, as confirmed by the recent British All-Party Parliamentary Inquiry into Anti-Semitism.
The second manifestation is the indictment of Israel as an apartheid state. This involves more than the simple indictment; it also involves the call for the dismantling of Israel as an apartheid state as evidenced by the events at the 2001 UN World Conference against Racism in Durban.
The third manifestation of ideological anti-Semitism involves the characterization of Israel not only as an apartheid state - and one that must be dismantled as part of the struggle against racism - but as a Nazi one.
And so it is then that Israel is delegitimized, if not demonized, by the ascription to it of the two most scurrilous indictments of 20th-century racism - Nazism and apartheid - the embodiment of all evil. These very labels of Zionism and Israel as "racist, apartheid and Nazi" supply the criminal indictment. No further debate is required. The conviction that this triple racism warrants the dismantling of Israel as a moral obligation has been secured. For who would deny that a "racist, apartheid, Nazi" state should not have any right to exist today? What is more, this characterization allows for terrorist "resistance" to be deemed justifiable - after all, such a situation is portrayed as nothing other than occupation et résistance, where resistance against a racist, apartheid, Nazi occupying state is legitimate, if not mandatory.
If ideological anti-Semitism seeks to mask itself under the banner of anti-racism, legalized anti-Semitism is even more sophisticated and insidious. Here, anti-Semitism simultaneously seeks to mask itself under the banner of human rights, to invoke the authority of international law and to operate under the protective cover of the UN. In a word - and in an inversion of human rights, language and law - the singling out of Israel and the Jewish people for differential and discriminatory treatment in the international arena is "legalized."
But one example of legalized anti-Semitism occurred annually for more than 35 years at the United Nations Commission on Human Rights. This influential body consistently began its annual session with Israel being the only country singled out for country-specific indictment - even before the deliberations started - the whole in breach of the UN's own procedures and principles. In this Alice in Wonderland situation, the conviction and sentence were pronounced even before the hearings commenced. Some 30 percent of all the resolutions passed at the commission were indictments of Israel.
After the commission was replaced in June 2006 by the UN Human Rights Council, the new body proceeded to condemn one member state - Israel - in 80% of its 25 country-specific resolutions, while the major human rights violators of our time enjoyed exculpatory immunity. Indeed, five special sessions, two fact-finding missions and a high level commission of inquiry have been devoted to a single purpose: the singling out of Israel.
This week's ICCA conference and London Declaration unequivocally condemned this "legalized" anti-Semitism, calling out that "governments and the UN should resolve that never again will the institutions of the international community and the dialogue of nations states be abused to try to establish any legitimacy for anti-Semitism, including the singling out of Israel for discriminatory treatment in the international arena, and we will never witness - or be party to - another gathering like Durban in 2001."
The data unsurprisingly confirm that anti-Semitic incidents are very much on the rise. Still, the available figures only show half the picture - they demonstrate an increase in this old/new anti-Semitism by concentrating on the traditional anti-Semitic paradigm targeting individual Jews and Jewish institutions, while failing to consider the new anti-Semitic paradigm targeting Israel as the Jew among nations and the fallout from it for traditional anti-Semitism. But the rise in traditional anti-Semitism is bound up with the rise in the new anti-Semitism, insidiously buoyed by a climate receptive to attacks on Jews because of the attacks on the Jewish state. Indeed, reports illustrate both an upsurge in violence and related anti-Semitic crimes corresponding with the 2006 Second Lebanon War and the recent Israel-Hamas war, which delegates to the ICCA conference characterized as a "pandemic."
It is this global escalation and intensification of anti-Semitism that underpins - indeed, necessitates - the establishment of the ICCA to confront and combat this oldest and most enduring of hatreds. Silence is not an option. The time has come not only to sound the alarm - but to act. For as history has taught us only too well: While it may begin with Jews, it does not end with Jews. Anti-Semitism is the canary in the mine shaft of evil, and it threatens us all.
The writer is a Canadian MP and former minister of justice and attorney-general. He is professor of law (on leave) at McGill University who has written extensively on matters of hate, racism and human rights. He is a co-founder of the Interparliamentary Coalition to Combat Anti-Semitism with UK MP John Mann.
The title chosen by Sharif for his latest book uses the word "shirt" as a metaphor for achieving his own political objectives.
The word refers to an episode in the history of Islam, when the caliph or Islamic leader Muawiya used it as a pretext to kill the previous caliph, Uthman, and seize control of the Islamic caliphate from Ali, the Prophet Mohammed's son-in-law.
He assumed the caliphate after Ali's assassination and forced the abdication of al-Hassan by threatening further bloodshed in 661. He ruled until 680 AD.
Israel claimed its three-week military offensive against Gaza in December and January (photo) was designed to stop Hamas firing rockets into Israel.
More than 1,330 Palestinians were killed in the Israeli military offensive known as Operation Cast Lead and more than 5,400 were injured, according to Palestinian medical sources.
The 2006 Lebanon War was a military conflict between the Islamist Shia group, Hezbollah, and Israel that began in July that year and lasted for 34 days.
The investigation was conducted by Col. Itzik Turgeman with the objective of thoroughly examining claims regarding 13 incidents in which facilities, structures and vehicles associated with the United Nations (UN) or other international organizations were damaged.
The majority of the incidents that were investigated were detailed in the complaints submitted to the IDF by the UN during Operation Cast Lead and thereafter, while other incidents were discovered during the process of investigating.
The investigation showed that the IDF took numerous measures to avoid hitting facilities and vehicles affiliated with the UN, Red Cross and other international organizations. These facilities were marked on IDF maps in advance according to the information provided by the international organizations. Clear orders were given stating that the hitting of facilities and vehicles of this sort must be avoided. Coordination between the IDF and the UN, the Red Cross and the international organizations was done via a special Civil Administration situation room and a center for humanitarian coordination that was established in order to allow day to day humanitarian aid coordination.
Investigation shows that Hamas and the other terror organizations operating in the Gaza Strip placed the facilities used by the UN and other international organizations in substantial danger. With the knowledge that the IDF limits its operations in the vicinity of such facilities, the terror organizations intentionally launched rockets and mortar shells adjacent to them. Similarly, Hamas and other terrorist organizations located headquarters, bases, weapon storage facilities and other terrorist infrastructure close to the sensitive facilities of the UN, Red Cross and other international organizations.
Two incidents were investigated that took place on January 15th 2009 during fierce fighting in the Hamas' stronghold in the Tel El-Hawa neighborhood in Gaza city. Hamas deployed anti-tank squads near sensitive facilities in the neighborhood, intending to deliver a strategic blow to the IDF (e.g. by hitting an IDF tank).
Damage to a structure that turned out to be a pharmaceutical storage facility– The investigation showed that during the battle, IDF forces came under fire from both anti-tank and small arms fire by terrorists located next to a structure that was later discovered to contain a Red Cross pharmaceutical storage facility.
The IDF returned fire towards the source of fire only after an IDF armored bulldozer suffered a direct hit from anti-tank fire. During the ensuing exchange of fire, which included the IDF's responsive firing, it appears that the structure containing the storage facility was hit. The IDF was not provided with the location of the storage facility in question by the Red Cross prior to the operation and therefore was not marked on the IDF's maps, unlike other Red Cross facilities. No one was injured during the incident.
Damage to the storage facility in the UNRWA headquarters compound – Concurrently, in the same general area, the IDF deployed a smoke screen in order to protect a tank force operating in the neighborhood from Hamas anti-tank crews who had positioned themselves adjacent to the UNRWA headquarters. The smoke screen was intended to block the terrorists' field of view. Information received by the IDF shows that the smoke screen did assist in protecting the force and prevented precise anti-tank fire against IDF forces. The smoke projectiles were fired at an area a considerable distance from the UNRWA headquarters, and were not intended to cause damage to either person or property. However, it appears that fragments of the smoke projectiles did hit a warehouse located in the headquarters, causing it to catch fire.
During the incident, claims were also made that an explosive shell or shrapnel hit the UNRWA headquarters. The investigation showed that these were shells, or shell fragments that were fired at military targets within the battle zone.
The damage caused to the UNRWA headquarters during the fighting in the Tel El-Hawwa neighborhood is the unfortunate result of the type of warfare that Hamas forced upon the IDF, involving combat in the Gaza Strip's urban spaces and adjacent to facilities associated with international organizations. These results could not be predicted.
Nevertheless, it is clear that the forces did not intend, at any stage, to hit a UN facility. Following UN complaints that an explosive shell had hit the headquarters, the forces were ordered to cease firing explosive shells in the region in question. Following the receipt of reports about the fire in the warehouse, all firing in the area was stopped. The entry of fire-fighting trucks to the area was coordinated with the IDF in order to assist in extinguishing the fire.
The investigation also looked into a complaint that an UNRWA vehicle was fired on in the Tel El Hawa neighborhood on January 14th 2009. The investigation reached the conclusion that during the incident a vehicle was fired upon, which it was later claimed belonged to the UN, but the vehicle did not bear UN markings. The vehicle was traveling in an area that international organizations had been clearly informed was forbidden for the movement of vehicles. The vehicle was carrying a Palestinian anti-tank squad. It was fired upon only after it had unloaded the terrorist squad and advanced towards the forces in a manner creating a genuine concern that it was a Hamas car bomb.
During the operation, the IDF constantly coordinated with the UN and other international organizations operating in the Gaza Strip. Coordination included the movement of 500 vehicles and convoys and the transfer of a continuous supply of food and humanitarian aid into the Gaza Strip. Many other problems were efficiently solved in real time. However, despite the thorough coordination, the investigation showed that during certain incidents there were failures in coordination.
In one instance, an IDF force fired upon a UN truck, which did not bear UN markings, on a journey that had not been coordinated ahead of time with the IDF. The investigation showed that closer coordination of the movement of UN vehicles is required, with an emphasis on precise routes and schedules.
The investigation concluded that the IDF did not, at any time, fire with the deliberate intention to hit a UN vehicle or facility in any of the 13 incidents investigated. In one instance the IDF targeted a group of people who were present in a UN-affiliated school late at night, at a time in which there were no classes taking place in the school, following specific intelligence and relying on the suspicion that led to the conclusion that they were participating in terrorist operations. In another incident, IDF forces attacked a UN vehicle which was being used for terrorist operations.
The IDF made sure not to hit facilities and vehicles associated with the UN and other international organizations and operated with extreme caution in order not to harm more than 1800 sensitive facilities located in the Gaza Strip. The IDF also coordinated almost 500 different vehicle movements during the fighting. However, as noted, in a very small number of incidents facilities and vehicles were unintentionally hit.
In relation to the scale of fighting and the threat posed by Hamas, the damage caused to UN facilities and vehicles was relatively limited as a result of the various precautionary measures taken by the IDF. The small number of incidents where damage was unfortunately caused occurred first and foremost as a result of Hamas' doctrine. Hamas as well as other terrorist organizations chose to fight under the cover of sensitive humanitarian facilities.
It should be noted that in one incident where it was found that a UN vehicle was fired upon in a breach of the IDF's rules of engagement, the soldier in question was court-martialed.
The IDF Chief of the General Staff, Lt. Gen. Gabi Ashkenazi, was presented with the conclusions of the investigation. Lt. Gen. Ashkenazi also emphasized the importance of avoiding harm to UN and other international facilities. Lt. Gen. Ashkenazi emphasized how important it is that IDF forces on all levels are familiarized with the locations of sensitive facilities within their assigned combat zone. He ordered that the regulations regarding safety-distances from sensitive facilities be highlighted, specifically with regard to the use of artillery. Lt. Gen. Ashkenazi also ordered that steps be taken to improve the coordination between the IDF and UN organizations working in the field, in the areas where it was lacking.
It should be noted that the incidents which were investigated by the IDF were also examined by the UN Board of Inquiry appointed by the UN Secretary General for the investigation of damage caused to UN facilities in the Gaza Strip during Operation Cast Lead. Despite the fact that the investigation by the IDF was initiated prior to the decision by the Secretary General to set up a UN committee of investigation, Israel cooperated with the UN committee and presented it with the findings of its investigation.
The investigation was conducted by Col. Erez Katz, and looked into claims that the IDF fired on or attacked medical crews, facilities, structures and vehicles. Some of these claims were described in a petition to the Israeli Supreme Court during the operation. During the investigation, additional claims were identified and the investigation was expanded to also include these incidents.
The investigation showed that the Hamas systematically used medical facilities, vehicles and uniforms as cover for terrorist operations. This included the extensive use of ambulances to transport terror operatives and weaponry; the use of ambulances to "evacuate" terrorists from the battlefield and the use of hospitals and medical infrastructure as headquarters, situation-rooms, command centers, and hiding places.
For example, Ismail Haniyeh decided to place his central command center in one of the Shifa Hospital units, while the senior leaders (both military and political) stationed themselves in another unit. On the ground floor of the hospital's main building, an entire wing was closed off and was solely used by Hamas terror operatives. At the wing's entrance, terror operatives prevented entrance to all uninvolved civilians.
In other instances, Hamas terror operatives seized control sections of Al-Shafa Hospital. Hamas also took control of a Red Crescent medical clinic in Khan Yunis, converting it into a prisoner detention facility.
In testimony by an ambulance driver published in the Italian newspaper Corriere de la Serra the driver claimed that he was forced by Hamas to extract terror operatives from the fighting zone, with the knowledge that he could coordinate with the IDF to temporarily hold fire so that he could safely evacuate the wounded. Several instances were reported in which ambulances were witnessed carrying armed Hamas terror operatives alongside the medical crews.
This illegitimate and illegal use of medial facilities sometimes resulted in damage being caused to them.
After investigating the incidents it became clear that of the seven casualties reported during the incidents in question, five were Hamas operatives. In addition, it was determined that in some of the incidents in which medical vehicles were damaged, the vehicles were driven in a suspicious manner, without prior coordination with IDF forces and in some cases without being clearly marked (such as using flashing lights) . This caused, in some cases, the vehicle to be incorrectly identified, and aroused the suspicions of the forces that the vehicle might be used for a suicide attack.
In one example an IDF force sheltering in a structure in the Gaza Strip received a concrete warning that terrorist elements intend to execute an attack against the force. Following the warning, the force identified an ambulance driving speedily towards the structure, bypassing a roadblock. The force took a number of warning measures (including the firing of warning shots in the air) which failed to bring the ambulance to a halt. The ambulance continued to progress towards the structure and reached the threatening distance of 50 meters from the structure, at which point the force fire in towards it. Only then did the vehicle turn around and drive off in the other direction.
In a separate incident, an ambulance was identified driving towards a shelter occupied by IDF forces, late at night, without any prior coordination, clear markings or flashing lights, raising suspicion that it was a car bomb. The force fired warning shots into the air, followed by warning shots near the vehicle. When the vehicle was only 100 meters away from the force, constituting a serious threat to the force, the force opened fire on it. In this incident as well, only then did the vehicle halt, turn around and drive away in the other direction.
In two of the incidents investigated (which were both mentioned in the Supreme Court appeal), it turned out that members of the medical crew who were supposedly "hit" in the incident – are alive and well. With regards to other incidents, the investigation could not find any evidence that they took place (likewise, at the time of some of the alleged incidents the, IDF was not operating at the location in question).
The investigation looked into an incident in which a building containing a mother-and-child clinic was attacked by the IDF. It became clear that Hamas used the same building as a weapons storage facility. The attack was aimed against the weapons storage facility. The investigation further showed that the clinic was not signposted in a way that made it possible to identify that building contained a medical facility. Nevertheless, the investigation clarified that the residents of the building were given a warning prior to the attack. Given that the IDF was not aware that there was a clinic located there, there was no intention to hit it.
The investigation also showed that IDF forces at all levels were directed to take extra caution to avoid harming medical crews and facilities, and in many cases ceased to operate when there was a medical vehicle or medical staff present in their area of operation. The forces took extraordinary care, as obliged by international law and in some incidents even refrained from attacking "medical vehicles" even when it was clear that they were in fact being used by Hamas and other terrorist organizations in the fighting. The investigation clearly showed that the forces were well aware of, and respected the special status given to medical crews, vehicles, structures and facilities. In addition, the orders relating to the use of force near medical vehicles were strengthened during the operation, making the IDF regulations stricter than those obliged by international law.
In addition, the investigation noted that the IDF operated a medical situation room in the Gaza District Coordination and Liaison, which coordinated the evacuation of bodies, the wounded and trapped civilians from the combat zone. During the operation, the medical situation room coordinated 150 different requests.
The IDF Chief of the General Staff, Lt. Gen. Gabi Ashkenazi, accepted the recommendations made by the Head of the investigation, stating that the awareness of the importance of preventing harm to medical crews, facilities and vehicles must be preserved. These issues should be practiced by all forces in "incidents and responses" drills. Finally, the Chief of the General Staff ordered an examination of the operation of the humanitarian corridor which was opened for the benefit of the local population during the fighting.
Towards the conclusion of the investigation, the IDF received additional claims relating to allegations of firing upon medical facilities and vehicles. These claims are currently being investigated.
The investigation was conducted by Col. Tamir Yidai and looked into seven incidents in which it was claimed, civilians were harmed by the IDF. This is a highly sensitive matter, for any loss of human life is unfortunate. This is especially true for the IDF, an ethical army that emphasizes the values of human life and the purity of arms. The investigation reached the conclusion that that in all of the incidents which were examined, IDF forces did not intentionally attack civilians who were not involved in the fighting.
In circumstances where there existed the risk of unintentionally harming uninvolved civilians, the IDF took many measures to minimize this risk, including the use of precise intelligence and providing warnings prior to the attack.
During the incidents in question, IDF operations did cause harm to uninvolved civilians. However, the results of this investigation make it clear that this was not intentional, but the result of circumstances beyond the control of the forces or due to unexpected operational mistakes. A significant proportion of the incidents occurred as a result of Hamas' illegitimate use of its own civilians. The Hamas took cover amongst the civilian population and used civilians facilities and structures as part of its terrorist operation against Israel.
• The attack on the house of senior Hamas operative Nazar Ri'an (January 4th, 2009) - The investigation showed that Ri'an's house was attacked due to its use by Hamas for storing large quantities of sophisticated weapons. Prior to the attack, the forces took a long series of measures to avoid harming uninvolved civilians (It must be stressed that Ri'an could have been considered a legitimate military target due to his central role in the planning and executing terror attacks, was not the target of the attack. The target was the weapons storage facility located in his home). These measures included a phone call notifying of the planned attack, the firing of preliminary warning shots using light weapons, waiting a sufficient period of time to allow the residents of the house to evacuate, and the identification of a group of people exiting the house. Only at that point, after all indications led to the conclusion that the building was empty, was the house targeted. It was later discovered that for unknown reasons, Ri'an and his family stayed in the building in spite of the many warnings and lengthy period of time allowed for their evacuation. Secondary explosions were clearly visible following the attack, proving that the building was used as for weapons storage.
• The attack on the house of Dr. Abu el Eish (January 17th, 2009) – The investigation showed that an IDF force identified suspicious figures on the third floor of the building, raising suspicions that the figures were observing IDF forces in order to direct sniper fire from another building. This was a method of action used by Hamas throughout the operation. Prior to firing at the snipers and the spotters, the regional commander took a series of measures to ensure that the suspicious figures were gunmen and that no civilians would be endangered by the attack. Accordingly, the commander waited 20 minutes before ordering the attack. Unfortunately, despite all the efforts made, four women who were in the same house as the spotters were hit.
It should be noted that Israeli security forces urged Dr. Abu el Eish to leave his house and the combat zone in the days prior to the incident, but he chose to remain in his house in spite of the clear risk.
• Truck apparently carrying oxygen tanks (December 29th, 2008) – the truck was targeted after the accumulation of information which indicated convincingly that it was carrying rockets between a known Hamas rocket manufacturing facility to a known rocket launching site. The attack was carried out near a known Hamas rocket manufacturing site and after a launch. It was only later discovered that the truck was carrying oxygen tanks (similar in appearance to Grad Missiles) and not rockets. The strike killed four Hamas operatives and four uninvolved civilians. It is important to note that the oxygen tanks being carried in the truck were likely to be used by Hamas for rocket manufacturing.
• The Al-Daia family residence in the Zeitoun neighborhood in the city of Gaza (January 6th, 2009) – the incident in question was a result of an operational error with unfortunate consequences. The investigation concluded that the IDF intended to attack a weapons storage facility that was located in the building next to the Al-Daia family residence. It appears that following an error, the structure that was planned to be attacked was the Al-Daia residence rather than the building containing the weapons. The house that was actually attacked (the Al-Daia residence) did receive a number of warnings beforehand, including the preliminary firing of ammunition which causes little damage and the use of the "Knock on the Roof" special warning method. However, due to the mistake in identifying the building, the warning phone call was received prior the attack by the residents of the building containing the weapons storage, not the Al-Daia residence. This may have been the reason that the Al Daia family did not leave the house before it was mistakenly hit it. This is a highly unfortunate event with severe consequences. It was ultimately caused by a professional mistake of the type that can take place during intensive fighting in a crowded environment against an enemy that uses civilians as cover for its operations.
In addition to the abovementioned incidents, the head of the investigation looked into two incidents in which it was claimed that attacks directed at mosques lead to the deaths of uninvolved civilians. With regard to the first incident, relating to a strike against the "Maqadme" mosque in Beit-Lehiya on January 3rd, 2009, it was discovered that as opposed to the claims, the mosque was not attacked at all. Furthermore, it was found that the supposed uninvolved civilians who were the casualties of the attack were in fact Hamas operatives killed while fighting against the IDF. The second incident, regarding a supposed strike that hit the "Rabat" mosque in Bet Lehiya on January 9th, 2009 – no testimony of any IDF forces operating in the area was found. The mosque is still standing unharmed.
In all of the incidents investigated, there were no breaches of international law, and in some of them it was clear that the actions of the IDF were in fact stricter than those demanded under international law. As in any combat situation, and specifically when fighting a terrorist organization that uses its own people as human shields, the investigation discovered isolated failures, some of which lead to the harming of civilians.
The IDF Chief of the General Staff determined that even in those unfortunate incidents in which the investigation showed that the IDF operated in a way that caused harm to uninvolved civilians, the harm was not intentional and was caused despite measures that were taken to prevent it. Lt. Gen. Ashkenazi ordered that clear regulations and orders be made on the basis of the conclusions of the investigation.
It must be added that the IDF is currently looking into a series of additional claims that were made against it. Upon the completion of an initial inquiry into these events, it will be decided whether they will be further investigated, in accordance with the facts and IDF investigations policy.
This investigation, which was conducted by Col. Shai Alkalai, focused on the use of munitions containing phosphorous components in Operation Cast Lead throughout the duration of the operation.
The investigation found that IDF forces used two different types of munitions containing white phosphorous.
It was found that during the operation, a very limited amount of the first type was used by ground and naval forces. The munitions included mortar shells fired by ground forces (not artillery shells) and 76mm rounds fired from naval vessels. These munitions contained phosphorous as the active ingredient and are not intended to create smoke screens.
The use of such munitions is legal under international law subject to certain limitations derived from their incendiary capabilities. The investigation showed that use of these munitions was done so in accordance with these limitations – they were only fired at open areas and were used for marking and range-finding rather than in an anti-personnel capacity. In one single incident, in an open uninhabited area, ammunition containing phosphorous was used to uncover tunnel entrances.
Let it be reemphasized that no phosphorus munitions were used on built-up areas or for anti-personnel purposes.
As a precautionary measure, even though international law does not prohibit the use of such means, as of January 7th 2009, it was decided that in order to further minimize the risk to civilians from munitions containing phosphorous, the IDF would cease to use the munitions containing larger quantities of phosphorous (i.e. those not used for smoke screening). All IDF forces were directed to act accordingly.
The investigation discovered that phosphorous munitions which contained phosphorous intended for purposes other than smoke screening were used after January 7th 2009 on two occasions, by ground forces and the Israel Navy respectively, for marking purposes. These two exceptions were looked into during the investigation, which found that on both the incidents there was no breach of any of the rules of international law.
It must be stressed that the ammunition containing phosphorous used by the IDF is standard, legal and is used by other western militaries worldwide, including states who are signatories of the Third Protocol of the Convention on Certain Conventional Weapons (CCW). The investigation showed that the use of white phosphorous made by the IDF was in accordance with Israel's obligations under international humanitarian law and more specifically, the obligations with regard to munitions with incendiary characteristics.
Most of the munitions containing phosphorus which were used during the operation were of a second type, and contained pieces of felt dipped in phosphorous in a manner that is not intended to cause injuries and which are non-incendiary, and are used exclusively to create smoke screens. Moreover, these are munitions which conform in full, with international law. In addition, the limitations under international law on the use of "incendiary munitions" do not apply to this type of munitions.
In this context is should be emphasized that the Third Protocol of the Convention on Certain Conventional Weapons (CCW), which defines specific limitations on the use of "incendiary munitions", clearly states that smoke obscurants are not considered "incendiary munitions". Israel is not a party to the Third Protocol, but it should be noted that even states that are a party to the Protocol make use of smoke shells which contain a small quantity of phosphorous for the purpose of smoke obscuration.
The use made by the IDF of obscurant smoke shells was for military requirements only (e.g. camouflaging armored forces from anti-tank squads deployed by Hamas in Gaza's urban areas). This use was in accordance with international law, while balancing between operational and humanitarian considerations. The use of smoke obscurants proved to be a very effective means and in many cases prevented the need to use explosive munitions whose impact would have been considerably more dangerous.
After having being presented with the conclusions of the investigation, the Chief of the General Staff emphasized the importance of a clear doctrine and commands on the issue of various munitions which contain phosphorous. In addition, Lt. Gen. Ashkenazi ordered that any use of phosphorous for purposes other than smoke obscuration be treated as exceptional.
This investigation, carried out by Col. Adam Zusman, focused on issues relating to the infrastructure operations and the demolishing of structures by the IDF forces during the ground operations phase of Operation Cast Lead. During the investigation the commanders of the forces that participated in the operation were questioned in relation to the issues being investigated. In addition, the investigation gathering data from relevant institutions and examined the relevant military orders.
The investigation showed that Hamas based its main line of defense on civilian infrastructure in the Gaza Strip (i.e. buildings, infrastructure, agricultural lands etc.), and specifically on booby trapped structures (mostly residential), the digging of explosive tunnels and tunnels intended for the moving of people and weaponry. This created an above ground and underground deployment in the Gaza Strip's urban areas by Hamas. During the operation, IDF forces were forced not only to fight the gunmen themselves, but to also deal with the physical terrorist infrastructure prepared by the Hamas and other terrorist organizations in advance. As part of this challenge, the forces demolished structures that threatened the forces and had to be removed – houses which were used by the enemy; other structures used by the enemy for terrorist activity; structures that prevented the forces from moving from one area to another (given that many of the roads were booby trapped); structures that were used to protect Israeli soldiers; agricultural elements used as cover for enemy tunnels and infrastructure; and infrastructure next to the security fence used by Hamas for operations against IDF forces or for digging tunnels into Israeli territory.
IDF operations which were intended to demolish booby trapped or structures rigged with explosives (and other similar operations) successfully prevented the enemy from detonating these structures while IDF forces were in them, despite the enormous efforts made by Hamas and other terrorist organizations, who rigged a substantial number of buildings to explode in the areas where the IDF operated.
The investigation shows that in all the areas of operation, the decision to authorize the demolishing of houses was only made by high ranking officers. In addition, the destruction of buildings was only initiated after it was determined by the forces that they were vacant. As a result, as far as the investigation was able to determine, no uninvolved civilians were harmed during the demolition of infrastructure and buildings by IDF forces.
The investigation showed that in many cases, the preparations made by Hamas and other terrorist organizations were responsible for the significant damage caused to houses. This was due to the secondary explosions caused by the detonation of explosive devices or weaponry placed by Hamas within the structures. This was illustrated by an incident which was investigated, in which a building in one of Gaza's northern neighborhoods was fired upon, resulting in the unexpected detonation of a chain of explosive devices planted by Hamas, damaging many other buildings in the neighborhood.
The investigation showed that the orders and directions given with regard to damage to property during the operation, at all levels, emphasized that all demolition operations should be carried out in a manner which would minimize to the greatest extent possible the damage caused to any property not used by Hamas and other terror organizations in the fighting. During the investigation it was apparent that that this issue was not stressed sufficiently in the written plans for the operation. However, the investigation clearly showed that the forces in the field understood in which circumstances structures or infrastructure could be demolished as well as the limitations relating to demolitions.
The investigations did not identify any instances of intentional harm done to civilian infrastructure and with the exception of a single incident (which was immediately halted by the relevant Brigade Commander, and was dealt with using disciplinary measures) it didn't find any incidents in which structures or property were damaged as "punishment" or without an operational justification. In all of the areas in which the IDF operated, the level of damage to the infrastructure was proportional, and did not deviate from that which was required to fulfill the operational requirements.
Overall, the extent of damage caused to buildings was a direct result of the extensive use by Hamas of those same buildings for terrorist purposes and targeting IDF forces.
The IDF Chief of the General Staff, Lt. Gen. Gabi Ashkenazi accepted the recommendation made by the head of the investigation to create clear regulations and orders with regard to the issue of demolition of infrastructure and structures as well as a clear combat doctrine. Lt. Gen. Ashkenazi also accepted the recommendation that the combat doctrine should include a definition of relevant "incidents and responses" to be distributed amongst all combat forces. Lt. Gen. Ashkenazi also accepted the recommendation to create a clear procedure of documentation and reporting for such operations. The conclusion that the extent of the demolished infrastructure and building was proportionate, in light of the operational requirements, was also approved by the IDF Chief of the General Staff.
The Palestinian unity government talks chaperoned in recent months by the Egyptians appear to have failed. Cairo is now talking about forming a joint committee or "executive framework" that will be virtually powerless vis-a-vis the two existing Palestinian governments in Ramallah and Gaza. This appears to constitute primarily a way for all involved to save face without admitting total defeat. The important unity issues--a jointly-formed government with an agreed platform, ground rules for new elections, merging Hamas into the PLO--remain unresolved. In the absence of a unity government, little or none of the international aid pledged for rebuilding dwellings destroyed in the recent war is finding its way into the Strip.
Accordingly, the de facto reality all parties face for the foreseeable future is that of the past two years: three states or political entities--Israel, the West Bank and Gaza. Under these circumstances, while a two-state solution remains the only viable outcome to the entire conflict, talk of achieving it in the near future rings hollow. On the other hand, those Israelis who believe the present situation of a divided Palestine works to Israel's advantage risk cultivating, through neglect, not one but two time bombs in our midst: a militant Islamist Gaza and a weak and unstable West Bank.
Thus it behooves us to ask: Given that the current "three state" situation is not likely to change in the foreseeable future, how can we make the best of it? Before we contemplate reuniting the West Bank and Gaza, we need two separate strategies for these separate and disparate entities.
In the West Bank, we have to look for ways to ensure that moderates remain in power by implementing genuine confidence- and security-building measures that support them. This means an absolute freeze on all settlement expansion, dismantling of outposts and even--if and when the security situation permits--coordinated unilateral Israeli withdrawal from additional parts of the West Bank. While some form of final status talks may be helpful in creating an incentive for Palestinians--and US President Barack Obama's resolve in this regard is encouraging--the real work that Obama's emissary George Mitchell should prioritize is ensuring Israeli and Palestinian compliance with these conflict-management measures in the West Bank. This should be easier to accomplish with the Netanyahu government than insisting immediately on a full-fledged Israeli-Palestinian peace process similar to those that have failed since 1993.
Regarding the Gaza Strip, the situation is more clear-cut: all relevant parties must begin by recognizing that their strategies have failed. Israel's military strategy failed back in January, as did the economic boycott strategy it pursued for nearly two years with the complicity of Egypt, the PLO and the Quartet. Egypt's strategy of ensuring that Gaza is an Israeli problem just blew up in Cairo's face with the revelations about Hizballah's espionage and sabotage operations on Egyptian soil: Gaza is an Egyptian problem, too. Perhaps this explains why Israel's reliance on Egypt to mediate ceasefire and prisoner-exchange deals with Hamas has also failed. Meanwhile, Cairo's attempt to broker renewed Fateh-Hamas unification is failing because Hamas, with Iran's backing, refuses to compromise its extreme views concerning Israel-related issues while the PLO is too weak to bend Hamas to its will.
Unless and until Hamas radically changes its attitude toward Israel, Jerusalem has every reason to quarantine it from the West Bank, lest a unity government or Palestinian elections strengthen its presence there. But quarantining physically should not mean ignoring politically. It's time for Israel to signal that it is prepared to talk to Hamas unconditionally. On the initial agenda: prisoner-exchange and a long-term ceasefire. If these can be accomplished, then and only then should they be followed by a joint exploration of ways in which peaceful coexistence with Gaza can be merged with peace with the West Bank. Such an order of business, which is not necessarily incompatible with the Likud's approach to the conflict, appears more promising than the failed policies of the past two years. | 2019-04-20T02:36:14Z | http://middle-east-analysis.blogspot.com/2009_04_19_archive.html |
2. Gold digging or thinking ahead?
4. Why saving, not investing?
9. How early for retirement savings?
A great deal of the work that goes into The Simple Dollar is simply figuring out topics for posts.
My usual procedure is to sit down and just brainstorm. I’ll go through my notes for post ideas, brainstorm my own ideas, read through my personal journal, read through whatever books are inspiring me at the moment, and just generate a long list of ideas.
After that, I cull them. I go through each one and ask myself if there’s really a post in there. Is this something that might help someone? Is this something that’s potentially entertaining? Is there enough meat here to really make a full post?
It’s a surprisingly long process for each of these posts to go from nothing to what you read each day.
I went through a divorce which was final this past November. My husband applied for and received a [specific mega bank] card during the marriage, and asked for a subordinate, not joint, card for me. When he started missing payments, [specific mega bank] reported this to my credit report – and yet didn’t come after me for the $$. They’re still reporting his debt on MY credit report. I’ve tried calling them and writing them to no avail. I followed their employees’ instructions to send them a letter asking for proof of signature card. I sent it certified nearly a year ago. Someone signed for it. They never responded to me. And yet they keep reporting his debt on my credit report, but not hassling me to pay it.
Any pointers on what to do? They trashed my credit rating last year over this, which caused my three cards to cut my credit lines and raise rates. I’d like to know my recourse against their actions. My ex-husband is responsible per court order for the account, but that doesn’t protect my credit report.
I excised the name of the bank for potential libel reasons.
I would try two things at this point. The first is a call to customer service, where I keep escalating the call until I get some sort of resolution. Document the call thoroughly, including recording the names of each person you speak to and a general summary of the conversation. Keep escalating the call until you get somewhere.
Failing that, I would clearly document all interactions with the bank, then directly request the credit agencies, asking them to remove this information from your credit reports. Provide as much documentation of the situation as possible and make it clear that you’ve done everything you can to resolve this.
Q2: Gold digging or thinking ahead?
You often mention the importance of making sure your significant other shares the same financial discipline and goals as you when it comes to dating and eventually marriage. I was married but one of the reasons we divorced was due to his poor financial decisions which left our family in ruins and, sad to say, I deal with it still since he is often late with child support and has trouble keeping a job (the recession is not to blame here). As far as dating, all the guys I meet have no concern for their personal finances. Based on their present choices and future plans for their money, I run in the other direction. When is someone’s personal finances too superficial or reminiscent of golddigging in choosing a mate?
I don’t think there’s anything wrong at all with avoiding someone who does not have control over their own finances as a specific trait. Where you might get into golddigging, though, is when you pair it with other traits, particularly a high income. If you’re looking at income as a minimum requirement to date you, that’s a completely different subject.
There isn’t all that much correlation between income level and financial sensibility. Some of the best financial people I know have a very low income, while at the same time I know several high income earners that are flaky when it comes to managing that income.
If you find yourself continually walking away from the people you met, though, you might want to consider a change of scenery when it comes to looking for people to date. Obviously, something isn’t adding up in the area you’re currently looking in.
I am a Human Resources Manager for a Fortune 500 company in Southern California. As you know, SoCal is a very expensive place to live. My company had to make a difficult decision to require employees to take some mandatory time off over the next few months. Although they were offered the choice to use vacation time or file for partial unemployment, I know that if the mandatory time goes on for more than a couple of months, many of my employees will suffer. Some have already depleted all of their vacation and unemployment benefits are not paid to 100% reimburse for lost wages.
As I consider how to best help everyone, it occurred to me that if this would have happened to me a number of years ago, I would be in the same situation as my employees….floating in the ocean without a life preserver. I want to get them into the lifeboat!
I am planning on scheduling meetings with the topics of: financial planning, how to cut back on living expenses (including couponing, reviewing home expenses, etc.), and would also like to recommend books for them to read.
My question is: what do you suggest is the best “read” for my employees? Keep in mind that many of them are two-income households with children; and, unfortunately are still living paycheck-to-paycheck. Also, do you have any other suggestions for me about what to include in my meetings?
I know that I cannot “save” anyone who doesn’t want to be saved. But, I do believe that for those who are ready to open their minds to a different frugal life-style, the information I provide might help them get through this time, as well as allow them to enjoy less debt in the future.
Well, besides my own book? I think it would actually be a good fit for people in your case, since I focused heavily on telling my own story of recovering from, well, living paycheck-to-paycheck while in a two income household with children, which is exactly how you describe the people you’re trying to reach.
Aside from that, I’d probably point to the book that helped me the most when it came to recovering from that very situation: Your Money or Your Life by Joe Dominguez, Vicki Robin, and Monique Tilford.
My suggestion for your meetings is to start off confessionally. Tell them, flat out, what your worst financial moment was and then talk about exactly what you did to bounce back from that. Then make the point that many of the people in that room are probably somewhere near their own financial low point. You’ve got to tie it to their own lives or they’re not going to care.
Q4: Why saving, not investing?
I have noticed that much of personal financial advice is focused on only half of the financial equation: saving and budgeting. While this is clearly the first step toward financial independence, it overlooks the second half: investing.
I am curious what your take is on this. Pennies saved are important, but pennies saved in a coffee can are pennies that decrease in value, which is another form of waste. I would be very interested in what investment books you recommend, etc. for those of us looking beyond saving.
The biggest reason for that is that the vast majority of Americans do not have the financial resources with which to invest. Many of them live paycheck to paycheck. The ones that don’t often only have some savings to account for the difference. Some have money in an employer-sponsored retirement plan, but a shockingly high percentage do not.
To put it simply, investing doesn’t matter to the vast majority of the American public. It’s a narrow topic that appeals mostly to people that are either earning so much they can’t spend it or have a big frugal streak inside of them (a la Warren Buffett). The people reading this blog, simply by the fact that they’re reading it and engaged in their finances, are the exception rather than the rule.
If you’re looking for a good “starter” investing book, try The Bogleheads’ Guide to Investing. I consider it the best one-shot investing book out there.
Do you use a budgeting software like Quicken? If you do, would you mind sharing which one you use? What are your thoughts about them?
I have a love-hate relationship with Quicken.
It does some things incredibly well, such as providing a good overall view of your finances, categorizing your expenses and so on.
My problem with it usually crops up when I want to do some sort of analysis of my financial situation and I find that I can’t do what I want to do. At that point, I wind up using a spreadsheet, which has always been my trusty tool for things like this.
Given the amount of time it takes to get everything set up and working well (which, in my experience, has been multiple hours each time I’ve set it up), I just don’t feel I get the bang for my buck that I should with Quicken. The money and time cost is too high for what I want from it.
I’m 26 years old and have a ton of student loan debt. Since I graduated college I was never able to land a great job and I defaulted on my student loans. My credit score is shot. However I have recently landed a lucrative job and am trying to take the proper steps to restore my financial situation. Everything seems to be on track except for my student loans. The problem is I have no idea where to begin. I can’t even find them. I know they are in default and have been sold to a collections agency but I don’t know who to contact to start the process of paying them back. I dont have collection agencies calling my phone. Most of them are through citi but when i log into their website it wont list them as open loans because they are defaulted. I want to do the right thing but I need some help. Any advice is much appreciated.
Your first step should be to call Citi and figure out where the loans currently are.
Most likely, what has happened is that they’ve sold the account to someone else at cents on the dollar. At this point, your debt is now held by another company that may have purchased a lot of debts from Citi. This is pretty common practice.
At some point, that company will contact you – they’re going to want to recoup their investment.
Your only route to speed up this process is to track them down first, and Citi is the key to that. Call them up, get a customer service rep on the phone, and track the collection agency down.
In this day and age, my wife and I rarely write checks– instead using automatic e-payments, debit, and doing most banking online. However, we do have one bill which we do need to write a physical check for, plus I understand the need to have a checkbook ready in case it’s needed. My wife’s checks recently ran out, and she had to order more from our bank. This was a one-time cost of $15! I can appreciate that it costs something to produce these checks, but even $15 is an annoyance in a world where we typically only use one check a month. I suppose there’s nothing that can be done about this, is there?
That’s a little high for buying checks (assuming you bought several books of them), but it’s not exceptionally or ridiculously high.
Remember, when you’re buying a checkbook, you’re paying for a convenience. Those checks make the process of making certain payments much easier than before. Compare it to, say, taking out a money order – checks, in terms of both convenience and price, are a much better bargain.
Since you’ve already bought the checks, there’s likely nothing that can be done. However, there are check printing businesses out there that will undercut the banks and save you at least a little bit of money.
While we were dating, my husband and I–both teachers and 29 years old–each bought one-bedroom condos at the height of the real estate bubble, each with interest-only mortgages. (It seemed like a great idea at the time because everyone told us we’d be able to sell them when we were ready to move out and we had no reason not to believe them. We also qualified for mortgages well above what we could reasonably afford on a teacher’s salary. But that’s placing blame on someone else’s shoulders.) Eight months later, he proposed. We tried to sell one of the condos, but by that time, the market had slowed considerably and we were unable to sell, so we decided to rent mine. The rent we collected didn’t quite cover the mortgage payment, so each month we were losing about $600, but were still able to pay off our credit card debts and pay for our wedding and honeymoon with the rent money.
A few months later, we found our we were pregnant and decided we needed more space for our growing family. With my father-in-law’s help in co-signing a loan, we bought a three-bedroom townhouse and rented out my husband’s condo. Again, the rent for that condo didn’t quite cover the mortgage, so altogether we were losing about $1000/month in mortgage payments for houses we weren’t living in. We had no money in savings and were living paycheck-to-paycheck. A year after our daughter was born, we found our we were expecting our second child and realized that we needed to be in a better place financially. Our renters moved out, we stopped paying the mortgages on our condos, and we tried to short-sell both. Our first mortgage holders did not approve the short-sale requests, and both went to foreclosure in August.
A few weeks ago, however, we started receiving calls from debt collectors on behalf of the second mortgage holders, who are trying to recoup the $50ishK loan that each place had. Our other debts include $2500 for one car loan, $13000 for a second car loan, $10000 in student loans, our townhouse mortgage ($321000) and now these two outstanding loan amounts for about $50000 each. We have nothing in our savings account, as I have missed two months of paychecks while on maternity leave with our son and we have had to use what little we had in there to pay the bills. About 7% of our paychecks automatically get deposited into a 403b retirement account.
What should we do? Try to settle the condo-debts by taking out a second trust on our townhouse as a consolidation loan? Keep ignoring the debt collection calls until we get sued or they go away? Stop contributing to our retirement accounts until we pay down some of our debts? File for bankruptcy?
Right now we’re sticking with option two until we can figure out some sort of plan of attack. Any recommendations?
Without knowing all of the interest rates, I can’t tell quite how bad it is, but it looks like you might be approaching a bankruptcy type of position. Both you and your husband are young teachers, which means you’re fairly low on the teacher’s income scale, and you’ve not mentioned any other form of income. You also have two young children at home who likely require some form of child care when you’re at work. Unless all of the interest rates are extremely low, it’s not a pretty picture.
I would suggest sitting down with someone you trust and going through all of the numbers in specific, including your monthly budget. Let someone else get a full glimpse of the numbers and assess where you’re at.
It may be that cutting your retirement contributions for a while can make this work – it depends heavily on the interest rates. You really need to carefully run the numbers yourself, though.
Q9: How early for retirement savings?
I’m a recent college grad, married, age 23. My husband, who graduated last year, has an entry-level job in his chosen profession and makes around $30,000 a year. He has minimal benefits and no retirement plan. I will start a job next week for $14 an hour that isn’t specifically what I trained for, but could segue into my field. This job is considered full time temporary with no benefits. The job could become full time after 6 months but I’m trying very hard to find work in my field. Our health insurance is covered by our parents plans until age 26 (thankfully!).
Because we have no retirement plans could we fund our own? We have no debt. Our cars are in great shape and we rent. We have saved about $4,000 this year. My grandfather bequeathed me $16,000 that is in a savings account right now, which is what we’d like to start a retirement account with.
If we can start some sort of retirement, which one would you recommend? How much should we put in every year? Would this change if we would get “real” jobs with benefits? Or should we just chill until our temporary jobs turn into something better and our lives are more stable? Thanks so much!
I would open a Roth IRA with the investment house of your choice. For the investment within that Roth IRA account, I’d choose a target retirement fund that’s closest to the year when you turn 65 (2055, probably).
As for how much to invest, I’d just invest what you can. I’d set up an automatic investment plan and start putting in the same amount each week automatically, depending on what you can afford and what your other goals are.
The simple fact that you’re getting started this early will make things much easier as you actually approach your retirement age.
Last week you mentioned that you were collaborating with someone on a site about board gaming. Details?
There really aren’t many details as of yet. A friend of mine who also enjoys board games and card games as a social activity has been long discussing getting such a site going and we’re slowly progressing from the planning stages to actually creating something.
Trust me – if it goes public, you’ll all know about it. | 2019-04-21T20:25:23Z | https://www.thesimpledollar.com/reader-mailbag-discarded-post-ideas/ |
The top class education i hold ever experienced. I took many MB4-218 certification checks, but MB4-218 turned out to subsist the perfect one passage to killexams.com. i hold recently located this internet site and wish I knew approximately it some years in the past. would hold stored me a variety of sleepless nights and gray hair! The MB4-218 exam is not an smooth one, mainly its ultra-modern version. however the MB4-218 Q and A includes the present day questions, daily updates, and those are actually True and cogent questions. I am convinced that is true reason I got maximum of them for the duration of my exam. I were given an top class marks and thank killexams.com to creating MB4-218 exam strain-free.
can i learn dumps questions trendy MB4-218 exam?
There had been many methods for me to attain to my goal destination of lofty marks in the MB4-218 however I become no longer having the exceptional in that. So, I did the pleasant factor to me by using taking plot online MB4-218 test serve of the killexams.com mistakenly and organize that this mistake turned into a candy one to subsist remembered for an extended time. I had scored rightly in my MB4-218 examine software program and thats complete due to the killexamss exercise test which became available on line.
If you want birthright MB4-218 training on how it works and what are the exams and complete then dont blow your time and opt for killexams.com as it is an ultimate source of help. I likewise wanted MB4-218 training and I even opted for this wonderful exam simulator and got myself the best training ever. It guided me with every aspect of MB4-218 exam and provided the best questions and answers I hold ever seen. The study guides likewise were of very much help.
Unbelieveable chummy overall performance cutting-edge MB4-218 examination pecuniary institution and examine manual.
Going through killexams.com has become a habitude when exam MB4-218 comes. And with exams coming up in just about 6 days was getting more important. But with topics I requisite some reference guide to lumber once in a while so that I would bag better help. Thanks to killexams.com their that made it complete simple to bag the topics inside your head easily which would otherwise would subsist impossible. And it is complete because of killexams.com products that I managed to score 980 in my exam. Thats the highest score in my class.
nice to pay interest that contemporary-day dumps modern-day MB4-218 exam are to subsist had.
I efficiently comprehended the troublesome themes relish shipping Competence and questions and answers expertise effectsfrom killexams. I correctly score 90% marks. complete credits to killexams.com. i used to subsist looking for a reference guidewhich helped me in planning for the MB4-218 exam. My occupied calendar simply permitted me to extra time of twohours by using one approach or another. through booking and deciding to buy the killexams.com Questions/solutionsand exam simulaotr, I were given it at my entryway mission internal one week and commenced planning.
i am MB4-218 licensed now, thanks to this killexams.com internet site. they hold a top notch collection of brain dumps and exam preparation sources, I extensively utilized them for my MB4-218 certification final yr, and this time their sftuff is simply as true. The questions are actual, and the exam simulator works high-quality. No troubles detected. I just ordered it, practiced for every week or so, then went in and passed the MB4-218 exam. this is what the precise exam preparation must subsist relish for complete of us, I recommend killexams.
No time to select a stare at books! requisite some thing speedy preparing.
the identical used of killexams.com is lofty enough to serve the applicants in MB4-218 exam education. complete the products that I had used for MB4-218 exam coaching had been of the pleasant fine so they assisted me to lucid the MB4-218 exam quickly.
Take these MB4-218 questions and answers before you lumber to vacations for test prep.
Going thru killexams.com has grow to subsist a habitude whilst exam MB4-218 comes. And with test arising in just about 6 days changed into getting extra crucial. But with topics I want some reference manual to lumber on occasion in order that I might bag better help. Thanks to killexams.com their that made it complete smooth to bag the subjects inner your head without problems which would in any other case could subsist not possible. And its far complete due to killexams.com products that I managed to attain 980 in my exam. Thats the best score in my class.
Hearty passage to killexams.com team for the questions & answers of MB4-218 exam. It provided tremendous mode to my questions on MB4-218 I felt assured to stand the test. Discovered many questions inside the exam paper just relish the guide. I strongly subsist pleased that the manual continues to subsist valid. Admire the exertion with the aid of your team members, killexams.com. The mode of dealing topics in a completely unique and uncommon manner is superb. Want you people create extra such test courses in near destiny for their comfort.
im very contented with the MB4-218 QAs, it helped me lot in exam center. i can certainly arrive for different Microsoft certifications also.
In Microsoft Solomon 6.0, the company concentrated on improving the product's usability, efficiencies and self-carrier alternatives. Microsoft claims main enhancements to a pair of areas of core functionality, including assignment management, accounting, analytics and reporting.
a fraction of the Microsoft enterprise solutions portfolio, Solomon 6.0 will elevate an estimated retail cost tag of $four,500 for a single-person equipment.
REDMOND, Wash. – Sept. 6, 2005 – At its first ever company acme event for midsize organizations, Microsoft is aphorism Microsoft Dynamics™, the new brand of fiscal, client relationship and provide-chain management solutions for tiny and midsize businesses, colossal organizations and divisions of world enterprises. the brand new brand will exchange Microsoft enterprise solutions going forward and represents Microsoft’s strategy to align its products with its research and pile roadmap, formerly known as “assignment green,” which facilities on a americans and process-centric design strategy to convey step forward innovation in two majestic free up waves.
this first wave of main releases under Microsoft Dynamics will partake habitual customer technology that focuses on a job-based mostly user adventure with profound integration to Microsoft workplace. Future waves of Microsoft Dynamics releases will focus on ordinary server know-how, including a standard mode mannequin that mixes the ultimate company strategies from every of the releases.
This iterative approach for introducing Microsoft Dynamics into the do in base is what shoppers are searching for: a staged migration that preserves their existing investments while receiving the advantages from Microsoft’s majestic investments in analysis and building.
To subsist taught extra about this branding approach, its implications on clients and company partners, and the process of picking Microsoft Dynamics, PressPass spoke with Tami Reller, corporate vp of Microsoft’s industry options group.
PressPass: Why did Microsoft arrive to a decision to re-company its industry options items?
Tami Reller: while Microsoft will proceed to acquire exhaust of industry solutions because the appellation of one of its seven divisions internally, we’ve decided to re-brand their company options products to acquire their purchasers’ deciding to buy decisions less demanding and to accurately mirror their innovation roadmap. They trust this makes it simpler for customers to understand that Microsoft has an offering for agencies that want economic administration, give chain administration and customer relationship management solutions. Their mode is to converge their product lines, and this product naming mode is a dedication toward their intention. Their branding and product-naming strategy is the subsequent logical step in their evolution.
PressPass: Why is Microsoft Dynamics an excellent appellation for “undertaking green” and Microsoft company solutions?
Reller: They undertook and achieved a majestic analysis assignment that turned into amongst the most wide naming research initiatives Microsoft has ever done. They conducted lots of of interviews with industry decision makers and IT determination makers in the U.S. and overseas markets. These interviews yielded a pair of findings, including that their consumers and partners strongly opt for a manufacturer it really is suggestive rather than simply descriptive or fanciful. members spoke back positively to Microsoft Dynamics because it suggests the power and movement that helps circulate a industry forward. additionally, it suggests the thought of flexibility and flexibility of the product because something that is dynamic is at complete times changing and reflects the environment they're asked to duty in. lastly, Microsoft Dynamics is consistent and aligns with Microsoft’s naming convention, hence strengthening the total portfolio of Microsoft brands.
PressPass: How will the brand new appellation subsist applied?
Reller: The transition will ensue over time as “challenge eco-friendly” expertise enters the market in their part items. you're going to start to observe Microsoft Dynamics and corresponding product names loom in marketing substances in accordance with the free up cycles of their items. Between now and the stay of 2006, we're making critical releases across their core product lines. you are going to observe the identify loom in the product traces at the side of these releases.
different items developed via the enterprise neighborhood corresponding to Microsoft point of Sale, Microsoft Retail management equipment, Microsoft FRx or Microsoft C5 will continue to subsist branded as they at the jiffy are and never comprise Microsoft Dynamics.
Reller: this is a herbal next step as they circulation to a converged product line and it’s according to what we've been announcing about their roadmap. they are doing this to acquire their clients’ purchasing decisions simpler when Dynamics ships.
PressPass: when you’re moving toward a converged product line, don’t part items nonetheless exist nowadays?
Reller: yes. dissimilar company management options exist nowadays together with Microsoft Axapta, Microsoft CRM, Microsoft remarkable Plains, Microsoft Navision and Microsoft Solomon. These will proceed as models of Microsoft Dynamics in the course of the wave 1 releases. These items will comprise greater of the equal appear and suppose, with features corresponding to contextual industry intelligence, a greater similar and intuitive consumer interface and person journey, and a greater stress on portals, with an accelerated integration with internet capabilities. The “better of” points and performance of Microsoft Axapta, Microsoft astonishing Plains, Microsoft Navision and Microsoft Solomon will demonstrate up within the 2d release wave of Microsoft Dynamics, which can subsist delivered in 2008. Microsoft CRM will continue as a fraction of the Microsoft Dynamics enterprise administration suite and should continue to subsist sold standalone.
PressPass: So, suppose you've got a industry that depends on what’s currently known as Microsoft company solutions—Axapta. This company upgrades over the following pair of years to extra present releases of Microsoft Dynamics AX. and then, sooner or later, there’s Microsoft Dynamics. What does that consumer attain then?
Reller: The huge odds to shoppers is that they can flee their organizations greater effectively with the most up to date industry functions suite within the trade. additionally, complete product strains lumber forward. they hold a software in region called Transformational Assurance, so that their valued clientele’ investments are relaxed. When the 2nd release wave of Microsoft Dynamics is launched, shoppers may subsist in a position to obtain relish functionality (as accessible) at no extra license can charge, which is made viable with Transformational Assurance. The Transformational Assurance capitalize of the Enhancement application is that when clients license Microsoft company solutions–Axapta, Microsoft company options–extremely reliable Plains, Microsoft enterprise solutions–Navision, Microsoft enterprise options–Solomon, including the chummy editions, in addition to Microsoft CRM, and stay latest on the Microsoft company options Enhancement program, they might subsist in a position to circulation to the longer term industry utility suite without needing to reacquire the functionality they already license. That potential customers can stream to Microsoft Dynamics on their own timeline.
PressPass: What does the switch to Microsoft Dynamics insinuate for your customers?
Reller: I assume it faculty a brand new even of possibility. We’re concentrated on constructing and enhancing their options in order that they greater deeply labor relish and with complete of the other tremendous know-how provided by using Microsoft. below complete of that, they can deliver their shoppers with a pair of core differentiators, which might subsist affordability and flexibility, each of which might subsist vital to the success of their customers.
Reller: The companions were working with us in defining the duty set for mission eco-friendly and are completely contented to observe the fruits of their collaboration at final transport as Dynamics. partners we’ve talked with are very smitten by their dedication to bringing collectively the better of nowadays’s enterprise software for a extremely potent, unified reply sooner or later. Unveiling Microsoft Dynamics is a significant step within the process of relocating during this direction, and they’re assured that the Microsoft Dynamics brand will resonate strongly with their existing and future shoppers. they are additionally providential to peer that every one of their advertising efforts will accrue in opposition t one manufacturer expanding the consciousness of Microsoft offerings.
PressPass: How hold customers answered to Microsoft Dynamics?
Reller: Very neatly. consumers had been a key a fraction of their resolution making. They conducted lots of of interviews with company decision makers and IT resolution makers domestically and internationally to solicit remarks and enter. Their research indicates that valued clientele responded well globally to the brand new appellation since it reflects the wants of companies relish theirs.
PressPass: When will they observe Microsoft Dynamics appear extra commonly?
Reller: they can commence to observe Microsoft Dynamics in the next essential releases of the items. they are able to likewise observe it in public places relish the internet and in other marketing materials. It may subsist dominant in a new global advertising crusade that we’ll launch in 2006. in the following pair of months to the subsequent 12 months they will hold critical releases of complete of their flagship product traces. you will commence to stare the new company in the product and in their marketing substances. To assist their partners birthright through this system, we’re setting up the companion Implementation tenet, which identifies key dates associated with executing the new manufacturer in complete collateral.
WASHINGTON, DC, April 1, 2019 (LifesiteNews) – convivial media majestic Twitter is in the middle of a public members of the family nightmare after it suspended on the weekend the official Twitter tackle for the professional-lifestyles film “Unplanned” and became because of this accused of prejudicial targeting of conservatives by means of numerous Twitter clients.
Late Sunday evening, people began to observe their requests to comply with the account rejected, along with a said one hundred,000 followers inexplicably faraway from following the film’s tackle.
The Twitter spokesman indicated that although @UnplannedMovie’s account become reinstated, followers of suspended accounts may select approximately 24 hours to “stabilize.” just relish the explanations given for the suspension, this appeared to subsist partial truths at foremost. We without retard reached out to two tremendously skilled system engineer and coders, asking for greater tips on why this “instability” might occur. If Twitter programmers hold the potential to suspend an account by code, wouldn’t deleting this identical code reinstate the account, and don't hold any impact on those that are seeking for to observe it? If this instability is an impact of the suspension, why would users that hold been in a position to ensue the account subsist dropped from it—basically 100k of them?
This evaluation appears to correspond to undercover investigative labor from challenge Veritas ultimate yr that unavoidable individuals at Twitter are, in fact, focused on the speech of these making exhaust of their convivial media platform. in keeping with this undercover video facts, these people are making decisions on who or what to enable to fashion, to subsist seen by using others—in a observe, these people are dictating what can subsist considered, and suppressing speech they disagree with.
In complete equity, the suspension and “technical concerns” linked to the nonetheless-“unverified” film account may be, as an additional device engineer do it, “the facts being disseminated over a bunch of redundant information centres. as the account become deactivated, these servers might have, each and every, “partial views” of the account and requisite time to stabilize of their view”, but regardless of CEO Jack Dorsey’s insistence that focused on doesn't select vicinity, the fresh “instability” furthers the narrative to the contrary.
The film’s group, including the filmmakers, begun recognizing that there were “technical issues” taking plot presently upon reactivation. “Deletion of some of their tweets (without consent), together with a 'we're back up' notification to their followers, as well as deletion of their followers the day prior to this. They went from neatly over a hundred,000 followers to 151 followers. americans seeking to observe us hold been automatically dropped from the equipment. people that observed and had been affected blanketed: Shannon Bream (Fox information); Dana Loesch; Patricia Heaton,” Konzelman and Solomon explained.
Questions quiet remain. If Twitter endured a weekend filled with public relation nightmares, why did those in company fail in watching for “ordinary” instability concerns, proactively addressing any pointed out issues by means of asserting the mistake of suspending the account? Why did they not proactively announce that because of the suspension, instability would circle up for twenty-four-48 hours after reinstating it, and announce that the account—and different conservative “influencers” could subsist “established” in an act of respectable faith? The outcomes of those screw ups appears most effective to verify the suspicions expressed via many engaged in convivial media—that of increased focused censorship of conservative voices by means of politically-leftist corporate entities.
A "protest and vigil at Twitter over 'Unplanned'" censorship should subsist held on April 2. particulars will likewise subsist discovered on fb birthright here.
Obviously it is arduous assignment to pick solid certification questions/answers assets concerning review, reputation and validity since individuals bag sham because of picking incorrectly benefit. Killexams.com ensure to serve its customers best to its assets concerning exam dumps update and validity. The vast majority of other's sham report objection customers arrive to us for the brain dumps and pass their exams cheerfully and effectively. They never trade off on their review, reputation and attribute because killexams review, killexams reputation and killexams customer conviction is vital to us. Uniquely they deal with killexams.com review, killexams.com reputation, killexams.com sham report grievance, killexams.com trust, killexams.com validity, killexams.com report and killexams.com scam. In the event that you observe any counterfeit report posted by their rivals with the appellation killexams sham report grievance web, killexams.com sham report, killexams.com scam, killexams.com dissension or something relish this, simply remember there are constantly terrible individuals harming reputation of reliable administrations because of their advantages. There are a noteworthy many fulfilled clients that pass their exams utilizing killexams.com brain dumps, killexams PDF questions, killexams hone questions, killexams exam simulator. Visit Killexams.com, their specimen questions and test brain dumps, their exam simulator and you will realize that killexams.com is the best brain dumps site.
killexams.com is a reliable and trustworthy platform who provides MB4-218 exam questions with 100% success guarantee. You requisite to practice questions for one day at least to score well in the exam. Your true journey to success in MB4-218 exam, actually starts with killexams.com exam practice questions that is the excellent and verified source of your targeted position.
At killexams.com, they provide thoroughly reviewed Microsoft MB4-218 schooling resources which can subsist the best for Passing MB4-218 test, and to bag licensed via Microsoft. It is a noteworthy preference to accelerate your career as a professional in the Information Technology enterprise. They are contented with their reputation of supporting people pass the MB4-218 exam of their very first attempts. Their success prices in the past years had been actually dazzling, thanks to their providential clients who are now able to boost their career within the speedy lane. killexams.com is the primary altenative among IT professionals, specifically those who are seeking to climb up the hierarchy ranges faster in their respective corporations. Microsoft is the enterprise leader in records generation, and getting certified by them is a guaranteed passage to prevail with IT careers. They serve you attain exactly that with their excessive pleasant Microsoft MB4-218 schooling materials.
Microsoft MB4-218 is omnipresent complete around the world, and the commercial enterprise and software solutions provided by using them are being embraced by passage of nearly complete of the organizations. They hold helped in driving lots of agencies on the sure-shot route of pass. Comprehensive information of Microsoft products are taken into prepation a completely crucial qualification, and the experts certified by passage of them are quite valued in complete organizations.
We present true MB4-218 pdf exam questions and answers braindumps in formats. Download PDF & practice Tests. Pass Microsoft MB4-218 e-book Exam quickly & easily. The MB4-218 braindumps PDF character is to subsist had for reading and printing. You can print greater and exercise normally. Their pass rate is lofty to 98.9% and the similarity percent between their MB4-218 syllabus study manual and actual exam is 90% based totally on their seven-yr educating experience. attain you want achievements inside the MB4-218 exam in just one try? I am currently analyzing for the Microsoft MB4-218 true exam.
Cause complete that matters here is passing the MB4-218 - Solomon 6.0 Project Management and Accounting exam. As complete which you requisite is a lofty score of Microsoft MB4-218 exam. The most effective one aspect you requisite to attain is downloading braindumps of MB4-218 exam exam courses now. They will no longer will let you down with their money-back assure. The experts additionally preserve tempo with the maximum up to date exam so that you can present with the most people of updated materials. Three months slack bag entry to as a passage to them thru the date of buy. Every candidates may likewise afford the MB4-218 exam dumps thru killexams.com at a low price. Often there may subsist a reduction for complete people all.
In the presence of the authentic exam content of the brain dumps at killexams.com you may easily expand your niche. For the IT professionals, it's far crucial to modify their skills consistent with their profession requirement. They acquire it smooth for their customers to select certification exam with the serve of killexams.com proven and genuine exam material. For a brilliant future in the world of IT, their brain dumps are the high-quality choice.
A top dumps writing is a totally vital feature that makes it simple a reliable passage to select Microsoft certifications. But MB4-218 braindumps PDF gives convenience for candidates. The IT certification is quite a difficult assignment if one does now not locate birthright guidance within the figure of genuine useful resource material. Thus, we've True and up to date content material for the education of certification exam.
The undergo will further empower users and is a key capitalize of Microsoft Solomon 6.0. It helps eradicate the requisite for users to shift gears when entering or exiting the solution. Specific enhancements to the menu interface will serve facilitate easier navigation by providing a familiar, easy-to-use environment that may boost productivity while simultaneously reducing training time and costs.
Released in August, Microsoft industry Portal 2.5, used with Microsoft Solomon 6.0, provides complete the functionality of the Solomon Desktop as well as new modules, including Key Performance Indicators and advanced payroll features. With Microsoft industry Portal 2.5, employees will subsist able to build a centralized project desktop that consolidates previously disparate aspects of project, management and accounting tasks. Microsoft Solomon 6.0 users likewise will subsist able to store, partake and edit Microsoft Word, Microsoft exceed and other documents in the Microsoft industry Portal, which has Microsoft Windows® SharePoint®Services as the underlying structure.
Project management and accounting now duty even better as one integrated industry system in Microsoft Solomon 6.0, helping businesses enlarge efficiency, realization and profitability. Resources can now subsist assigned to tasks within Microsoft Solomon Project Controller. Other benefits comprise further streamlined payroll and accounting features along with seamless integration with Microsoft Office Project 2003.
In addition, Microsoft Solomon 6.0 includes new and improved options for analytics and reporting that serve enlarge a company’s pecuniary visibility. Customers of Microsoft Solomon 6.0 can select odds of Microsoft industry Solutions for Analytics–FRx®6.7, which includes four major enhancements: a new FRx Report Manager module, improvements to the FRx Currency Translation module, tighter integration with Microsoft Office exceed 2003, and upgraded champion for eXtensible industry Reporting Language (XBRL) 2.0 taxonomy. Microsoft Solomon 6.0 customers likewise will receive champion for Crystal Reports 10, which includes added options for exporting data to Microsoft exceed and creating funnel charts.
Microsoft industry Solutions offers integrated industry applications and services that allow tiny and midsize organizations and divisions of large enterprises to connect employees, customers and suppliers for improved efficiency. The pecuniary management, customer relationship management, supply chain management and analytics applications labor with Microsoft products such as Office and Windows to streamline processes across an entire organization, giving businesses insight to respond rapidly, device strategically and execute quickly. Microsoft industry Solutions applications are delivered through a worldwide network of channel partners that provide specialized services and local champion tailored to a company’s needs.
Note to editors: If you are interested in viewing additional information on Microsoft, gratify visit the Microsoft Web page at http://www.microsoft.com/presspass on Microsoft’s corporate information pages. Web links, telephone numbers and titles were remedy at time of publication, but may since hold changed. For additional assistance, journalists and analysts may contact Microsoft’s Rapid Response Team or other confiscate contacts listed at http://www.microsoft.com/presspass/contactpr.asp .
Part of the Microsoft industry Solutions portfolio, Solomon 6.0 will carry an estimated retail cost tag of $4,500 for a single-user package.
When Goldman Sachs CEO Lloyd Blankfein hands off to president David Solomon this fall, it will subsist the investment bank's first change in leadership since 2006.
During the intervening years, Blankfein led the arduous through the pecuniary head and the subsequent fallout surrounded by a coterie of loyalists, some of whom worked shoulder-to-shoulder with the CEO at commodities trader J. Aron & Co.
Solomon's management team will differ from his predecessor's. An investment banker who climbed the rough-and-tumble ranks at endure Stearns before jumping to Goldman Sachs before it sold shares to the public in 1999, Solomon runs with a different crowd. Many of them worked for the Goldman president during the decade he ran the investment-banking division.
Solomon will select over from Blankfein in October. To understand who's in, who's out, and who is in line for promotions, industry Insider spoke with more than a dozen Goldman Sachs insiders. Solomon declined to observation through a spokesman.
What follows is a list of more than two dozen executives at Goldman Sachs, broken into four categories: Solomon's inner circle; some key members of his broader management team, but not complete ("bench"); a collection of executives facing an uncertain future ("on the bubble"); and a few Blankfein loyalists who hold a depth of institutional information not easily replaced. Executives are listed alphabetically within each group.
Before they bag to the list, one final thing: attain you labor at Goldman Sachs and assume they overlooked a key player or ignored a member of the inner circle? Something else about the bank you want to share? Email me at [email protected] or find me on WhatsApp or Signal at 917-673-9252. | 2019-04-26T02:46:11Z | http://morganstudioonline.com/brain-dumps.php?pdf=MB4-218 |
Read Indiana Gov. Mitch Daniels' 2012 State of the State address.
Members of the General Assembly, honored guests, fellow citizens. For an eighth time, and the final time, you afford me the unrivaled privilege of this podium. As it’s my last such chance to express my appreciation for the public service you each perform, and to Hoosiers for hiring me twice so I could try to perform my own, I’ll start with a heartfelt thank you.
But the time for reminiscing will come later, much later. Tonight, and all nights in today’s Indiana, must be about the future, where we are and where we are going.
A reporter asked recently, “What keeps you up at night?” I replied that I generally sleep well, but if I ever do have trouble, I don’t have to count sheep. I count all the states I’m glad I’m not the governor of.
I’m pretty sure that good man would agree tonight that things are very different in Indiana now. Then, we were broke and other states were flush. Tonight, while states elsewhere twist in financial agony, Indiana has an honestly balanced budget, a strong, protective reserve in our state savings account, and the first AAA credit rating in state history, one of just a handful left in America. Our credit is better – imagine this – than that of the federal government.
Another host of states raised taxes again last year, while Hoosiers are taxed at the lowest levels in a long time, thanks in part to the lowest property taxes in the nation.
While other state governments stiff their vendors, close parks, delay tax refunds, and ignore unacceptably poor service levels, Indiana state employees are setting national standards for efficiency.
Tonight, Hoosiers are served by provably the most productive government workers anywhere. Indiana has the fewest state employees per capita in the country, the fewest we’ve had since 1975. And yet our parks have never been in better shape, your tax refund comes back twice as quickly as it used to, and the average customer got in and out of a license branch last month in less than 14 minutes.
I’m not the only one to notice. In a national survey last summer, 77 percent of Hoosiers described their state government as “efficient,” far above most states and the second-highest rating in the nation.
Uniquely in public sector America, Indiana now pays state workers on a performance basis, so those doing the best job are properly rewarded for their superior efforts. But I know that the reward they value as much as money is simple recognition from the citizens they serve, and I hope you’ll show them right now that you value them and their hard work as much as I do.
Careful stewardship of the taxpayer’s dollar, and ceaseless efforts to improve public services, are matters of duty, and basic good government. But they are not the fundamental goals of public life. They are just means to the real goal, which is to make of our state a place of opportunity, and upward mobility, and a better standard of living. A place where young people, and people not so young, know that they can start with nothing and make a good life. From our administration’s first day, this has been the central objective around which everything else was organized.
We have worked relentlessly to move Indiana up the list of great places to do business. We set out to build the best sandbox in America, a place where men and women of enterprise knew that, if they risked a buck on their idea or their dream, they would have the best possible chance to get it back, with something left over they could use to hire the next Hoosier.
We have made steady progress, coming from nowhere to the top tier in every ranking: No. 6 according to the nation’s site selectors, No. 6 according to CEO Magazine, No. 5 according to real estate decision makers.
But it isn’t nearly enough. It was our ironic bad luck to create a top economic climate just as the nation plunged into its worst modern recession, and business investment slowed to a crawl: we became the prettiest girl in school the year they called off the prom.
Despite these headwinds, our recently strong state revenues show that something positive is happening to Hoosier incomes. In 2010, the most recent data we have, Indiana incomes grew at the eighth fastest rate in the country.
Here’s another encouraging sign: more people are moving into Indiana than moving out. Our population is growing at the fastest rate from Iowa to Maine. Maybe best of all, thousands more college graduates moved into our state last year than moved out. There is no better indicator of economic promise in today’s world than success at attracting top talent, and we are.
We are not where we want to be, nowhere close. But with a welcoming business climate, enormous investments in new public infrastructure, and a stable fiscal picture, we are poised for more progress, and better days.
The days when education debates started and stopped at dollar signs are over, and high time. From President Obama down, everyone now recognizes that leaders in education are defined not by what they put in but by what they get out. But just for the record, and despite frequent misrepresentations to the contrary, Indiana is a leader in what we put in.
With this year’s spending increases, plus the additional funds we requested for full day kindergarten, K-12 spending is now 56 percent of the entire state budget, the highest percentage of any state in the nation. No state anywhere devotes more of its state funds to education.
But that’s not why others are following Indiana. It’s our new commitment to rewarding the best teachers, liberating principals and superintendents, and providing low- and middle-income parents the same choices as their wealthier neighbors; that’s what has caught the world’s attention. And this year, when we end the cruel, defeatist practice of passing children who cannot read into fourth grade, and when our most diligent students begin to graduate from high school in 11 years, and get a head start on college costs with the dollars they earned through their hard work, others will take notice of Indiana yet again.
There are few subjects more studied, or more intriguing, than leadership. Leaders come in many forms and often from unexpected directions. But some qualities are common among them, and one is that leaders never loaf. They never slip into complacency, settle for things as they are, or stop pursuing innovation and excellence of result. If they do, leadership will pass, and new leaders surpass. Leaders who loaf aren’t leaders for long.
Along with all the accolades, Indiana now bears this burden of leadership, the duty to keep pressing ahead.
This administration will not loaf. We have made out a long list of self-assignments for our eighth and final year. Our Economic Development Corporation captured a record 219 new jobs transactions in 2011; we have raised the bar to 250 for the year ahead.
We will press hard to accelerate further the ahead-of-schedule, under-budget delivery of our Major Moves transportation program. In 2012, we will invest $1.2 billion in road and bridge construction, the sixth straight record-setting year.
The last contract on the Hoosier Heartland Corridor will be let next summer and the entire project finished by 2013. The last contracts on U.S. 31 from South Bend through Kokomo will be let this year, and we have accelerated completion of the entire corridor into 2015. I-69 will be open for traffic from Evansville to Crane, as will the entire Fort to Port highway in Northeast Indiana. The Sherman-Minton Bridge will be rebuilt and reopened by March and, upriver, an agreement on a new bridge from Utica to Louisville will be in place, cementing Indiana’s place at the forefront of the public-private partnership movement.
We will build the state’s 3,000th mile of bike and hiking trails, and reach our goal of a trail within 15 minutes of every Hoosier.
Unknown to most citizens, the air and water of Indiana is now the cleanest in living memory. In 2011, every Indiana community met all national air quality standards for the first time in the history of the Clean Air Act.
Last year, we wiped out the last of a 550-case backlog of old, and therefore less strict, environmental permits, and are now the only state completely current. Our goal for 2012 is to maintain this status and, if national limits are lowered yet again, to find a way to meet those standards, too.
We will complete our successful overhaul of what was once America’s worst welfare system when, in February, the 10th and final region is converted to our reformed, public-private system. Backlogs have been slashed by 80 percent, timeliness and accuracy have soared above national averages, and last October the program earned a cash bonus and an award for most improved in the nation. We have set high targets for continued improvement in 2012.
The same is true of our campaign to conserve Indiana’s natural heritage. The last seven years have seen new records for protection of wetlands and habitats, 50,000 acres by the end of this year, highlighted by the largest such project ever at Goose Pond. In 2011, we launched new waterways conservation projects the size of three Goose Ponds in the Muscatatuck Bottoms, and five Goose Ponds along the Wabash Corridor. Before long, Hoosiers will be able to travel over 100 miles down our state’s signature river and never leave a protected wetlands.
Our coming Bicentennial gives us an ideal opportunity to extend this historic era of reverence for the beauty God bestowed on Indiana. I have appointed a commission of a dozen illustrious citizens, led by my partner Becky Skillman, and by the legendary Congressman Lee Hamilton, to guide the great celebrations to come.
As a first initiative, I have asked them to oversee a Bicentennial Nature Trust, a statewide project to protect still more of our most precious natural spaces. On our 100th birthday, Indiana launched its state park system. A statewide conservation initiative is a fitting sequel and bequest from our second century to our third.
We have identified state funding, within existing resources, of $20 million, but that must be just a beginning. The Trust is intended to inspire others, and to match their donations of land or dollars in a continuing statewide surge of conservation. The Commission joins me in challenging citizens, businesses, and in particular our unique network of county community foundations, to identify and fund local projects that will safeguard places of beauty for future generations.
In this Assembly, you too must set big goals. We should, at long last, enact a law to protect workers and patrons across Indiana from the hazards of second-hand smoke. Public support has grown, and so has the evidence of health risk to workers. It is time to move this long-sought objective to the finish line.
We should – no, we must – strengthen our laws against the horrid practice of human trafficking, and we must do it in time for the Super Bowl, the kind of event at which the exploitation of young women is rampant in the absence of such a tough law.
We should assist students with the cost of higher education by empowering our Higher Ed Commission to limit the “credit creep” which unduly increases both time to graduation and student expense. Undoubtedly, some degrees will continue to justify more than the traditional 120 credit hours. But schools requiring 126 hours for a degree in sociology, or 138 hours in special education, or 141 hours in music education, should have to explain why all that time and student expense is necessary, especially when other colleges offer high quality programs in less time and cost.
We should deepen the state’s response to the terrible tragedy that befell so many at last summer’s Indiana State Fair. A catastrophe so singular merits unique treatment, and I hope you will augment the amounts already provided the victims and their families by the state and private donors.
And we should trust the people of Central Indiana with the decision whether to raise local dollars for mass transit if they believe it crucial to their future quality of life.
Within weeks, one of the great public careers, and perhaps the greatest judicial career, our state has known will come to a close. Chief Justice Randy Shepard, let tonight be one of many occasions on which a grateful and fortunate state thanks you for a quarter century of fairness, firmness, and farsightedness on our highest bench.
Part of Justice Shepard’s legacy will be the landmark report that he and former Governor Joe Kernan co-authored, proposing overdue modernization of our pioneer days structures of local government. One way to honor this great public servant will be to advance more of the sensible and needed reforms set forth by the Kernan-Shepard Commission. I ask this Assembly to do so, on their own merits but also in recognition of this historic public servant.
Because economic opportunity, and building America’s best home for jobs, is the central goal of all we do, every year should include a bold stroke to enhance it. This year, the choice of actions has become obvious.
In survey after survey, by margins of 2 to 1 or more, Hoosiers support the principle known as Right to Work. After a year of studying the proposal, I agree.
The idea, that no worker should be forced to pay union dues as a condition of keeping a job, is simple, and just. But the benefits in new jobs would be large: a third or more of growing or relocating businesses will not consider a state that does not provide workers this protection.
Almost half our fellow states have right to work laws. As a group, they are adding jobs faster, growing worker income faster, and enjoying lower unemployment rates than those of us without a law. In those ratings of business attractiveness I mentioned, the only states ahead of us are right to work states.
What every economic development expert has testified to, we have learned from firsthand experience: over seven years and well over a thousand job competitions, we have found that, when Indiana gets a chance to compete, we win two out of three times. But too often we never get a chance, because a right to work law is a requirement. Especially in this poor national economy, a state needs every edge it can get.
Everyone knows that, among the minority favoring the status quo, passion on this issue is strong, and I respect that. I did not come lightly, or quickly, to the stance I take now. If this proposal limited in any way the right to organize, I would not support it. But we just cannot go on missing out on the middle class jobs our state needs, just because of this one issue.
For the sake of those without jobs, and those young people just beginning the ascent of life’s ladder, I ask you to remove this obstacle and make Indiana the 23rd state to protect the right to work.
And we think we have disagreements! When we do, I hope we’ll keep them not only in state, but also in this Chamber, where the people’s business is supposed to be settled.
Mr. Carpenter’s letter wasn’t mainly about duels or haircuts. He wrote it because he had gone to see the newly-elected President, Abraham Lincoln, who had spent that day, his 52nd birthday, in Indianapolis. Young Carpenter described Lincoln’s arrival at Lafayette Road, the procession down Washington, Pennsylvania, Ohio and Illinois Streets to the Bates House hotel.
Seeing the new President filled Carpenter with hope, he said, that “(S)oon our government will be remodeled.“ I like the term. These measures I have mentioned are part of our continuing remodeling project.
In three weeks, the entire world will fix its eyes on this city, and our state. It should be a magic moment, I hope a matter of pride to every Hoosier everywhere.
But the Super Bowl didn’t get here overnight. Indy’s selection followed decades of constant striving, and building, and reforms to make our capital the vibrant, livable model city it has now become. No one leader, or group of leaders, made it happen. The work was passed from hand to hand, administration to administration, generation to generation, and in no era did the people of Indianapolis rest, or settle, or loaf. So it will have to be with the construction of the great Indiana we are determined to achieve.
I carried here from its place on my desk an atomic clock, given me by a friend who served a sister state as governor with great distinction. It sits directly in front of me each day, counting down the days, hours, minutes, and seconds until I turn over these duties and return to private life. It is there to remind me to use every moment as well as I can to make Indiana a place of greater promise and prosperity. Silently, it challenges me to search each day for the next improvement, the next efficiency, the next breakthrough, the next stroke of Indiana leadership.
Yes, these nights are about the future, but I do look back at past speeches, if only to avoid repeating myself. In one, I recounted telling an East Coast CEO who wondered what Indiana was known for that one day he wouldn’t have to ask. Tonight, he doesn’t.
In another, I said I hoped we would become bolder in our embrace of change, take our motto from the inspiring athletes of the Special Olympics, and be a braver state. Tonight, we are.
In the very first of these meetings, I invited you and every Hoosier listening to join us in rejecting mediocrity, demanding excellence, aiming higher. Tonight, we do.
That is the state we have dreamed of. A state that magnetizes people of talent, and the risk-taking capital that seeks to employ them. A state of growth. A state of hope. A state of promising futures.
We are not yet fully that state. But we are so much closer to it. We have leapfrogged other places, passed more competitors than Tony Stewart at Homestead. We are certainly, irrefutably, different.
Until it became real, I never imagined that, for eight fulfilling years, I would be given the chance to help make Indiana different. On the night it became real, I resolved to use every day, take every action, make every change that might make our state a place of promising futures.
I now have 369 days, __hours, ___minutes, and __seconds left as the people's employee. I pledge to use every one of them, as wisely as I can, in the service of those who sent us to this chamber. I ask you to do likewise, to be the kind of leaders the new leadership state of Indiana now expects us to be.
God bless this Assembly and this great state. | 2019-04-20T22:26:32Z | https://www.governing.com/news/state/Indiana-2012-state-of-the-state-address.html |
A story of the Asian slave trade that followed the abolition of the African slave trade, as described by a first-hand witness, Don Aldus, The Rover.
The hardbound book drifted from bookshelf to bookshelf for over 100 years before I opened it. Its water-stained pages are filled with neat columns of handwritten words organized in alphabetical lists, cryptic annotations (“Number of different words in my book, Don Aldus The Rover”) and a yellowed newspaper clipping from the London Times.
Why would a writer count, for God’s sake, the words in his own book? OCD, maybe? And what was that book? Who was the mysterious Don Aldus?
Figure 1 (above right): Spine of journal with handwritten and pasted label: Don Aldus. Figure 2 (below left): Inside cover of the journal. Pencil text reads: “Number of different words in my book, Don Aldus The Rover'.
There were no easy answers. Little by little, question by question, it suckered me into searching for answers that no one else had found and placed in the public domain.
Exactly! So what? can’t be answered unless someone investigates. My investigation crisscrossed oceans. I sniffed through the English-language archives of England and Australia, virtual library stacks in New Zealand and riffled through the genealogies of countless individuals. It is astonishing how much can be learned about historical figures using the Internet. In fact, you can sometimes learn more about them than their own contemporaries could have known.
More specifically, I learned that slavery didn’t pass out of the world just because England, and later the United States, outlawed the practice. I found that racism didn’t prevent Caucasian merchants and their Chinese counterparts from doing business, as long as their mutual interests were served.
I learned how hard it can be to live with shame. Plus a lot more. So pay attention.
The book—let’s call it a journal—certainly didn’t look like the key to a series of interlocking stories, each known in its respective time and place, but never connected. Not like this.
—The story of a ship—one of many—that freighted abducted and coerced workers from China and delivered them as slaves to the Americas and elsewhere for profit.
—A long-forgotten author—our hero!—who published the same text twice in eight years, under two titles, using two names.
—A scathing, seemingly on-the-spot description of the ugly and brutal coolie trade. And yet, that description turns out to be, literally and figuratively, a whitewash.
What was the coolie trade? The business model essentially required the capture of Chinese nationals by other Chinese, their imprisonment in China and their subsequent transportation by ship to colonies controlled or managed by Caucasians. The contracts for this human freight were subsequently sold or auctioned, generally to mine and plantation owners in need of cheap labor.
Ultimately, this journal proved to be a lost and most probably previously unknown link to reports about the coolie trade that appeared in newspapers far and wide in the latter decades of the 19th century.
After the slave ships from Africa were outlawed and long before “cattle cars” were used to deliver European pariahs to German death camps, Caucasian and Oriental “businessmen” combined to obtain and deliver cargoes of miserable and horribly abused Chinese to far distant lands and godforsaken often deadly jobs for profit.
The journal isn't much to look at. Some pages were cut out. Some are blank. Most are filled with lists. Neatly written, primarily in ink, the word lists are grouped alphabetically, but are otherwise casually organized. asking precedes added, which is followed by adding, and aspire.
The words add up. Literally, if not figuratively. The journal’s author appears to have counted all of the words in Don Aldus The Rover. They are organized alphabetically, by first letter. Individual totals appear at the end of every section. (See Figures 3 and 7.) In the last pages of the journal, its author summed up a life at sea by totaling the number of words he used to describe it.
This, however, would not become clear until later.
The search for the identity of Don Aldus and his literary legacy ultimately led to the story of the “coolie trade” that followed the abolition of the African slave trade. I learned that the gold rush that eventually transformed the North American West had a frightful counterpart in the rush to capture and sell “yellow gold” - Chinese men - to the owners of plantations, mines and “mineral” deposits in South America, the Caribbean and the islands of the Malay Archipelago.
But, as it would turn out, behind the seemingly candid testimony of Don Aldus, lay “facts” as cryptic as the water-stained journal that revealed them.
I stumbled on the journal among the effects left behind by my parents. Its decorative spine earned it a second life in the disinterested safety of my parents’ bookshelves. There it likely sat unopened for years. In 1989, that house sent flames high into the sky above Mummy Mountain, in Scottsdale, Arizona. What little was left when the embers were extinguished was waterlogged or singed. The journal’s decorative value was ruined by the water that saved it.
Scottsdale is a suburb of Phoenix, Arizona, planted in the Sonoran Desert. The desert is both an oddly ironic and utterly appropriate location for the discovery of a sailor’s journal. The Phoenicians of the Bible were famed mariners.
Some 25 years later, I held it, looked between its covers and fell, a little like Alice in Wonderland, into another, utterly alien world.
Pasted on the spine is small piece of once-cream colored paper holding the handwritten text, in ink, Don Aldus (Figure 1). It covers another piece of paper with something written on it: something presently illegible.
Taped inside the cover I found a yellowed newspaper clipping (Figures 2 & 4). The headline: "The Chinese Coolie Traffic From Hongkong."
It looked old; the spelling of Hong Kong was unfamiliar. Moreover, I thought that “coolie” referred specifically to Chinese laborers or servants. But I was wrong.
"The word coolie, which refers to unskilled cheap labor from Asia, is believed to have its origin in India, Turkey, or Africa.
A second opinion seemed in order.
This article suggests that the governments of Great Britain, Germany and the Qing Chinese Emperor cooperated to ensure a peaceful, satisfactory outcome.
In the then current - and clearly myopic if not simply racist - view of the newspaper, businesses and governments enabling and profiting from the transportation of shanghaied workers to an uncertain fate incurred neither moral hazard nor legal culpability. Everyone profited - except the victims.
The dateline, at the end of the clipping, is "London Times, Feb.18." No year is given. A search of the London Times archive revealed that the article was published in 1890.
The captain of the German steamer had good reason to be concerned. When abducted and imprisoned Chinese workers being shipped to distant foreign shores exploded into mutiny, the results for everyone on board - from the captain and crew to the prisoners - could be fearful.
Contemporaneous verification is provided by a dispatch in The Colonies And India (London, Eng.), of April 9 1890. 6 (See Figure 5.) The same information was reported widely in the American press of the time.
Figure 7: The first and last journal pages (inset) listing words beginning with A. Total number of words listed for A was calculated at 467.
Does the situation described sound ominous–for the coolies? It was. More ominous than you might imagine.
Apparently, the journal’s author trimmed this article out of a leading English newspaper, at a time that the country was center of a vast colonial empire as of 1890.
But why paste it in a journal filled largely with word lists? Like the clipping, the words were evidence, albeit, of a different type, pointing to interlocked questions.
name of the author. Nor does it state how that conclusion was reached.
On the facing page, in pencil (Figure 2), one sees, "Number of different words in my book, Don Aldus The Rover."
Below that, in ink, there is a second, apparently unrelated entry, "Household & Personal effects July 1891 when adjusting a fresh. Policy of Insurance."
Flip the page. The quite legible, sepia colored ink reads, "Showing the Number of words in my book Don Al(d)us The Rover. Total number at end of this book"
–“Coolie Traffic and Kidnapping”. By Don Aldus. LONDON: McCorquodale & Co., “THE ARMOURY.” 1876. 253 pages. Collection of Oxford University. Digitizing sponsor: Google.
Don Aldus! I couldn’t wait to peruse it.
Figure 9: WorldCat.org listing for "Don Aldus, the Rover".
Surprisingly, for a text written in the first person, Aldus’ dialog partners invariably refer to him as “Mr. D.” Don Aldus, Mr. Aldus, or Mr. A never make an appearance in the text.
The second book,“Don Aldus, the Rover,” is not readily available. It was not listed for sale on AbeBooks.com or Amazon.com. The Internet Archive did not have a version, either.
However, OCLC WordCat.com identified the location of two known copies. One is in the collection of The British Library, St. Pancras (London), the other is held by the State Library of Victoria (Australia).
My curiosity aroused, I copied My voyage to Australia from the OCLC World Cat Notes entry and searched for it in "Coolie Traffic and Kidnapping."
There it was: located in the Table of Contents. "My Voyage to Australia and its Consequences" (sic) is Chapter VI. It opens on page 64.
Next, I picked out an unfamiliar word listed in the journal, under S: spalpeen's.
Merriam-Webster.com says that SPALPEEN is a word of Irish origin and a synonym for RASCAL.
But was spalpeen's used in the text of "Coolie Traffic and Kidnapping?" Bingo. It appears in the PDF text on page 36 and again, in the singular, on page 60.
These two items, each an independent link to “Don Aldus, the Rover,” both appear in "Coolie Traffic and Kidnapping." The clues were suggestive.
Figure 10: Journal entries near the end of the book display individual word total by letter in the text of Don Aldus, The Rover (left) and the estimated total number of words in the same book (right).
The clipping from the London Times (Figure 4) also seemed significant. It was published four years after the listed publication date of “Don Aldus, the Rover.” That made it evidence of strong and continuing interest in coolie abduction on the part of the journal's author. It seems doubtful that anyone else would have pasted a pertinent newspaper clipping into the journal.
Now, on a scale of nominally odd to wildly extraordinary, where does one rank the fact that the journal’s author took the time to alphabetize, write down, and total the number of individual words in an entire book? Manually. Presumably, after the book was published. The total is 5734 words.
The “Estimated Words in the book,” was originally entered in ink as 43,000. That figure, however, was later overwritten in pencil with a new value, 81,000.
Just how the journal’s author obtained either figure is not entirely clear. But if you copy the entire text of "Coolie Traffic and Kidnapping" into Microsoft Word and use the Word Count feature, it reports a total of 71,876 words.
● Authors Don Aldus and George D. Donald were probably the same person. Don Aldus was probably a pseudonym for George D. Donald.
§ Donald = Don Ald__.
§ Within the text of "Coolie Traffic and Kidnapping" the protagonist–presumably the author–is referred to as Mr. D.
● "Coolie Traffic and Kidnapping" and “Don Aldus, the Rover,” are probably the same book, with different titles.
§ Both volumes were published by McCorquodale & Co, eight years apart.
§ “Don Aldus, the Rover,”is not a work of fiction.
● The journal was most likely written by George D. Donald.
The journal shows, for example, that its author included and counted prepositions, definite and indefinite articles, even common verbs, as words: “a,” “an,” “all,” “and,” and “are.” Clearly this list was not compiled as part of any standard book index.
As more data was needed. I ordered a copy of “Don Aldus, the Rover,” from the State Library of Victoria (Australia). Once it arrived, a glance sufficed. The two books are not identical. “Don Aldus, the Rover,” has a cover illustration. "Coolie Traffic and Kidnapping" doesn’t.
The difference? “Don Aldus, the Rover,” has an Introduction and a new first chapter, Japan, neither of which are listed in the TOC of "Coolie Traffic and Kidnapping." Both are paginated with Roman numerals whereas the original chapters are paginated with Arabic numerals. The font style used for the original chapters, in both TOCs, is apparently the same. The numeric range displayed for each chapter in the original text (Figure 11) has been truncated to display only the first page of the chapter in “Don Aldus, the Rover.” With the exception of the Chapter VIII., in Figure 11, even the use of the ellipses is identical.
Step two was to compare pages of the “same” chapter from both books side-by-side. I picked page 3 of the chapter, "Hong Kong; Incidents which led me to take a voyage in a Coolie ship," (sic) at random.
Adding the 560 words of the Introduction former and 2448 words from the new chapter, Japan, to the word count established above for "Coolie Traffic and Kidnapping" brought the total for “Don Aldus, the Rover” to 74,884 words. The error rate is right around 6%.
Figure 13 (left): Cover illustration for "Don Aldus, The Rover." Published 1886.
In "Coolie Traffic and Kidnapping" the emphasis in the prose Preface is on the horrifying story of human trafficking in enslaved Chinese workers. Not so in the second version.
The Preface of “Don Aldus, the Rover” is, instead, poetic. It is comprised of two short stanzas of verse. The first one, “To My Critics," is an admonition not to dismiss the text before giving it a careful review. The second verse, “To My Readers,” lightly suggests that the book will amuse, instruct, or at a minimum, help pass the time.
The freshly added Introduction doesn't address human trafficking, either. It speaks to other, would-be rovers and urges them to observe themselves as closely as the wide world they hope to discover.
Otherwise, both books display the identical text. As noted earlier, Don Aldus never appears in the text of"Coolie Traffic and Kidnapping." Aldus does not appear “Don Aldus, the Rover” either.
What is a reader to think? You buy “Don Aldus, the Rover,” it even includes an illustration of Don Aldus, but the ostensible hero never makes an appearance in the text. At least, not by name. The protagonist remains "Mr. D."
Look at the book’s cover. Isn’t that gent, hand on sword, foot on the cannon’s carriage, a ship's captain? After all, the author is listed as "CapT. George D. Donald". And the word Capt. virtually touches the gent’s hat.
Now compare that image to the man identified as Don Aldus in the corresponding illustration on the flyleaf. There is, wouldn’t you agree, a close resemblance?
After breakfast says Mr. D, “we came on deck to take one more look at the land ere we lost it.” A paragraph later, his tone is melancholy.
This is not the reminiscence of a young man, say, an apprentice seaman. Thus speaks an adult Englishman of his first journey far from home by ship. But what experienced sailor leaves England for the first time - England, the center of a far-flung military and commercial empire connected solely by world’s oceans - as an adult? It seems unlikely.
Then again, what professional seaman - what captain - tells a tale that has him unable to stand on his own two feet in heavy seas?
True, not all captains are ship's captains, after all. Then again, there is no clear indication in the text that Mr. D. had served his country as a military man, either.
Would an experienced English soldier or sailor describe his weapon so variably inside of six paragraphs? Or would he stick to simpler prose?
Then, too, the protagonist describes himself not as a man of steely nerve and martial experience, but as a soft-hearted intellectual, certain that education would eventually cure most social ills. He has other remarkably liberal opinions, too.
In any case, Mr. D, the inexperienced traveler of the chapter, "My Voyage to Australia and its Consequences," has become quite the opposite by the time he decides, impulsively, to chaperon a boat-load of coolies headed to slavery in Peru per the Preface of "Coolie Traffic and Kidnapping."
He has visited Australia, China (Hong Kong), traveled the Mediterranean with stops at Athens and "Salonica" (Greece), to Constantinople (modern Istanbul, Turkey), and sailed north to Odessa (Ukraine) via the Black Sea.
So Mr. D - Don Aldus? - seems to be an Englishman, aged 30 or older at the point he begins his journal. As the first book was published in 1876 - several years after it was written - Don Aldus was likely born about 1840, give or take a few years.
Inconsistencies abound. Our peripatetic protagonist, a world traveler in an age of sea travel, as noted above, describes himself as “nautically incompetent” midway through the text. ("Our passage down the China Sea." Page 130).
Yet, by 1886 when “Don Aldus, the Rover” is published, its author - a Geo. D. Donald - had risen to the rank of captain.
While recounting the events on his first trip away from England, Mr. D described a fateful conversation between the captain and the first mate of the ship he took to Australia in the third person. (My Voyage to Australia and its Consequences. Pages 71-72.) But he then skipped to the first person plural, as if he had been a member of crew instead of a passenger.
“‘What can we do?‘ said the fellow (the captain).
Apparently, McCorquodale & Co., the book’s publisher, didn’t have an editor proof the text before it was published.
Our protagonist demonstrates the insights of an alert, widely travelled and equally well-read individual, even though he never mentioned his own educational background. He quotes Shakespeare. He knows enough about Chinese mythology to reference Pwann Koo, the “first man," of Chinese mythology. He is conversant with Siddartha Gautama, his place of birth and heritage. In an aside, he tosses off the approximate height of “Fusiama,” (Mount Fuji).
References to Socrates, Jupiter and other classical luminaries are strewn throughout the text. Mr. D even uses a bit of French (“on dit”) and incorporates multiple handfuls of verse.
This does not read like the conversation of a working stiff. Never once is the cost of his travel or accommodations worthy of mention.
That summarizes Mr. D. But what can be gleaned about George D. Donald, assuming that CapT. George D. Donald was not itself a pseudonym?
Why did he publish the same book twice, under different names and titles? What compelled him to use a pseudonym in the first place?
For that matter, why is every person addressed by name, and each ship that Mr. D referred to, only identified by a first initial in Donald’s book(s)? Privacy?
One possible answer to the preceding question is suggested by the text itself. At the outset of the book, we learn that a vessel flying the flag of England will shortly be loaded with coolies intended for the slave trade. But that was illegal!
"Our naval friend immediately turned round and declared such to be impossible, as he had observed the free and proud ensign of old England flying at her flagstaff this morning, and such trade was considered almost slavery by the British powers that be, and not permitted under the flag.
Isn’t it possible that the English captain of the (American-built) coolie ship, with whom Mr. D later travelled and became friendly, the crew and the ship's owners could have been targets of prosecution under English law, or other valid courts of jurisdiction in which the ship had sailed with its cargo of prisoners?
Maybe, if they could be identified! For that matter the author, too, might have been subject to such laws, if he could have been identified.
Conclusively identifying the author and substantiating the "facts" described in the text of Donald’s book(s) was not made easier by his purposeful omission of exact dates, ships' names and full surnames in his text(s).
George and Donald being common English and Scotch names, attempting to find a particular George D. Donald, even with an estimated birth date range, was a significant challenge.
I was forced to sift details in hopes of uncovering a tell-tale shard.
–Mr. D departed London, England, May 18, year unknown, on a trip to the British colonies of the Far East.
–He traveled by "iron clipper."
–Other passengers, male and female, had also booked passage.
Other clues in the text suggest that Mr. D’s Australian voyage occurred in the late 1860s or early 1870s.
1. "Coolie Traffic and Kidnapping" was published, in London, England, in 1876.
2. In the Preface of "Coolie Traffic and Kidnapping," Mr. D states that the book was written several years earlier.
3. Both books include the chapter, "We sail for Macao, our place of charter." (sic) It details the refitting a clipper ship to house a cargo of coolies, destination: Peru. Coolie trafficking out of the port city of Macau - then under Portuguese control - ended at the start of 1874. 14 Thus Mr. D’s visit clearly predated the cessation of coolie trafficking from Macau.
4. In the chapter, "My voyage through the Mediterranean" (Page 143), the author mentions seeing the Queen of Greece. "The Queen — whom I had the satisfaction to see closely — (sic) is a lovely creature of middle height, with more of the Romano-Greek than the Russ about her."
Consequently, Mr. D must have departed London (prior to reaching Australia and Hong Kong) and arrived in Peru between 1867 and 1874.
The next clue appeared in the form of an extended and dramatic monologue. Mr. D regales the ship’s first mate (aka, chief officer - a position subordinate only to the ship’s captain), Mr. N, with a story of his disastrous first voyage to the colonies - that is, his trip to Australia.
About two months after departing London, on July 14th, 18__ a gale that battered his ship for three (eternal) days. The ship - unnamed - eventually lost all three of its masts; the passengers’ berths were flooded and the ship barely avoided sinking.
The full story required five full pages in the original text. A few key scenes follow. Ultimately, these details helped identify the exact ship in question and the presumptive author of these books.
"At eight o'clock in the evening of the above date we were running before a furious storm, accompanied by fierce squalls and hail, while the sea came rolling on like living mountains, a sure sign at all times that the gale will be long and furious.
"At midnight the chief officer was lashed, with two men, at the wheel, guiding the vessel before the tempest and the sea, our compass being useless, while the bold commander was moving about the saloon (endeavouring to put on a commanding countenance for the occasion) to " cheer" the excited passengers, instead of being on deck attending to the wreck of matter which had already commenced there.
"We all set cheerfully to work, bailing out the water with vessels of every description, but before we got well warmed at our work she shipped another sea, swept the deck of everything, took a life-boat from the starboard quarter, and brought down the lower main topsail yard from the collar of the main stay, where it had been dangling since fifteen minutes past mid-night, bringing also the stay with it in its fall across the ship, where it broke in two, just as we were being driven — with the ladies in their night-dresses — from the inundated saloon to take what shelter the port after-cabin could afford. Speedily the saloon became a total wreck, and all our ready cash, letters of credit, valuables and clothing, battered up into a heterogeneous mass.
This description summarizes only the first 12 hours of the storm. Eventually the storm and the attendant dangers abate just long enough for the sailors to lead the passengers to the other end of the ship.
“Soon, however, the good ship recovered herself, in some measure at least — sufficiently to enable the sailors to convey us to the forecastle where (to our great surprise) nothing whatever had been disturbed, while all night long such sufferings were being experienced in the saloon.
“The sailors immediately gave up their beds to the ladies and children, while boxes were opened and dry clothes served out to every one of us, until none remained for themselves.
The preceding paragraphs indisputably place Mr. D on board the ship as a passenger. Although this was earlier implied, the description here is vivid and explicit.
He then detailed a second night of terror.
“As night closed in fervent were the prayers offered up for deliverance from further calamity.
“Thick darkness shrouded every one from sight. The sea ran high; and rain had joined its battering music with the wind and measured clanking of the pumps, when suddenly a ‘crack’ was heard; the mainmast tottered and with a crash like thunder fell on board.
“The falling of the mast having smashed our pump-levers, we soon prepared a primitive wooden lever to serve the purpose of pumping.
“Ere the rising of another sun, the mizenmast rolled down, breaking below the poop deck, tearing and smashing everything to atoms in its track, finishing up by landing over the starboard quarter within a few feet of our steering gear."
Meanwhile, all aboard - passengers and crew, men and women - are manning the pumps. Here comes the third night of the storm.
“As night again drew on and darkness set its "signet on the flood" the storm if possible increased as if determined to drag the last ray of hope from every heart by howling a (seeming) sepulchral melody over us and, as it were, preparing a funeral requiem for ourselves and gallant crew.
As luck would have it, in searching genealogy websites for mid-19th century England, I had earlier encountered the name George Donald Donald. That particular permutation of George + Donald and the associated dates hadn’t appeared in the archive of the Times of London, nor had Google proved helpful. But I tried again using the Elephind.com website.
That search eventually led to articles discussing and reporting the disaster that befell a ship named the Dallam Tower. The connection? The first mate and second-in-command of the ill-fated ship was one George Donald Donald.
The following table picks selected elements from Mr. D’s descriptions and compares them to statements found in newspaper reports of the Dallam Tower disaster.
Figure 17: Selected events described in the books, "Coolie Traffic and Kidnapping" and "Don Aldus, The Rover," and corresponding descriptions of Dallam Tower shipwreck events drawn from newspaper reports and other contemporary sources.
The parallels between Mr. D’s story and news reports regarding the Dallam Tower disaster are clear and persuasive. The story is the same.
The Dallam Tower story proved to be a sort of Rosetta Stone.
Figure 18: Display advertisement in The Times of London, on May 3, 1873. It lists the scheduled departure date of the iron clipper, Dallam Tower, traveling from London to Otago, New Zealand.
However intriguing the newspaper reports that correspond to Mr. D’s tale of disaster, the details that he omits are far more telling. The first of many twists in this story is provided by what the narrator doesn’t share.
–George Donald Donald, was publicly heralded as the Dallam Tower’s savior by many of its passengers.
In our own age of self-aggrandizement, it is shocking to find an author suppressing facts that might otherwise have assured him of recognition and increased sales.
A) Foremast. B) Mainmast. C) Mizzenmast.
Figure 20: Illustration of the Dallam Tower having lost all three of its masts.
This letter identifies George Donald Donald as a hero. Surely, the captain of the Dallam Tower, John S. Davies, would have noted the glaring absence of his own name! This omission must have amounted to a very public affront.
Mr. D also fails to mention that some survivors of the Dallam Tower took yet another step.
–Multiple Dallam Tower passengers presented a neglect of duty claim against the Dallam Tower captain to the Victorian Steam Navigation Board. (Melbourne, Australia, is in the Australian state of Victoria.) Figures 21 - 23, below, display newspaper reports of the official inquiry.
3. That in trying to heave the ship to (turn it), the captain had the helm down and the braces were fouled and unattended. No time was allowed for clearing the fouled braces.
4. On the last day of the storm, while the main hatch was smashed in, the captain stayed in his bunk and tried to dissuade sailors from obeying the orders of the chief officer. Had the hatch been left open, seawater might have flooded the ship with potentially disastrous circumstances.
Captain Payne: From the 14th to the 18th, taking all the circumstances into consideration, did Captain Davies not do all that a captain should have done?
Figure 21: Portions of an Evening News (Sydney, Australia), article dated September 9, 1873.
of the testimony of chief officer, George Donald Donald (labeled Parts 4-6).
Is it any wonder, then, that the survivors thought that George Donald Donald had saved their lives?
Figure 22: Additional portions of an Evening News (Sydney, Australia), article dated September 9, 1873. The article reports on the official Victorian Steam Navigation Board inquiry into charges filed against Captain Davies of the Dallam Tower. Parts 4-6 display portions of the testimony of chief officer, George Donald Donald.
The Argus article of September 6th (See Figure 23, Part 2) suggests that the first mate’s testimony was key to this conclusion.
Figure 23: Portions of an article from The Argus (Melbourne, Australia) dated September 6, 1873. The article reports on the testimony to and the decision of the official Victorian Steam Navigation Board regarding charges filed against Captain Davies of the Dallam Tower by some passengers. In this article, Part 1 lists the charges. Part 2 shows that George Donald Donald’s testimony played a key role in the decision of the board. Part 3 reports that Captain Davies was found culpable. However, the board only issued a “caution,” a relatively minor form of censure.
Nor is that all. Mr. D also passed over Captain Davies’ attempt to vindicate - or perhaps avenge - himself at the expense of his first mate.
Seven weeks later, Captain Davies charged George Donald Donald, with willful disobedience of a command.
The ship’s third officer “on being examined, admitted that the captain had told him not to take any notice of the (first) mate’s orders.” This is, by the way, the same invidious conduct described in the Dallam Tower passengers’ fourth charge against Captain Davies. That charge had been dismissed for want of first-hand confirmation.
When Mr. D described the nameless captain of his disaster narrative as “the most wretched specimen of incompetent imbecility possible to be found,” was he being kind?
This would be the end of the Dallam Tower story for the purposes of this essay were it not for the fact that the drama of the Dallam Tower disaster captured the imagination of succeeding generations as only a few stories ever do.
Oddly enough, however, those who chronicled the story repeatedly misreported the name of the Dallam Tower’s chief officer.
In 1924, 51 years after the Dallam Tower arrived in Melbourne, Sir Henry Brett, author and publisher, published a dramatic description of the same events in his book, "White Wings. Volume I". Brett shared his motive for revisiting the story in a preface.
The court suspended Davies' captain’s certificate for three years.
George Donald Donald’s high opinion of himself was implicitly confirmed by the 1877 court of inquiry. It held the first mate equally responsible for the wreck.
Had Captain Davies’ first mate on the Queen Bee proven as capable as the first mate of the Dallam Tower, perhaps the second wreck might have been averted.
–Demonstrated extraordinary modesty–reticence, really–regarding his own heroic efforts to save the Dallam Tower.
–Sacrificed his credibility as a reporter of "facts" by delivering a completely fabricated image of himself and his status while on the Dallam Tower.
–Completely rewritten the sequence of events to suit his needs.
The preceding assertion only became evident after it was possible to identify and date the Dallam Tower disaster. Per the books’ narrative, Mr. D gave his version of the story in Macau, in 1866. (We discover signs of mutiny amongst the Coolies. Page 95). Mr. D described events from his own past that would not take place until 1873.
A second date sequence discrepancy confirms that the first was no simple mistake. Later in the narrative, Mr. D, now well on his way to Peru, tells Mr. N about a different voyage he had taken through the Mediterranean (My voyage through the Mediterranean. Page 143).
During that trip, Mr. D had visited Greece and seen its young, Russian-born queen. But, since she did not marry George I, the King of the Hellenes, until the following year, in October 1867, we have caught our narrator living in the future, yet again.
Perhaps the promised “collection of facts suited to the time,” described in the Preface of "Coolie Traffic and Kidnapping" (See Figure 8) was not meant to imply that the whole narrative was entirely true. After all, again and again, throughout the text, the author highlights the truth of individual incidents, just not all of them.
A page later, Mr. D. reconfirms the veracity of the anecdotes just shared and stresses the reliability of those to come.
Mr. D is, in effect, tagging narrative elements for his readers. When he writes that one part or another is true, he implies that other, untagged narrative elements are not - entirely - true. The story of his Mediterranean cruise is true and reliable (even if the time sequence is not). The “varying incidents” of his voyage to Peru, he says, will also be true.
That insight prompted another review of the Mr. D’s Dallam Tower disaster story. He did not describe it as “true.” Still, as shown in Figure 17, much of Mr. D’s version corresponds closely to the facts reported at the time in the press.
A strict, legalistic reading of Mr. D’s assurance at the outset of "We arrive at Anger" (cited above) compels the conclusion that the veracity of the role and identity of the narrator, himself, have not been guaranteed. We have only been advised that the “incidents” are true, not the rest of the narrative. Thus are differences between “principle” and practice, in life as in literature, bridged.
On arrival in Peru, Mr. D found that the involuntary contractors he traveled with were keenly needed.
However satisfying that result might have been to the owners of the ship and the owners of the contracts, respectively, the “cargo” was not thrilled.
The apparent anxiety exhibited by the Chinese prior to disembarkation (and distribution) was, as Mr. D saw the situation, utterly unnecessary. The worst was over.
The narrator needed only this single paragraph to describe his two-month stay in Peru. (By comparison, he dedicated 210 pages to the 3.5 month voyage that preceded it.) Mr. D’s penchant for touring the countries he visited (such as Japan and Greece) suggests that he would have done the same in Peru. Presumably, then, his relatively positive conclusion reflected significant personal experience.
There were, in fact, many reports in the press of that period describing the dismal situation of indentured Chinese laborers in Peru and elsewhere.
A July 26, 1869 article in The New York Herald, "The Chinese Labor Question." addressed the issue forthrightly.
In October of the following year, The New York Herald published a second article addressing the issues associated with Chinese emigration entitled, “That Heathen Chinee.” It reports mortality rates that amount to slaughter.
"Statements, not very trustworthy, however have come to the author from Havana (Cuba) declaring that there were less than 74,000 coolies on that island January 1, 1870. He cannot readily accept this account, because it does not seem possible that so large a proportion as one-half have died since their arrival."
The subtitle of a July 1873 New York Times article, The Coolie Trade, by itself suggests the status of Chinese expatriates in Peru: The Slavery Of The Present.
Figure 25: Portions of an article from the New York Times. July 19, 1873.
As noted earlier, "Coolie Traffic and Kidnapping" was most likely written during or just after the period described in the New York Herald and New York Times articles. Surely the murderous conditions in which indentured Chinese then worked in Peru ought to have made a strong impression on the worldly, sensitive Mr. D.
It is particularly noteworthy that the lot of the Chinese working on the infamous Chincas Islands, also called the “guano islands,” goes unmentioned by Mr. D. As noted earlier, the mortality rate for Chinese laborers on these islands during the 1860s and 1870s was estimated at over 50 percent.
According to the New York Herald article, “That Heathen Chinee.,” Chinese citizens, having generally concluded that the “work abroad” opportunities on offer were not worth the risk, had to be recruited by other means.
"Then began the system of kidnapping coolies, purchasing, chaining, starving, and, as it may appropriately be called, murdering, which for twenty years shocked the feelings of all human persons and cast a dark blot upon the Portuguese and Spanish escutcheons that can never be expunged. Fathers and mothers sold their sons. ... Banditti brought in their male and female prisoners and sold them in lots to the traders, for which sums never exceeding ten dollars per person were thankfully received.
"The traders organized bands of night thieves whose business it was to steal into cabins of the laborers and carry on board the ship the father and sons, and sometimes the whole family. ... Then ships ... were ... sent up the bay's and rivers to fall suddenly upon the unsuspecting inhabitants of some rural district. ... Old men were seized in the rice fields, boys in the schoolrooms, young men in the shops, and carried by force to the suffocating holds of the vessels at Macaow. Yet this dreadful traffic in coolies still goes on.
Could money have had anything to do with George Donald Donald’s reluctance to fully report on the Chinese laborers' experience in Peru? After all, Mr. D never mentions the value proposition represented by the ship’s cargo. The omission is noteworthy.
The Charleston Daily News article cited immediately above, also reports on the profitability of the coolie trade.
A year earlier, a report in The New York Herald of July 26, 1969, described a similar price range, under a sub-section of the article, The Chinese Labor Question, entitled Cost and Profit.
Mr. D travelled to Peru on a ship “fitted up” for “about 700” coolies. 44 The values reported by the Charleston Daily News suggest his voyage could have generated a gross profit of roughly $140,000.
The same article put the cost of feeding a single coolie for a three-month voyage at $8 to $10, total.
A modern historian calculated the net profit of an average coolie ship of the period.
So Donald probably misrepresented his status on the coolie ship, too. Why would a sailor with the highest certification available in the English merchant marine fleet - Extra Master - sacrifice 3.5 months of income to play the role of a curious tourist with a hankering for a slave ship adventure? 47, 48 Especially, when he could make the same trip pay?
Still, proof that Captain George Donald Donald was the captain of the coolie ship - a slave ship - featured in either "Coolie Traffic and Kidnapping" or “Don Aldus, the Rover,” or any other, for that matter, is not available.
In the course of research, the cloud of mystery that surrounded Don Aldus lifted to reveal a more nuanced yet incomplete picture of George Donald Donald.
age 45, husband of Mary A. G. Donald.
Donald seems to have switched careers; he is now a commercial traveler, a traveling sugar salesman.
Whitton Road Twickenham.” Inserts display the “D” and “my” found in the text.
Do we have the right George D. Donald?
Curiously, the man compelled to count every word in his masterpiece, was, at least in his later years, given to misspelling simple words and identifying the misspelled portion with an underline.
Donald’s will provides two examples.
found in this text. Compare them to those in Figure 30.
Can we be sure that the captain wrote his own “last will and testement?” Compare the capital cursive D’s in the will to the capital cursive D in the (Don Aldus) journal inscription at left (Figure 28). They are virtually identical. For that matter, the cursive D in the signature that appears beneath the drawing of Don Aldus (Figure 14) is a close match for the cursive capital D’s in the will and in the journal inscription.
In the will, the word “my” appears twice in the second sentence. Captain Donald’s approach to a cursive y, in both cases, resembles a cursive z. The journal inscription features the very same styling. Note the forward leaning slant of both texts.
The same hand surely wrote them all.
Figure 29: Detail from the handwritten “Last Will and Testement of George Donald Donald of Newstead Whitton Road Twickenham.”(Highlights added for emphasis).
This pattern is (inconsistently) duplicated in the (Don Aldus) journal.
In Figure 30, for example, “Superencumbant” is underlined. So is “Spectaclle.” But other underlined words are spelled correctly, such as “Staircase”.
None of the words misspelled in the will or in the journal are also misspelled in the captain’s books.
The closer you look at this, the odder it gets. In order to create the alphabetical compilation of words used in his book, the captain had to reference the book, itself. That might explain why certain words - words used only once or twice in the entire text, but in close proximity to each other - appear listed on the same page of the journal.
Sanguinary and Superincumbent both appear only once, on page 132, in the text(s). Spectacle is used six times, and appears on pages 130 and 134. Sewn is only used once and appears on page 133.
Syra, on the other hand, appears just once, too, but on page 146.
Donald must have flipped through his book to identify words for inclusion in his alphabetical lists. But if so, how could he have misspelled words that are spelled correctly in his published book?
Perhaps he used an uncorrected manuscript for this purpose. Spelling errors in the manuscript would have been transferred to his journal. But why would Donald use an uncorrected manuscript when a published version – with correct spellings - was available in the form of CR&K?
Clearly, someone helped Donald correct the numerous misspellings. He had some sort of editorial support, after all.
The world described in the pages of Coolie Traffic and Kidnapping and Don Aldus The Rover is almost unrelievedly dismal.
Feigning friendly camaraderie, Chinese kidnappers lured both their high- and low-born Chinese prey into handsome facilities with drinks and offers of hospitality, from which only the kidnappers will exit with their liberty plus a handsome finder’s fee. Once trapped inside such a “barracoon,” threats and various levels of abuse invariably convinced the captives that any fate was preferable to an extended stay. They accepted new names and agreed to acknowledge that they had “voluntarily” accepted contracts abroad when examined by a government inspector.
This farce was standard procedure in Macau, under Portuguese stewardship.
When we first meet Mr. D, the tour guide embedded within the text(s), his understanding of coolie trafficking is credibly naive.
" ‘Well, sir, I believe there is some such farce as you refer to gone through ; but I am assured upon reliable authority that two-thirds of the poor things are decoyed from home and sold into the ‘barracoons,' after getting inside the gates of which the curtain drops over the victims.’"
"’Truly,’ said the doctor; ‘and the inquisitive eyes of the world fail to discover the coercive enormities committed within.’"
After a short trip from Hong Kong, Mr. D reaches Macau aboard the clipper ship that will be refitted to carry slaves to Peru. While there, he visits one of the notorious buildings - a “barracoon” - used to trap and hold those who will shortly be sold into slavery. His tour guide is a "friend."
“On Saturday morning a friend conducted me through one of the barracoons, which I found to be a large, commodious, county-jail-looking structure.
The “voluntary" laborers came aboard the ship not as passengers but as merchandize.
The ship was fitted out as a floating prison.
This was all perfectly legal as long as the ship sailed under the proper flag. (Note: Merchant ships then, as today, were subject to the rules of the country they are registered in. The “flag” of the country of registration determines what laws apply on the ship and whether those laws are enforced.) More to the point, it was necessary.
Captain Donald’s book(s) are presented, fundamentally, as a report on and protest against the abduction and enslavement of Chinese citizens of the period (1860 - 1890). Yet, as described, there is strong reason to believe that the author’s first-hand knowledge of the “coolie trade,” as it was widely called at the time, reflects his active participation in the business.
–fall victim to the hypocrisy implicit in the author’s unwillingness to reveal a true picture of the events, people and places he purports to have observed. This seems especially odd and inappropriate given the many newspaper articles of the period that reported on the abusive treatment of coolies in Peru, at least.
Is it possible that the author was unaware of the many newspaper articles of the period that discussed the very practices he described or omitted? Of course.
Nonetheless, in the court of literary license, ignorance of “current” affairs pertinent to one’s primary theme is not an acceptable excuse. This may explain, in part, why neither "Coolie Traffic and Kidnapping" nor “Don Aldus, the Rover” seem to have made much of an impression on the culture of the time nor resonated with their readers.
So, to cite yet another example, The Times (of London), published a description of the nauseating abuse of coolies on board ships headed to Peru, in its July 29, 1871 issue, page 9. This occurred five years before the publication of "Coolie Traffic and Kidnapping" (in 1876). The following is an excerpt.
“A series of documents lately laid before the House of Commons reveals the existence in the Southern Pacific of horrors rivalling those presented by the African Slave Trade in its worst phases. It appears that there is a constant traffic between certain European ports in China and the Western coast of South America in Chinese Coolies, nominally shipped as voluntary and indentured labourers, but really as helpless and as subject to brutal treatment as any slaves. Peru has especially resorted to this source of labour supply, and since the abolition of slavery in that Republic, sixteen years ago, many thousands of Coolies have been imported from China.
Figure 32: Two illustrations from "Don Aldus, The Rover."
But, then again, if the stated objective was the delivery of able-bodied slaves to a far distant location for profit, optimization of the conditions of confinement is as logical as it is essential. Is there any form of mass transport to a gulag, concentration camp, or forced labor camp that would not benefit from such an approach?
Still, Mr. D’s description of the then common approach to floating imprisonment makes the regime instituted in the American-built ship he took to Peru (involving frequent cat-o-nine-tail lashings replete with blood gushing backs and nearly dead victims) a dramatic improvement.
“I have visited, not one but, several such ‘coal scuttles,’ on board of which I dare not embark my sow, where the 'Cruelty to Animals Act' might be in force; knowing this fact, dear reader, you will cease to wonder at the frequent mutinies of Coolies, but will ask those tender-hearted white men, dealers in human bones, why they charter such miserable rafts of rottenness and stench to carry the highest order of animal yet discovered.
Despite their many faults, these books are artifacts of the period and windows into the minds of those involved in the coolie trade. Donald delivered ample evidence of a wounded conscience. He tried to share what he had seen and perhaps what he had done. The product of a twisted culture gave us these twisted tales.
It is hard to overlook the fact that Donald refused to insert himself into "Don Aldus, The Rover," even though he published his first book under his own name. Why?
Is it possible that he thought the illustrated version might succeed as a fictional narrative where the first version failed as non-fiction? Retaining the original text must surely have reduced the cost of republishing to a relative pittance.
Earlier, I suggested that certain identification of the participants in the slave trade might have been subject to prosecution under British law. It is also possible that English libel laws of the period might have given the author pause.
Other, earlier cases would likely have been known either to the author or to his publisher, who would also have been at some risk.
Aside from any possible fear of possible legal repercussions, Donald must have felt sufficient shame over his personal involvement in the coolie trade or other activities that he felt obliged to misrepresent the awful treatment of Chinese workers in Peru. Only shame, it seems to me, would explain why an otherwise careful observer of the human trafficking trade would boldly assert that abducted coolies were better off in Peru than in their own home country–when the world already knew the truth.
So far as I can tell, no one else has yet remarked upon or closely examined the issues raised by "Coolie Traffic and Kidnapping" and "Don Aldus, The Rover." This shouldn't be surprising as their authors and content are mere footnotes in world history. But what telling, troubling and provocative footnotes they are!
Cover Art by Glenn S. Michaels. 2015.
8. Coolie Traffic and Kidnapping, by Don Aldus, 1873, McCorquodale & Co., Ltd. “The Armoury” See: https://archive.org/stream/coolietraffican00aldgoog/coolietraffican00aldugoog_djvu.txt.
"Hypergraphia: The driving compulsion to write; the overwhelming urge to write. Hypergraphia may compel someone to keep a voluminous journal, to jot off frequent letters to the editor, to write on toilet paper if nothing else is available, and perhaps even to compile a dictionary. Hypergraphia is the opposite of writer's block."
13. Don Aldus, The Rover, By Capt. Geo. D. Donald; Chapter 1: Japan, Page xiii. "Next to the Indian Palanquin, recommend me to the Jinrikisha of Japan for ease and comfort..." On page xii, the author expounds upon the birthplace and significance of "Siddartha Gautama ('The Holy')" aka Buddha with a conversance that suggests personal experience of the area or a strong interest in religion and history.
15. GRAND DUCHESS OLGA CONSTANTINOVNA OF RUSSIA. Project Gutenberg Self-Publishing Press, World Public Library Association. Retrieved July 24, 2015, from: http://self.gutenberg.org/articles/Grand_Duchess_Olga_Constantinovna_of_Russia. Sourced from World Heritage Encyclopedia™ licensed under CC BY-SA 3.0. World Heritage Encyclopedia™ is a registered trademark of the World Public Library Association, a non-profit organization.
38. "Records uncovered by historians in the People's Republic of China, using Chinese records, reveal that from 1880 to 1885, a period when many of the coolies sent to Cuba and Peru during the height (also the last thrust) of the coolie trade in the first half of the 1870s would have completed their original contracts, only 1,887 of the Chinese managed to make their way back home to China. This was an insignificant number, given the over 100,000 who left China in 1870-74 alone for Cuba and Peru."
45. The actual number of Chinese citizens (coolies) on board is unclear. The author speaks of 700 in on pages 30 and 44 and 650 on page 124. As the new of crew members is reported at 56 (page 124), it is possible that some confusion resulted.
46. American Merchants and the Chinese Coolie Trade 1850-1880: Contrasting models of human trafficking to Peru and the United States. Schultz, Austin. Department of History seminar paper, Western Oregon University, 2011. Page 23, citing: Upton, James Henry. American involvement in the Chinese coolie trade 1848-1882. Thesis (M.A.)--Auburn University, 1970. Page 19.
49. Master mariner. Wikipedia.org. Retrieved July 20, 2015, from https://en.wikipedia.org/wiki/Master_mariner: “The Extra Master's qualification, which was discontinued in the 1990s, used to be the highest professional qualification and it was the pinnacle for any mariner to achieve.” This page was last modified on 7 November 2014, at 17:52.
Original data: Scotland. 1861 Scotland Census. Reels 1-150. General Register Office for Scotland, Edinburgh, Scotland. The 1861 Census for Scotland was taken on the night of 7/8 April 1861.
57. 1901 England Census for George D Donald. Source Citation: Class: RG13; Piece: 1187; Folio: 117; Page: 20. : Ancestry.com. 1901 England Census [database on¬line]. Provo, UT, USA: Ancestry.com Operations Inc, 2005. Original data: Census Returns of England and Wales, 1901. Kew, Surrey, England: The National Archives, 1901. Data imaged from the National Archives, London, England. Retrieved July 24, 2015, from: http://search.ancestry.com/cgi¬bin/sse.dll? indiv=1&db=uki1901&h=1772286.
61. The irony of the unintentional pun has not escaped the essayist.
63. James McNeill Whistler, Beyond the Myth, by Ronald Anderson & Anne Koval, Carroll & Graf Publishers, Inc. New York, 1994. Whistler v Ruskin; Pages 215 -227.
A well written article. I look forward to following your ongoing research into this important and under-researched topic.
I love you. But you're nuts! | 2019-04-22T02:20:15Z | http://gsmichaels.blogspot.com/2015/05/don-aldus-man-of-mystery-literary.html |
In common use, the term “web tracking” refers to the process of calculating or assigning unique and reasonably stable identifiers to each browser that visits a website. In most cases, this is done for the purpose of correlating future visits from the same person or machine with historical data.
Some uses of such tracking techniques are well established and commonplace. For example, they are frequently employed to tell real users from malicious bots, to make it harder for attackers to gain access to compromised accounts, or to store user preferences on a website. In the same vein, the online advertising industry has used cookies as the primary client identification technology since the mid-1990s. Other practices may be less known, may not necessarily map to existing browser controls, and may be impossible or difficult to detect. Many of them - in particular, various methods of client fingerprinting - have garnered concerns from software vendors, standards bodies, and the media.
To guide us in improving the range of existing browser controls and to highlight the potential pitfalls when designing new web APIs, we decided to prepare a technical overview of known tracking and fingerprinting vectors available in the browser. Note that we describe these vectors, but do not wish this document to be interpreted as a broad invitation to their use. Website owners should keep in mind that any single tracking technique may be conceivably seen as inappropriate, depending on user expectations and other complex factors beyond the scope of this doc.
We divided the methods discussed on this page into several categories: explicitly assigned client-side identifiers, such as HTTP cookies; inherent client device characteristics that identify a particular machine; and measurable user behaviors and preferences that may reveal the identity of the person behind the keyboard (or touchscreen). After reviewing the known tracking and fingerprinting techniques, we also discuss potential directions for future work and summarize some of the challenges that browser and other software vendors would face trying to detect or prevent such behaviors on the Web.
We believe that the availability of any one of these mechanisms is sufficient to reliably tag clients and identify them later on; in addition to this, many such identifiers can be deployed in a manner that conceals the uniqueness of the ID assigned to a particular client. On the flip side, browsers provide users with some degree of control over the behavior of at least some of these APIs, and with several exceptions discussed later on, the identifiers assigned in this fashion do not propagate to other browser profiles or to private browsing sessions.
The remainder of this section provides a more in-depth overview of several notable examples of client tagging schemes that are within the reach of web apps.
HTTP cookies are the most familiar and best-understood method for persisting data on the client. In essence, any web server may issue unique identifiers to first-time visitors as a part of a HTTP response, and have the browser play back the stored values on all future requests to a particular site.
All major browsers have for years been equipped with UIs for managing cookies; a large number of third-party cookie management and blocking software is available, too. In practice, however, external research has implied that only a minority of users regularly review or purge browser cookies. The reasons for this are probably complex, but one of them may be that the removal of cookies tends to be disruptive: contemporary browsers do not provide any heuristics to distinguish between the session cookies that are needed to access the sites the user is logged in, and the rest.
Some browsers offer user-configurable restrictions on the ability for websites to set “third-party” cookies (that is, cookies coming from a domain other than the one currently displayed in the address bar - a behavior most commonly employed to serve online ads or other embedded content). It should be noted that the existing implementations of this setting will assign the “first-party” label to any cookies set by documents intentionally navigated to by the user, as well as to ones issued by content loaded by the browser as a part of full-page interstitials, HTTP redirects, or click-triggered pop-ups.
Compared to most other mechanisms discussed below, overt use of HTTP cookies is fairly transparent to the user. That said, the mechanism may be used to tag clients without the use of cookie values that obviously resemble unique IDs. For example, client identifiers could be encoded as a combination of several seemingly innocuous and reasonable cookie names, or could be stored in metadata such as paths, domains, or cookie expiration times. Because of this, we are not aware of any means for a browser to reliably flag HTTP cookies employed to identify a specific client in this manner.
Just as interestingly, the abundance of cookies means that an actor could even conceivably rely on the values set by others, rather than on any newly-issued identifiers that could be tracked directly to the party in question. We have seen this employed for some rich content ads, which are usually hosted in a single origin shared by all advertisers - or, less safely, are executed directly in the context of the page that embeds the ad.
Local Shared Objects are the canonical way to store client-side data within Adobe Flash. The mechanism is designed to be a direct counterpart to HTTP cookies, offering a convenient way to maintain session identifiers and other application state on a per-origin basis. In contrast to cookies, LSOs can be also used for structured storage of data other than short snippets of text, making such objects more difficult to inspect and analyze in a streamlined way.
In the past, the behavior of LSOs within the Flash plugin had to be configured separately from any browser privacy settings, by visiting a lesser-known Flash Settings Manager UI hosted on macromedia.com (standalone installs of Flash 10.3 and above supplanted this with a Control Panel / System Preferences dialog available locally on the machine). Today, most browsers offer a degree of integration: for example, clearing cookies and other site data will generally also remove LSOs. On the flip side, more nuanced controls may not be synchronized: say, the specific setting for third-party cookies in the browser is not always reflected by the behavior of LSOs.
From a purely technical standpoint, the use of Local Shared Objects in a manner similar to HTTP cookies is within the apparent design parameters for this API - but the reliance on LSOs to recreate deleted cookies or bypass browser cookie preferences has been subject to public scrutiny.
Microsoft Silverlight is a widely-deployed applet framework bearing many similarities to Adobe Flash. The Silverlight equivalent of Flash LSOs is known as Isolated Storage.
The privacy settings in Silverlight are typically not coupled to the underlying browser. In our testing, values stored in Isolated Storage survive clearing cache and site data in Chrome, Internet Explorer and Firefox. Perhaps more surprisingly, Isolated Storage also appears to be shared between all non-incognito browser windows and browser profiles installed on the same machine; this may have consequences for users who rely on separate browser instances to maintain distinct online identities.
As with LSOs, reliance on Isolated Storage to store session identifiers and similar state information does not present issues from a purely technical standpoint. That said, given that the mechanism is not currently managed via browser controls, its use of for client identification is not commonplace and thus may be viewed as less transparent than standard cookies.
HTML5 introduces a range of structured data storage mechanisms on the client; this includes localStorage, the File API, and IndexedDB. Although semantically different from each other, all of them are designed to allow persistent storage of arbitrary blobs of binary data tied to a particular web origin. In contrast to cookies and LSOs, there are no significant size restrictions on the data stored with these APIs.
In modern browsers, HTML5 storage is usually purged alongside other site data, but the mapping to browser settings isn’t necessarily obvious. For example, Firefox will retain localStorage data unless the user selects “offline website data” or “site preferences” in the deletion dialog and specifies the time range as “everything” (this is not the default). Another idiosyncrasy is the behavior of Internet Explorer, where the data is retained for the lifetime of a tab for any sites that are open at the time the operation takes place.
Beyond that, the mechanisms do not always appear to follow the restrictions on persistence that apply to HTTP cookies. For example, in our testing, in Firefox, localStorage can be written and read in cross-domain frames even if third-party cookies are disabled.
Due to the similarity of the design goals of these APIs, the authors expect that the perception and the caveats of using HTML5 storage for storing session identifiers would be similar to the situation with Flash and Silverlight.
All browsers expose the option to manually clear the document cache. That said, because clearing the cache requires specific action on the part of the user, it is unlikely to be done regularly, if at all.
Leveraging the browser cache to store session identifiers is very distinct from using HTTP cookies; the authors are unsure if and how the cookie settings - the convenient abstraction layer used for most of the other mechanisms discussed to date - could map to the semantics of browser caches.
To make implicit browser-level document caching work properly, servers must have a way to notify browsers that a newer version of a particular document is available for retrieval. The HTTP/1.1 standard specifies two methods of document versioning: one based on the date of the most recent modification, and another based on an abstract, opaque identifier known as ETag.
In the ETag scheme, the server initially returns an opaque “version tag” string in a response header alongside with the actual document. On subsequent conditional requests to the same URL, the client echoes back the value associated with the copy it already has, through an If-None-Match header; if the version specified in this header is still current, the server will respond with HTTP code 304 (“Not Modified”) and the client is free to reuse the cached document. Otherwise, a new document with a new ETag will follow.
Interestingly, the behavior of the ETag header closely mimics that of HTTP cookies: the server can store an arbitrary, persistent value on the client, only to read it back later on. This observation, and its potential applications for browser tracking date back at least to 2000.
Similarly to tagging users through cache objects, both of these “metadata” mechanisms are unaffected by the deletion of cookies and related site data; the tags can be destroyed only by purging the browser cache.
As with Flash LSOs, use of ETag to allegedly skirt browser cookie settings has been subject to scrutiny.
Application Caches allow website authors to specify that portions of their websites should be stored on the disk and made available even if the user is offline. The mechanism is controlled by cache manifests that outline the rules for storing and retrieving cache items within the app.
Similarly to implicit browser caching, AppCaches make it possible to store unique, user-dependent data - be it inside the cache manifest itself, or inside the resources it requests. The resources are retained indefinitely and not subject to the browser’s usual cache eviction policies.
AppCache appears to occupy a netherworld between HTML5 storage mechanisms and the implicit browser cache. In some browsers, it is purged along with cookies and stored website data; in others, it is discarded only if the user opts to delete the browsing history and all cached documents.
Note: AppCache is likely to be succeeded with Service Workers; the privacy properties of both mechanisms are likely to be comparable.
Flash maintains its own internal store of resource files, which can be probed using a variety of techniques. In particular, the internal repository includes an asset cache, relied upon to store Runtime Shared Libraries signed by Adobe to improve applet load times. There is also Adobe Flash Access, a mechanism to store automatically acquired licenses for DRM-protected content.
As of this writing, these document caches do not appear to be coupled to any browser privacy settings and can only be deleted by making several independent configuration changes in the Flash Settings Manager UI on macromedia.com. We believe there is no global option to delete all cached resources or prevent them from being stored in the future.
Browsers other than Chrome appear to share Flash asset data across all installations and in private browsing modes, which may have consequences for users who rely on separate browser instances to maintain distinct online identities.
SDCH is a Google-developed compression algorithm that relies on the use of server-supplied, cacheable dictionaries to achieve compression rates considerably higher than what’s possible with methods such as gzip or deflate for several common classes of documents.
The site-specific dictionary caching behavior at the core of SDCH inevitably offers an opportunity for storing unique identifiers on the client: both the dictionary IDs (echoed back by the client using the Avail-Dictionary header), and the contents of the dictionaries themselves, can be used for this purpose, in a manner very similar to the regular browser cache.
In Chrome, the data does not persist across browser restarts; it was, however, shared between profiles and incognito modes and was not deleted with other site data when such an operation is requested by the user. Google addressed this in bug 327783.
For example, it is possible to use window.name or sessionStorage to store persistent identifiers for a given window: if a user deletes all client state but does not close a tab that at some point in the past displayed a site determined to track the browser, re-navigation to any participating domain will allow the window-bound token to be retrieved and the new session to be associated with the previously collected data.
Another interesting and often-overlooked persistence mechanism is the caching of RFC 2617 HTTP authentication credentials: once explicitly passed in an URL, the cached values may be sent on subsequent requests even after all the site data is deleted in the browser UI.
In addition to the cross-browser approaches discussed earlier in this document, there are also several proprietary APIs that can be leveraged to store unique identifiers on the client system. An interesting example of this are the proprietary persistence behaviors in some versions of Internet Explorer, including the userData API.
Last but not least, a variety of other, less common plugins and plugin-mediated interfaces likely expose analogous methods for storing data on the client, but have not been studied in detail as a part of this write-up; an example of this may be the PersistenceService API in Java, or the DRM license management mechanisms within Silverlight.
Origin Bound Certificates (aka ChannelID) are persistent self-signed certificates identifying the client to an HTTPS server, envisioned as the future of session management on the web. A separate certificate is generated for every newly encountered domain and reused for all connections initiated later on.
By design, OBCs function as unique and stable client fingerprints, essentially replicating the operation of authentication cookies; they are treated as “site and plug-in data” in Chrome, and can be removed along with cookies.
Uncharacteristically, sites can leverage OBC for user tracking without performing any actions that would be visible to the client: the ID can be derived simply by taking note of the cryptographic hash of the certificate automatically supplied by the client as a part of a legitimate SSL handshake.
ChannelID is currently suppressed in Chrome in “third-party” scenarios (e.g., for different-domain frames).
The set of supported ciphersuites can be used to fingerprint a TLS/SSL handshake. Note that clients have been actively deprecating various ciphersuites in recent years, making this attack even more powerful.
In a similar fashion, two separate mechanisms within TLS - session identifiers and session tickets - allow clients to resume previously terminated HTTPS connections without completing a full handshake; this is accomplished by reusing previously cached data. These session resumption protocols provide a way for servers to identify subsequent requests originating from the same client for a short period of time.
HTTP Strict Transport Security is a security mechanism that allows servers to demand that all future connections to a particular host name need to happen exclusively over HTTPS, even if the original URL nominally begins with “http://”.
It follows that a fingerprinting server could set long-lived HSTS headers for a distinctive set of attacker-controlled host names for each newly encountered browser; this information could be then retrieved by loading faux (but possibly legitimately-looking) subresources from all the designated host names and seeing which of the connections are automatically switched to HTTPS.
In an attempt to balance security and privacy, any HSTS pins set during normal browsing [were*] carried over to the incognito mode in Chrome; there is no propagation in the opposite direction, however. *Update: Behavior was changed in Chrome 64, such that Chrome won't use on-disk HSTS information for incognito requests. It is worth noting that leveraging HSTS for tracking purposes requires establishing log(n) connections to uniquely identify n users, which makes it relatively unattractive, except for targeted uses; that said, creating a smaller number of buckets may be a valuable tool for refining other imprecise fingerprinting signals across a very large user base.
Last but not least, virtually all modern browsers maintain internal DNS caches to speed up name resolution (and, in some implementations, to mitigate the risk of DNS rebinding attacks).
Such caches can be easily leveraged to store small amounts of information for a configurable amount of time; for example, with 16 available IP addresses to choose from, around 8-9 cached host names would be sufficient to uniquely identify every computer on the Internet. On the flip side, the value of this approach is limited by the modest size of browser DNS caches and the potential conflicts with resolver caching on ISP level.
With the notable exception of Origin-Bound Certificates, the techniques described in section 1 of the document rely on a third-party website explicitly placing a new unique identifier on the client system.
Another, less obvious approach to web tracking relies on querying or indirectly measuring the inherent characteristics of the client system. Individually, each such signal will reveal just several bits of information - but when combined together, it seems probable that they may uniquely identify almost any computer on the Internet. In addition to being harder to detect or stop, such techniques could be used to cross-correlate user activity across various browser profiles or private browsing sessions. Furthermore, because the techniques are conceptually very distant from HTTP cookies, the authors find it difficult to decide how, if at all, the existing cookie-centric privacy controls in the browser should be used to govern such practices.
EFF Panopticlick is one of the most prominent experiments demonstrating the principle of combining low-value signals into a high-accuracy fingerprint; there is also some evidence of sophisticated passive fingerprints being used by commercial tracking services.
User-Agent string, identifying the browser version, OS version, and some of the installed browser add-ons.
Screen and browser window resolutions, including parameters of secondary displays for multi-monitor users.
The window-manager- and addon-specific “thickness” of the browser UI in various settings (e.g., window.outerHeight - window.innerHeight).
The list and ordering of installed system fonts - enumerated directly or inferred with the help of an API such as getComputedStyle.
Information about installed browser extensions and other software. While the set cannot be directly enumerated, many extensions include web-accessible resources that aid in fingerprinting. In addition to this, add-ons such as popular ad blockers make detectable modifications to viewed pages, revealing information about the extension or its configuration. Using browser “sync” features may result in these characteristics being identical for a given user across multiple devices. A similar but less portable approach specific to Internet Explorer allows websites to enumerate locally installed software by attempting to load DLL resources via the res:// pseudo-protocol.
Random seeds reconstructed from the output of non-cryptosafe PRNGs (e.g. Math.random(), multipart form boundaries, etc). In some browsers, the PRNG is initialized only at startup, or reinitialized using values that are system-specific (e.g., based on system time or PID).
According to the EFF, their Panopticlick experiment - which combines only a relatively small subset of the actively-probed signals discussed above - is able to uniquely identify 95% of desktop users based on system-level metrics alone. Current commercial fingerprinters are reported to be considerably more sophisticated and their developers might be able to claim significantly higher success rates.
Of course, the value of some of the signals discussed here will be diminished on mobile devices, where both the hardware and the software configuration tends to be more homogenous; for example, measuring window dimensions or the list of installed plugins offers very little data on most Android devices. Nevertheless, we feel that the remaining signals - such as clock skew and drift and the network-level and user-specific signals described later on - are together likely more than sufficient to uniquely identify virtually all users.
When discussing potential mitigations, it is worth noting that restrictions such as disallowing the enumeration of navigator.plugins generally do not prevent fingerprinting; the set of all notable plugins and fonts ever created and distributed to users is relatively small and a malicious script can conceivably test for every possible value in very little time.
The external client IP address. For IPv6 addresses, this vector is even more interesting: in some settings, the last octets may be derived from the device's MAC address and preserved across networks.
A broad range of TCP/IP and TLS stack fingerprints, obtained with passive tools such as p0f. The information disclosed on this level is often surprisingly specific: for example, TCP/IP traffic will often reveal high-resolution system uptime data through TCP timestamps.
Ephemeral source port numbers for outgoing TCP/IP connections, generally selected sequentially by most operating systems.
The local network IP address for users behind network address translation or HTTP proxies (via WebRTC). Combined with the external client IP, internal NAT IP uniquely identifies most users, and is generally stable for desktop browsers (due to the tendency for DHCP clients and servers to cache leases).
Information about proxies used by the client, as detected from the presence of extra HTTP headers (Via, X-Forwarded-For). This can be combined with the client’s actual IP address revealed when making proxy-bypassing connections using one of several available methods.
With active probing, the list of open ports on the local host indicating other installed software and firewall settings on the system. Unruly actors may also be tempted to probe the systems and services in the visitor’s local network; doing so directly within the browser will circumvent any firewalls that normally filter out unwanted incoming traffic.
In addition to trying to uniquely identify the device used to browse the web, some parties may opt to examine characteristics that aren’t necessarily tied to the machine, but that are closely associated with specific users, their local preferences, and the online behaviors they exhibit. Similarly to the methods described in section 2, such patterns would persist across different browser sessions, profiles, and across the boundaries of private browsing modes.
Data in the client cache and history. It is possible to detect items in the client’s cache by performing simple timing attacks; for any long-lived cache items associated with popular destinations on the Internet, a fingerprinter could detect their presence simply by measuring how quickly they load (and by aborting the navigation if the latency is greater than expected for local cache).
Mouse gesture, keystroke timing and velocity patterns, and accelerometer readings (ondeviceorientation) that are unique to a particular user or to particular surroundings. There is a considerable body of scientific research suggesting that even relatively trivial interactions are deeply user-specific and highly identifying.
Users logged into websites that offer collaboration features can be de-anonymized by covertly instructing their browser to navigate to a set of distinctively ACLed resources and then examining which of these navigation attempts result in a new collaborator showing up in the UI.
Request timing, onerror and onload handlers, and similar measurement techniques can be used to detect which third-party resources return HTTP 403 error codes in the user’s browser, thus constructing an accurate picture of which sites the user is logged in; in some cases, finer-grained insights into user settings or preferences on the site can be obtained, too.
Any of the explicit web application APIs that allow identity attestation may be leveraged to confirm the identity of the current user (typically based on a starting set of probable guesses).
In a world with no possibility of fingerprinting, web browsers would be indistinguishable from each other, with the exception of a small number of robustly compartmentalized and easily managed identifiers used to maintain login state and implement other essential features in response to user’s intent.
In practice, the Web is very different: browser tracking and fingerprinting are attainable in a large number of ways. A number of the unintentional tracking vectors are a product of implementation mistakes or oversights that could be conceivably corrected today; many others are virtually impossible to fully rectify without completely changing the way that browsers, web applications, and computer networks are designed and operated. In fact, some of these design decisions might have played an unlikely role in the success of the Web.
Some fingerprinting techniques simply leave no remotely measurable footprint, thus precluding any attempts to detect them in an automated fashion.
Most other fingerprinting and tagging vectors are used in fairly evident ways, but could be easily redesigned so that they are practically indistinguishable from unrelated types of behavior. This would frustrate any programmatic detection strategies in the long haul, particularly if they are attempted on the client (where the party seeking to avoid detection can reverse-engineer the checks and iterate until the behavior is no longer flagged as suspicious).
The distinction between behaviors that may be acceptable to the user and ones that might not is hidden from view: for example, a cookie set for abuse detection looks the same as a cookie set to track online browsing habits. Without a way to distinguish between the two and properly classify the observed behaviors, tracking detection mechanisms may provide little real value to the user.
The current browser privacy controls evolved almost exclusively around the notion of HTTP cookies and several other very specific concepts that do not necessarily map cleanly to many of the tracking and fingerprinting methods discussed in this document. In light of this, to better meet user expectations, it may be beneficial for in-browser privacy settings to focus on clearly explaining practical privacy outcomes, rather than continuing to build on top of narrowly-defined concepts such as "third-party cookies".
We worry that in some cases, interacting with browser privacy controls can degrade one’s browsing experience, discouraging the user from ever touching them. A canonical example of this is trying to delete cookies: reviewing them manually is generally impractical, while deleting all cookies will kick the user out of any sites he or she is logged into and frequents every day. Although fraught with some implementation challenges, it may be desirable to build better heuristics that distinguish and preserve site data specifically for the destinations that users frequently log into or meaningfully interact with.
Even for extremely privacy-conscious users who are willing to put up with the inconvenience of deleting one’s cookies and purging other session data, resetting online fingerprints can be difficult and fail in unexpected ways. An example of this is discussed in section 1: if there are ads loaded on any of the currently open tabs, clearing all local data may not actually result in a clean slate. Investing in developing technologies that provide more robust and intuitive ways to maintain, manage, or compartmentalize one's online footprints may be a noble goal.
Today, some privacy-conscious users may resort to tweaking multiple settings and installing a broad range of extensions that together have the paradoxical effect of facilitating fingerprinting - simply by making their browsers considerably more distinctive, no matter where they go. There is a compelling case for improving the clarity and effect of a handful of well-defined privacy settings as to limit the probability of such outcomes.
We present these ideas for discussion within the community; at the same time, we recognize that although they may sound simple when expressed in a single paragraph, their technical underpinnings are elusive and may prove difficult or impossible to fully flesh out and implement in any browser. | 2019-04-19T04:20:05Z | https://sites.google.com/a/chromium.org/dev/Home/chromium-security/client-identification-mechanisms |
SOME POTENTIAL PLANTS FOR BIO-ENERGY.
SOME POTENTIAL PLANTS FOR BIO-ENERGY. ASHWANI KUMAR AND AMIT KOTIYA Bio-Technology Lab,Department of Botany University of Rajasthan, Jaipur - 302 004 Engery Plantation Demonstration project and Biotechnology Center. Email. [email protected] ABSTRACT : India has land area of approximately 329 mha, out of which 150 mha of land area in India is uncultivable and around 90 mha. is characterized as wasteland. The arid region of India lies between 24° and 29° N latitude and 70° and 76° E longitude and covers 3,17,090 km2 area spread over seven states (Rajasthan, Gujarat, Haryana, Maharashtra, Karnataka, Andhra Pradesh and portions of Jammu&Kashmir) of the Indian Union. Ninety percent of arid region about 2,85,580 km2 is confined to north west India, covering most of the western Rajasthan, part of Gujarat and small portions of Punjab and Haryana. Wastelands in the country include the degraded forest, overgrazed revenue wasteland, ravines, hilly slopes, eroded valleys, drought stricken pastures, over irrigated ‘Usar’ and ‘Khar’ soils and water-logged marshy lands. The state of Rajasthan is situated between 23°3’N and 30°12’ N latitude and 69°30’ and 78°17’ E longitude. The total land area of the state is about 3,42,239 km2, out of which about 1,96,150 km2 is arid and rest is semi-arid. The plants occurring in this region were characterised. 1. INTRODUCTION: India is situated between 8°4" to 37°6" N latitude and 68°7" to 97°25" E longitude. The total land area of the India is approximately 329 mha, out of which 150 mha of land area in India is uncultivable and around 90 mha. is characterized as wasteland. The arid region of India lies between 24° and 29° N latitude and 70° and 76° E longitude and covers 3,17,090 km2 area spread over seven states (Rajasthan, Gujarat, Haryana, Maharashtra, Karnataka, Andhra Pradesh and portions of Jammu & Kashmir) of the Indian Union. Ninety percent of arid region about 2,85,580 km2 is confined to north west India, covering most of the western Rajasthan, part of Gujarat and small portions of Punjab and Haryana. Wastelands in the country include the degraded forest, overgrazed revenue wasteland, ravines, hilly slopes, eroded valleys, drought stricken pastures, over irrigated ‘Usar’ and ‘Khar’ soils and water-logged marshy lands. The state of Rajasthan is situated between 23°3’N and 30°12’ N latitude and 69°30’ and 78°17’ E longitude. The total land area of the state is about 3,42,239 km2, out of which about 1,96,150 km2 is arid and rest is semi-arid. Majority of wasteland lies in districts of Ganganagar, Bikaner, Jaisalmer, Barmer, Jodhpur, Churu and Nagaur, while only 4 per cent of wasteland is covered by the Jalore, Jhunjhunu, Sikar, Pali, Ajmer and Jaipur. Rajasthan has largest area of wasteland in India. According to land state data between 1972-75 and 1980-82, 9 mha. of tree cover has been lost at an average rate of 1.3 mha. per year (Sajadak et. al., 1981 and Kaul,1991).There is a need to characterize the plants available in the wastelands so as to make use of them for the wasteland colonization subsequently as most of such plants have not be exploited till date. The colonizer plants of wasteland were characterized from the non-saline and saline areas and their potential as bio-energy plants was determined. Material and methods: For the study of biomass production three different plots were selected under semi arid type climate of wasteland of Rajasthan. collection and evaluation of liquid and solid fuel biomass 150 plant species were recorded and out of them 60 plant species were selected for solid biomass. Beside this 15 plant species were selected for liquid biomass, 10 plants were selected for non-edible oil and 5 were selected for hydrocarbon yielding plant. 1.1 Biomass comprising all forms of matter derived from the biological activities taking place either on the surface of the soil or at different depth of the vast body of water lakes, river, ocean. 1.2 Assessing the total above ground biomass, defined as biomass, when expressed as dry weight per unit area, either total biomass or by components (eg. leaves, branches and bole), is a useful way of quantifying the amount of resource available for traditional uses. The main sources of biomass can be classified in two groups one is waste materials including those derived from agriculture, forestry and municipal wastes (Ter-Mikaelian and Korzukhin, 1997; Leible, 1998 and Bork and Werner, 1999). 1.3 The study area is situated in semiarid region and most plant species appear in the region in their respective growth periods. A three tier system was developed for biomass production i.e. herbaceous, shrub and tree biomass. Most plant species are herbaceous in nature and appear during rainy season. They are the first colonizers and are generally herb which have important uses (Woodard and Prime, 1993; Morgana et al., 1994 and Houerou and Houerou, 2000). 1.4 Biomass can be converted in to solid, liquid and gaseous forms through biological thermochemical route for deriving thermal electrical and mechanical forms of energy. Thus biomass offers multiple options for transition from the use of conventional, exhaustible and polluting forms to non-conventional, renewable, non-exhaustible, non polluting and perennial forms so as to ensure sustained growth and economic development (Verma et al., 1996; Dabson et al., 1997 and Spalton, 1999). 1.5 The colonizer plants of saline wasteland were characterized in study area in Jobner division of Jaipur Distt. Plant species included: Argemone maxicana Linn., Polycarpaea corymbosa (L.) Lamk., Portulaca, suffruticosa wt., P. quadrifida L. Sida cordifolia Linn., Balanites aegyptica (L.) Del., Ziziphus mauritiana Lamk., Acacia jacquemontii Benth., A. senegal Willd., A. nilotica (L.) Del., A. leucophloea (Roxb.) Willd., Prosopis cineraria (L.) Druce, P. juliflora (Swartz) DC., Crotalaria burhia Buch-Ham., Tephrosia hamiltonii Drumm, Farsetia hamiltonii Royle, Citrullus colocynthis (Linn) Schrad., Mollugo cerviana (L.) Ser., M. nudicaulis Lamk., Trianthema portulacastrum Linn., T. triquetra Rotll., Artemisia scoparia Waldst et kit., Laggera alata (Don.), Sch.-Bip., Launaea resedifolia (L.) Druce., L. procumbens (Roxb.) Rammyya and Rajgopal, Pulicaria crispa Sch-Bip., Tridax procumbens Linn., Verbesina cinerea (L.) Less., Xanthium strumaxium Linn., Calotropis procera (Ait.) R. Br., Leptadenia pyrotechnica (Forsk.) Decne., Heliotropium marifolium Retz., Sericostoma pauciflorum Stocks, Convolvulus microphyllous Sieb. Ex. Spreng., Datura innoxia Mill., Withania somnifera (Linn.) Dunal, Solanum surattense Burm f., Tecomella undulata (Sm.) Seem, Sonchus asper (L.) Gars, Leucas aspera (Willd.) Spreng, Boerhavia diffusa Linn., Achyranthes aspera Linn., Aerva tomentosa (Burm. f) Juss., Amaranthus caudatus Linn., Digera muricata (Linn.) Mart. Pupalia lappacea (Linn.) Juss., Chenopodium album Linn., Chenopodium murale Linn. Salsoia baryosoma (Rets.) Dandy, Suaeda furticosa, Haloxylon ruburum, Euphorbia hirta Linn., E. prostrata Ait. Croton bonplandianum Baill., Phyllanthus asperulatus Hutch., Riccinus communis Linn., Ficus benghalensis Linn., Ficus religiosa Linn., Holoptelea integrifolia (Roxb.). Planch, Commelina forskalaei Vahl., Cyperus arenarius Retz., C. triceps (Rottb.) Endl., Cenchrus cilliaris, Cenchrus biflorus, Dactyloctenium sindicum Boiss., Cynadon dactilon, Saccharum bengalense Retz. Capparis decidua, Alanthus excelsa A. Juss, Azadirachta indica A. Juss., Cassia fistula Linn., Anogeissus pendula Edgew., Arnebia hispidissima (Lehm.) DC., Acacia cuperasus.Some herbaceous and shrub plants are also important for biomass production in the form of bioenergy (Sampath et al., 1983; Vasudevanm and Gujral, 1984; Singh et al., 1987; Morgana et al., 1994; Prine and Woodard, 1994; Pedreira et al., 1999 and Vazquez-de-Aldana et al., 2000). 1.6 Beside the solid biomass some plant species are important for liquid biomass in form of hydrocarbon and non edible oil production, which provides an alternative source of petroleum (Calvin 1979; Hall 1980;Eilert et al 1985). 1.7 Present studies were conducted on characterization of bio-energy resources in the semi arid region of Rajasthan because the growing demand for fuel wood as a result of rapid population growth has made it increasingly difficult for many people in this region to meet their basic energy need. 2. METHDOLOGY 2.1 Solid Biomass: Study area was rich in plant diversity and identification of plant species was done using flora and monograph. 230 plants species were characterized and out of them 60 plants species were selected for dry matter production. Collection of plant species in all the seasons was carried out and three replicates were taken. The fresh weight and dry weight was recorded. Each replicate of plant species was collected in all seasons and their fresh weight and dry weight were recorded. Dry weight was recorded by drying plant species at 105°C till their weights became constant. 2.2 Extraction of hydrocarbons: The determination of hydrocarbon content was made following Jayablan et al. (1994), the same procedure was employed for extraction of hydrocarbons (biocrude) by using solvent methanol and hexane in the soxhlet apparatus. The methanolic extracts (60°C) were collected after 18 h. The hexane (55°C) extractables were also collected after 18 h, respectively. 2.3 Extraction of non-edible oil: Non edible oils were estimated following (Gupta et al., 1998 and Roy and Kumar, 1998). Non-edible oil yielding plants were selected for the study. For the extraction of non edible oil, seeds were collected and dried. After drying a fine powder was made which was placed in a thimble Whatman filter paper no. 1. Ten gram of powder was placed in each thimble. Extraction was done by using solvent petroleum ether in a soxhlet apparatus at 40°C to 50°C for about 30 h. The petroleum ether extractable was collected after 30 h, and excess of solvent was removed by distillation at 45°C. The fractions were transferred to the previously weighed flask and were finally dried at 40°C for 24 h or till the weights become constant for determination of oil. 3. RESULTS 3.1 Solid Biomass: The characterization of plant diversity was another aspect of study on plant community. 230 plant species were recorded. Out of the 230 plant species 60 plant species were selected for biomass production in their natural habitat. Plants were collected from studied areas in natural condition. Three replicates of each plant were collected and their fresh and dry weights were recorded in each season. Out of the 60 plants following plant species were suitable for biomass production due to their high dry matter contents. These plants included (weights in g/plant) Echinops echinatus Roxb. : 133.66; Verbesina encelioides (Cav.) Benth. & Hk.: 80.33; Calotropis procera (Ait) R.Br.: 648.33; Leptadenia pyrotechnica (Forsk.) Decne. : 486.66; Sericostoma pauciflorum Stocks. : 352.66; Amaranthus spinosus Linn. : 167.66; Withania somnifera (L.) Dunal. : 350; Lepidagathis trinervis Wall. ex Nees. : 204; Lantana indica Roxb. : 373.33; Aerva tomentosa (Burm.) Juss. : 283.33; Croton bonplandianum Baill. : 155.33; Abutilon indicum (L.) Sweet. : 1453.33; Acacia jacquemontii Benth. : 693.33; Crotalaria burhia Buch.-Ham. ex Benth. : 266; Saccharum bengalense Retz. : 1900 and Artemisia scoparia Waldst. et Kit. : 90. The plant biomass in terms of fresh weight and dry weight was recorded in all the three seasons. 3.2 Extraction of hydrocarbons: Hydrocarbons were extracted by using two different solvent hexane and methanol. Among the different plant extractions Euphorbia antisyphilitica Zuce. showed the best extraction results in hexane 8.5% and Calotropis procera (Ait.) R.Br. showed best results in methanolic extraction 33.8%. Percent hydrocarbon contents in above ground part of different plants in Hexane extraction (HE) and Methanolic extraction (ME) Name of the plant ME HE Calotropis procera (Ait.) R.Br. 38.8 6.2 Euphorbia antisyphilitica Zuss. 27.5 8.5 Euphorbia hirta Linn. 20.4 4.8 Euphorbia prostrata Ait. 33.5 4.2 Pergularia daemia (Forsk.) Chiov. 30.41 3.8 Calotropis gigantea 26.5 5.2 Euphorbia neriifolia 7.13 6.31 Euphorbia lathyris 21.56 5.57 Euphorbia tirucalli 6.31 3.48 Padilanthus tithymaloides var 6.68 3.12 Padilanthus tithymaloides var 6.69 5.12 Padilanthus tithymaloides var 7.36 4.12 Euphorbia nivulia 12.0 6.40 3.3 Extraction of non-edible oil : In order to study non-edible oil production, 11 plants were selected for studies. Non-edible oil was extract by using solvent petroleum ether. Seed oil was extracted taking seeds with seed coat. Among different seed oil contents determined maximum seed oil was recorded in Ricinus communis Linn. This was followed by others. Non-edible oil content in seeds of different plant species Name of the plants Percent seed oil Argemone mexicana Linn. 34.0 Azardirachta indica A. Juss 29.3 Citrullus colocynthis (Linn.) Schrad. 17.6 Cleome viscosa Linn. 38.6 Pongamia pinnata (L.) Pierre. 39.2 Jatropha curcas Linn. 37.2 Ricinus communis Linn. 48.2 Sesamum indicum Linn. 22.7 Xanthium strumarium Linn. 32.8 Martynia annua Linn. 16.8 Calotropis procera (Ait.) R.Br. 36.2 4. DISCUSSSION Biomass contributes a significant share of global primary energy consumption and its importance is likely to increase in future world energy scenarios. Current biomass use, although not sustainable in some cases, replaces fossil fuel consumption and results in avoided CO2 emissions, representing about 2.7% to 8.8% of 1998 anthropogenic CO2 emissions. The global biomass energy potential is large, estimated at about 107 EJ/a. Hence, biomass has the potential to avoid significant fossil fuel consumption, potentially between 17% and 36% of the current level and CO2 emissions potentially between 12% and 44% of the 1998 level. Modern biomass energy use can contribute to controlling CO2 emissions to the atmosphere while fostering local and regional development. There is significant scope to integrate biomass energy with agriculture, forestry and climate change policies. Further the advantages from utilization of biomass include: liquid fuels produced from biomass contain no sulphur, thus avoiding SO2 emissions and also reducing emission of NOx. The production of compost as a soil conditioner avoids deterioration of soil. Improved agronomic practices of well managed biomass plantations will also provide a basis for environmental improvement by helping to stabilize certain soils, avoiding desertification which is already occurring rapidly in tropical countries. The creation of new employment opportunities within the community and particularly in rural areas will be one of the major social benefits. The present investigations carried out with an object of biomass production and utilization in less fertile areas, will provide satisfactory answers to the double challenge of energy crisis and forced deforestation in the country and semi-arid and arid regions of Rajasthan. Kumar (2001) has suggested that biomass from plants can be converted into liquid fuels. This will make it possible to supply part of the increasing demand for primary energy and thus reduce crude petroleum imports, which entail heavy expenditure on foreign exchange. Several families widely growing in Rajasthan have great potential as renewable source of energy. Euphorbiaceae (Euphorbia antisyphilitica, E. tithymaloides, E. caducifolia, E. lathyris, E. neerifolia etc. Aselipiadaceae (Calotropis gigantea and C. procera) Asteraceae and Apocynaceae have large number of valuable plants (Kumar and Vijay, 2002 and Vijay et al., 2002). Characterization of biomass production in wastelands during the present investigation offers a database of potential plants to be used in arid and semiarid regions and a three tier system has been developed. However further studies are needed to establish gene pool database on the basis of RFLP and AFLP so that it could be used for genetic transformation studies. Which can help for development of bioenergy source from these arid and semiarid wasteland of Rajasthan. REFERENCES (1) Behnke, H.D, and S. Herramann, 1978, Fine structures and development of laticifers of Gnetum Gnemon L. Protoplasma 95:371-384. (2) Calvin, M, 1979. Petroleum plantations for fuel and materials Bioscience 29: 533-538. (3) Calvin, M. 1983, New Sources for fuel and Material. Science 219: 24-26. (4) Cass, D.D. 1968. Observations on the ultra structure of the non articulated laticifers of Jatnopha podagrica (Euphorbiaceae) Experientia 24: 961-962. (5) Cass, D.D, 1985. Origin and development of non-articulated laticifers of Jatrpopha dioica, Phytomorphology 35:133-140. (6) Datta, S.K. and S.De. 1983. In vitro study of ovary induced callusing, rhizogenesis and presense of cardenolide in Calotropis gigantea. Cell chromosome Res. 6:10-12. (7) Datta, S.K. and S.De. 1986a. Organ specific chemodifferentiation of cardenolides of Calotropis gigantes in vitro. Beitr. Biol. Pflanz. 61:315-319. (8) Datta, S.K. and S.De. 1986b. Laticifer differentiation of n R. Bx. Ex Ait. In culture. Ann. Bot. 57:403-406. (9) Dickenson, P. and J. Fairbairn. 1975. The Ultrastructure of the alkaloidal vescicle of Papaver somniferum latex Ann. Bot. 39: 707-712. (10) Eilert, U., L.R. Nesbitt and F. constable, 1985, Laticifers and latex in fruit of periwinkle Catheranthus roseus, Can. J. Bot. 63: 1540-1546. (11) Esau. K. and H. Kosakai. 1975. Laticifers in Nelumbo nucifera Gaertn: Distribution and structure. Ann. Bot. 39: 713-719. (12) Fahn, A. 1979 Secretory tissue in plants, London: Academic Press. (13) Fay, De E., C. Sanier and C. Hebart 1989. The distribution of plasmodesmata in the phloem of Haevea brasiliensis in relation to laticifer loading. Protoplasma 149: 155-162. (14) Fineran, B.A. , 1982. Ultrastructure and organization of non-articulated laticifers in mature tissues of poinsettia ( Euphorbia pulcherrima Willd.). Ann. Bot. 50:207-220. (15) Fineran, B.A. 1983. Differentiation of non-articulated laticifers in poinsettia ( Euphorbia pulcherrima Willd.). Ann. Bot .52:279-293. (16) Fineran, B.A., J.M. Condon and M. Ingerfeld. 1988. An Impregnated suberised wall layer in laticifers of Convolvulaceae and its resemblance to that in walls of oil cells. Protoplasma 147: 42-54. (17) Hall, D.O. 1980 Renewable Resources (Hydrocarbons) outlook, Agric 10: 246-254. (18) Hartig, T. 1862. Uber die Bewegung des Saften in den Holzpflanzen. 12 In den Milchasftgefassen. Bot. Z. Berlin. 20:97-100. (19) Heinrich, G. 1967. Licht und elektronenmikroskopische Untersuchungen del Milchrahren van Taraxacum bicorne. Flora 158: 413-420. (20) Mahlberg, P.G., D.G. Davis, D.S. Galtiz, and G.D. Manners. 1987. Laticifers and the classification of Euphorbia esula. Bot.J.Linn.Soc.94:165-180. (21) Mahlberg, P.G. and P.S. Sabharwal 1968. Origin and early development of non articulated laticifer in embryo of Euphorbia marginata. Am. J. Bot. 55: 375-381. (22) Marty, F. 1968. Intrastructure des laticiferes differencies d' Euphorbia characias C.R. Acad. Sci. 271: 2301-04. (23) Nielsen, P.E., H. Nishimura, J.M. Otvos and M. Calvin 1977. Plant crops as a source of fuel and hydrocarbon like materials. Science 198: 942-944. (24) Popovici, H. 1926 contribution a l'etude cytologique des laticifers, C.R. Acad. Sci. 183: 143-45. (25) Rachmilevitz, T. and A. Fahn 1982. Ultrastructure and development of the laticifers of Ficus Carica L. Ann. Bot 49: 13-22. (26) Roy, A.T. and D.N. De. 1992. Studies on differentiation of laticifers through light and electron microscopy in Calotropis gigentea (Linn.) R. Br. Ann. Bot. 70: 443-49. (27) Schulze, Ch. E. Schepf and K. Mothes 1967. Uber die lokalisation der kautschukpartikel in verschiedenen Typen von milichrohren, Flora 158: 458-460. (28) Spilatro, S.R. and P.G. Mahlberg. 1986. Latex and laticifer starch contents of developing leaves of Euphoriba pulcherrima . Am. J. Bot. 73: 1313-1318. (29) Swain, R. 1977 Secondary compounds as protective agents. Annu. Rev. Plant physiol. 28: 479-501. (30) Trecul, M.A. 1867 Des vaisseaux propres et du tanins les musacecs. Ann. Sci-Naturelles (5 Ser.) 8: 283-300. (31) Wilson, K.J. and P.G. Mahlberg.1978. Ultrastructure of non articulated Laticifers in mature embryo and seedlings of Asclepias syriaca. Am. J. Bot. 65:98-109. (32) Wilson, K.J. and P.G. Mahlberg 1980. Ultrastructure of developing and mature non-articulated laticifers in the milk weed Asclepias syriaca L. (Asclepiadaceae), Am. J. Bot. 67: 1166-1170. (33) Wilson, K. J., C.L. Neesler, and P.G. Mahlberg. 1976. Pectinase in Asclepias latex and its possible role in laticifer growth and development. Am. J. Bot. 67:1160-1170. | 2019-04-21T08:22:58Z | https://www.science20.com/humboldt_fellow_and_science/blog/some_potential_plants_bioenergy-62329 |
Spot.Coach, Inc. (“Spot.Coach,” “we,” “us,” “our”) provides its services (described below) to you through its website located at www.spot.coach (the “Site”) and through its mobile applications and related services (collectively, such services, including any new features and applications, and the Site, the “Service(s)”), subject to the following Terms of Service (as amended from time to time, the “Terms of Service”). We reserve the right, at our sole discretion, to change or modify portions of these Terms of Service at any time. If we do this, we will post the changes on this page and will indicate at the top of this page the date these terms were last revised. We will also notify you, either through the Services user interface, in an email notification or through other reasonable means. Any such changes will become effective no earlier than fourteen (14) days after they are posted, except that changes addressing new functions of the Services or changes made for legal reasons will be effective immediately. Your continued use of the Service after the date any such changes become effective constitutes your acceptance of the new Terms of Service.
PLEASE READ THESE TERMS OF SERVICE CAREFULLY, AS THEY CONTAIN AN AGREEMENT TO ARBITRATE AND OTHER IMPORTANT INFORMATION REGARDING YOUR LEGAL RIGHTS, REMEDIES, AND OBLIGATIONS. THE AGREEMENT TO ARBITRATE REQUIRES (WITH LIMITED EXCEPTION) THAT YOU SUBMIT CLAIMS YOU HAVE AGAINST US TO BINDING AND FINAL ARBITRATION, AND FURTHER (1) YOU WILL ONLY BE PERMITTED TO PURSUE CLAIMS AGAINST SPOT.COACH ON AN INDIVIDUAL BASIS, NOT AS A PLAINTIFF OR CLASS MEMBER IN ANY CLASS OR REPRESENTATIVE ACTION OR PROCEEDING, (2) YOU WILL ONLY BE PERMITTED TO SEEK RELIEF (INCLUDING MONETARY, INJUNCTIVE, AND DECLARATORY RELIEF) ON AN INDIVIDUAL BASIS, AND (3) YOU MAY NOT BE ABLE TO HAVE ANY CLAIMS YOU HAVE AGAINST US RESOLVED BY A JURY OR IN A COURT OF LAW.
Services Description: The Service is a platform that connects employers (“Employers”) seeking to provide professional development consultation services and coaching sessions (“Sessions”) to Employer’s employees (“Employees”), through our community of talented, professional coaches (“Coaches”).
Member Account, Password and Security: You are responsible for maintaining the confidentiality of your password and account, if any, and are fully responsible for any and all activities that occur under your password or account. You agree to (a) immediately notify Spot.Coach of any unauthorized use of your password or account or any other breach of security, and (b) ensure that you exit from your account at the end of each session when accessing the Service. Spot.Coach will not be liable for any loss or damage arising from your failure to comply with this Section.
Modifications to Service: Spot.Coach reserves the right to modify or discontinue, temporarily or permanently, the Service (or any part thereof) with or without notice. You agree that Spot.Coach will not be liable to you or to any third party for any modification, suspension or discontinuance of the Service.
General Practices Regarding Use and Storage: You acknowledge that Spot.Coach may establish general practices and limits concerning use of the Service, including without limitation the maximum period of time that data or other content will be retained by the Service and the maximum storage space that will be allotted on Spot.Coach’s servers on your behalf. You agree that Spot.Coach has no responsibility or liability for the deletion or failure to store any data or other content maintained or uploaded by the Service. You acknowledge that Spot.Coach reserves the right to terminate accounts that are inactive for an extended period of time. You further acknowledge that Spot.Coach reserves the right to change these general practices and limits at any time, in its sole discretion, with or without notice.
Mobile Services: The Service includes certain services that are available via a mobile device, including (i) the ability to upload content to the Service via a mobile device, (ii) the ability to browse the Service and the Site from a mobile device and (iii) the ability to access certain features through an application downloaded and installed on a mobile device (collectively, the “Mobile Services”). To the extent you access the Service through a mobile device, your wireless service carrier’s standard charges, data rates and other fees may apply. In addition, downloading, installing, or using certain Mobile Services may be prohibited or restricted by your carrier, and not all Mobile Services may work with all carriers or devices. By using the Mobile Services, you agree that we may communicate with you regarding Spot.Coach and other entities by SMS, MMS, text message or other electronic means to your mobile device and that certain information about your usage of the Mobile Services may be communicated to us. In the event you change or deactivate your mobile telephone number, you agree to promptly update your Spot.Coach account information to ensure that your messages are not sent to the person that acquires your old number.
Each Employer shall pay all applicable fees for the Services (“Service Fees”). Each Employer will be charged a monthly fee for the Services. Employer’s will be required to provide Spot.Coach information regarding Employer’s credit card or other payment instrument. Employers represent and warrant to Spot.Coach that such information is true and that Employers are authorized to use the payment instrument. Employers will promptly update their account information with any changes (for example, a change in your billing address or credit card expiration date) that may occur. Employers agree to pay Spot.Coach the amount that is agreed upon between the parties. Employer hereby authorizes Spot.Coach to bill Employer’s payment instrument in advance on a periodic basis until Employer terminates their account, and Employer further agree to pay any charges so incurred. If Employer disputes any charges Employer must let Spot.Coach know within sixty (60) days after the date that Spot.Coach charges the Employer. We reserve the right to change Spot.Coach’s prices. If Spot.Coach does change prices, Spot.Coach will provide notice of the change on the Site or in email to Employers, at Spot.Coach’s option, at least 30 days before the change is to take effect. Employer’s continued use of the Service after the price change becomes effective constitutes your agreement to pay the changed amount. Employer shall be responsible for all taxes associated with the Services other than U.S. taxes based on Spot.Coach’s net income.
Spot.Coach and you acknowledge that these Terms of Service are concluded between Spot.Coach and you only, and not with Apple, and that as between Spot.Coach and Apple, Spot.Coach, not Apple, is solely responsible for the Apple-Enabled Software and the content thereof.
Apple is not responsible for any product warranties, whether express or implied by law. In the event of any failure of the Apple-Enabled Software to conform to any applicable warranty, you may notify Apple, and Apple will refund the purchase price for the Apple-Enabled Software to you, if any; and, to the maximum extent permitted by applicable law, Apple will have no other warranty obligation whatsoever with respect to the Apple-Enabled Software, or any other claims, losses, liabilities, damages, costs or expenses attributable to any failure to conform to any warranty, which will be Spot.Coach’s sole responsibility, to the extent it cannot be disclaimed under applicable law.
Spot.Coach and you acknowledge that Spot.Coach, not Apple, is responsible for addressing any claims of you or any third party relating to the Apple-Enabled Software or your possession and/or use of that Apple-Enabled Software, including, but not limited to: (i) product liability claims; (ii) any claim that the Apple-Enabled Software fails to conform to any applicable legal or regulatory requirement; and (iii) claims arising under consumer protection or similar legislation.
In the event of any third party claim that the Apple-Enabled Software or the end-user’s possession and use of that Apple-Enabled Software infringes that third party’s intellectual property rights, as between Spot.Coach and Apple, Spot.Coach, not Apple, will be solely responsible for the investigation, defense, settlement and discharge of any such intellectual property infringement claim.
Spot.Coach and you acknowledge and agree that Apple, and Apple’s subsidiaries, are third party beneficiaries of these Terms of Service with respect to the Apple-Enabled Software, and that, upon your acceptance of the terms and conditions of these Terms of Service, Apple will have the right (and will be deemed to have accepted the right) to enforce these Terms of Service against you with respect to the Apple-Enabled Software as a third party beneficiary thereof.
Service Content, Software and Trademarks: You acknowledge and agree that the Service may contain content or features (“Service Content”) that are protected by copyright, patent, trademark, trade secret or other proprietary rights and laws. Except as expressly authorized by Spot.Coach, you agree not to modify, copy, frame, scrape, rent, lease, loan, sell, distribute or create derivative works based on the Service or the Service Content, in whole or in part, except that the foregoing does not apply to your own User Content (as defined below) that you legally upload to the Service. In connection with your use of the Service you will not engage in or use any data mining, robots, scraping or similar data gathering or extraction methods. If you are blocked by Spot.Coach from accessing the Service (including by blocking your IP address), you agree not to implement any measures to circumvent such blocking (e.g., by masking your IP address or using a proxy IP address). Any use of the Service or the Service Content other than as specifically authorized herein is strictly prohibited. The technology and software underlying the Service or distributed in connection therewith are the property of Spot.Coach, our affiliates and our partners (the “Software”). You agree not to copy, modify, create a derivative work of, reverse engineer, reverse assemble or otherwise attempt to discover any source code, sell, assign, sublicense, or otherwise transfer any right in the Software. Any rights not expressly granted herein are reserved by Spot.Coach.
The Spot.Coach name and logos are trademarks and service marks of Spot.Coach (collectively the “Spot.Coach Trademarks”). Other Spot.Coach, product, and service names and logos used and displayed via the Service may be trademarks or service marks of their respective owners who may or may not endorse or be affiliated with or connected to Spot.Coach. Nothing in this Terms of Service or the Service should be construed as granting, by implication, estoppel, or otherwise, any license or right to use any of Spot.Coach Trademarks displayed on the Service, without our prior written permission in each instance. All goodwill generated from the use of Spot.Coach Trademarks will inure to our exclusive benefit.
Third Party Material: Under no circumstances will Spot.Coach be liable in any way for any content or materials of any third parties (including users), including, but not limited to, for any errors or omissions in any content, or for any loss or damage of any kind incurred as a result of the use of any such content. You acknowledge that Spot.Coach does not pre-screen content, but that Spot.Coach and its designees will have the right (but not the obligation) in their sole discretion to refuse or remove any content that is available via the Service. Without limiting the foregoing, Spot.Coach and its designees will have the right to remove any content that violates these Terms of Service or is deemed by Spot.Coach, in its sole discretion, to be otherwise objectionable. You agree that you must evaluate, and bear all risks associated with, the use of any content, including any reliance on the accuracy, completeness, or usefulness of such content.
The Service may provide, or third parties may provide, links or other access to other sites and resources on the Internet. Spot.Coach has no control over such sites and resources and Spot.Coach is not responsible for and does not endorse such sites and resources. You further acknowledge and agree that Spot.Coach will not be responsible or liable, directly or indirectly, for any damage or loss caused or alleged to be caused by or in connection with use of or reliance on any content, events, goods or services available on or through any such site or resource. Any dealings you have with third parties found while using the Service are between you and the third party, and you agree that Spot.Coach is not liable for any loss or claim that you may have against any such third party.
You agree to release, defend, indemnify and hold Spot.Coach and its affiliates and their officers, employees, directors and agents (collectively, “Indemnitees”) harmless from and against any and all losses, damages, expenses, including reasonable attorneys’ fees, rights, demands, claims, actions of any kind and any injury (including death) or property damage arising out of or relating to your use of the Service, any activities or transactions in connection with any Coach or Session, any User Content, your connection to the Service, your violation of these Terms of Service, any damage to proprety or any personal injury to any extent caused directly or indirectly by any Coach, or your violation of any rights of another.
Notwithstanding the foregoing, you will have no obligation to indemnify or hold harmless any Indemnitee from or against any liability, losses, damages or expenses incurred as a result of any action or inaction of such Indemnitee.
INDEMNITEES EXPRESSLY DISCLAIM ANY LIABILITY THAT MAY ARISE BETWEEN COACHES AND EMPLOYEES ENGAGED IN THE SERVICE, BECAUSE SPOT.COACH IS NOT INVOLVED IN THE ACTUAL CONTACT BETWEEN COACHES AND EMPLOYEES OR IN THE COMPLETION OF ANY SESSION. IN THE EVENT THAT AN EMPLOYEE HAS A DISPUTE WITH A COACH OR EMPLOYER, EMPLOYEE RELEASES INDEMNITEES FROM ANY AND ALL CLAIMS, DEMANDS, OR DAMAGES (ACTUAL, DIRECT OR CONSEQUENTIAL) OF EVERY KIND AND NATURE, KNOWN AND UNKNOWN, SUSPECTED AND UNSUSPECTED, DISCLOSED AND UNDISCLOSED, ARISING OUT OF OR IN ANY WAY CONNECTED WITH SUCH DISPUTE.
YOUR USE OF THE SERVICE IS AT YOUR SOLE RISK. THE SERVICE IS PROVIDED ON AN “AS IS” AND “AS AVAILABLE” BASIS. SPOT.COACH EXPRESSLY DISCLAIMS ALL WARRANTIES OF ANY KIND, WHETHER EXPRESS, IMPLIED OR STATUTORY, INCLUDING, BUT NOT LIMITED TO WARRANTIES AS TO SERVICES OFFERED BY PERSONS LISTED ON THE SERVICES, THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT.
SPOT.COACH MAKES NO WARRANTY THAT (I) THE SERVICE WILL MEET YOUR REQUIREMENTS, (II) THE SERVICE WILL BE UNINTERRUPTED, TIMELY, SECURE, OR ERROR-FREE, (III) THE RESULTS THAT MAY BE OBTAINED FROM THE USE OF THE SERVICE WILL BE ACCURATE OR RELIABLE, (IV) THE QUALITY OF ANY PRODUCTS, SERVICES, INFORMATION, OR OTHER MATERIAL PURCHASED OR OBTAINED BY YOU THROUGH THE SERVICE WILL MEET YOUR EXPECTATIONS, (V) ANY ERRORS IN THE SERVICE WILL BE CORRECT, AND (VI) THE COMPANY MAKES NO WARRANT AS TO ANY INFORMATION OR MATERIALS PROVIDED BY EMPLOYERS, EMPLOYEES OR COACHES.
YOU EXPRESSLY UNDERSTAND AND AGREE THAT SPOT.COACH WILL NOT BE LIABLE FOR ANY INDIRECT, INCIDENTAL, SPECIAL, CONSEQUENTIAL, EXEMPLARY DAMAGES, OR DAMAGES FOR LOSS OF PROFITS INCLUDING BUT NOT LIMITED TO, DAMAGES FOR LOSS OF GOODWILL, USE, DATA OR OTHER INTANGIBLE LOSSES (EVEN IF SPOT.COACH HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES), WHETHER BASED ON CONTRACT, TORT, NEGLIGENCE, STRICT LIABILITY OR OTHERWISE, RESULTING FROM: (I) THE USE OR THE INABILITY TO USE THE SERVICE; (II) THE COST OF PROCUREMENT OF SUBSTITUTE GOODS AND SERVICES RESULTING FROM ANY GOODS, DATA, INFORMATION OR SERVICES PURCHASED OR OBTAINED OR MESSAGES RECEIVED OR TRANSACTIONS ENTERED INTO THROUGH OR FROM THE SERVICE; (III) UNAUTHORIZED ACCESS TO OR ALTERATION OF YOUR TRANSMISSIONS OR DATA; (IV) STATEMENTS OR CONDUCT OF ANY THIRD PARTY ON THE SERVICE; OR (V) ANY OTHER MATTER RELATING TO THE SERVICE. IN NO EVENT WILL SPOT.COACH’S TOTAL LIABILITY TO YOU FOR ALL DAMAGES, LOSSES OR CAUSES OF ACTION EXCEED THE AMOUNT YOU HAVE PAID SPOT.COACH IN THE LAST SIX (6) MONTHS, OR, IF GREATER, ONE HUNDRED DOLLARS ($100).
This Dispute Resolution by Binding Arbitration section is referred to in this Terms of Service as the “Arbitration Agreement.” You agree that any and all disputes or claims that have arisen or may arise between you and Spot.Coach, whether arising out of or relating to this Terms of Service (including any alleged breach thereof), the Services, any advertising, any aspect of the relationship or transactions between us, shall be resolved exclusively through final and binding arbitration, rather than a court, in accordance with the terms of this Arbitration Agreement, except that you may assert individual claims in small claims court, if your claims qualify. Further, this Arbitration Agreement does not preclude you from bringing issues to the attention of federal, state, or local agencies, and such agencies can, if the law allows, seek relief against us on your behalf. You agree that, by entering into this Terms of Service, you and Spot.Coach are each waiving the right to a trial by jury or to participate in a class action. Your rights will be determined by a neutral arbitrator, not a judge or jury. The Federal Arbitration Act governs the interpretation and enforcement of this Arbitration Agreement.
YOU AND SPOT.COACH AGREE THAT EACH OF US MAY BRING CLAIMS AGAINST THE OTHER ONLY ON AN INDIVIDUAL BASIS AND NOT AS A PLAINTIFF OR CLASS MEMBER IN ANY PURPORTED CLASS OR REPRESENTATIVE ACTION OR PROCEEDING. UNLESS BOTH YOU AND SPOT.COACH AGREE OTHERWISE, THE ARBITRATOR MAY NOT CONSOLIDATE OR JOIN MORE THAN ONE PERSON’S OR PARTY’S CLAIMS AND MAY NOT OTHERWISE PRESIDE OVER ANY FORM OF A CONSOLIDATED, REPRESENTATIVE, OR CLASS PROCEEDING. ALSO, THE ARBITRATOR MAY AWARD RELIEF (INCLUDING MONETARY, INJUNCTIVE, AND DECLARATORY RELIEF) ONLY IN FAVOR OF THE INDIVIDUAL PARTY SEEKING RELIEF AND ONLY TO THE EXTENT NECESSARY TO PROVIDE RELIEF NECESSITATED BY THAT PARTY’S INDIVIDUAL CLAIM(S), EXCEPT THAT YOU MAY PURSUE A CLAIM FOR AND THE ARBITRATOR MAY AWARD PUBLIC INJUNCTIVE RELIEF UNDER APPLICABLE LAW TO THE EXTENT REQUIRED FOR THE ENFORCEABILITY OF THIS PROVISION.
Spot.Coach is always interested in resolving disputes amicably and efficiently, and most customer concerns can be resolved quickly and to the customer’s satisfaction by emailing customer support at [email protected] . If such efforts prove unsuccessful, a party who intends to seek arbitration must first send to the other, by certified mail, a written Notice of Dispute (“Notice”). The Notice to Spot.Coach should be sent to 6121 Sunset Blvd., Los Angeles, CA 90028 (“Notice Address”). The Notice must (i) describe the nature and basis of the claim or dispute and (ii) set forth the specific relief sought. If Spot.Coach and you do not resolve the claim within sixty (60) calendar days after the Notice is received, you or Spot.Coach may commence an arbitration proceeding. During the arbitration, the amount of any settlement offer made by Spot.Coach or you shall not be disclosed to the arbitrator until after the arbitrator determines the amount, if any, to which you or Spot.Coach is entitled.
Unless Spot.Coach and you agree otherwise, any arbitration hearings will take place in a reasonably convenient location for both parties with due consideration of their ability to travel and other pertinent circumstances. If the parties are unable to agree on a location, the determination shall be made by AAA. If your claim is for $10,000 or less, Spot.Coach agrees that you may choose whether the arbitration will be conducted solely on the basis of documents submitted to the arbitrator, through a telephonic hearing, or by an in-person hearing as established by the AAA Rules. If your claim exceeds $10,000, the right to a hearing will be determined by the AAA Rules. Regardless of the manner in which the arbitration is conducted, the arbitrator shall issue a reasoned written decision sufficient to explain the essential findings and conclusions on which the award is based.
Payment of all filing, administration, and arbitrator fees (collectively, the “Arbitration Fees”) will be governed by the AAA Rules, unless otherwise provided in this Arbitration Agreement. If the value of the relief sought is $75,000 or less, at your request, Spot.Coach will pay all Arbitration Fees. If the value of relief sought is more than $75,000 and you are able to demonstrate to the arbitrator that you are economically unable to pay your portion of the Arbitration Fees or if the arbitrator otherwise determines for any reason that you should not be required to pay your portion of the Arbitration Fees, Spot.Coach will pay your portion of such fees. In addition, if you demonstrate to the arbitrator that the costs of arbitration will be prohibitive as compared to the costs of litigation, Spot.Coach will pay as much of the Arbitration Fees as the arbitrator deems necessary to prevent the arbitration from being cost-prohibitive. Any payment of attorneys’ fees will be governed by the AAA Rules.
Notwithstanding any provision in this Terms of Service to the contrary, Spot.Coach agrees that if it makes any future change to this Arbitration Agreement (other than a change to the Notice Address) while you are a user of the Services, you may reject any such change by sending Spot.Coach written notice within thirty (30) calendar days of the change to the Notice Address provided above. By rejecting any future change, you are agreeing that you will arbitrate any dispute between us in accordance with the language of this Arbitration Agreement as of the date you first accepted these Terms of Service (or accepted any subsequent changes to these Terms of Service).
You agree that Spot.Coach, in its sole discretion, may suspend or terminate your account (or any part thereof) or use of the Service and remove and discard any content within the Service, for any reason, including, without limitation, for lack of use or if Spot.Coach believes that you have violated or acted inconsistently with the letter or spirit of these Terms of Service. Any suspected fraudulent, abusive or illegal activity that may be grounds for termination of your use of Service, may be referred to appropriate law enforcement authorities. Spot.Coach may also in its sole discretion and at any time discontinue providing the Service, or any part thereof, with or without notice. You agree that any termination of your access to the Service under any provision of this Terms of Service may be effected without prior notice, and acknowledge and agree that Spot.Coach may immediately deactivate or delete your account and all related information and files in your account and/or bar any further access to such files or the Service. Further, you agree that Spot.Coach will not be liable to you or any third party for any termination of your access to the Service.
You agree that you are solely responsible for your interactions with any other user in connection with the Service and Spot.Coach will have no liability or responsibility with respect thereto. Spot.Coach reserves the right, but has no obligation, to become involved in any way with disputes between you and any other user of the Service.
These Terms of Service constitute the entire agreement between you and Spot.Coach and govern your use of the Service, superseding any prior agreements between you and Spot.Coach with respect to the Service. You also may be subject to additional terms and conditions that may apply when you use affiliate or third party services, third party content or third party software. These Terms of Service will be governed by the laws of the State of California without regard to its conflict of law provisions. With respect to any disputes or claims not subject to arbitration, as set forth above, you and Spot.Coach agree to submit to the personal and exclusive jurisdiction of the state and federal courts located within New Castle County, Delaware. The failure of Spot.Coach to exercise or enforce any right or provision of these Terms of Service will not constitute a waiver of such right or provision. If any provision of these Terms of Service is found by a court of competent jurisdiction to be invalid, the parties nevertheless agree that the court should endeavor to give effect to the parties’ intentions as reflected in the provision, and the other provisions of these Terms of Service remain in full force and effect. You agree that regardless of any statute or law to the contrary, any claim or cause of action arising out of or related to use of the Service or these Terms of Service must be filed within one (1) year after such claim or cause of action arose or be forever barred. A printed version of this agreement and of any notice given in electronic form will be admissible in judicial or administrative proceedings based upon or relating to this agreement to the same extent and subject to the same conditions as other business documents and records originally generated and maintained in printed form. You may not assign this Terms of Service without the prior written consent of Spot.Coach, but Spot.Coach may assign or transfer this Terms of Service, in whole or in part, without restriction. The section titles in these Terms of Service are for convenience only and have no legal or contractual effect. Notices to you may be made via either email or regular mail. The Service may also provide notices to you of changes to these Terms of Service or other matters by displaying notices or links to notices generally on the Service.
Under California Civil Code Section 1789.3, users of the Service from California are entitled to the following specific consumer rights notice: The Complaint Assistance Unit of the Division of Consumer Services of the California Department of Consumer Affairs may be contacted in writing at 1625 North Market Blvd., Suite N 112, Sacramento, CA 95834, or by telephone at (916) 445-1254 or (800) 952-5210. You may contact us at Spot.Coach, Inc., 6121 Sunset Blvd., Los Angeles, CA 90028.
Please contact us at [email protected] to report any violations of these Terms of Service or to pose any questions regarding this Terms of Service or the Service. | 2019-04-22T23:04:46Z | https://sidekick-hq.com/terms-of-service/ |
Gwen Bonik won with a +250.
In the Seniors Scratch Division Wally Bridgett won with 2133.
The final tournament this year for teaching and seniors will be held on February 24, 2018. Check with your zone director to be sure of your location and time.
The ladies third tournament winner was Tracy Smith of Calgary with a 2342. This is Tracy’s 14th tournament victory. Congratulations!
The winner of the fourth ladies tournament was Shauna Pirie-Laisnez of Big Valley with a 2274. This is Shauna’s 3rd tournament win.
In the men’s division, Dexter Wiseman of Sherwood Park won his 6th Master’s tournament with a score of 2135.
Bradly Tytgat took the fourth tournament in the men’s division also with a score of 2159. This is Bradly’s 1st tournament victory. Way to go!
Tournament 5 and 6 will be held in Edmonton on March 17 and 18. Check with your zone directors as to the exact location and times.
The annual Master/YBC Provincial tournament is being held on March 11, 2018 at Heritage Lanes in Red Deer. This is a great event that gives our youth bowlers a glimpse at what being a Master is all about.
Entry information has been sent to the bowling centers and your proprietors should be running house rounds in the near future. Please take the time to check it out and join in. It really is a lot of fun for those who get involved!!
March 18, 2018, at Heritage Lanes in Red Deer. The start times will be Saturday @ 1:00 p.m. and Sunday @ 9:00 a.m. Cost is $90.
There will be supper served at the lanes following the bowling on Saturday and a lunch will be served on Sunday as well. There will be a cost for the meals but it has not yet been determined what the cost will be. This information will be sent out once we have a list of the qualifiers and we know how many people will be attending the Provincials.
If you have qualified to bowl and you do not plan to attend please let Bev Gigliuk know as soon as possible. She can be contacted at [email protected] or by phone at 403-340-8961.
Also; don’t forget to bring extra Cash ! This is to take care of elimination draw tickets.
The Teaching Division Provincials are being held at Chinook Bowladrome in Calgary on Saturday, March 17, 2018 @ 1:00 p.m. and Sunday, March 18, 2018 @ 9:00 a.m. Chinook is located at Chinook Shopping Centre (B75, 6455 MacLeod Trail S) in Calgary. Phone: 403-252-5747. Cost will be $90.
Alberta’s National Team will be finalized on Sunday and the winners will be asked to stay a little later to pick a coach, sign papers, and get sized up for shirts.
If you have qualified to bowl and you do not plan to attend please let Rhod Hubbard or Dorry Mielke know as soon as possible. Rhod can be contacted at [email protected] or by phone at 403-279-5310 and Dorry can be contacted at [email protected] or by phone at 780-884-1719.
information sent to him at [email protected]. The average date to be used is February 25, 2018, and must be sent to Rhod by March 3, 2018.
Remember to bring extra Cash ! This is to take care of elimination draw tickets.
The deadline for resumes for Teaching and Senior divisions is before the first ball is thrown on the last day of the Provincial tournament. The deadline for the Tournament division is before the first ball is thrown on the morning of the final tournament.
Your Teaching Division Director contacts are Rhod Hubbard and Dorry Mielke. Rhod’s e-mail is [email protected] and Dorry’s e-mail is [email protected] .
The dates for the 2018 Master’s Nationals are from June 30 – July 4, 2018 in Thunder Bay, Ontario.
June 29 & July 5 are travel days, with the opening ceremony on June 30 and the bowling starting on July 1.
The date for this year’s AGM is Sunday, May 27, 2018 at 12:00 p.m. at the Kerry Wood Nature Centre in Red Deer (6300 45 Avenue, Red Deer – 403-346-2010). Please mark this in your calendar and plan to attend.
Jaymin Wudkevich won a silver medal in Regina. He was the single representative in the Teaching Men division. Way to go Jaymin!
Congratulations to Bonnie McDonald of Hilo on winning the first Tournament! Bonnie bowled a 2380. This is Bonnie’s sixth tournament win.
Jennifer Smith of Calgary rolled a score of 2061 to take tournament #2. Jennifer continues her winning ways as this was her twenty-seventh win! Congratulations Jennifer.
What a weekend for Brad Wilton of Calgary! He won both tournaments with a score of 2258 and 2270. This was his fifth and sixth win.
Congratulations to all. Great bowling!
The first and second teaching division tournaments are complete.
Congratulations go out to Ashley Bridgett from Sherwood Park on winning in the North Teaching Ladies division with a +232. This is Ashley’s second year as a master.
Shelly Taylor of Calgary won the South Teaching Ladies tournament with a +227.
On the men’s side, Henry Schuetz of Edmonton won the Teaching Men’s North division with a +325. He’s been a member for 3 years.
Darcy Schmitki of Calgary was a runaway winner with +233. Congratulations!
Jamie McAra from Edmonton bowled a +216 to win the North Teaching Ladies division. Way to go!
Ashley Collins from Airdrie won the South Teaching Ladies tournament with a +252. Great bowling!
Craig MacDonald from Edmonton bowled well on this day. He was a +222 winning the Teaching Men’s North division.
Glen Demmon was a clear winner with a +311. He represented the Teaching Men’s South division.
The Senior’s POA Division was won by Dwight Anderson of Edmonton. Dwight rolled a +193.
Greg Gigliuk was the best bowler on this day. He bowled 2072. Way to go! This was his 13th win in both the tournament and senior division.
The senior’s POA division was won by Gwen Bonik from Edmonton. She bowled a +134.
Tom Stevenson from Calgary won the Senior’s Scratch division. He had a total of 2087.
Way to go to all the bowlers!
Brian Randall of Fort Saskatchewan, Jerry Kind of Lethbridge, Ken Malcomson of Medicine Hat, and Rhod Hubbard of Calgary.
These bowlers/coaches will be receiving their recognition award throughout the current season! Please take the time to congratulate them on their accomplishment.
Coach upgrade or Competition Coach certified by December 31, 2017.
We would like to take this opportunity to thank Mark Polivchuk for continuing to look after our website, not only throughout our bowling season, but throughout the rest of the year as well. Mark recently updated our “look”. Check it out at mbaofa.ca.
Mark is always very prompt in posting information when asked and keeps our website up to date with what’s going on in the bowling world. Thank you Mark for the great job that you do for the Master Bowlers’ Association of Alberta!!
Just a reminder of the Master/Youth Tournament. These entry forms are to be forwarded to Paradise Lanes. Mark Miller’s information is included on the entry form.
The Master/Youth Tournament will be held on Saturday, November 18, 2017 and November 19, 2017, at Paradise Lanes in Calgary. The shift on November 18 begins at 4:00pm and the one on November 19 begins at 9:00 am. Entry fee is $50.00 per bowler!
Please be sure to include your phone number on the entry form. This is in the event that you need to be contacted in the case of a time change or cancellation. Neither are likely but having your phone number makes this much easier! Thank you.
The 2018 Nationals will be held in Thunder Bay, Ontario. from June 30, 2018 – July 4, 2018. Travel dates June 29 and return July 5. Opening Ceremonies are June 30.
To be eligible to participate on a National team, you must have taken a Community Sport Initiation Clinic prior to December 31st of the current bowling season. Many clinics have taken place in September and October. Let Brian Sudbury know if you would like to take a clinic so that you could qualify.
Welcome back for another season of the Master Bowlers Association of Alberta.
We had a very good showing in Regina as we won the aggregate for the fifth time in six years. Actually we tied with Ontario for this honour.
Congratulations to Jennifer Smith (Marshall) who won the Tournament Ladies Singles Gold Medal for a second time. Jennifer won the title in 1997. Jennifer finished first in the match play with a great 16 win 4 loss and one tie record. Jennifer then won the Gold Medal step ladder with two straight wins over Tracey Ormiston of Ontario. Jennifer joins our Dianne Violini as multiple winners of this prestigious title.
Gary Baird tied for second and third but came up short in a one game roll off against Tom Williams of Northern Ontario and eventual champion Shane Chafe of Newfoundland. The Tournament Men singles were extremely close as the top qualifier Danny Baer had 24 points and the 8th qualifier had 18 points. Three bowlers had 20 points and three had 22 points.
Tournament Men brought home Gold led by Freddie Tofflemire who set a new MBA of Canada record for average at a Masters Nationals with 296.8 average. Dexter Wiseman, Brad Wilton, Brad Glynn, Matt Schultz, and coach Cassey Campbell comprised the team. This was the first Gold medal for the men since 2010.
Tournament Ladies won silver. Congratulations to Tracy Smith, Halea DeSutter, Danielle DeBlois, Shauna Pirie-Laisnez, Bonnie McDonald and coach Geoff Wilson. Alberta native Jennifer Baker led the Newfoundland ladies to their first ever Gold Medal.
Bonnie Clermont won Gold with a 15-6 match play record amongst the Teaching Division. The Teaching Ladies brought home a bronze medal. Congratulations to Bonnie Clermont, Rhonda Bowden, Jennifer Smith (Johnston), Courtney Rowlett, Ryleigh Cleator and coach Bob Stirling. Our Teaching Men finished eighth.
Jaymin Wudkevich won a Silver medal in Teaching Division singles.
Norm Preston won a Bronze Medal for Seniors Singles. The Seniors had a lot of fun.
Alberta Rookies did us proud with excellent costumes and an outstanding performance to the tune of “Macho Man” by the Village People. We even had Jennifer Smith (Johnston) do three point pushups to up the ante. We certainly had the most rookies at Nationals by far and the stage could not contain them. Before long they were making their way onto the dance floor and enticing the judges with their act. Kudo’s to our rookies who are no longer rookies. Alberta always puts on a great show! Memories for life.
We continue to offer the Rookie Rate to welcome new bowlers into our Tournaments. First year members of the Master Bowlers Association of Alberta over the age of 25 and who has never been a member of any Master Bowlers Association in Canada will be charged the same tournament rate currently charged to our members under the age of 25 during their first season of tournaments.
We also have our Welcome Back Rate. Members of the Master Bowlers Association over the age of 25 and who have not competed in any Master Bowlers Association tournament in Canada in the past 3 consecutive seasons will have the opportunity to apply to be charged the same tournament rate currently charged to our members under the age of 25 during the current season of tournaments. The application must be received prior to participation. The rate can be used once during the member’s lifetime.
MBA of A members competing in qualifying tournaments must be a member in good standing with the Alberta 5-Pin Bowlers’ Association and the Master Bowlers’ Association of Alberta. The 5 pin card must be purchased through a local proprietor or directly through the Alberta 5 pin office.
Enclosed you will find the schedule for the season’s upcoming tournaments. Please remember to check future newsletters for notices of change of dates or times. Sometimes changes do have to be made and we do not want anyone missing out or arriving for a tournament on the wrong day.
Included with this newsletter you will find an entry form for the Master/Youth Tournament. These entry forms are to be forwarded to Paradise Lanes. Mark Miller’s information is included on the entry form.
The Master/Youth Tournament will be held on Saturday, November 18 & 19, 2017, at Paradise Lanes in Calgary, with a shift at 3:00 p.m. and also a 7:00 p.m. shift, if necessary. Entry fee is $50.00 per bowler!
Please be sure to include your phone number on the entry form. This is in the event that you need to be contacted in the case of a time change or cancellation. Neither are likely, but having your phone number makes this much easier! Thank you.
Please note the late fee of $10.00 if renewal fees are not paid by September 23rd of the current bowling season.
Community Sport – Initiation – Sunday September 24, Chinook Mall Training Center, lower level across from Chinook Bowladrome, Calgary 8:30 a.m. – 5:00 P.M.
Community Sport – Initiation – Sunday October 15, Christmas Bureau in Red Deer, #15, 7428 – 49 Ave., (behind the Ranch House Restaurant, just north of Cosmos Bottle Depot, one block east of Gaetz Ave.), 9:00- 5:00 P.M.
Competitive Coach – September 22 – 24, Christmas Bureau in Red Deer, #15, 7428 – 49 Ave., (behind the Ranch House Restaurant, just north of Cosmos Bottle Depot, one block east of Gaetz Ave.), Friday 6 pm – 10 pm, Saturday and Sunday 9:00 a.m. – 5:00 p.m.
Congratulations are going out to Jennifer Smith who won the 5th and 6th tournaments with a score of 2190 and 2034. This is an amazing feat as Jennifer has now won 26 tournaments!! We are truly awed by her performance!
In the 5th tournament on the men’s side, Adam Weber won his 4th tournament with a score of 2352.
Scott Hauca won his first tournament with a score of 2170.
Ladies singles representative is Jennifer Smith of Calgary.
The men’s singles representative is Gary Baird of Blackfalds.
The ladies team is made up of Halea Pederson, Bonnie McDonald, Shauna Pirie-Laisnez, Tracy Smith and Danielle Peters. Coaching the ladies will be Geoff Wilson.
The tournament men’s team consists of Dexter Wiseman, Freddie Tofflemire, Brad Wilton, Matt Schultz and Brad Glynn. The men’s coach will be Cassey Campbell.
Congratulations to everyone and best of luck to all of you heading to the Nationals in Regina, Sakatchewan from June 29-July 4, 2017!!
Amber Kidd of St. Albert won the 4th North Division Ladies tournament with a +146. This is her first year as a Master Bowler. In the South, Melissa Olson of Calgary won with a +137.
On the men’s side Andrew Gayleard from Edmonton won the North with a +217. This was Andrew’s first year as a Master Bowler as well. Zack Doyle from Calgary was the South winner with a +385!!!.
In the Senior POA Division, Gwen Bonik of Edmonton won with a +125.
In the Senior Scratch Division, Ken Malcomson won with a score of 1932.
Make sure that you have sent in your averages as of March 3. Dorry or Rhod require this by March 8.
If you cannot attend, please let your Tournament Director know before March 8. This makes it much easier for setting up the tournament.
Your Senior Division Director is Joe Wood. Joe’s e-mail is [email protected] .
purchase 2 elimination draw tickets so bring a bit of extra cash to take care of this. Thank you.
Your Senior Division Director is Joe Wood. Joe’s-mail is [email protected] or phone at 403-285-4575.
Bowl Alberta is hosting their annual All Events tournament on the weekend of April 1 & 2, 2017 at Bonnie Doon Lanes, Edmonton. This is a scratch/handicap tournament including singles, doubles, and 4 player teams. This tournament is for adults and is much the same format as the Youth Scholarship Tournament.
Bowl Alberta is also holding their annual Youth Scholarship Tournament. This is to be held May 19-21, 2016 at Chinook Bowladrome, Calgary. This tournament is a scratch/handicap event, including singles, doubles, and 3 player teams.
The Youth Scholarship Entry Forms are available at your local bowling centre and also on the Bowl Alberta website at bowlab.ca . Click on the FORMS tab to download forms for both the All Events & YBC Scholarship Tournaments.
The Alberta Youth Bowling Camp will be held from August 10-13, 2016 at Mount Royal University and Chinook Bowladrome Lanes in Calgary. If you are interested in coaching or assisting with the Youth Camp, please contact Grady Long in Edmonton at 780-422-8251 or download the coach’s application form at bowlab.ca and click on the FORMS tab.
The following people volunteered for the casino this year that was held in January. Thank you to all of those who did volunteer. We rely on the funds from the casino. When you see these people please say thank you to them.
Marc Tremblay won with a +304.
In the Seniors Scratch Division Wally Bridgett won with 2030.
The final tournament this year for teaching and seniors will be held on February 26, 2017. Check with your zone director to be sure of your location and time.
The ladies third tournament winner was Jennifer Smith of Calgary with a 2224. This is Jennifer’s 24rd tournament victory. Congratulations!
The winner of the fourth ladies tournament was Bonnie McDonald of Hylo with a 2105. This is Bonnie’s 5th tournament win.
In the men’s division, Mark Johnstone of Edmonton won his 6th Master’s tournament with a score of 2301.
Garry Baird took the fourth tournament in the men’s division also with a score of 2529. This is Garry’s 9th tournament victory.
Tournament 5 and 6 will be held in Calgary on March 4 and 5. Check with your zone directors as to the exact location and times.
The annual Master/YBC Provincial tournament is being held on March 12, 2017 at Heritage Lanes in Red Deer. This is a great event that gives our youth bowlers a glimpse at what being a Master is all about.
March 19, 2016, at Parellel Lanes in St Paul. The start times will be Saturday @ 1:00 p.m. and Sunday @ 9:00 a.m.
The Teaching Division Provincials are being held at Bonnie Doon in Edmonton on Saturday, March 18, 2017 @ 1:00 p.m. and Sunday, March 19, 2017 @ 9:00 a.m. Bonnie Doon is located at 82 Avenue and 85 Street in Edmonton. Phone: 780-466-9047.
information sent to him at [email protected]. The average date to be used is February 25, 2017, and must be sent to Rhod by March 3, 2017.
The dates for the 2016 Master’s Nationals are from June 29-July 4, 2017 in Regina, Saskatchewan.
June 29 & July 4 are travel days, with the opening ceremony on June 29 and the bowling starting on June 30.
The date for this year’s AGM is Sunday, May 28, 2017 at 12:00 p.m. at the Kerry Wood Nature Centre in Red Deer (6300 45 Avenue, Red Deer – 403-346-2010). Please mark this in your calendar and plan to attend.
With the increase in the cost of supplying golf shirts, we have increased the price of a shirt to $70.00.
The Master Bowlers Association of Alberta are hosting a fundraiser Casino and need volunteers.
The casino is being held January 9 and 10, 2017 at the Deerfoot Inn & Casino. Anyone interested in helping can contact Jamey Frank at [email protected] or 403-650-9185 with their availability. We are in need of volunteers for both daytime and evening/night shift in all positions at this point so any help you can give is appreciated!
Congratulations to Halea Pederson of Edmonton on winning the first Tournament!! Halea bowled a 2340 at Bonnie Doon Lanes. This is Halea’s second tournament win.
The men’s tournament #1 winner was Brad Wilton of Calgary with an unreal 2562 at Bonnie Doon Lanes. This is Brad’s 3rd win.
Annette Campbell of Edmonton rolled a score of 2160 to take tournament #2. Congratulations Annette.
The 2nd men’s tournament was won by Dexter Wiseman. Dexter bowled a 2383 and collected his 5th set of stars. Dexter also has 2378 in the first tournament. Nice average for the weekend.
The first teaching division tournament is complete.
Congratulations go out to Courtney Rowlett from Edmonton on winning in the North Teaching Ladies division with a +353.
Rachel Demmon of Airdrie won the South Teaching Ladies tournament with an outstanding +640.
On the men’s side, Evan Kane of Edmonton won the Teaching Men’s North division with a +326.
Rhod Hubbard of Calgary edged out Mike Petrucha in the South with a +296 to plus 282. Congratulations!
The Senior’s POA Division was won by Cisco Beyersbergen of Edmonton. Cisco rolled a +165.
Lynn Howell of Edmonton won the Senior’s Scratch division with a 2168 at Bonnie Doon Lanes edging out Greg Gigliuk (2107). This is Lynn’s 3rd win in the Senior Division.
Ralph Galenza of Calgary, Andre Vaillancourt of Edmonton and Shirly Kultgen of Medicine Hat.
Coach upgrade or Competition Coach certified by December 31, 2016.
The Master/Youth Tournament will be held on Saturday, November 26, 2016, at Paradise Lanes in Calgary, with a shift at 3:00 p.m. and also a 7:00 p.m. shift, if necessary. Entry fee is $50.00 per bowler!
To be eligible to participate on a National team, you must have taken a Community Sport Initiation Clinic prior to December 31st of the current bowling season. | 2019-04-19T21:06:52Z | https://mbaofa.ca/author/mbaofa/page/2/ |
From left, a white king, black rook and queen, white pawn, black knight, and white bishop in a set of Staunton chess pieces.
Chess is an abstract strategy board game and mental sport for two players. The object of the game is to checkmate the opponent's king. This occurs when the king is under immediate attack (in check) and there is no way to remove it from attack on the next move.
Chess is one of the world's most popular board games; it is played both recreationally and competitively in clubs, tournaments, online, and by mail or e-mail ( correspondence chess).
Many variants and relatives of chess are played throughout the world. The most popular are xiangqi in China and shogi in Japan. Other national chess variants include janggi in Korea and makruk in Thailand. The game described in this article is sometimes known as Western Chess or International Chess to distinguish it from other variants.
The position of the pieces at the start of a game of chess.
A typical Staunton-design chess set and clock.
Chess is played on a square board of eight rows (called ranks) and eight columns (called files) of squares. The colors of the sixty-four squares alternate between light and dark, and are referred to as "light squares" and "dark squares".
Each player begins the game with sixteen pieces which can move in defined directions, and in some instances, limited range, and can remove (capture) other pieces from the board: each player's pieces comprise eight pawns, two knights, two bishops, two rooks, one queen and one king. One player controls the white pieces and the other player controls the black pieces; the player that controls white is always the first player to move. The players alternate moving one piece at a time (with one important exception) to either an unoccupied square, or one occupied by an opponent's piece, capturing it. With one exception ( en passant), all pieces capture opponent's pieces by moving to the square that the opponent's piece occupies.
When a king is under direct attack by one (or possibly two) of the opponent's pieces, the player is said to be in check. When in check, only moves that remove the king from attack are permitted. The object of the game is to checkmate the opponent; this occurs when the opponent's king is in check, and there are no moves that remove the king from attack. Normally a checkmate will require the cooperation of several pieces, but can also be achieved with only one, if the king is blocked by other pieces (e.g. a back rank checkmate). A player who deems checkmate is inevitable may concede the game (resign) to the other player. A drawn result (a tie) is also possible.
Chess has been described not only as a game but also as an art, a science, and a sport. It is sometimes seen as an abstract war game; as a "mental martial art", and teaching chess has been advocated as a way of enhancing mental prowess.
When a game begins, one player controls the sixteen white pieces while the other uses the sixteen black pieces. The colors are chosen either by a friendly agreement, by a game of chance such as pick-a-hand, or by a tournament director. The first player, referred to as White, always moves first and therefore has a slight advantage over the second player, referred to as Black. The chessboard is placed so that each player has a white square in the near right hand corner, and the pieces are set out as shown in the diagram, with each queen on a square that matches its colour.
Each kind of chess piece moves a different way.
The knight can jump over occupied squares and moves two spaces horizontally and one space vertically (or vice versa), making an L shape; a knight in the middle of the board has eight squares to which it can move. Note that every time a knight moves, it changes square colour.
A pawn can move forward one square, if that square is unoccupied. If it has not moved yet, the pawn has the option of moving two squares forward, if both squares in front of the pawn are unoccupied. A pawn cannot move backward.
When such an initial two square advance is made that puts that pawn horizontally adjacent to an opponent's pawn, the opponent's pawn can capture that pawn " en passant" as if it moved forward only one square rather than two, but only on the immediately subsequent move.
Pawns are the only pieces that capture differently than they move. They can capture an enemy piece on either of the two spaces adjacent to the space in front of them (i.e., the two squares diagonally in front of them), but cannot move to these spaces if they are vacant.
If a pawn advances all the way to its eighth rank, it is then promoted (converted) to a queen, rook, bishop, or knight of the same colour. In practice, the pawn is almost always promoted to a queen.
With the exception of the knight, pieces cannot jump over each other. One's own pieces ("friendly pieces") cannot be passed if they are in the line of movement, and a friendly piece can never replace another friendly piece. Enemy pieces cannot be passed, but they can be "captured". When a piece is captured (or taken), the attacking piece replaces the enemy piece on its square ( en passant being the only exception). The king cannot be captured, only put in check. If a player is unable to get the king out of check, checkmate results, with the loss of the game.
Chess games do not have to end in checkmate — either player may resign if the situation looks hopeless. Games also may end in a draw (tie). A draw can occur in several situations, including draw by agreement, stalemate, threefold repetition of a position, the fifty move rule, or a draw by impossibility of checkmate (usually because of insufficient material to checkmate). Chess games and positions are recorded using a chess notation, mostly the algebraic chess notation. The international rules of chess are described in more detail in the FIDE Handbook, section Laws of Chess.
Chess openings are a sequence of moves, often memorized, which will help a player build up his position and prepare for the middlegame. Openings are often designed to take hold of the centre of the board (e4, e5, d4 and d5), develop pieces, protect the king, and create a strong pawn structure. The classical school of chess expounds the virtues of occupying the centre early using pawns and/or pieces, while Hypermodernism advocates the control of the centre not by using pawns but with distant pieces. It is often important for a player to castle (a special move that moves the king from the centre of the board two squares towards one of the corners) to protect the king. While studying openings can greatly improve one's results, it is important to understand the underlying reasons for each sequence of moves in an opening. This can greatly reduce the need to rely on rote memorization of the opening phase of the game. Of the utmost importance in the opening is maintaining balance, or equality.
The black knight on e6 is pinned to its king by the white bishop, and the white knight is pinned to the queen on b1 by the black rook. Note that the knight on b4 is still free to legally move, while the knight on e6 cannot legally move.
When taking and trading pieces, the chess piece point values become important. Valuations differ slightly from book to book, but generally, taking pawns to be worth one point, knights and bishops are worth three points each, rooks are worth five points, and queens are worth nine points. Since the king's loss ends the game, it is invaluable (and the king is never traded). However, in the endgame when there are few pieces left on the board and there is little danger of checkmate, the fighting value of the king is equivalent to about four points. The actual value and importance of a piece will vary based upon its position and the stage of the game. If a player performs a sacrifice (e.g. exchange sacrifice), he is choosing to ignore the standard valuation of his pieces for positional or tactical gains. The beginning player should be aware that points are not an inherent part of the game; there is no scoring and chess was played long before the idea of assigning points to pieces. Instead, points are used by a player to consider whether he will come out materially better than his opponent in an exchange of pieces. For instance, to lose two pawns (two points) in taking the opponent's knight (three points) puts one ahead in material by one point. Such an advantageous exchange of pieces may, however, be a poor tactic if it leaves the opponent with an exploitable advantage in the way the pieces are positioned on the board.
Chess combinations and traps do not appear out of thin air. Usually they are present because the opponent has certain weaknesses in his position. These types of weaknesses include: pinned pieces, overloaded pieces, weaknesses around the opponent's king, weak squares, unprotected pieces, weak colour complexes, pieces not able to come back to defend the king, etc. The weaknesses can then be exploited with a chess combination that is often built out of a number of tactical "methods". Such weaknesses are often created in the opponent's position in the first place by threats, provocative moves, and generally strong "positional play", etc. Chess combinations often include a number of types of tactics which many middlegame books classify and provide examples. Such common tactical methods include pins, forks, skewers, discovered attacks (especially checks), zwischenzugs, deflections, decoys, sacrifices, forcing moves, undermining, overloading, interference and even "quiet moves".
A fork is a situation where a piece is moved such that two opposing pieces are attacked (forked) simultaneously. It usually is difficult for the other player to protect both of his pieces in one move. Pins are used to prevent the movement of an enemy piece by threatening any pieces behind it should it move. Skewers are a kind of reverse pin where the more valuable piece is placed in front of a less important one. A discovered attack (or revealed threat) is where the movement of one piece reveals a formerly blocked line of attack for another piece of the same colour. For clarification, it should be noted that a "pin" is a tactic - the act of pinning the opponent's pieces. But a "pinned piece" is a specific type of weakness in the opponent's position, which when identified, can be exploited with a tactical combination.
A few common positional elements which high level chess players routinely must assess include pawn structure, king safety, space, and control of key squares and groups of squares (e.g. diagonals, open-files, dark or light squares, etc.). In addition, there are factors such as the two bishops that compensate each other's weaknesses. Most middlegame books recommend that once an assessment of the elements of the position has taken place, it is then recommended to try and form a "plan" to create an advantage. Once a plan is formulated, it is then recommended to try and ensure the plan is feasible through the process of checking concrete variations.
Great chess writer Aron Nimzowitsch outlined in the classic work My System a number of middlegame positional principles such as "rook on the seventh rank", "undermining the pawn chain", "restrain, blockade and destroy". This work has influenced generations of modern chess players in how they think in the middlegame.
During the endgame, pawns and kings become relatively more powerful pieces as both sides often try to promote their pawns. If one player has a large material advantage, checkmate may happen quickly in the endgame. If the game is relatively even, endgame tablebases and endgame study are essential. Controlling the tempo (time used by each move) becomes especially important when fewer pieces are left on the board. In some cases, a player will have a material advantage, but will not have enough material to force a checkmate. In this case, the game is considered a draw by insufficient material.
Blitz chess is a version of chess where a chess clock is used to limit the time control for each player. Generally each side has three to fifteen minutes (five is common) for all of its moves. An even faster version of chess is known as bullet chess or lightning chess. Bullet chess's time controls are less than three minutes. Speed chess requires the player to spend less time thinking because if the player's time runs out, he loses. When playing at a faster time, computers become relatively more powerful than humans.
If both players use computers to enhance their strength, it is called advanced chess.
Chess can also be played blindfold. In this case the play is conducted without the players having sight of the positions of the pieces, or any physical contact with them. Moves are communicated via chess notation. Some very strong chess players are able to play multiple blindfold games simultaneously.
When two players are separated by great distances they can still play chess. Correspondence chess is chess played through the mail, e-mail or special correspondence chess servers.
Today, chess is often played on the internet through the telnet-based hosts (such as ICC and FICS) and TCP/IP based servers (such as Playchess and WCN).
One of many chess variants: Glinski's hexagonal chess.
Chess variants are forms of chess where the game is played with a different board, special fairy pieces or different rules. The number of possible chess variants is unlimited. D.B. Pritchard, the author of Encyclopedia of Chess Variants, estimates that there are more than two thousand chess variants , confining the number to published ones.
Many chess grandmasters played chess variants and some even invented new ones. José Raúl Capablanca feared a "draw death" of chess and suggested making the board larger and adding new pieces, such as a combination of rook and knight and also a combination of bishop and knight. He played a number of test games and finally setlled on an 8x10 chess variant, Capablanca chess .
Bobby Fischer objected to what he considered to be an overemphasis on memorized chess openings in normal chess, and the Russians fixing matches. Thus he devised a formalisation of the variant Shuffle Chess in response. In this chess variant, which he originally named Fischer Random Chess but is now typically called Chess960, the initial position is selected randomly before each game. This random positioning makes it almost impossible to prepare the opening play in advance.
A Persian youth playing chess with two suitors. A form of chess was played in Persia as early as the 3rd century.
Many countries claim to have invented chess in some incipient form. The most commonly held view is that chess originated in India , since the Arabic, Persian, Greek, Portuguese and Spanish words for chess are all derived from the Sanskrit game Chaturanga. In addition, in the past only India had all three animals, horse, camel and elephant, in its cavalry, which represent knight, bishop and rook in chess. The present version of chess played throughout the world ultimately derives from a version of Chaturanga that was played in India around the 6th century. It is believed that the Persians subsequently created a more recognizable version of the game called Shatranj.
Another theory exists that chess arose from the similar game of Xiangqi (Chinese chess), or at least a predecessor thereof, existing in China since the 2nd century BC. Scholars who have favored this theory include Joseph Needham and David H. Li.
Chess eventually spread westward to Europe and eastward as far as Japan, spawning variants as it went. The game spread throughout the Muslim world after the Islamic conquest of Persia. When it entered the Muslim world, the names of its pieces largely retained their Persian forms but its name became shatranj, which continued in Spanish as ajedrez and in Greek as zatrikion, but in most of Europe it was replaced by versions of the Persian word shāh = "king". There is a theory that this name replacement happened because, before the game of chess came to Europe, merchants coming to Europe brought ornamental chess kings as curiosities and with them their name shāh, which Europeans mispronounced in various ways.
Chess eventually reached Russia via Mongolia, where it was played at the beginning of the 7th century. It was introduced into the Iberian Peninsula by the Moors in the 10th century, and described in a famous 13th century manuscript covering chess, backgammon, and dice named the Libro de los juegos. The entrance of chess into Europe is marked by changes to the rules, including changes to the moves of the bishops, pawns and queen, with the modern form emerging since 15th century.
Early on, the pieces in European chess had limited movement; bishops could only move by jumping exactly two spaces diagonally (similar to the elephant in xiangqi), the queen could move only one space diagonally, pawns could not move two spaces on their first move, and there was no castling.
By the end of the 15th century, the modern rules for the basic moves had been adopted from Italy: pawns gained the option of moving two squares on their first move and the en passant capture therewith, bishops acquired their modern move, and the queen was made the most powerful piece; consequently modern chess was referred to as "Queen's Chess" or "Mad Queen Chess". The game in Europe since that time has been almost the same as is played today. The current rules were finalized in the early 19th century, except for the exact conditions for a draw.
The most popular piece design, the "Staunton" set, was created by Nathaniel Cook in 1849, endorsed by Howard Staunton (a leading player of the time), and manufactured originally by Jaques of London. The style was officially adopted by Fédération Internationale des Échecs (FIDE) in 1924.
Chess is an organized sport with structured international and national leagues, tournaments and congresses. Chess's international governing body is FIDE (Fédération Internationale des Échecs), which has presided over the world championship matches for decades. Most countries of the world have a national chess organization as well, who in turn are members of FIDE.
FIDE is a member of the International Olympic Committee (IOC), but the game of chess has not ever been part of the Olympic Summer or Winter Games. Chess does have its own Olympiad, held every two years as a team event.
Correspondence chess tournaments are usually played under the auspices of International Correspondence Chess Federation (ICCF). The ICCF awards its titles International Master, Senior International Master and Grandmaster - these are equivalent to similar titles awarded by FIDE for over-the-board chess.
In order to rank players, both FIDE and ICCF use the Elo rating system developed by Arpad Elo.
For most, the ultimate chess competition is the World Chess Championship. The current World Chess Champion is Vladimir Kramnik, who won a match against Veselin Topalov in 2006. In women's chess, the reigning Women's World Champion is Xu Yuhua from China. However, the world's highest rated female player Judit Polgar has never participated in the Women's World Chess Championship, instead preferring to compete with the leading men. Other competitions for individuals include the World Junior Chess Championship, the European Individual Championship and the National Chess Championships of countries around the world.
Regular team chess events include the Chess Olympiad and European Team Championship. The 37th Chess Olympiad in 2006 was held in Turin, Italy. Armenia won the gold in the men's event, and Ukraine took the top medal for the women.
The International Correspondence Chess Federation runs the World Correspondence Chess Championships both unrestricted and for women. The World Chess Solving Championship is both a team and an individual event.
Besides these top chess competitions, there are thousands of other chess tournaments, matches and festivals held around the world every year. The most popular would include Spain's Linares event, Monte Carlo's Melody Amber tournament, the Dortmund Sparkassen meeting and Wijk aan Zee's Corus tournament.
The idea of creating a chess playing machine dates back to the eighteenth century. Around 1769, the chess playing automaton called The Turk became famous before being exposed as a hoax. Serious trials based in automatons such as El Ajedrecista were too complex and limited to be useful.
Since the advent of the digital computer in the 1950s, chess enthusiasts and computer engineers have built, with increasing degrees of seriousness and success, chess-playing machines and computer programs. At first considered only a curiosity, the best chess playing programs — like Rybka, Hydra etc. — have become extremely strong players. In blitz chess, they can beat the best human players; at regular time controls battles between the very best chess programs and the very best human players have been balanced.
Garry Kasparov, then ranked number one in the world, played a six-game match against IBM's chess computer Deep Blue in February 1996. Deep Blue won the first game, but Kasparov convincingly won the match by winning three games and drawing two. The six-game rematch in May 1997 was won by the machine (informally dubbed Deeper Blue) which was subsequently retired by IBM..
Computers are important to today's chess also as seconds with huge databases of past games and a high analytical ability, and they also allow to play over internet on sites like Free Internet Chess Server or Kurnik, which becomes increasingly popular. | 2019-04-20T20:11:25Z | https://www.cs.mcgill.ca/~rwest/wikispeedia/wpcd/wp/c/Chess.htm |
Want to know more about intercultural relationships? This is my complete, compact A-Z guide, the pros and the cons of falling in love with someone outside of your community, country or colour.
The first obstacle you may have to overcome is that your family, and maybe even some of your friends, will not accept your relationship. It may take a while for the people you love to overcome their prejudices or get used to the idea, but have patience.
If your family or friends are struggling to accept your intercultural relationship, read this.
Interracial marriage didn’t become fully legal in America until 1967 and intercommunity marriage in India is still quite rare. When I first came to India, my cousin-sisters-in-law thanked us for breaking the boundaries. They have since married men from different states and castes.
If you are in an intercultural relationship, you may find yourself an inspiration to others like you!
Every relationship requires quality communication, but when you have cultural differences, communication is even more important. Values and traditions will need explaining, so you can understand why your partner or their family do certain things, and vice versa.
An intercultural relationship may force you to come to some tough decisions.
Which country will you live? Which language will you speak? Which religion should you teach your children?
Falling in love with someone from another culture has an extra dose of excitement because not only are you discovering another human, you’re discovering a whole new way of life.
The food we eat says a lot about our lifestyle, our heritage, our culture. This could be a revelation to your taste buds, or you could end up eating separate meals at dinner.
From “he’s only using her for a green card” to “why is he with her?”. When you enter an intercultural relationship, it will surely set some nasty tongues wagging.
If you’re in an intercultural relationship, you put your happiness and love for your partner above the fear of prejudice and cultural conflict. When you combine two cultures, you may have extra things to argue about but with good communication, these things usually are resolvable .
Immigration may become a huge, life consuming, soul shattering part of your life. It’s getting even harder for those in international long distance relationships to unite with stricter border control.
If you need to bow down to immigration, prepare for your relationship to be thrust under a magnifying glass, every detail dissected. This is not for the faint of heart.
You may not share the same sense of humour. My husband definitely doesn’t have a British sense of humour, but we still make each other laugh. We just don’t enjoy the same television shows.
Multicultural kids are gorgeous (okay, I am bias) and can grow up enjoying the best of both worlds. Diwali and Christmas, for example.
For some it’s great opportunity to learn another language, others come up against a frustrating language barrier.
Language barriers are toxic to relationships. You and your partner may communicate well, there more often a barrier between you and their family. This can cause conflict and misunderstandings, which can result in problems in your relationship.
Language barriers and cultural differences can lead to a myriad of misunderstandings. Speaking a common language doesn’t mean the language barrier doesn’t affect you. If something is translated literally, it can result in misunderstandings. For example, if Marathi is translated word for word into English, it can mean something different.
There are some traditions, habits, or values that may feel like nonsense to you. However much your partner has tried to explain them. Sometimes you are just not going to “get it” and respect that it’s gone over your head.
Not only do intercultural relationships blaze the trail for others who fall in love, you also help educate people who hold negative stereotypes. An intercultural relationship is a symbol of the progress we have made.
Connecting two cultures in a way they wouldn’t have otherwise. Two families come together who otherwise would never have met. With exposure and education, stereotypes and prejudices slowly slip away.
When you find yourself immersed in another culture, you are thrown out of your comfort zone and into a situation where things are done differently. If you stick around for long enough, your ideas of what is right and wrong are challenged. Here, you have an opportunity for personal growth.
You will get asked the same questions over and over, ad nauseam. Friends, family, waiters, people in the queue for at the airport. People’s curiosity will follow you around like a hungry dog.
“Are you allowed to celebrate Christmas?”, “can you speak Marathi yet?”, and my personal favourite: “how did this happen?”.
If you are in an interfaith relationship, some of your partner’s beliefs may contradict your own. It may take a lot of soul-searching and honest communication to resolve some of these issues. However, you may find yourself spiritually rejuvenated by your partner’s faith.
Alternatively, you may both follow you own religions separately without any issue. Reaffirming that religions can life together peacefully, even in the same bed!
Taking my shoes off before you enter someone’s home, touching the feet of elders, eating with my right hand. These are all examples of social etiquette I had to get my head around when I first joined an Indian family.
You may have to learn a couple of things to avoid seeming rude to your partners family, and you might have to teach your partner a couple of things before they meet yours.
Oh, the people you will meet and the places you will see.
Your intercultural relationship doesn’t have to be an international one for it to expand your travel horizons. Even if you both were born in the same country, if either of you have roots elsewhere, you have more of an excuse to go out and see the world.
Intercultural relationships help us see that our similarities out number our differences. Beyond the food we eat, clothes we wear, language we speak, habits we grow up with, we all have similar hopes and dreams.
Whilst all cultures value similar things, some may hold certain values higher than others.
For instance, in India it’s traditional for a son to live with his parents and a daughter to go and live with her husband’s parents. In England, children leave home and start their own family in a separate house. Therefore when this English Wife started her Indian Life, it was pretty difficult to get my head around joint family living.
However, our personal values don’t always reflect our cultural identity. You may share the same values as your partner and that may be one of the reasons your intercultural relationship words so well.
You can have a fusion wedding, or even two weddings! I know several couples who have had both Hindu and Christian ceremonies, and others who have had beautiful fusion weddings!
It’s an ugly word but the chances are, if you are in an intercultural relationship, you will experience xenophobia at some point. It may come from an aged family member or a stranger from the street. It hurts and something you, sadly, have to prepare for.
You can create your own culture with your favourite parts of each others, the best of both worlds. I don’t think there is any need to continue traditions purely for tradition sake if it isn’t fun, functional or life affirming.
You may occasionally feel like a zoo animal because, even in multicultural societies, intercultural relationships are not the norm. People will stare, and may even take photographs.
Remember: by being seen, you are normalising intercultural relationships. You are opening minds to the possibility that people from different cultures can love each other and live together in harmony.
That’s a beautiful message to spread, one the world needs.
I *love* ‘How did this happen?’ Like your relationship is an inexplicably tangled set of headphones or an unfortunate mess in the bathroom. And I think I empathise most with the lack of a shared sense of humour. I’ve learned that I need to maintain other relationships for that kind of thing, ditto high culture, literary discussions etc because of the literacy problem, which is okay (I have friends who can’t grasp how I can be in a relationship with someone who can’t discuss books, songs or plays with me – well, that’s what my literate friends are for; can they teach me to make pakora and ride a camel?). But there is a peculiar loneliness in laughing hysterically at a Victoria Wood sketch and not being able to explain what’s so funny.
It was definitely worth it!!
Well, with respect to cricket team,which team will you support between Ind Vs Eng world cup match ,when it will be played in your host nation England in 2019?
A very common question, as you can imagine!
I think I am going to have to write a whole blog post on this!
This Was Great. The only thing I couldn’t relate to was the zoo animal thing coz we live in Australia and here intercultural relationships are more and more conmon plus im not someone who cares what anyone thinks . I don’t think they r treating u as a zoo animal they just maybe don’t understand your union especially sometimes the older women because they have seen generation after generation Indian man marry Indian woman and to them it’s a lot “easier” but for some of us it would be very hard and almost like torture to live without our love whether we r white and he’s Indian or not. Great article!!
I didn’t mean being treated literally like an animal, just the staring part, people go to zoos to stare (hey, I had to get Z in some how, and S for staring was already taken :P).
Hello, Lauren! I really like your A to Z list. I can relate to it perfectly. I’ve been married to a Marathi man, I am Mexican.
Between us everything is mainly neutral. We’ve been living in England for 6 months now and previously, when we got married I moved to Italy with him so we didn’t face the strange looks a lot. When I’ve been to India, Jesuschrist! All the time. As if I were a monkey or something. Every inch of me has been analysed and I can understand that but… man, I’ve felt so unconfortable at times.
I’m sorry you had to go through all of that when you came to India, for them to say that to you is really horrible! An intercultural marriage definitely needs to include both cultures, for everyone’s sake (I’ve written a post about this, Adapt vs. Adjust). I’m certain if they were able to look beyond their first impressions and prejudices, you could build a genuine relationship with them. Of course there is only so much you can do, the rest is on them! I hope they realise this soon!
Lauren, It seems, from the different stories of intercultural relationships that I read about, that the Indian family only really accepts the Western woman if she “Indianizes” herself, as Cristina puts it, in her comment below. Do you think that your husband’s family would be happy if you chose not to wear Indian clothes, and didn’t embrace Hinduism? And how about if you drank alcohol and smoked cigarettes? In other words, is it really you, the person, they accept, or are you judged, not on your character, but on how well you are willing to play the role of Indian wife?
Well, my husband’s cousin sisters wear Western style clothes. My mother-in-law and I wear a kurta-leggings-chunni combo (except at functions and festivals) whist her sisters and sister-in-laws all wear a saree at all times. So I think, if I suddenly had a thigh-waist ratio that could handle jeans, my MIL wouldn’t bat an eye lid about that. My grandmother-in-law would probably be upset because she gets upset if I am not wearing a bindi.
If I drank, smoked and enjoyed clubbing for example, Nagpur would definitely not be a place I could live because it’s so sleepy (the way I like it). Many would call me boring, I guess. My husband and I spend our evenings reading books and discussing philosophy (not that you cannot do that whilst you are smoking and drinking)… It’s really hard to imagine all this alternative reality stuff!!
What I can say is, I know quite a few Western women who have married Indian men, live in the West, little interest in Hinduism, who have great relationships with their in-laws. I know others who really love Indian culture but their in-laws will not accept them. I would say that it would probably be easier to be accepted into a traditional Indian family if you are seen to be trying to understand their way of life, no doubt about that. Of course it’s impossible to bond immediately, with stereotypes and prejudices playing their part, “indianizing” or not.
A genuine relationship is build over time and meaningful communication.
Do you plan on living with your in-laws long term now? Will you write a blog about your decision to move back in with them?
I thought your MIL did dictate your cultural style choices in that she insisted you wear a dupatta even in the house, but I think maybe I’m mixing you up with another expat blogger. I know there’s a huge variety of experiences from one set of in-laws to another – can’t think of a single Indian partner who minds what their western partner wears though.
Yes, she did when I first arrived in India, and I was known to wear a dupatta/chunni with a western outfit or two. Since then things have changed and as I mentioned in the previous comment, “a genuine relationship is built over time and meaningful communication.”, and back then she really nervous about what people were saying about the new bahu in town (she expressed this to me herself later). I think she feared others would judge me. Since then, we have built a genuine relationship and I know that now she wouldn’t mind.
That’s good to know – I’m glad the two of you have managed to forge a good relationship. I think it’s hard to comprehend how much this question of ‘what will the neighbours think’ drives that kind of rule-setting at the beginning if your own mindset is more along the lines of ‘who gives two hoots what the neighbours think?’, and I’ve seen it have a negative impact – from both sides – on more than one cross-cultural relationship (mine included, on a very fundamental level), but it’s a brave soul who’ll put aside those concerns entirely … it’s hard to buck long-standing trends, and other people’s negative opinions can cause real distress and isolation.
Yep totally agree with all of these! If I could add one I would add a B for Bravery. To face all of these challenges you have to have a strong head and heart. We don’t always start out fully equipped for this journey so a large amount of courage is needed when taking these leaps into the unknown. At times it can be overwhelming and really scary – mentally, physically, financially, socially. We are lucky that you and others like yourself are willing to share your success stories and remind us that if you are fearless the reward you will get is that the positives will outweigh the negatives and it will all be worth it in the end!
Lauren would like to read more on your experience with marathi food, what western world know abut indian food is basically punjabi food and to some extend south indian. curious to know your fav tv program and ur first experince watching indian movie in cinema hall and did u able to resist yourself dancing on song zing zing zingat..?
I don’t watch tv and I’ve had a great time in the cinema halls!
Great blog! I throughly enjoyed reading your story. It is very hopeful, thank you for sharing. May I ask how your now husband’s family was accepting of your relationship? When did he tell them and when did you meet them?
I’m in a similar situation and it is very hard! I’m American and he is Indian but from the U.K. He had to leave the states due to work/visa, he is now living back with his parents in the UK, So we are currently in a long distance relationship. I don’t have any doubts just find it odd he has yet to tell his parents about us. He came and met my big, amazing yet crazy family over Christmas… I tend to over think things although recently he explained how his parents are getting old and ill and he must be there for them. He is completely loyal and loving although I understand his role and culture so I’m confused. | 2019-04-25T00:47:10Z | https://englishwifeindianlife.com/2016/11/12/intercultural-relationships/ |
The Netherlands has, for centuries, dealt with flooding and high waters by developing innovative water management techniques and technologies, and in recent years, other countries have been tapping this Dutch expertise. Here, the Maeslantkering, a massive moveable storm surge barrier that can be engaged to protect the city and port of Rotterdam from flooding, sits open, with its two swinging gates resting on dikes on either side of the Nieuwe Waterweg channel. The barrier, completed in 1997, was part of the last phase of the Netherlands’ decades-long Delta Works project. Credit: shutterstock.com/GLF Media.
In early 2017, scientists from NOAA and other U.S. research institutions announced that new data had led them to raise the upper estimate of projected global sea-level rise by the end of this century to 2.5 meters. That’s considered the extreme scenario and would require a catastrophic melting of land-based ice sheets and glaciers in Greenland and Antarctica. However, it doesn’t take anywhere near that much sea-level rise to cause havoc. Global mean sea level has risen about 8 centimeters in the last 20 years, contributing to dramatic increases in coastal flooding. For example, nuisance flooding in U.S. coastal communities has increased by 300 to 900 percent in recent decades due to the increased intensity of storm surges, according to NOAA’s National Ocean Service. And it’s not just nuisance flooding that’s a problem.
The 17 tropical storms of the 2017 Atlantic hurricane season, including 10 hurricanes, caused an estimated $282 billion in damage in the U.S., ranking as the country’s most destructive and expensive hurricane season to date; again, larger storm surges caused by higher seas was part of the reason the damage was so great. Rising oceans are no longer just a future threat; the problem is here and will only get worse over time. So, what to do? Where to turn? Enter the Dutch.
Dutch expertise in water management is as old as the Netherlands itself, and as global seas rise, the Dutch are still on the front lines in dealing with flooding and sea-level rise. This prowess is not only helping them in their own efforts, but now they “are going all around the world consulting and selling their engineering expertise,” says journalist Jeff Goodell, author of the 2017 book “The Water Will Come: Rising Seas, Sinking Cities, and the Remaking of the Civilized World.” They are “trying to export that expertise; it’s their growth industry. … It’s their Silicon Valley.” And coastal cities in the U.S. and elsewhere are hoping Dutch ingenuity will work for them as well in fighting back the encroaching seas.
Water-pumping windmills were an early technology used by the Dutch to drain swampy areas — which often lay below sea level — and create polders, dryland plots surrounded by dikes. Credit: Henk Monster, CC BY 3.0.
The Netherlands is situated in a low-lying delta formed by the outflow of three major rivers: the Rhine, the Meuse and the Scheldt. In accordance with the Dutch saying that “God created the world and the Dutch created Holland,” the country is in large part an engineered landscape reclaimed from swamps and marshes. One-third of the Netherlands is below sea level, and two-thirds is vulnerable to flooding. Dutch identity and society arose from the common need to push back against the sea.
In the 13th century, the people of the Netherlands began developing strategies and technologies to deal with flooding. Credit: K. Cantner, AGI.
In the 13th century, after decades of disastrous inundations by floods and storms, the people of the Netherlands organized around the communal need to keep the water out, developing strategies and technologies to deal with flooding. Water management innovations, such as the now-iconic 15th-century polder windmills, which pumped out swampy areas, often lying below sea level, proliferated. Over time, some 3,000 polders, or dryland plots surrounded by dikes, were created.
The Dutch became famous for their early mastery of coastal engineering and water management, which for centuries largely kept them safe behind barriers and dikes. This sense of safety was sharply eroded in early 1953, however, when the North Sea broke through the protections, flooding more than 2,000 square kilometers of land and killing 1,835 people overnight.
Willem Schellinks’ painting, “De doorbraak van de Sint Anthonisdijk bij Houtewael,” depicts the breach of a dike in the village of Houtewael near Amsterdam in 1651. Credit: public domain.
And engineer they did: In the aftermath of the flood, the Dutch redoubled their efforts to battle the sea, creating an enormous flood-control system known as the Delta Works. A modern engineering marvel, the Delta Works — built between the late 1950s and the 1990s — consists of nine dams and four storm barriers that have closed off estuaries and substantially reduced the Dutch coastline by about 700 kilometers. Delta Works has served the Dutch well for decades, but extreme flooding in the ‘90s caused mass evacuations and fueled rising concerns about climate change and sea-level rise. Dutch water managers saw limitations to “hard engineering” approaches like dikes and barriers in a rapidly changing and increasingly unpredictable climate, so they took a vigorous new approach.
Floodwaters swamp a coastal town in the Netherlands during the North Sea Flood of 1953, which produced record storm surges and killed more than 1,800 people. Credit: U.S. Agency for International Development.
“In 1992, the Dutch were able to pass a national flood policy that obligated them to protect against floods and gave them a governing structure as well as resources” to do so, says Shana Udvardy, a climate resilience analyst with the Union of Concerned Scientists. “It helped shift the paradigm toward the questions of ‘How are we going to accommodate flooding? How are we going to afford it?’” Udvardy says.
The right of the Dutch population to be protected from flooding was written into the constitution, and the Netherlands adopted a very high national standard for flood safety. Their flood protection measures are designed to defend the heavily populated and industrialized western part of the country from 10,000-year floods (those thought to have a 0.01 percent chance of occurring in any given year); less populated areas, meanwhile, have protections designed to guard against a 4,000-year flood. In the U.S., by comparison, a 100-year flood standard (a much lower standard relating to events thought to have a 1 percent chance of occurring in any year) is often the norm for guiding relevant safety and insurance policies.
In addition to building more walls and dikes, the Dutch also began applying a more long-term, holistic perspective about flooding that factored in scientific data about the changing climate. The crowning achievement of this costly effort is known as Room for the River, a massive $3 billion project initiated in 2006 that involves some 40 different infrastructure projects along Dutch rivers and waterways. At the heart of the project is the idea that instead of keeping water at bay, space can be allocated to safely accommodate flooding. Dikes and other obstructions are removed, and flood channels and floodplains are broadened and deepened.
The 30-kilometer-long Houtribdijk between the towns of Enkhuizen and Lelystad was completed in 1975 as part of the Zuiderzee Works, a project begun in about 1920 to dam and reclaim land from the shallow Zuiderzee Inlet. Credit: Snempaa, CC BY-SA 4.0.
In Noordwaard, near Rotterdam, a large polder has been repurposed as a reservoir for floodwater. And in the 2,000-year-old town of Nijmegen, a dike was moved back and a new bypass channel was dug for the river Waal. Ambitious in scope, the flood-control program in Nijmegen also acted as a catalyst for broader urban regeneration there, including the addition of an urban park on an island and a riverfront promenade. Adding urban improvements and amenities built crucial local support for the plan.
These projects are typically expensive — the project in Nijmegen cost $500 million — and often require sacrifices; people are displaced from homes in flood zones and formerly productive land is fallowed or repurposed. In return, natural floodplains are restored to serve as sponges during floods. The rest of the time, these areas can be used for recreation or allowed to return to a natural state. This “softer” approach to water engineering issues has gained traction with designers, planners and architects around the world.
The 9-kilometer-long Oosterscheldekering, completed in 1986 as part of the Delta Works, is the largest storm surge barrier in the Netherlands and features sluice gates that can be opened or shut to allow water to pass through or to block it. Credit: Bert Kaufmann, CC BY 2.0.
In addition to techniques that confront flooding, some modern Dutch ideas about how to live with water are more experimental: In Rotterdam Harbor, for example, a floating dairy farm, replete with 40 cows and 6,000 chickens, is being constructed by a private consortium. And a floating forest that consists of salt-resistant trees housed in buoys has already been installed in the harbor.
Twenty Dutch Elm trees uprooted from parts of Rotterdam during construction projects were replanted and installed as a “bobbing forest” in the city’s harbor in 2016. The effort is primarily meant as an art installation, but is also seen as a model for future innovation and sustainability projects. Credit: shutterstock.com/hans engbers.
One experimental project in the Netherlands that is starting to catch on elsewhere is the Zandmotor, or Sand Engine — a 1-kilometer-long, hook-shaped sand peninsula that was built in 2011 along a stretch of coastline at Ter Heijde in South Holland. In a single operation 10 kilometers offshore, dredgers collected 21.5 million cubic meters of sand, which was then deposited in the designated area. Over time and by design, waves and tides slowly disperse the sand and naturally replenish nearby beaches. This conceptually simple experiment, also known as sandscaping, has performed as designed, preventing beach erosion. It has also been more efficient and economical, as well as less disruptive to the beach and to wildlife ecology, than a traditional approach such as regular sand replenishment. Its success has not gone unnoticed; another sand engine is now, with Dutch help, being constructed along the North Sea coast in Norfolk, England, an area where severe beach erosion threatens coastal towns and industry.
From Delhi, India, to Wuhan, China, to São Paulo, Brazil, cities around the world have begun to turn to the Dutch for help with water management strategies. The Dutch, in turn, have been eager to export their technology and expertise; in the Netherlands, water management is a $5.5 billion industry annually.
As part of the Room for the River project, a dike was moved back and a bypass channel (left waterway in the photo) was dug along the River Waal at Nijmegen to help protect the surrounding areas from excess floodwater. Dredging of the channel, seen here in summer 2015 toward the end of its construction, also created a new island, which now hosts an urban park. Credit: Alamy.com/frans lemmens.
Cities in the United States, in the wake of punishing natural disasters, have also turned to the Dutch both for expertise and inspiration. Following the devastation wrought by Hurricane Katrina in New Orleans in 2005, a delegation of architects, city planners and politicians from Louisiana, including architect David Waggonner, visited the Netherlands.
Starting in 2006, Waggonner’s firm, Waggonner & Ball Architects, helped partner Dutch planners with New Orleans’ public officials through a series of workshops and publications that came to be called the Dutch Dialogues. The Dutch Dialogues introduced New Orleans to new thinking on, and approaches to, water and engineering issues. Although the Dutch Dialogues ended in 2011, the collaboration helped give rise to the city’s new resilience strategy.
Emblematic of New Orleans’ new approach is the Gentilly Resilience District. Created in partnership with Dutch designers, the district is a comprehensive flood management strategy for Gentilly, an ethnically diverse middle-class neighborhood. In the context of urban planning, resiliency describes systems adapted for disruptions that can bounce back quickly in the wake of natural disasters. In Gentilly, some of the resilient design elements being developed include water-permeable streets and sidewalks, medians between streets and former woodlands designed to function as stormwater holding facilities, and an old convent that’s to be transformed into a “water garden” and recreation area that can also hold up to about 38,000 cubic meters of stormwater.
When Hurricane Sandy hit the East Coast in October 2012, it was the second-deadliest and -costliest hurricane in U.S. history (it has since dropped to fourth in both measures behind 2017’s Harvey and Maria). The sheer destruction it created and the vulnerabilities it revealed were wake-up calls to many about the dire threats posed by climate change.
Many subway stations and tunnels, including the South Ferry subway station in Lower Manhattan, seen here in November 2012, were heavily damaged by floodwater during Hurricane Sandy. Credit: Metropolitan Transit Authority/Patrick Cashin, CC BY 2.0.
In the aftermath of Hurricane Sandy, President Obama allocated $60 billion to help the East Coast recover from the disaster, and updated flood standards for federal agencies to allow for the inclusion of climate science and sea-level rise data to help determine flood risk regulations (rules since rescinded by President Trump). The Obama administration saw in the effort to rebuild and recover from the disaster an opportunity to better prepare the region for the perils of future storms and flooding. The plan was to rebuild better and smarter, with resiliency in mind. As part of this effort, Obama sent Shaun Donovan, then secretary of Housing and Urban Development (HUD), to the Netherlands to observe Dutch flood-control and prevention measures. There, Donovan met Ovink, who was eager to show off the Dutch prowess in dealing with water. Donovan was impressed by what he saw, and he and Ovink eventually became partners. Ovink moved to the U.S. and oversaw a multifaceted planning and design competition called Rebuild by Design, which was launched by the Hurricane Sandy Rebuilding Task Force in June 2013. Rebuild by Design was a complex and ambitious undertaking that sought to integrate a wide range of government entities, nonprofits, community organizations and stakeholders in Connecticut, New Jersey and New York. The concept was to focus on design and let the design dictate specific projects and policy.
The Zandmotor, or Sand Engine, at Ter Heijde in South Holland seen in July 2015, four years after it was created. Credit: Joop van Houdt/Rijkswaterstaat.
Rebuild by Design produced a slew of high-profile and thought-provoking ideas for waterfront projects, seven of which have been funded by the affected cities and states, often with additional federal aid. Of the funded projects, New York’s BIG U is the highest profile and arguably most ambitious. Not only did Hurricane Sandy wreak havoc on New York and its environs, it flooded portions of Manhattan’s underground infrastructure, including many tunnels and subway stations, which filled with saltwater that corroded electrical systems.
The catastrophic flooding in New Orleans during Hurricane Katrina led the city to partner with Dutch designers to create a new resilience strategy. Credit: U.S. Navy photo by Gary Nichols.
Manhattan remains very vulnerable, and the BIG U, which has already received more than $800 million from HUD and the City of New York, will be an innovative 16-kilometer stormwater barrier ringing lower Manhattan. Some features of the BIG U — construction of which has been delayed but is currently slated to begin in 2019 — would be familiar to the Dutch. Like the Room for the River project in Nijmegen, the BIG U sought input from local residents and stakeholders, and it will be much more than a traditional storm barrier. It is a multilayered system that combines a variety of storm surge barriers, from fixed berms to inflatable, pop-up barriers, as well as floodwater runoff and storage areas. It is also meant to incorporate myriad urban upgrades such as parks, benches, bike paths and vendor stalls.
Another project in New York that exhibits Dutch design influence is the recently completed renovation of Governors Island. A former fort and military base, and more recently a Coast Guard training facility, Governors Island, which sits in New York Harbor just south of lower Manhattan and west of Brooklyn, was sold to New York state and New York City by the federal government for $1 in 2003 (a small portion remains with the National Park Service). In 2010, a far-reaching plan was undertaken to remake the island as a legacy public park that would be sustainable and enjoyable for many generations to come. The Dutch firm West 8 was chosen to implement the project.
Flooding during Hurricane Sandy shut down the Queens-Midtown tunnel, which connects Manhattan to Queens beneath the East River, for more than a week. Credit: Metropolitan Transit Authority/Mark Valentin, CC BY 2.0.
The flat topography of the low-lying south end of Governors Island was radically altered. Carefully fortified hills were built with debris from the imploded Coast Guard buildings. While these hills protect natural elements on the island like trees, shrubs and grass from the deleterious effects of saltwater inundation, they also provide an impressive vista of New York Bay and lower Manhattan. The park’s design was tested by Hurricane Sandy and it passed with flying colors; unlike other parks in the region, Governors Island survived the storm virtually unscathed.
The BIG U, construction of which is currently slated to begin in 2019, is intended to ring Lower Manhattan with 16 kilometers of stormwater protection involving different types of barriers as well as floodwater runoff and storage areas. Credit: BIG-Bjarke Ingels Group.
One lesson from the Netherlands’ experience is that not only can big public investments in flood-control infrastructure work, but they can be more economical than responding after a disaster. Historically, however, the U.S. has relied more on expensive disaster recovery than on programs and infrastructure meant to prevent or mitigate flood-related disasters.
Although many architects, experts and city planners around the world laud the Dutch efforts to innovate solutions to sea-level rise and flooding, others are cautious about the temptation to oversimplify the problems of sea-level rise, or to think that we can engineer our way out of any problem.
The BIG U is also meant to incorporate urban upgrades such as parks, benches, bike paths and vendor stalls. Credit: BIG-Bjarke Ingels Group.
“We certainly want to applaud the Dutch for their good engineering, but the fact is if sea level is going to be 5 or 10 feet [1.5 to 3 meters] higher, there isn’t going to be any simple answer or engineering fix,” Englander says. “It’s a bigger problem than most people have stopped to think about.” The sheer size and complexity of sea-level rise, and the fact that 40 percent of the world’s population lives within 100 kilometers of a coastline, preclude one-size-fits-all solutions.
According to Goodell, the challenge for Americans is a cultural one; the issue needs to be viewed not as a future problem for isolated municipalities or regions but as a current national crisis threatening our coastlines. The Netherlands’ culture of innovating water management and flood-control measures, as well as the country’s huge public investments in disaster-mitigating infrastructure, could be instructive in how to navigate coming climate change-related challenges.
The view of lower Manhattan from the renovated south end of Governors Island in New York Harbor. Credit: MusikAnimal, CC BY-SA 4.0.
Of course, the Dutch cannot export their history or culture, but as the seas rise, U.S. coastal cities will need to develop more flexible and innovative approaches to accommodating and responding to encroachment from seas and rivers.
In the short term, some cities, like New Orleans, New York and Norfolk, Va., are ramping up flood-control-related investment, planning and preparedness in combination with forward-looking design strategies. In that sense, the Dutch offer a model for innovative and common-sense approaches. The Dutch design influence on U.S. projects such as the Gentilly Resilience District, the Rebuild by Design projects and Governors Island certainly represents important steps in the right direction. Twenty years from now, floating buildings, forests and dairy farms may not seem so fanciful.
Iovenko is a writer and filmmaker in Los Angeles. His writing has appeared in such publications as the New York Times, the New Republic, the Los Angeles Times and the Atlantic. | 2019-04-20T04:43:32Z | https://www.earthmagazine.org/article/dutch-masters-netherlands-exports-flood-control-expertise?fbclid=IwAR0_069_g5UqBecSig-GlvhBt3dhkKYtivfY4hqM0yNHl83Z10I4GHUVn4w |
been listening to this truly sprawling overview of the book A Year of Biblical Womanhood by Rachel Held Evans. Wenatchee The Hatchet is not ordinarly one to listen to podcasts that don't involve sermons with particular local and personal interest. But an anonymous commenter brought my attention to this massive five-part series, which I recall being linked to by a blogger whose writing I regularly read.
Been digesting the ideas and discussion throughout the week. Might write something about it all later. Still have a couple more hours of listening to go through, though, and Wenatchee DID write that there'd be writing about music again. So what that's going to translate into is that Roberts and Wagner's discussion is too substantial to deserve unthoughtful writing (though that may be what happens anyway!) and Wenatchee's got albums to write little reviews about .... maybe over the weekend. :) We can hope!
I could write at length about this article but rather than do that I'll note a few excerpts.
... [in the lexicon of character in the radicals Anderson describes] there aren't many narratives of men who rise at 4 A.M. six days a week to toil away in a factory to support their families. Or of single mothers who work 10 hours a day to care for their children. Judging by the tenor of their stories, being "radical" is mainly for those who already have the upper-middle-class status to sacrifice.
Nor are there many stories of "failure"—of people sacrificing without visible signs of transformation. As a result, many of the narratives implicitly convey that the reason to go and die is the gospel success that will follow. In most stories, the results come during the lifetime of those who decided to "come and die." That's why the single most refreshing moment in the canon for me was Furtick's lengthy acknowledgment that God's "greater" often seems like disappointment and failure, and that in our "most dire moments [God] seems almost absent." Given how prevalent such moments seem in the Christian life—and in Scripture—they are disproportionately underrepresented in the "radical" literature.
As a former Pentecostal (as in I began to transition out of Pentecostalism decades ago) Anderson's observation that the new radicals have ideas that resemble Keswickian concepts of sanctification is intriguing, to say the least! That to be truly and more fully Christian you have to be sold out, on fire for the Lord, and all that, is hardly a new idea to anyone who was once steeped in Pentecostalism and its roots in the Holiness movement, let alone with a hefty dose of premillenial futurist eschatology. That many of the radicals Anderson refers to may not subscribe to premillenialist or futurist views is probably not hugely important, since through the ostensibly opposite avenue postmillenialist historicist types with an interest in theonomy can end up getting to somewhat similar places in advocating for a radical Christian approach to shaping society. It can be sort of like the extremes in the left and right in sloganized politics, move far enough to the left or right and you can see the same kinds of repressive social and political structures emerging. Or, to get more acid about it, move far enough to the left and right and people seem to agree that anonymous international Jewish bankers must be ruining everything.
But, moving along ... Anderson notes that a paradox in the radical chic that it is presented through the Christian-conference-publishing-celebrity-industrial-complex.
... What's more, the radical message comes packaged in the Christian-conference-publishing-celebrity-industrial-complex. While Platt warded off critics early on by donating his profits to relief and missions work, the popularity of his call for radical living requires the existence of a lucrative publishing culture that, by its nature, has to think and act with profits in mind. The really radical path for a megachurch pastor these days would be to refuse to publish, to take a smaller church, to not podcast sermons, and to embrace a more monastic witness. The irony is that if they tried, we'd probably turn them into larger celebrities and laud their humility. The desert fathers had a similar problem. But if the message is going to critique the American dream for the people in the pews, then we may need pastors willing to show us the path of downward mobility with their lives.
The same could be said for Carl Trueman a few years ago in remarking on the unresolved matter of Mark Driscoll talking about the "crisis of conference Christians" while continuing to speak at conferences. But this sort of meta-level irony is worth noting and it's good that Anderson has noted it--it's strange that the radicals use what can be considered the apparatus of consumer cultivation and product distribution to challenge people to be less consumeristic. How does this get affirmed, this message of being sold out, when the way the message is presented so often seems to sell out? Does this beget being really sold out or a kind of moral licensing in which wishing we were really sold out is treated as having reached that state? Or at least gotten us to the point where we can tell others they need to be at that spot? It's not like this isn't a question in the writing of someone like John Piper with a book title such as Don't Waste Your Life. The good news of Jesus is for people who waste their lives, too, isn't it? Let's just set aside entirely the question of how Piper or anyone else would surmise that a person has led a wasted life. There's a sense in which if we're looking at one radical we're looking at something common to them all.
When I was younger I'd hear that great things would happen if I'd just cut loose and get on fire for the Lord. Cutting loose and getting on fire has not been, isn't, and likely will never be characteristic of me. Something may change so this is not something I'm saying may always be the case, but the Pentecostal notion of "on fire" simply doesn't describe me over the course of most of my life. Even though I grew up Pentecostal for a number of formative years I came to question so many things about Pentecostal practice I withdrew from that scene. I don't regret the thing wholesale because it was a Pentecostal youth pastor who introduced me to work by Gordon Fee, Francis Schaeffer, and Solzhenitsyn.
Suffice it to say I grew up in a highly unusual, atypical Pentecostal sort of background compared to what might be culturally expected. I somehow managed to be around a youth pastor who cared that teenagers like me learned about exegesis and hermeneutics and around Pentecostal church musicians who were glad I was getting interested in Dave Brubeck and Duke Ellington. Growing up in the Pacific Northwest, apparently, meant I had the fortune to grow up in an area where cultural and intellectual interests were not considered to be "quenching the Spirit". The older I get the more grateful I am for that.
Well, yes, let's just grant that up front. As Anderson put it in his article, the radical stance simply doesn't seem to account for the reality of failure. It's possible to go through life failing at all sorts of things. In a strange paradox for radical preachers who might preach from prophets, most of those prophets completely failed to secure the reforms and policies they advocated for while today's radical advocates may be oblivious to this concept when preaching from prophetic texts to make a point. There may be more than a few observations about how Jesus fulfilled prophecies X, Y and Z and that's a wonderful, worthy consideration. But let's not forget that Jesus said that the prophets were killed and cast out and ignored. What if, to be particularly polemical about this point, today's radical advocates may show us how conformist they are precisely because so many of us find it so very easy to literally buy their message?
Over at Slate's Double X Libby Copeland writes about how celebrities seem to be marrying as young as their early 20s and late teens, unlike most of us, who have been marrying later in life. Now that neo-Calvinists have fretted about the "epidemic of singleness" over the last decade is something Wenatchee The Hatchet has discussed very recently but here, arguably, is the flip side of the same coin, which is a secular anxiety that anyone WOULD marry in the late teens or early 20s. These people must just not be old enough or financially stable enough or mature enough to handle married life.
Take note of that phrase "seems downright regressive." What's regressive about marrying younger and regressive in relationship to what? The norm now? What if now is not the norm? Remember that the last time the median age of first marriage was as high as it's gotten in the last three or four years as the Great Depression. And since arguably a secular left and a religious right both have some historical memory, let's go back to consider the post-World War 2 setting in which getting married straight out of high school could make some sense.
... Once upon a time, men with high school degrees could obtain manufacturing jobs with solid wages and pensions that enabled them to marry and start families in their early 20s. Now, with the chances of nabbing a pension about as good as “winning the World Series,” as the Knot Yet study puts it, young blue-collar Americans can’t pay for a wedding, let alone a house and kids.
But then again who says home-ownership in a post-industrial capitalist society is actually economically viable or normative? Here Wenatchee refers back to the anecdotal observation that most of the middle-aged guys in the leadership rungs of Mars Hill were not homeowners back in theri 20s or, if they were, they owned a home that was subsidized by taking on as many renters as they could possible handle (and maybe more).
... In other words, celebrities marry young not because they’re more mature than the rest of us (clearly) but because they have the means so much of America lacks. The move may be driven by youthful impulse, but it is also, in a strange way, logical. They’re just doing what so many of us would have (ill-advisedly) done as teenagers if we’d had loads of cash and legal independence from our parents: married our first loves.
Wenatchee wonders what "first love" is supposed to mean here. It may certainly be irrational to marry one's first love but it's not entirely clear that marriage as it is undertaken in any American cultural context is really a purely rational decision.
But not all of us think marrying for true love is a compelling or plausible reason to marry. It may be nice if you have it but marrying to be a spouse and parent is not an irrelevant incentive to marry, and even marry young. Wenatchee knows several couples, actually, who married as young as 19 and had children fairly soon into marriage (as in the first four years). We live in a culture in which a teenaged girl who specifically wants to be a wife and mother in her 20s, even her early 20s, may be told that that's too soon. On the basis of what? If she manages to attain this goal then she could manage to be an empty nester in her 40s (depending on how things go).
The authors of Knot Yet write that as a cultural effect of delaying marriage, “marriage is transformed from a cornerstone to a capstone of adult identity. No longer the stabilizing base for the life one is building, it is now more of a crowning achievement.” During my parent’s generation, couples launched their adult lives together and built families and financial stability along the way, whereas now, those of us in our 20s and 30s believe we should be well on our way to professional success before marriage. It would seem that pop stars like Miley Cyrus are forgoing that by marrying barely out of puberty, but in fact they just happen to work in a business that brings success at an abnormally young age. They’re already there, or at least they feel like they are. The wedding feels like a capstone.
For people at the upper and lower rungs of society, though, marriage and family have larger implications. Family conceived as an extended network of families and clans becomes more significant the higher or lower we get in social strata and in some sense for pretty much the same reason, money and resources. At the top family name is part of the resource inventory to be responsibly handled, at the bottom family name will be of some value in case, well, for instance someone in the clan is better off than your brood. Let's not be unaware that there have been times when nepotism had some positive outcomes. It's not like Wenatchee The Hatchet woke up some morning and decided that, you know, the Bach family had this generations long dynasty that existed because of nepotism and that this means Bach's music shouldn't be heard, for instance. We can thank the social networking and aims of well-off people in various cases for the moment when Haydn urged Mozart's father to encourage the boy's talents and Wenatchee writes this as someone who loves Haydn's music vastly more than Mozart's!
Anyway, as we were saying, marrying young will probably be unrealistic and unreasonable if the expectation of newlywed family-building is too beholden to the economic circumstances of previous generations. Wenatchee has been contending for years that if the American economy continutes on its course the extended family will increasingly be seen as economically and socially necessary. It's not that marrying young is currently or ever has been "unrealistic" it's that the American conception of the family in the secular left and the religious right is too narrowly nuclear in its general conception.
Mark Driscoll is just descending into self-parody I think.
Link is to Matthew Paul Turner linking to Act Like Men 2013 a conference featuring ... well, it's got to be obvious by now.
That's a good line-up of guys from Acts 29 leadership, isn't it? Some overlap in the line-up for this conference.
It's nice to know that after nearly two years the crisis of conference Christians seems to be over.
7. Some people in the church ration grace as if they paid for it themselves…and if they spend what they have it will result in personal loss.
Much could be written about this observation but for now merely quoting it will suffice.
Apparently Mark Driscoll now says of Mars Hill "We're not a wealthy church".
It's happened a couple of times before and it's happened again, someone finds something that gets passed along to Wenatchee The Hatchet. Normally Wenatchee has not seen reason to comment on things that get sent along of this but this, this is a special case.
Jesus loves this church very much. His grace is on Mars Hill in a way that is very unusual.
Despite geographical, political, and spiritual obstacles along the way, we’re larger than any other church that has grown up in the northwest corner of the country. We’re not a wealthy church. [emphasis added] We’re not an experienced church. We’re not a convenient church. We are a blessed church.
The only reason why this thing called Mars Hill is working is because Jesus loves us. He loves our cities. He loves our friends, family, neighbors, co-workers and other people who don’t even know him yet. We’re here for a reason, and it’s certainly not thanks to anything that we can take credit for.
Our multi-site strategy, which now includes 14 locations in four states, was never Plan A. Originally we wanted a nice, big building where we could all gather under one roof. But God had other ideas. He had people he wanted to save in Albuquerque, Orange County, Portland, and around the Puget Sound through our church. This has made our life a lot more complicated, but if it means more people get to meet Jesus, I’m all for it. Should God ever provide us with place where we can establish a Mars Hill hub someday, I won’t argue. In the meantime, however, we’re nothing but grateful for what we’ve got. God is using it in a big way.
Three of our Seattle-area churches are now up over 1,000 people in weekly attendance: Bellevue, Ballard, and Downtown Seattle. For the past year, I’ve been preaching almost exclusively from Mars Hill Bellevue. They’ve got a new building in a great spot and the potential for lots of new locations on Seattle’s Eastside, so I wanted to do everything I could to help make Bellevue strong. Today, it is without a doubt our healthiest church overall. Pastor Thomas Hurst is a great lead pastor, and the people of Mars Hill Bellevue are a huge blessing to the rest of our church in more ways than one.
In God’s providence, my season spent focusing on Bellevue coincided with Angela Hurst’s cancer battle. Since the other senior leaders and I were present on Sundays, this allowed Pastor Thomas to devote more attention to his wife and their boys during a very difficult time. Angela was diagnosed last year, and just recently received a clean bill of health. Praise God!
With Mars Hill Bellevue going strong, we now have a lot of other needs and opportunities throughout the church that could use some extra care. For example, Mars Hill Downtown Seattle is in the middle of a leadership transition and trying to get settled into a new location that’s already been picketed by protestors and picked at in the local press.[emphasis added] We’ve got a lot of seats to fill Downtown and a lot on the line for the reputation of Jesus and his work in Seattle. The stakes are high, and I want to make sure the church is well cared for during this critical season.
As of this month, I’m preaching live in Bellevue and Downtown Seattle. Ballard will join the live schedule this fall with the start of our Ten Commandments series. [emphasis original] Obviously, I can’t preach every single service in person; each location will get a combination of live and video sermons. Since none of our churches will be live 100% of the time, for those currently attending Bellevue, Downtown, or Ballard, I encourage you to pick a location and stick with it. Our churches need members committed to the local mission, and I would hate to see people leave their church and go to another Mars Hill just because they want to see me preach in person. Besides, the live schedule will probably take an air traffic controller to figure out, as we’ll be tinkering with the limits of space and time.
This is all rather complicated, but nobody ever said ministry would be easy. Please pray for me and my family. Since I will be spending my Sundays as a traveling minister preaching morning and evening, chances are Grace and the kids will have to attend church without me some of the time. This is hard for us, but we’ve talked about it a lot and we want what’s best for the Mars Hill family, even if it means a few sacrifices for the Driscoll family.
Thankfully, I’m surrounded by a team of gifted leaders who work hard and love Jesus. I praise God for Pastor Dave Bruskas and Pastor Sutton Turner, my fellow executive elders who help oversee the whole church. Our central operations team is also packed with humble servants who are hashing out the technical details as we speak.
God has given our church a hard job to do. It’s hard because Jesus loves us and he’s sent a lot of people our way. It’s hard because Satan hates us and will oppose every step. But there’s no place I’d rather be than right here serving the church and preaching the gospel. You are worth it, Mars Hill! I love you very much.
For those in Ballard, Downtown Seattle, and Bellevue, I’ll be seeing you soon. I look forward to visiting our other churches as time and schedule allows, and I can’t wait to see what God does on Easter when we get to enjoy live services together as one enormous family. Please join me in praying for 20,000 people to attend Mars Hill and for hundreds and hundreds to be baptized!
The Stranger spent more time fisking Justin Dean for misrepresenting the level (any) and nature of Mars Hill involvement with Liflong AIDS Alliance than making any sustained complaint about Mars Hill Downtown in particular (beyond the usual jokes about Tim Gaydos' name, I suppose). Justin Dean wrote a sorta long press release about the grand opening, after all. Mars Hill clearly wants the attention if they have a PR team. Let it be noted that though The Stranger dislikes Mars Hill intensely they've been known to show some courtesy to specific pastors. They didn't rip into Bill Clem when announcing that his wife Jeannie had cancer and even went so far as to suggest that if you're the praying type, to pray for them.
So take Driscoll's comment that Mars Hill Downtown has been nitpicked by critics with a grain of salt, or two. Some readers have the distinct impression The Stranger had it out for Justin Dean far more than Mars Hill Downtown.
The change in the schedule of live preaching is vaguely interesting. For a while the plan seemed to be moving live preaching to just Bellevue and that phase seems to have passed.
What's significantly more interesting is Driscoll's claim about Mars Hill "We're not a wealthy church."
Wasn't it on March 28, 2012, no less that Mark Driscoll said this in "What's Next For Me"?
He did say that, in fact.
If Mars Hill isn't a wealthy church what happened to the church that could rent the city of Ephesus for a day?
Captured, edited, and finalized a promotional video.
Edited and exported a sermon front to back, using multicam switching in Final Cut Pro and After Effects.
Edited, exported, compressed, and uploaded clips to youtube.
Communicated with multiple team members via Basecamp about deadlines and deliverables.
Organized a documentary project in Final Cut Pro.
Created a folder structure for a new project and transferred all media from storage devices.
Transcoded Red camera footage in Red Cine.
Light a set for a promotional video.
An old feature on Mars Hill production and their use of Red cameras can be found here.
1.We have upgraded our video cameras to the RED cameras used for major films like District 9. This means that the video experience at a Mars Hill Campus or online is better than live – for free.
2.We have upgraded our media player by creating our own technology to handle the high-definition video content we are now capturing and are giving it all away online – for free.
The high end major film level gear was important enough that it was brought up, at all. That was 2009 and now in 2013 Mars Hill is not a wealthy church?
Yesterday, a crew went to the Port Angeles Salvation Army to drop off the 21,500 pounds of food people at our Seattle-area churches brought in.
That's not exactly a small amount of food. But now, Driscoll says of Mars Hill "We're not a wealthy church". Last year for annual reporting stuff Driscoll said last year was their best year ever. Well, maybe every years is Mars Hill's best year ever but this year Mars Hill isn't a wealthy church even though within the last, say 18 months, Mars Hill has shown that it can throw together eleven tons of food for the Salvation Army Port Angeles food pantry (good for them about that, by the way). Driscoll could casually mention how epic it was that they were filming in Ephesus, which they rented for a day just about a year ago. And now this year, somehow, Mars Hill isn't a wealthy church.
So half the total expenses are personnel expenses. Where's that money going? Who's getting how much? What are the housing allowances for staff, particularly lead pastors at campuses and executive elders? Now, to take a trip down memory lane, let's consider that in Lief Moi's letter from 2007 he mentioned that he stopped being lead pastor at Ballard and as part of the 2007 re-org he received a nearly 40% salary cut. It's on page 7 of the big 145 page pdf for those who haven't read Moi's letter already. The nearly 40 percent salary cut was part of the 2007 re-org and what happened to co-founding pastor of Mars Hill Lief Moi during that re-org was he was told he lacked the kingly gifts to run a campus the size of Ballard and he was no longer campus pastor/lead pastor there. And that would seem like the reason he got the nearly 40% salary cut. That raises a fairly natural question of what the pay grades are lead pastors, executive pastors of campus, and executive pastors for the entire organization that is Mars Hill (i.e. the officers of the church as a corporation).
So the book on money is rebranded from Re:Lit to Jamie Munson with a bow and arrow logo.
It's curiously apt that Munson's new book is on authority. Authority was considered a big concern on Munson's part when he circulated reasons for the immediate termination of two employees of Mars Hill back in 2007.
So what were these men doing during the investigation process? Any of them can feel free to speak on record when they like. Scott Thomas, for instance, was explaining to Petry that there was no need for Petry to attend his own trial on October 10, 2007. Scott Thomas then turned around and told a member of Mars Hill church that a conciliatory process had just been completed on October 11, 2007. What personal sins Scott Thomas was repenting of, according to Jamie Munson's letter, might be interesting for Munson to elaborate on now, since he was apparently confident enough to say the four members of the EIT spent the investigative process repenting of personal sin.
Munson conveyed to members that Petry needed to be shunned in December 2007, saying that the elders had repeatedly attempted to reconcile with Petry and that these reconciliation attempts were rebuffed.
In later correspondence in early 2008 with Paul Petry, Jamie Munson seemed pretty convinced that neither he nor other executive elders or elders at Mars Hill generally, had done or said anything questionable.
There's more that you can read about Munson's role within the real estate history of Mars Hill if you like. He shows up in posts tagged "governance" and "real estate and Mars Hill".
Munson's currently still a pastor at Mars Hill and on a few boards.
Whether or not Jamie Munson was actually the legal president of Mars Hill on record with the Washington Secretary of State's office records while Mark Driscoll was, by his own account, no longer legal president, might be worth investigating.
that having Munson as president meant Driscoll no longer had to deal with conflicts of interest. What those were never got explained, but it was significant that Driscoll characterized (for whatever reason) his own role as legal president of Mars Hill as characterized by conflicts of interest.
When Driscoll preached in later 2007 in Nehemiah he made it sound like he had particular grievances with particular elders. Then on 10/01/2007 Driscoll was using some kind of royal "we" to say that two men had been fired from being pastors for the first time in the history of Mars Hill. If by that Driscoll meant terminated in some process that involved documentation of end of employment, okay, but it can't have literally been the case that no one had been fired from employment at Mars Hill at any point between 1996 and September 2007, can it? In any case, it sounds (literally) like Driscoll said something about his issues with specific leaders within Mars Hill in 2007 and along the way of leaders being terminated it stopped being personal and started to be more of a "we" thing, a "we" thing that at various points involved Jamie Munson.
Spotted this over at the BHT courtesy of Justin.
The piece is a useful case study of why attempting to use the political jargon of left and right to describe Christian faith and practice can be hazardously misleading. It is, in a way, one of the reasons Wenatchee The Hatchet has some distrust the theological left and right in the United States and the punditry classes that have emerged from within them. A tablespoon or so of salt has to be applied all across the spectrum. | 2019-04-22T02:32:29Z | http://wenatcheethehatchet.blogspot.com/2013_03_17_archive.html |
Bernard Capp has made an outstanding contribution to the social and cultural history of early modern England. This volume of 13 essays, by leading scholars Capp has inspired, is a fitting tribute. It is, at one level, a cabinet of curiosities, with studies of jokes, memories, miracles, insults, fairies, witches and bodily functions, each enticingly strange. The editors stress, though, that this is more than a collection of bizarre tales. Like all the best cultural history, the episodes described here are keyholes through which to peer at a diffuse framework of mentalities, at the fleeting traffic between institutions and individuals, ideas and opinions – the light and shade of the world we have lost. What Carlo Ginzburg saw in his literate miller, and Robert Darnton in that massacre of cats, were opportunities to recover evanescent but essential aspects of early modern existence, and to make them speak to big questions of consciousness, belief and agency. These historians aim to capture nothing less than the past reality of experience: its textures, ambiguities and conflicts.
As Angela McShane and Garthine Walker suggest in their (all too brief) introduction, Bernard Capp’s research has reached deep into a realm of marginal existence to show us how the majority lived. There is a certain irony in this, but early modern inequalities of wealth, power and literacy meant that the relationship between the sizes of social groups and record-production was an inverse one: there are no peasant diaries. Yet a vast amount of archival sources concern the lower orders, sometimes vividly recording their minds, words and actions, even if not actually written by them.
The book’s organizing scheme is based on the relationship between the extraordinary and the everyday, queer and quotidian, uncanny and unremarkable. Definitions vary as viewpoints vary. First, even sparing our ancestors the enormous condescension of posterity, our perspective can never be quite the same as theirs. Early modern people able and inclined to examine their lives, and to make a record, were unlike us, and the rest more alien still. Just as important are the ways in which early modern people differed from each other. Generalizations are easily made but often misleading; variety, however, speaks for itself. Its determinants are relatively limited – era, age, gender, class, occupation, location, religion – but their permutations infinite: how differently did a recusant Lancastrian gentlewoman of the 1580s see the world from a puritan apprentice in Commonwealth London? What does it mean to call both ‘early modern’, and is that more helpful than bracketing together people alive during the Napoleonic Wars and the First World War?
Differentiation is not just a matter of doing right by the dead, recognizing their individuality and subjectivity: it is about seeing early modern life as a dynamic equation, and thereby better understanding change. A key aspect of early modern change, and one that generated so many documents, is that it caused anxiety throughout society. In an age of overpopulation, poverty, shortages of land and food, and fraught competition, difference was a perceived source of disorder, imagined or real. Certain groups became problems: assertive women, masterless youths, vagrants, religious dissenters. The perception was more frightening than the reality; but in the hands of England’s governors perceptions became truth: the political consequences of belief were tangible, and the ‘other’ buttressed ideals cherished by Church and state. The 16th and 17th centuries were politically turbulent and insecure, and tolerating even trivial forms of unorthodoxy might be seen to encourage social dissolution and divine destruction.
Given the complexity of this world, where culture had more battlegrounds than common ground, how are we to separate the everyday and the extraordinary? Clearly, no firm rules can be established: we need multiple perspectives and contexts of communication. To satisfy such a need, this collection offers ‘an exploration of the shifting centre and the porosity at the peripheries of the “norm” in early modern England’ (p. 3). The essays are arranged into two sections: the first looks for the extraordinary qualities of the everyday, the second the everyday in the extraordinary. This is an elegant formulation, but it is not clear that the essays conform to such a neat dyad. Some readers might wonder what it even means, and there is no conclusion to help them judge how well the essays live up to the prospectus. Undoubtedly, the contributions, in all their variety, do throw up interesting comparisons and connections, but we are obliged to make them for ourselves.
Those of us who raid archives for a current project, view with an admiring envy a historian who has spent his life reading, and looking for, everything. Keith Thomas is famous for his envelopes stuffed with reference-slips for every ethnological detail under the early modern sun. Perhaps only he could have written an essay on farting. It is an illuminating piece: flatulence is not in itself historically important, but the manners and morals, codes and conventions, surrounding it are. Sheepishly, perhaps, Thomas insists that his piece is ‘a well-intentioned attempt to illuminate some of the values, sensibilities and implicit tensions of the period’ (p. 11), and trusts that Bernard Capp will understand. Farts were not merely malodorous gases: they were toxic, hazardous to expel but more dangerous to hold in. Some considered breaking wind discreetly an art; others (such as the Dutch) were less inhibited. Farting might be a weapon, like a curse or an insult. It could be used to disrespect authority, a spontaneous uncivil act at a time when civility was so important to polite status.
Essentially, or perhaps we should say fundamentally, this is an essay about the serious side of humour. So often when we laugh we betray the things that worry us, and because these change over time they have a history. 17th-century jokes ‘ridiculed people whose bodies let them down at ludicrously unsuitable moments’ (p. 19), and the greater the shame, the louder the laughter. Thomas suspects that viewing a fart as a breach of decorum had been less common in earlier times, which may explain post-1600 scatological humour – ‘the natural release sought by people for whom intensifying standards of bodily restraint were relatively new and unaccustomed’ (p. 22).
Anthony Fletcher relates the cautionary tale of Sir Thomas Isham, who in 1675, aged 17, inherited a Northamptonshire estate. At first his behaviour was merely obnoxious, but the real trouble started when he went on the Grand Tour. Isham had taste, but an enormous appetite, and indulged unstintingly in art. In 1679 a dawning awareness that his absence and lifestyle were damaging the estate drew the prodigal son home. His affairs in chaos, Isham arranged to marry into money but died of smallpox on the eve of his wedding. Fletcher’s assessment is that ‘Sir Thomas proved too arrogant, too opinionated, too pleasure seeking and too mercurial to be a successful and respected Northamptonshire landlord’ (p. 45). What this tells us about the everyday and the extraordinary is uncertain – except perhaps that much was expected of the young in the 17th century (especially heirs to titles and estates) and that sometimes they failed to live up to those expectations. Self-restraint turned to abandon as familial and societal constraints on their lives became unbearable – like succumbing to wind.
The unusual friendship between an old man and an orphan is the subject of Ralph Houlbrooke’s essay. In 1596 Robert Robertes died without making a formal will, but had, it was claimed, made the 11-year-old Cecily White his executor, something Robertes’s brothers disputed. The case could not be decided definitively, although it seems a settlement was reached. The story comes from depositions taken in a Berkshire archdeaconry court, the sort of records which ‘brilliantly illuminate an exceptional relationship or situation’ (p. 48). The detail in which the dispute and its background have been reconstructed is indeed remarkable, and shows the intricate nature of the legal and financial affairs of even quite ordinary people by the end of the 16th century. This demonstrates more than just the action of the state upon people’s lives: lawsuits like this, in their many thousands, actually constituted the state, not as a set of institutions but as a web of connections with authority.
Legal records also underpin Paul Griffiths’s investigation of ‘punishing words’, a piece packed with examples of libels and slanders tried in borough courts. He focuses on how feuding neighbours and reformist magistrates alike drew on the same visual vocabulary to threaten and cajole. The urban landscape was dotted with sites and devices of correction – bridewells, cages, pillories, gallows, whipping posts and cucking stools – comprising a ‘material semiotics’ (p. 68) of discipline and punishment. This, Griffiths suggests, was Foucauldian avant la lettre. He insists that the adoption of these images did not constitute plebeian acquiescence to the moral authority of the law, rather a pragmatic reaction to the realities of power and the urge to lay enemies low.
It is difficult to discover what early modern people thought, but this should not stop us trying. David M. Turner’s excellent contribution examines a serial publication, Poor Robin’s Intelligence, available between 1676 and 1677. Its stock-in-trade was ‘prodigies, cheats, sham doctors, astrologers and the mishaps and sexual misadventures of the city’s inhabitants’ (p. 86). Disdained then and since, the newspaper actually offers a rich seam of historical evidence. It was written in an esoteric, elliptical style, full of innuendo, puns, metaphors and literary allusions – ‘a kind of learned vulgarity that was based on varied cultural resources’ (p. 100). Turner is especially interested in the way it connected with tastes and topical interests, and its uses as a guide to the interplay between humour and political debate. More broadly, its content ‘offers an intriguing insight into how London’s inhabitants located themselves mentally and geographically within the expanding metropolis’ (p. 87).
Garthine Walker, sticking closer to her own editorial brief than some contributors, challenges the dominant idea that witchcraft was an exceptional crime: the contemporary notion that it was exceptionally difficult to determine, and the historical notion of its exceptional non-existence. Instead, she sees it as ‘a mundane, everyday crime’, the unexceptional quality of which ‘was precisely wherein lay its power to bring about exceptional outcomes’ (p. 106). Walker recommends that we see English witch-trials not in the context of other European witch-trials, but ‘in the more immediate context in which it existed, namely in that of felony within the English criminal justice system’ (p. 109). In everything from body searches to the evidential admissibility of hearsay, witch-trials conformed to normal legal procedure, and convictions were neither casual nor hysterical: they were the logical outcomes of complex decision-making processes by intelligent people with laws and beliefs different from our own.
Here we leave the extraordinary in the everyday, and move to the reverse formulation, although the essays in the first part fit this description too. Peter Marshall recounts how in the mid-1640s Cornish maidservant Ann Jeffries allegedly acquired healing powers after encountering some fairies. 50 years later, a London printer made a pamphlet of the tale, part of a campaign ‘to stem a perceived tide of atheism, scepticism and unbelief sweeping the nation’ (p. 128) by displaying the extraordinary works of God and the devil. The episode exemplifies brilliantly a moment in late 17th-century epistemology when the credibility of such phenomena hung in the balance. Many were unsure; some were vehemently defensive; others openly scoffing. It is particularly interesting that the battle-lines did not follow lines of social demarcation: this was an elite controversy.
Alexandra Walsham follows with a superb account of the legend that a bone belonging to John Wyclif, posthumously condemned as a heretic and disinterred, caused a healing well to spring up where it fell. That ‘the morning star of the Reformation’ should be remembered with exactly the same kind of miracle story that Protestants reviled seems less ironic when we realize that, as in Peter Marshall’s essay, belief was embedded in culture and met needs that were social as well as spiritual. Walsham compares Wyclif’s veneration in folklore and ‘the reciprocal processes by which Luther was assimilated into older paradigms of sainthood’ (p. 149). Old habits died hard, and not from ignorance but due to the sheer power of traditional customs – customs that were meaningful, evocative and satisfying. The supposed ‘miracle’ was intimately bound up with rural lieux de mémoires, ‘a tendency to spin an imagined past around visible topographical features that is deeply ingrained in human cultures’ (p. 142).
Catherine Armstrong dissects Jacobean reports that starving colonists in Jamestown had resorted to cannibalism, arguing that the ‘truth’ of this cannot be separated from political ideas about the New World, and the means by which they were communicated. Captain John Smith promoted America almost as vigorously as he promoted himself, and his off-colour joke about a man who ate his wife may well be an indication of his disillusionment with Virginia and a new-found affection for New England. That humans have eaten other humans, as rituals of triumph and from desperation, is beyond dispute; but it may also be the case that ‘what is important about cannibalism is that people think it exists, rather than whether it does exist’ (p. 168). This, it seems then, is a very good example of the way that the extraordinary inhabits the everyday: as a horrific idea that keeps norms in place.
The same could also be said about witches, examined in the next essay. Darryl Ogier examines ‘the dreadful record of Channel-Island witch hunting’ (p. 178), and observes how a lack of external scrutiny explains relatively high numbers of prosecutions. Within the islands themselves, the authorities ‘made common cause against un-neighbourliness with the wider population, serving the advancement and retention of power’ (p. 187). Like Garthine Walker, Ogier identifies the everyday concerns in the extraordinary crime of witchcraft: the nuts and bolts of daily life manipulated and threatened by demonism. Throughout the early modern period, popular attitudes to the devil were complicated. Not all engagement with magic implied satanic power, unless of course it was condemned as such by a clergyman or law officer. Again, meaning, malign or benign, depended on perspective.
Darren Oldridge’s essay on the print history of the Mother Shipton legend shows her transformation from sorceress to witch to diabolist, each with its own inflection, during the middle decades of the 17th century. These shifts, Ogier suggests, ‘indicate the power of popular stereotypes to mould the image of the literary characters in dramatic ways’ (p. 223). Interestingly, Shipton was not necessarily becoming more frightening: it was perfectly possible to represent her as a comic figure in the 1660s, and to the same audiences that would continue to fear witches for generations to come. Reading these tales, and discovering how a 17th-century audience read them, requires careful contextualization and a degree of imagination.
The next story is a case in point. In 1650 some drunks in Berkshire decided to honour their exiled king by eating flesh sliced from their buttocks. In a richly researched and conceptually sophisticated piece, Angela McShane suggests that ‘such events, rather than simply appealing to our taste for the bizarre and spectacular, can illuminate something of the everyday experience of royalism in interregnum England’ (p. 192). She subjects the episode to ‘multiple imaginary readings’ (p. 192), and argues that it might be seen as a ‘secular sacrament’ (p. 193) arising from a desire among traditionalists to restore monarchy and remake the body politic. Cavaliers were rootless, disinherited, incoherent, which explains why bonding rituals may have been unusually important in the 1650s, a means for them to ‘re-engage emotionally both with each other, and an imagined State to come’ (p. 205). Like blood, drink could seal an impromptu covenant, banishing melancholy, dulling pain and galvanizing hope.
The thaumaturgical power of blood also features in Steve Hindle’s contribution, focusing on an affray in the Cheshire town of Nantwich in 1572 which left a gentleman named Roger Crockett dead. The investigation that followed was convoluted, attended by allegations that witnesses had been suborned and their testimony false. A remarkable aspect of the inquest was recourse to the ritual of touching, where, it was believed, a murderer might be exposed by the fresh bleeding of a corpse. Hindle does some impressive detective-work on the evidence, engaging fully with the problem of the ordinary and the extraordinary at the heart of this volume. From the welter of depositions generated by the crime, including a file from a prerogative court, it’s hard to say what was true in any objective sense, and the story of Crockett’s demise ‘evaporates into ether of Star Chamber rhetoric, leaving only half-heard echoes of mutual recrimination’ (p. 237).
Hindle’s fine epilogue rounds off the entire collection. He suggests that dividing the strange from the normal is unhelpful unless we thoroughly investigate their relationship, in different eras and contexts. We must recover not just otherness, but forms and rates of change. Change is about the big picture, not always well served by the microhistorical approach, at least in the Italian micro-istoria tradition rather than that of English local studies. As the contributors show, links between the extraordinary and the everyday could be ambivalent, conflicted, and intricately arranged by circumstance and contingency. Furthermore, the things we find remarkable in the past were sometimes the same as our ancestors found strange in their present; why else would they have recorded them with such wonder, shame, horror and glee? Things were remarkable in that they were worth remarking upon; to see something as extraordinary was to notice change, and often to be troubled by it. This reaction produced a fabulous array of documentary sources telling wonderful and frequently weird stories. Therein lies much of the appeal of studying the early modern period: ‘its almost unlimited capacity to disclose the co-existence of the strange with the apparently familiar, the interpenetration of the ordinary and the extraordinary’ (p. 239).
The editors thank Dr Gaskill for his review and do not wish to comment further. | 2019-04-21T13:35:45Z | https://reviews.history.ac.uk/review/1012 |
Common talk deserves a walk, the situation’s changed/ everything said from now on has to be rearranged.
The hiphop DJ is a meta-musician, an author, a programmer, an organizer of recorded fragments and a builder of databases whose talents are uniquely suited to survival and meaningful cultural production in our emerging era of total digital cross-reference.
The line between electronic and live music is unbroken. The forms may appear impressively distinct but they are organized around the same act: playing a musical instrument (a keyboard, drum pads, so on). In electronic music — which finds its most popular moment in the ’70s, German band Kraftwerk — a musician plays a musical instrument and is concerned about, for instance, the key he/she is playing in. This is not the case with hiphop. Hiphop is organized around the act of replaying music; and it is this act, replaying, that marks the real rupture in the mode or method of production.
There are no musical instruments in hiphop (or proper hiphop, and there is such a thing as proper — or closer yet, real — hiphop). This is a truth many critics and hiphop lovers find hard to accept. They instead force matters by placing the idea or image of a guitar or a drum next to that of a turntable, as in the case of the liner notes for the compilation CD Altered Beats by Bill Murphy and Rammellzee: “The turntable is more like a drum than anything else. Aside from the obvious physical resemblance of the circular platter to the typical drum head, the turntable/mixer system is in effect ‘played’ with hands, the black wax rhythmically manipulated by the fingers, just as the tightly wound skin of a congo or West African tribal drum is coaxed into sonic nuances with open-handed slaps.” But in fact the African tribal drum is a musical instrument; the turntable is not. Even the West Indian steel drum (closer to the turntable in the sense that it is repurposed — more on this later), is still very far from what the turntable is and what it produces, which is not even real music but meta-music (again, more on this in a moment).
In Tone-Loc’s 1989 video for his wildly popular single “Wild Thing,” his DJ (or the actor who pretends to be his DJ) plays something that is half a guitar and half a turntable. There are two reasons for this monstrosity. One, “Wild Thing” sampled Van Halen’s “Jamie’s Cryin'” (without permission), and so the guitar/turntable contraption functions as a symbol for this gimmick: hiphop sampling rock. Furthermore, this symbol (hiphop sampling rock) is held (or played, or closer yet, replayed) by another symbol, that of the DJ, who in the video is a code for what sampling is: an advanced digital form of the initial and manual DJ practice/science of scratching and connecting breaks into a sonic series.
The second reason has to do with the turntable’s relative newness. Even in 1989, long after its departure from the actual production of hiphop music (the turntable was at the this point, like a DJ in the video, nothing more than a reference to the essence of hiphop), there was still some confusion as to what exactly it was — meaning, what does it resemble? Which family does the turntable belong to? What is it actually doing? Making music? The contraption in the video asserts that it is not very different than a guitar. Indeed, the “Wild Thing” video says, if you were to hold a turntable flat against your stomach and attach a neck to it (no strings or keys — so it is a pure neck), then this fact would be apparent. The turntable is a musical instrument.
The “Wild Thing” video seems silly — and at the level of promoting a silly pop rap song it is. But on another level, the level of its relationship with other music videos and music forms, it is dead serious. The video attempts to explain to rock and soul skeptics what this new thing, which is used in a particular/peculiar way by the hiphop DJ, is. The “Wild Thing” video assumes that due to the turntable’s shape, traditional musicians are unable to recognize it as an instrument. In a pure instance Platonizing the reality of an image, the video invents this thing, this useless contraption (which is not a guitar, nor a turntable — you can’t scratch that way without the record falling off) that has the form of an electric guitar so that the skeptics can finally recognize the turntable’s essential sameness with other, traditional instruments.
To replay a record with your hands is different from playing an instrument with your hands. The one object (the turntable) says to the hand, “Don’t touch me, for I’m must complete my cycle and fulfill that which is recorded on the 12inch”; the other (the musical instrument) says to the hand, “If you don’t touch me, if you don’t pull my strings or strike my keys, I’m nothing, I’m a useless object.” The turntable is always wrenched out of sleep by the hand that wants to loop a break or to scratch a phrase. In a word, the turntable is awakened by the DJ who wants to make (or, closer yet, remake), music (or, closer yet, meta-music); whereas the instrument always sleeps when it is used to make real music. Indeed, even during the performance of the loudest rock song, the instrument is fast asleep in the hands of the long-haired thrasher.
The turntable is a repurposed object. It is robbed of its initial essence. But the void is soon refilled by a new essence which finds it meaning, its place in the hiphop universe, in the service of the DJ.
A thing (Kant) or implement (Heidegger) or commodity (Marx) that is repurposed does what it is not supposed to. It is made by the hands of a manufacturer (Kant), an artisan (Heidegger), a laborer (Marx) to perform (and literally disappears into) a specific task, but the repurposed object ends up doing something else. Think, if you will, of a film projector, which is used to show a movie. That is its purpose: to show a movie, not to make a movie — a filmmaker uses a camera for that. And yet this is what a turntable is forced to do; to make meta-music (music about music) instead of playing previously recorded music.
Hiphop is less “music,” per se, and more “about music” — so radical is its difference from previous methods or modes of music production. Hiphop doesn’t so much make music the way, say, The Average White Band, or James Brown, or The Police made music; it instead makes music out of and about real music — meaning, it makes music its subject. “Punk, rock, new wave and soul” (G.L.O.B.E) are subjected to the reproductive logic of hiphop. In this respect, hiphop is, as Afro-futurist/culture critic David Goldberg points out in his essay “Put The Needle On The Record,” meta-music — music made out of and about other music.
Real Hiphop does not sample real sounds, like the toilet flushing in Art of Noise’s “Close (To the Edit)” (1984), but samples copyrighted music. The hiphop DJ does not shape raw sound into a form recognized as music, but shapes information into a sonic form recognized as meta-music.
The German philosopher Heidegger once wrote that the essence of a tool (like a hammer) is only noticed when it is broken. If a hammer works, then it is nothing more than an extension of your hand, but if it breaks, you notice its ‘hammerness.’ This is close to what I mean by repurposing; the added and unexpected uses of the Aurora Bridge (e.g., the way it has been used to express political and environmental concerns, as in 1997 when Greenpeace protesters hung from it by huge ropes and prevented two American fishing trawlers from heading to the Bering Sea) knocked it out of the slumber of its primary function, and it is now wide-awake, alert, alive. Indeed, like Heidegger’s broken hammer brings out the hammer’s hammerness, repurposing brings out the ‘bridgeness’ of the Aurora Bridge.
A repurposed turntable brings out a turntables’s turtableness.
Because it is doing what it is supposed to be doing, a musical instrument is fast sleep when in the process of making music (Indeed, the very fact of this may explain why Jimi Hendrix frequently lit his electric guitar on fire or played it with his teeth — anything to wake the damn thing up!). Turntables, on the other hand, are always wide awake or “enstranged.” This is why the beloved heavy metal practice of smashing a guitar or kicking over a drum set at the end of a show cannot be translated into hiphop terms; how can a DJ break something that is essentially broken when serving his/her hiphop needs? To smash a turntable after it has been man/mishandled by a hiphop DJ seems like a terribly cruel thing to do.
Enstranged, not estranged. Enstranged is a neologism that approximates the Russian word “ostranenie,” which means “making it strange,” or to defamiliarize something that has been smothered by habit. The Russian Formalist, and Victor Shklovsky specifically, argued that enstrangement is what distinguished poetic language from everyday language.
During the heyday of European ethnic gangsters in North American cities, violin cases were famously repurposed for gangland wars. These cases which carried Tommy guns were wide-awake when in the hands of the gangsters and fast asleep when in the hands of classically trained musicians.
A musician’s case contains an instrument; a DJ’s case contains information.
Marx, like Heidegger, recognized the significance of enstranging an object. For Heidegger, a broken object exposes its thingness; for Marx, it exposes its source, the laborer, the one who has transferred his/her body’s energy into the substance of the object. In Capital, Volume One, Marx writes: “[I]t is generally by their imperfection as products, that means of production in any process assert themselves in the character of products. A blunt knife or weak thread forcibly remind us of Mr. A., the cutler, Mr. B, the spinner. In the finished product the labour by means of which it has acquired its useful qualities is not palpable, has apparently vanished.” A broken object is also wide awake or enstranged. Indeed, a broken hiphop turntable is a bizarre (if not the most bizarre) thing. When it’s actually broken it can’t be repurposed (or broken) by the (re)creative hands of the DJ.
The production of one form (replayed music) occurs outside of the text/recording; the other (played music) within — if it is recorded at all. Indeed, hiphop doesn’t really “vanish into thin air” in the manner evoked by jazz genius Eric Dolphy, but returns into the album sleeve to be replayed on another day.
Hiphop is the first musical form to break completely with traditional music in terms of production — how it is made, who makes it, and so on. Even dub, the closest form to hiphop — which was born in 60s and employed dub plates in ways that are analogous to hiphop’s use of records — has vital connections to live musical performance that hiphop doesn’t. Dub is constituted by two significant practices that are not completely separated or in opposition: One, is to make dub with live musicians — a practice that finds its representative in Lee “Scratch” Perry and is related in many ways to electronic music, like Kraftwerk’s; the other is to make a “version” (a remix) of a recorded piece of music — a practice that finds its representative in King Tubby and is distantly related to early, early hiphop, like Afrika Bambaataa’s — whose “Planet Rock” famously sampled Kraftwerk’s, “Trans-Europe Express” (sans permission). This is why dub presents significant theoretical problems; its mode of production is never as clear as hiphop (the total break), but always in a dub haze of live instruments and electronic equipment. Nevertheless, dub is the only link (or, more closely, a ghost of a link) between hiphop meta-music and instrument-based music.
The real break began in the mid-70s when New York DJs invented the practice/science of looping a break from scratch. What the DJ establishes with the back and forth, blend and blur, is a series (loop after loop) of repeated information that forms a total sonic mix (or matrix) into which the rapper is inserted. The rapper does not perform with a band but within the meta-music.
Started in the 70s, the looping of the break anticipated the sampler. The sampler digitally assembles multiple parts into a master mix. With the arrival of the sampler in the early 80s, the DJ abandons real turntables (at the club or in the park or the radio station) for the mixing-board.
If you open up and then fold the note sleeves for the soundtrack to What’s The Worst That Could Happen? (2001) in a certain way, the image of Eric Sermon on the mixing boards will be faced with the image of Marvin Gaye on the keyboards. Unlike the folding of the new $20 bills to produce what looks like the burning Twin Towers, the matching of Eric Sermon’s method of producing music with Marvin Gaye’s method of producing music is not accidental.
Similar to the guitar/turntable contraption in the “Wild Thing” video, the matched images attempt to explain what is not yet fully understood or realized by making it correspond to something that is familiar. Meaning, the mixing-board is the hiphop version of the piano: The piano has keys, the soundboard has knobs; both have wide surfaces; both require that the pianist or mixing-boardist sit down and use the tips of their fingers — therefore: both are instruments. But these parallels are only visual not factual. The mixing-board is not an instrument, that is not its essential purpose. The mixing-board was made, designed, installed in a soundproof basement to record instruments. It is repurposed by the hiphop DJ who, now a producer, concentrates both the recording and production of music within the mixing-board.
If rearranged in such way that the living hiphop producer Eric Sermon is on top and the ghost of Marvin Gaye is on the bottom looking up, we would have a better representation of what is actually taking place in the production of hiphop music. The phantom of the musician exists within the electronic depths of the soundboard. The musician is the subject of the hiphop producer.
But even this is not close enough. A more precise representation of modern hiphop production should look something like this.
The modern mixing-board replacing the DJ who repurposed the LP that was produced by a live musician.
The sampler is not a musical instrumental (in the traditional sense of a musical instrument), it is instead repurposed to turn one DJ repurposing two turntables into a thousand mini DJs repurposing two thousand virtual, mini turntables.
RZA goes to work, feeding a succession of sample-laden discs into a sampler. He has a diffident, genius-at-work charisma about him as he sits with his back to the room, keyboard at side. With a flick of his prodigiously ringed hand he reaches out and conjures up a brutal bassline. The speakers pulse violently. RZA takes a sip of Hennessy. ‘Record this, right here!’ he tells the bewildered-looking engineer.
RZA has decided to dispense with the original master tapes, shipped over from Britain. He wants a completely new version, recorded rough-and-ready without the standard safety net of a time-code. This convention-trashing, wildstyle approach to recording elicits some consternation from the studio’s engineer, a central-casting white guy who warns RZA: ‘You won’t be able to synch to this, you know.’ RZA waves him away and turns to [Texas’ Bassist and leader] Johnny McElhone.
‘What are you saying? I understand no keys,’ says RZA.
The real turntable has been dead for many years now; it’s no longer used to reproduce music. The sampler has replaced it in studio and the DAT machine at live shows. (Indeed, when the Anti-Pop Consortium performs a live show they often say, “Let’s give it up to our DAT machine” instead of “Let’s give it up to our DJ.”) The turntable is now a ghost machine within the complex circuitry of the mixing machine. When we see a DJ at a nightclub scratching records and reproducing music on the turntables — which by the way have not progressed or significantly improved in over 20 years; what was used to scratch records in the early 80s, if not earlier, are essentially the same Technics that are used today — we are watching something from the past, and, because of this, something that is almost ritualistic.
Like the saint he or she is, the 21st century DJ who cuts and runs the break of our favorite song is not innovative, they are not looking forward but backward, giving praise thanks to his/her great and departed ancestors — Jam Master Jay and DJ Scott La Rock — on what is now the altar of hiphop: the two turntables.
Originally from Zimbabwe, Charles Tonderai Mudede is the book editor for The Stranger, an alternative Seattle weekly. An adjunct professor at Pacific Lutheran University, Mudede is also a founding member of the Seattle Research Institute (www.seattleresearchinstitute.org). | 2019-04-22T14:55:15Z | http://ctheory.net/ctheory_wp/the-turntable/ |
Don't miss your upcoming reunion - make sure to check the reunion section below.
Margaret Doherty '68 was recently appointed as the next State Representative for House District 35 in the Oregon State legislature. Washington and Multnomah county commissioners unanimously selected Margaret to replace outgoing state Rep. Larry Galizio. Margaret was sworn in on September 29, 2009 and represents District 35, including Tigard, King City and SW Portland. Check out her website at: http://www.leg.state.or.us/doherty/. She joins two other Wilson graduates in the current Oregon legislature:Senator Ginny Burdick '65, District: 18 (Tigard, King City and SW Portland) and Representative Chris Garrett '92, District: 38 (City of Lake Oswego and a portion of SW Portland). After graduating from Wilson, Margaret went to Portland State University and received a degree in Speech and Theater. She taught Speech, English and History at Milwaukie High School for 10 years, then went to work as a labor consultant with the Oregon Education Association for the next 22 years. In that position, Margaret represented education workers in many part of the State. She retired in 2006 and began a floral design business. Margaret has always been active in politics in Oregon. Since Margaret ended up majoring in speech, her two most influential teachers at Wilson were Mr. Pacheco and Mrs Zervis. "After working with teachers all of my adult life, I truly appreciate what wonderful and dedicated teachers we did have," states Margaret. "They really were not making much money back then, yet they were dedicated to making sure we got the most out of an education." When asked about advice for current Wilson students, Margaret tells us that "You never know where you are going to end up in life. I never thought I would be a state representative. Make the most of the opportunities you have been given."
John Nelson '64 received his Bachelor of Landscape Architecture from the University of Oregon in 1969 and a Master of Urban Design and Regional Planning from University of Edinburgh (’73), Scotland. John was in the Army Reserve and lived in the United Kingdom and Illinois from ’71 to ’77 and relocated back to Portland. He married Diana Lund (Astoria ’65) in 1969 after they met at University of Oregon. John has two children, Andrew (Jesuit HS and USC), lives in Seattle; and, Sarah (Jesuit and U of O) who lives in Portland. John is a Board Member and Director of Planning Services at Maul Foster Alongi, Inc, and environmental science and engineering firm in Portland and Seattle. He is currently building a houseboat of his own design and will live at Sauvie Island. Click here to see a photos of his new floating home that was delivered to slip at Sauvie Island in August, 2009 (photo 1; photo 2) John adds, "A great place for a WWHS party!" He also enjoys downhill skiing, sailing, travel, reading, family and college football. When asked about influential teachers, John tells us that his most influential teacher was Mary Bunce, 8th grade at Bridlemile school. She was an artist married to Louis Bunce, and introduced John to art and music which led him to pursue a career in architecture, landscape architecture, and urban planning. He also enjoyed trips to the art museum with Christina Whitlock. Words of wisdom for current Wilson students... "Go to the U of O! And avoid photo radar on BH Highway (I got caught last year)." He also believes that Hillsdale is not the same without Peterson’s Ice Cream shop, Lynch’s Market and Piggly Wiggly.
Following graduation from Wilson High in 1967, Alan Mushen '67 attended Willamette University with his heart set on a career in law or education. Due to a number of personal health concerns and surgeries, "my undergraduate studies were completed in General Social Science at Portland State University," states Alan. During this period, he was able to take a two-week trip to Europe to visit his brother, who was stationed in Germany. Once he returned to the States, it was time to pursue a career. Initially, he worked for two years as a Researcher for Oregon Historical Society. Since his father had been a life-long banker, he decided to become involved in the financial world. Alan adds, "After six years as a commercial teller and management trainee, I encountered too many customers who wondered aloud what I was doing in such an unchallenging job." What finally got him away from banking was attending Willamette College of Law in 1983. Unfortunately, during this time his mother became terminally ill with cancer, and his law studies had to be put on hold. Following his mother's untimely death, Alan opted to pursue a career in secondary education. As a result, he returned to University of Oregon and obtained his secondary teaching credential in Social Studies. Following one year as a classroom teacher at Umatilla School District, Alan enrolled at University of Oregon to earn his Masters Degree in Special Education for Secondary Students. "With a background in personal health and medical experiences, plus patience for those with high needs, I was able to successfully relate to students and their parents in a school setting," states Alan. "After a 22-year career in classroom teaching as a life skills, learning center instructor, and alternative education teacher, I still hear from grateful students- now young adults and their parents. Hopefully, I made a difference for many of them along the way." Alan tells us that there were teaching stops at Alsea, Oakland, Glide, and Tillamook School Districts. "Somehow, the lure of school administration never interested me, as I wanted to be on the 'firing lines' with the enthusiasm of youth instead of removing myself to an office." Currently, Alan works as an Adjunct Professor for Tillamook Bay Community College in Early Childhood Education-Family Studies and plans to continue this position at Clatsop Community College in Astoria, Oregon. Alan has been married for sixteen years to Micki and has two daughters. They love to live by the ocean and have two Whippets named Myrtle and Maude. They live in Cannon Beach, Oregon, where he finds time to play the piano and write, both fiction and non-fiction work. Alan is an avid walker and shoots a basket or two. In his spare time, Alan assists at Habitat for Humanity, Special Olympics, and Meals on Wheels. "It would be fun to hear from any of my former Wilson friends or classmates who want to share," says Alan. His current e-mail address is [email protected]. "Funny how time flies for all of us." When asked about teachers at Wilson, Alan remembers several teachers at Wilson who made a difference in his life as a person and educator. Names like Proppe, Selberg, Feller, Ashley, Dodge, Zervis, Hutchinson, Brugato, Dalby, Makinster, Witty, Hertz, Meinicke, Severson, Conlon, Ole Johnson, and Crandall. "In today's world of turmoil and change, we all had that special campus on Vermont Street to call home for four years!"
After graduation from Wilson, Cliff Fenton-Feingold '76 attended the University of Oregon, and graduated from Portland State University with a B.S. in Business and Marketing. He lived in Seattle for 18 years before moving to Bend, Oregon where he has lived for about 12 years. Cliff has two daughters, 18 and 16. His oldest daughter starts U of O this Fall. He owns a high end furniture store in Bend called Feingold Home (http://www.feingoldhome.com/).Cliff's classmates knew him as Cliff Fenton. He tells us that his dad changed his name from Feingold to Fenton in the late 40s like a lot of families of Jewish decent did in New York at the time. "He simply picked an 'F' name out of the Bronx phone book and we ended up Fenton," adds Cliff. "It always bothered me that he had to do that to even get a job. Things were different after the war. I decided to change it back about 7 years ago out of respect for our heritage. My daughters did the same." When asked about favorite teachers at Wilson, Cliff told us he had great teachers. Cliff's favorite was Stan Stanton, his football coach, "like a father figure to us nutty ball players." George Crandall was also a favorite. Words of wisdom for current Wilson students: "What you do speaks so loud, I have no need to hear what you say."
William Ross Booth '07 graduated from Wilson and is stationed at Fort Drum, NY. He is a registered EMT and trained as a combat medic and usually works at the civilian clinic on base. Currently, he is deployed with the 520th Engineering Battalion near Basra, Iraq. He stays at COB (contingency operations base) ADDER which is outside of the city. "He mostly communicates through Facebook," states Paul Welty, his stepfather. "But we do get the occasional satellite phone call." Click here to see some photos from Iraq: photo 1, photo 2.
Whitney Hawke '05 graduated from Occidental College in May 2009 with degrees in both Politics and Urban & Environmental Policy. In September 2009, Whitney started classes at Lewis & Clark Law School. She plans on specializing in environmental law, with an emphasis on brownfield redevelopment and urban infill policy. In addition to law school, Whitney co-owns and operates a record label here in Portland called Brave Recs. In her spare time, Whitney also works as a music journalist for Willamette Week. Her very supportive parents are Denise and Steve Hawke. When asked about her favorite classes at Wilson, Whitney says that there were quite a few great ones. "I'd say Mr. Zaraza's physics classes, Mr. Nolan's World History, and Mr. McDicken's Ecology class were my tops." Whitney's advice for current Wilson students is "to specialize in several different areas and build a diverse arsenal of skills and interests. Mixing art classes with hard sciences and foreign languages can give you a well-rounded intellect people appreciate and admire. Think outside the box and have fun while doing it."
According to the Portland Tribune's Jason Vondersmith (October 1, 2009), "leaving her native Portland for the bright lights and competitive nature of Hollywood hasn’t been the easiest transition for Keri Murphy. But things are looking up for the 34-year-old Murphy, a 1993 Wilson High School graduate. She recently signed to be part of E! Entertainment Television’s “That Morning Show.” To read the full article, click here: http://www.portlandtribune.com/features/story.php?story_id=125434356028837100.
Send us the details on where/what you have been doing since graduating from Wilson, and we'll post in an upcoming WWHS Alumni Update e-newsletter. Send details to Linda Doyle.
Annie Painter was an Art Teacher at Wilson High School during the ’72-74 school years. Photo 1. She was best known for the Art Marketing project, which had Wilson students designing items and services which were saleable in the general marketplace. Initially she was known as Annie Johnson, but was married midway though this period. To read more click here.
Keenya Browder '93 lost her senior yearbook somewhere over the years and has been looking for a replacement yearbook. Thanks to Betsy Cole (retired Wilson teacher/counselor), Keenya is flipping through the pages of her senior yearbook once again. Thanks, Betsy!
Kathy Evans (Owen) graduated in 1961 and is wondering if there are any plans underway for their upcoming 50-year reunion. She is retired from Intel almost three years ago and is "loving retirement and our grandchildren," adds Kathy.
On July 18, 2009, Wilson alumni returned to the field for the annual alumni baseball game. This year 33 Wilson graduates played against each other. Cary Cadonau '91 had two hits, including a seventh inning home run, and three RBI’s to lead the odd-numbered alumni in a 5-4 loss to the Alpenrose American Legion team in game one. Ben Woodcock '05 and Chris Cannan '91 had two hits each. Nick Slade '00 had two hits and one RBI in the loss to Alpenrose in game two. PITCHERS: Toby Harris '89 (4 K’s in 2 innings), Evan Dunn '05 (3 K’s in 3 innings), Jim Dunn '76, and Nick Slade pitched the first game. Second game pitchers were Shaun Fagan '96 (3 K’s in 3 innings), Ron Dodge '76, Jason Nash '02, Slade, and Zach West '02. HITTERS: Alumni with one hit were Kevin Clopton '91, Kacy Fairfax '04, Brian Flink '98, Kevin LaBerge '72, Marc Molenkamp '98, Nash, Sean Setzer '04, West, and Chad White '02. SPECIAL THANKS: To Jeremy Shetler '92 for –announcing and running the scoreboard.
The reunion plans for the Class of 1980 are underway. It is scheduled for July 30, 2010 from 7:00pm - midnight at the Stockpot. (Red Tail Golf Course - formerly Progress Downs near Washington Square). Save the date cards and information will be going out soon to those that can be found! Go Trojans!
Click here for all the reunions and the latest details.
There are so many ways to support the current Wilson High School students. You can contribute to individual programs, you can attend athletic and performing arts events, or you can volunteer to help clean up the campus, just to name a few. If you would like to help the next generation of Wilson graduations, please contact Erica Meyers, WHS Business Manager, at [email protected].
Alumni, head to Pizzicato Pizza in Hillsdale on Tuesday, October 20 and the Wilson PTA will keep 20% of the sales for that day. Call ahead for takeout. 503-452-7166. Gilft certificates also count. Pizzicato Hillsdale 6358 SW Capitol Hwy. GO WILSON!
To get on the email list for the current Wilson baseball team and all the events for alumni, go to: http://www.wilsonhsbaseball.com/.
The 2009-2010 WHS Band Program is starting off with a fantastic year. We are pleased to announce that the Music Program raised the funds needed to purchase a new tuba. This has been a much-needed addition to our program -- as a community, we have worked for several years to reach this goal. The tuba will debut at the first concert on Tuesday, October 27 at Wilson. Our need this year is performance apparel to give our groups a cohesive look and feel. Our ladies have never had performance apparel for band. The gentlemen have pieced together tuxedos left from years past. Not many are left, and they are in desperate need of repair and replacement. We are purchasing additional jackets, pants, and shirts to outfit the gentlemen and purchase formal dresses for the ladies. Our current estimate to begin this process works out to approximately $45 per student. If you would like to help us outfit WHS band members, please send your donation by check (payable to Wilson High School) Attention: Paul Jolstead, Band Director, Wilson High School, 1151 SW Vermont, Portland, Oregon 97219. Include Band Outfits in the memo line of your check. If you have any questions about the performance apparel, you may contact Nancy Biskey, Band Booster President, at [email protected]. Thank you for your support of the Wilson High School Bands. Please join us for our first band, orchestra concert on Tuesday, October 27, 7:00pm, Wilson Auditorium.
The Wilson Cheerleaders will be holding a fundraiser on Saturday, October 24 from Noon to 5:00pm at Baristadors Coffee on 11136 SW Capitol Hwy. Baristadors will be donating 40% of their profits on this day to our nationally ranked cheerleading program. Baristadors Coffee sells coffee and non-coffee drinks, breakfast bagels, bagel sandwiches, pastries and Prince Pucklers ice cream, a gourmet ice cream made in Eugene. We need lots of folks to stop by on October 24 to help support the squad as they work to make it to nationals again this year. Wilson's Varsity squad took 1st in state in their division last year. Come out and support these talented young ladies!
Wilson High School Preschool is now enrolling for the 2010-2011 school year. The Wilson Preschool Program gives high school students the opportunity to learn and implement developmentally appropriate practices and creative curriculum to 3-5 year old children. Under the direction of a certified teacher, preschoolers work one-on-one with mentor students giving both the high school student and the preschooler a beneficial learning experience. Wilson will be hosting an open house (pizza provided) on Thursday, November 5 at 5:30pm. If you are looking for a unique preschool program, please come to this informational meeting. Since we will be providing dinner we ask that you please RSVP at 503-916-5280 or email Erica Meyers at [email protected]. To read more go to: http://www.wilson.pps.k12.or.us/.docs/pg/10277.
Check out the WWHS Alumni website and don't forget to complete the simple online form to join the WWHS Alumni database. To help us reach as many graduates as possible, please consider adding the link to our website (http://www.wilsonalumni.com/) from your website. Pass the word along to your Wilson High School classmates about the Wilson High School Alumni website and the opportunity to register. Tell your friends.
We've set up a new online Woodrow Wilson High School Alumni "Ning" online community network. The purpose of the WWHS Alumni Ning is for you to add stories about your time at Wilson, share what you've been doing since graduating from Wilson, and announce upcoming class reunions. Check out some old photos posted at the site. Click here to see more.
If you are receiving the WWHS Alumni Update, please make sure to add the following email address to your address book ([email protected]). This way your internet/email provider will not view the e-newsletter as spam. Thanks! If you would like to be removed from the list, just send an email to Linda Doyle.
DO YOU HAVE NEWS TO REPORT?
Send the details to Linda Doyle, including your name, class year and quote about your time spent at WWHS. Do you have a story about a classmate's achievements. Send us the story and we will post it in our next WWHS Alumni e-newsletter. All you have to do is to give us the full name and graduating class of the individual along with their story. Then let us know your name and graduating class. | 2019-04-18T10:52:45Z | http://wilsonalumni.com/newsletter/2009/October2009.html |
It is easy to modify from the template by producing new columns to track advice. Applying our templates is a outstanding start to make an expert invoice. With all the acceptable design invoice template is plug a couple of things and you are done!
Have a look at our on-line bill generator or app (Android, iOS) now to determine how simple it is to make use of our templates and also create an magnificent statement for the corporation. Spreadsheet templates could possibly even be employed for instant funding like an instantaneous party funding and etc.. The template follows a pattern that’s very simple to understand and use. A template was produced in a fashion it’s simple to ascertain a value is guessed. The above mentioned templates empower a firm consideration to maintain their invoicing system right up. Say for instance you may possess a statement template for an organization that works on precisely the exact identical strategy.
A inside designer should perhaps not merely have knowledge regarding things but on the stores that are excellent where in fact the things that are crucial may be purchased at cheap prices. Getting started as a freelance graphic designer takes longer than being more creative and talented . A freelancer graphic designer which has a small company really should avoid many of invoice problems. You have to become proficient at style, but that isn’t sufficient to carry you become through the rivalry which is feature of design. It may be worth taking into consideration sending a wonderful vintage style and design .
You should be structured and prepared to really go your job is wrapped up. Another system would be to determine contingent. Being delegated an undertaking, an interior designer needs to be attentive to what he wishes to embellish.
Visit In the event that you’d enjoy template choices and review your own possibilities. Inquire into the options to obtain whatever you’re browsing for. There is substitute for bring buyer and supplier’s reality with payment info and the credit score interval. There is substitute to incorporate the identify of this seller corporation along with the buyer alongside payment information and also the date on.
You are able to design the way that your invoice appears here. Hence , an invoice ought to be made for the security and assurance regarding the part of the designer. Buy Status bill will become generated determined on the buy status simply.
You may easily create your invoices by utilizing bill template. You’re going to need a statement that is very likely to create your business show up professional and can be very simple to make use of. If you’re struggling with having a statement that is suitable to share with your client, simply let’s and we might like to generate the invoice of one’s desire absolutely free of charge! Zoho bill can be definitely an invoicing application. Zoho Invoice includes quite a few templates to allow you to make statements that are amazing .
You’re ready to track your invoice or possibly if you have maintained a format that is consistent, to control customer issue. Invoices follow the standard arrangement. Invoice is an industrial document. A great invoice should have a firm logo which will help generate the statement seem much far additional skilled and market the business. It’s critical to lift a specialist statement to get task insured from the client. You are able to build professional looking statements in addition to quotes from virtually every single speech and currency throughout the planet.
The statement should not include. If you’re also on the lookout for many pro equipped with free of cost statement to get ready your own small business statement, you can find no cost Invoice Template out of our site. For this reason, you can utilize the invoice to create the discounts and citizenship incentives that you offer known. Additionally, it auto-generates invoices your energy which means you may get paid for your work . Invoices are some of the one of the most necessary documents for organization owners. Simply because they assist clients to comprehend the things they truly are currently looking for bills are very attractive to customers. Using a template it is likely to prepare a professional looking invoice which is prepared to be routed .
Your invoice should appear tidy and simple to learn. So statements are really essential for practically any kind of business. A person may obtain a reach of statements .
A word of advice is not to really go overboard. If a little business name will not obviously specify the form of product or service that you offer, then you need to make sure to own a tag line or slogan. Giving every line there is a name that is different likely to earn editing. Hosting plans and domain names are in essence simple.
After you supply the e mail addresses of one’s friends, you are actually leading the firm house to perhaps even a subscriber or your prospective client. For someone with much comprehension of the insurance policy policy product, discovering information might be described as considered a tricky encounter. You definitely are going to be exhibited recipient data at left hand perimeter. For the account page it is likely to make a Google sites listing for your own organization. There are a lot of article methods however the way that is best to locate them is always to do a look for the top article submission sites.
You understand which isn’t about employing a procedure in regards to promoting an internet site and that which person is proper. In case your website is functioning to the Unix-based operating platform (such as Linux), chances are the internet server supports that the PHP scripting language. If you’re doing, your site is going to take a nose dive that is critical. Check out all of the optimization techniques for each search engine which you just want on distributing your website to. For example, in case your website is computers, then make an on-line directory that targets that the computer industry. Building an effortless website is straightforward, even for non-IT men and women.
Matters want to modify so as to bargain with temperament and all the flow of the evolution Everything progresses. So you’re likely to get to cover for a bit of it. You need to accept the notion that desktop publishing is nothing more than the introduction of a record on your computer for a particular use to begin exploring your imagination. Any thought might be good one, however, try to think. Experience the tail including sub-tails and you are not planning to run out from articles generation thoughts.
Shirt contest sites, Sites, and purchasing comparison websites, to mention a couple of. For the area, you’re likely to be doing something different so the template might well not be described as a practical feature foryou personally. You’re innovative without having to make use of peoples works and you’ll write your posts. Make an effort to add personal encounters which is about one’s entry’s topic. Additionally, there really are business Blogs and a range of small business talk boards that are online.
As a way to draw out the attention of search engines, then you might require to create an ideal quantity of articles along with info. The higher the more simpler it is for you to receive your caliber, your degree of attention content submitted on your blog. You’ll also place here this content of your website. An individual can get various queries and want to figure out more about this insurance policy policy product, forms of dangers, and coverage details . He could ask questions that are additional unique for coverage and the item. He could use live conversation to contact a specialist and get answers from real life. The applying interface and also intricacy of the application form functionality has an crucial role in picking on the customer engagement experience.
You may want to save your document you want to modify your gift tag. You may well be wondering exactly what documents you’re ready to talk about with you the following… it is very easy. You may create your text and following which it is possible to copy and paste the text in one additional cells. Fonts have an influence on the manner your record may appear. Though a font may grab care easily, it’s nonetheless true that you have to think about the legibility of your own words.
Utilizing tags or codes creates A full page layout. You might need to use templates for creating your letterhead in the event that you want a fast and straightforward procedure. This sample credit repair letter template can be a great start. The design layout is going to function as guide where to set your articles in every webpage.
Whatever sort of business you’ve got, be certain your letterhead displays your enterprise value . You speak to them concerning the benefits of list their business and can also proceed to every company. You have the ability to delight in an optimized firm for quite a lengthy time in case that you do not quit applying these processes.
You are able to get into templates that are storyboard on line. You will find lots of a good deal of play games on the internet. It isn’t feasible to be successful on line without some sort of promotion by way of electronic mail.
Tons of men and women would like to obtain a better job. Therefore, in case you prefer an advertising endeavor consider taking a certification application in social networking promoting. Resumes have grow to be the ticket to surfing the job market place. You may possibly have known about chronological and useful arrangement. You may find all our hints which are free to download under. Hybrid resumes require the very best faculties from every of many formats.
You are able to easily tailor made the subsequent combination resume illustrations to fulfill your requirements. Contemporary day resume cases possess their own faculties to format and layout, As you may see. These instances represent an range of letters that you could use throughout your job search. You also need to at all times check the job description to determine whether the organization wishes a specific document type. Even if you are a amazing worker, but you are unable to exhibit the important points on your resume correctly, then you might skip out the chance. Make sure you get the info you’re on the lookout for. You need to change it, although you might possess a foundational restart which compellingly articulates the principal info, states Heifetz.
For example, add it in the experience section in case you’ve got expertise using a specific kind of applications. Add your adventure you have. If you get yourself a good job experience, then you can use the arrangement and also the functional in case careers. Give you the awareness you want. Skills It’s important not to forget that expertise really are a various matter to credentials. In case you have any abilities plus they are regarding the positioning you were applied it is sensible to incorporate this abilities. As it highlights your knowledge as opposed to your work history, then it is most appropriate for you in case you’ve got openings in your job.
Adhering into the restart occasion is very useful in the event the content of this app has to be more refreshed. As you know, if you purchase a work interview or perhaps maybe not will depend heavily on the advice you include in your resume. But you may possibly not need previous tasks or work in various fields Give your best expertise into your own business to convince the boss you are an exceptional candidate that includes a skill. An manager could be checking to see whether you’ve grown in title. Remain knowledgeable about a vast assortment of jobs that are ever changing and Events and occasions Freelancers who wish to remain beforehand in a economy have to demonstrate within their field.
Work background or specialist encounter is being among the element of one’s resume. You’re able to see about the value of hints here. The aim of a resume is always to secure you an interview. Retrieves a task you have created.
In the event that you’d like to choose the best sample resume format, you may also check into occupation websites and discover what professionals at the field knowledge and comprehension have been all using. Have a look at these tips to secure you comfortable with the formats to work with for your own CV or resume. That which you’ve the 3 most common formats when searching for the very best format for your resume. You should compose your resume in an ordinary format. You have arrived at the site, When you’re watching for a combo format restart template.
Additionally, there are three significant types of resume templates. You wont have to fret though since you’ll find easy resume templates to generate utilization of and edit today. What’s more, you can use the free resume for greater outcome. First find the template that you just simply elect for. There’s no cookie-cutter template which will succeed for aims and your career history it might be hard to identify what advice is definitely better without even getting to know you first include on a resume. It truly is straightforward to invisibly within the layout and how your resume appears.
The resume template has changed into an extraordinary design and style. Depending upon your situation, you may employ alternative kinds of resumes , or even a historical, functional, hybrid. It is all-important to change education and learning system according to period requirement and with society’s advancement. Applicant monitoring methods have to take a posture to read your own resume. Tailor your resume based on the job which you are applying, meaning do not write an application if that you do not possess a certain organization. Software Plans The job application represents the barrier to get an ex-offender expecting to spell out an absence. For instance, the summation section needs to be published in the exact first person.
Don’t be afraid to draw a dash of comedy, if you may be humorous. Gratefulness could be your life that we hold within our own hands because when we aren’t grateful, then far we now have as we will always wish to possess something or some thing else more, we won’t be happy. It’s common courtesy. Giving thanks is one of the best manners. Give thanks to your very minor and alot will be discovered by you.
People have an automated reaction to mimic exactly what individuals do. So it can be used by them to get their tax-deductible varieties, you’ve to give the statement of their help. Letter-writing within the illustration of contribution invite you letters need to have a touch. Also make sure you don’t neglect to mention that acknowledgement receipt letter is a document that is significant that the firm may use to acquire benefit from taxation. You can also browse my choice of Inspirational Quotations. Reading mail-order quotations may be one method to remind yourself that you own too much to be thankful for. It is possible to hunt my sizable assortment of Funny rates.
An example has been provided here so as to supply a much far better comprehension of a letter is written to you. This will make it possible for one to understand just how exactly to draft a thank you letter. While it will serve the purpose of being the cornerstone, it is always preferable to write a correspondence by means of a template as a guideline, as such will make sure your correspondence is much personal and more heartfelt in its tone. Normally your templates will be the perfect means to prepare a permission slide on your . There is absolutely no common format for producing acknowledgements, simply the format needs to match the remaining of your research-paper Dissertation acknowledgements example.
No-mind may be your actual means to live, the true ways to comprehend, the process to be. Put those reviews under this merchandise when you have testimonials pertaining to some certain item. The testimonial is received by you plus they won’t need to do some job. Ensure their bill is special. Watch any infomercial and you’re going to discover they’re loaded with consumer recommendations. You can’t have buyer recommendations that are adequate.
Appreciate life, and also you may discover that you do have more of it. Therefore concerning bring which lifestyle gives, you ought to love what you currently have. The majority of people do not need to decide on enough moment (or take away the potential guilt). You’ve already been right here, you helped to generate things run efficiently. This was just one of the most roughest times in my own personal life. Their work really is a lifesaver, and so, valuable for men and women in the society. In the event you truly feel unappreciated or miserable in work or in your existence, there is no superior cure compared to simply interacting.
Be grateful when some thing isn’t known by that you For this offers you the possiblity. You would certainly be helping us tremendously inside our advertising efforts. In long run, should you need any help firms could arrive to aid you.
You will get to tailor them to meet your unique conditions. Anytime you will construct a society which works, you have got to begin your system and also nature. The soul of appreciation is just a strong energizer. Meditation is a strong expression of love plus wonders might be performed by it . Due to this, there is a inherent disbelief in virtually any advertising message that arrives from you personally. There’s no loneliness like theirs.
Assure you meet your promise so youconsidered for raises that are better, and’re taken seriously later on. Note that there’s a guarantee to perform better and to call home until the salary amount you are being awarded yearly. You receive the dollars. By going to the people, the total funds has seen a motive and they have been at a position to go back to everyday life. While doing work for a cause, it’s not always straightforward to amass capital and when you’ve secured a contributor who’s well prepared to donate to your origin, it isn’t only appropriate but also plain fine to thank them for helping with all the mission that you’re searching for. It is crucial that your letter mentions the method by which the donation they will have made will help the main reason why Though thanking a individual who has created a contribution that you’re searching for. Use this sample to guide the procedure whatever sort of function you are devoting your sponsors for.
Trust in mepersonally, acknowledgement is really actually a thing that is strong. State name of somebody who you would like to say in an acknowledgement. Generally, acknowledgements differ dependent on numerous people whom you’d like to state your own gratitude to. It is reportedly the recognition of the occurrence of some or something actuality. Note that every job differs and also you must tailor your acknowledgements to satisfy your individual circumstance. A two-page acknowledgement is long and runs on the likelihood of creating your reader drop interest. Special acknowledgment for significant donors can be really a significant step to make certain their elevated volume of support is duly recognized.
It’s important to acknowledge actions of kindness and support When it might be really hard to create sympathy thank you notes while you’re grieving. In the end, you might state your admiration to a loved ones, family and friends who supported you. A few folks, for some reason do not hesitate to write a dedication instead of an acknowledgement.
No one will surprise you even. It’s suitable to ship an acknowledgement card In the event you get a sympathy card. In the wake of your loved one’s passing, you’re most very likely to get a selection of notes and sympathy cards.
You will have the ability to print the 19, When a contribution doesn’t always have an legal e mail. For Construction letters state the way it’s going to be properly used. Figuring out whether or not just a donor is currently making their first donation or their fifth term is in knowing what matters to have in your thank you letter critical.
However large or small there was donation, donors desire to really sense as if you love them of exactly what it is that they are able to contribute fiscally out the scope. Whatever the size of this gift, they want to know their engagement matters. The do nor that was thrilled called the company because she desired to match up with the individual who had written this type of letter that was gorgeous.
Both are fantastic ways for donors to find out additional. For instance, if a pre determined amount is given more than by donors, their names could be recorded in a specific spot in your website. Just like yearly donors gift donors desire to learn how their gift can be used and also how it is helping you supply far greater and more library providers on your area.
An e-mail letter is well suited for linking for your site and newsletter. There certainly are lots of concerns you may put at an donation acknowledgment correspondence, but the big thing that you shouldn’t forget would be always to re lay all its specifications to get a trade that is exact clear and transparent and the advice of the contribution. An acknowledgment letter is comparable to a thank you notice. Lots of these sample acknowledgment letters are attached beneath the content. Additionally, you can additionally work together with you personally one time to learn more on the subject of job search components.
Not believe or If you include a thank you department that is detailed, it is still advisable to compose a concise note on the rear of the app devoting all of your guests that obtained the opportunity to stop by your marriage ceremony ceremony helped create your evening special. Very fantastic notes are going to continue to keep you track why and once making certain you pay all you prefer to enjoy, for instance, the name of each particular person who you want to thank you. It’s potential to compose an acknowledgement observe that is amazing .
Moreover showing gratitude the letter will cite the intention supporting the contribution. It’s vital to include your reason behind producing the thankyou letter. It is crucial by giving an outline of why you are composing it to begin the correspondence. To prevent that matter, your letters will need to become supporter-focused. Additionally they function as a listing of a gift and can be useful for taxation purposes. A number of receivers may be addressed by This kind of letters. If you get a more extended compassion letter, that has to be acknowledged using your own response.
You’re going to even demand the people that you help within the acknowledgement approach, although you may perhaps not simply personalize your letters. There could be factors. Be sure that the letter isn’t too long or vague. An donation acknowledgement correspondence is employed from the recipient of the donation to assure the sender they have already received either the sum of money or any help being extended with the individual who gave the donation. Donor acknowledgement letters are, even in various techniques, the very first step towards donor retention. You may receieve a comprehensive answer .
Have the exact good news on the market for everybody. It is likely to consist of admiration reports. For a number of folks, creating a poem is far simpler than for others.
Below, information is supplied around the optimal/optimally way to compose acknowledgements in academic texts. In case good friends and relatives don’t feel like partying all evening and simply want to examine their day daily difficulties, find another group of buddies! You don’t will need to thank each one of your friends and every one ! Household members are enthusiastic about an origin and also if folks see their friends they can look at encouraging well. There’s significantly a lot more than 1 approach to word Due a lot to my parents, so my pals along with also my thesis advisor”, but the amount of standard approaches to phrase which is so much more streamlined than the wide range of theses that the pigeonhole principle pertains to reveal numerous persons are composing exactly the very exact same paragraphs within their acknowledgments. This indicates that you would think taking a compliment should be straightforward. Moreover, concerning figuring out just how to just accept compliments, the ideal thing is it’s going to grant you the opportunity to find yourself as the others see youwhich is likely pretty incredible.
Words may be shifted to meet your individual wants. At times it can be tough to find out the words that are best to say for someone who means a lot to youpersonally. Phrases of thanks isn’t only fantastic manners, but the activity. Thank you’re just a phrase that’s used so frequently, it truly is often times quite tricky to demonstrate gratitude when you actually and deeply indicate it. If you’re searching to get words or particular phrases to work with on your funeral thankyou cards, you will discover samples beneath.
Reading gratitude quotes might be a proven strategy to remind yourself that you just have a lot to be grateful for. It is likely to also search my large group of amusing Quotes. You may also browse my sizable assortment of Inspirational Quotes.
You wish to send out your condolences to the household that is full. Sympathy can be an expression of wanting to help the individual in want and also comprehension precisely the issue. Alfred Painter Gratitude is not merely the greatest of virtues, however, also the parent of each one of the others. Prove your appreciation and make it individual. Daniella Whyte Appreciation is actually really a issue. Note however also you have to tailor made your acknowledgements to satisfy your circumstance and that every project differs. A superb acknowledgment goes the excess mile to spell out exactly why an author is thankful.
The acknowledgments site is an area it is likely to play this up just a minor. If you have any questions or opinions, please get in contact us. Concise and Simple messages can get the job done nicely. Pick the mail merge record you’d want to work with for your present Acknowledgment. After the request was made it really is challenging to stay for a roundrobin request, specially on top of correspondence.
Acknowledging an help is likely to make them feel fantastic and allow them to understand that you simply aren’t expecting to accept most of the credit to yourself. The benefits of gratitude are massive. When a donation will not always have an legal electronic mail you will possess the capability. Share something favorable in regards to the person that gave the gift to you. You chose on an great present for me personally. You are quite a boon. You’re nothing below a boon from God!
As they do not feel valued, A great deal of folks have gone insane. There’s always someone who needs something. One of the factors on Earth will be getting your favourite food brought to you. You produce your own certainly one of some kind message to reveal your appreciation and may get ideas from the list below. You have any thoughts of exactly what things to compose in your thank-you notes, and you’ve viewed that purposeful and sincere gratitude may be expressed by you just simply in simply a couple lines, it won’t be as challenging to begin. It is critical to stay in mind that love comes from many varieties. Just a tiny love goes a very long method.
It’s isn’t feasible to really sense glad and depressed in exactly the same instant. Thus a number of individuals have gotten into the custom of sending e-mail it is especially wonderful to find a note in the email. You need to really have read my thoughts as that your gift isn’t precisely what I desired. When it might feel as it is a momentary or short frame of mind, the actuality remains it really is most commonly a. Everything you must do is clean your brain for a minute and provide yourself a couple moments to thinkabout. Instead, concentrate on sharing connect to theirs. Remember the advice above, and never forget that the sensation you’d love to convey and also the solutions you want to offer. | 2019-04-22T20:27:55Z | http://newberlin-inn.com/jak-napisac-cv-po-liceum/ |
Which business card format is supported?
How can I view the raw tag contents?
How can I store / import / export tag contents for later use?
How can I turn on NFC on my phone?
How to disable the phone’s NFC prompts?
Does NFC reduce my phone’s battery life?
Which NFC Tag Types are supported?
How much data can I store on a tag?
How to delete existing contents of tags?
Can I write multiple tags at once?
Multiple Records on Tags – Why?
Which devices are compatible with the peer-to-peer mode?
How can I launch apps through NFC tags?
How can I launch tasks on the phone through NFC tags?
How can I NDEF format a tag?
What is the use of the record’s ID?
How can I lock / write protect NFC Tags?
In most cases, NFC tags are stickers – they can be visible to you, or also be placed for example on the back side of a poster.
The NFC tag contains a little chip and an antenna. The chip stores the data and takes care of communicating with the reader device – e.g., your NFC smartphone. Your smartphone also contains an extra antenna used for NFC.
If you tap a tag, your phone and the tag communicate with each other. The antenna is used to transmit data and energy between the rader and the tag. It allows your phone to read the tag; if it’s a re-writeable tag, the device can also store data to the tag.
The tag doesn’t contain a battery; it’s powered by the electromagnetic field of your phone.
NFC interactor writes business cards according to the vCard standard, which is universally used and supported in all mobile devices.
Windows Phone: NFC interactor can read and parse vCard 2.1 and 3.0 business cards. When writing, it defaults to version 2.1, as Windows Phone APIs would add additional encoding information to version 3.0 cards, which further increases the necessary tag size; version 2.1 already supports all necessary details. If needed, NFC interactor allows you to change the vCard version to 3.0, though.
Symbian / MeeGo: NFC interactor can read and parse vCard 2.1 and 3.0 business cards. When writing, it uses version 3.0, as Qt APIs do not add encoding information and therefore there is no size difference between the different standard versions.
NFC interactor for Windows Phone automatically converts contacts from the address book to the vCard standard.
Note that there is not always a 1:1 mapping between the way Windows Phone stores contacts in the address book and the vCard standard – NFC interactor will create the best possible match, but it might not be possible to directly store all the data from the phone contact. Please check the composed record after importing the contact from the address book!
Specifically, Windows Phone vCard APIs do not include Yomi names into generated vCards; therefore, NFC interactor does not include them in the editor.
Other potential issues are only theoretical: e.g., Windows Phone contacts would support 2 street address lines, whereas vCards only support a single line – NFC interactor would automatically combine those two street address lines into one. However, the Windows Phone UI currently only allows entering a single street address line; making this a hypothetical thought.
In NFC interactor for Windows Phone, go to the “tag reader” page and tag a tag to read its NDEF message.
Now, tap and hold the parsed message on the screen. After a moment, the context menu will appear, which allows viewing the raw message contents. Tap this option and the NDEF message will be shown as a hex string.
Windows Phone only supports reading the NDEF message; it does not allow apps to read outside of the message area (= the rest of the tag memory area).
In the tag composer, choose the appbar button to pin the composed message to a new live tile. After giving the tile a title and an action (write to tag or send to device), the message will be stored together with the live tile on your phone. Whenever you tap the live tile, NFC interactor starts, loads the message into the composer, and instantly activates publish mode.
Note that you can also pin tags you read to live tiles. Tap and hold the message contents in the “nfc info” view and choose to “edit” the contents. This will load the message into the composer, from where you can pin it to a live tile.
After you read a tag, tap and hold the message in the “nfc info” view to open the context menu. Now, choose “send via email”. This will open your email client, with all the available information about the tag already present in the email text: the parsed & human-readable information, the raw NDEF contents as a hex string, as well as in a hex-editor-like view for easier reading.
After you read a tag, tap and hold the message in the “nfc info” view to open the context menu. Now, choose “copy to clipboard”. This will copy the tag summary to the clipboard, so that you can paste it into your messaging or note taking app.
In case you have the whole NDEF message as a hex string (e.g., through the shared email from option (2)), you can import the message into the composer. Go to the “tag composer” page and add the “NDEF Importer Tool”. Now paste the whole NDEF message hex string into the text box and tap the “Import” button. NFC interactor will parse the hex contents and create the editor interface for your message contents.
NFC interactor associates itself with files of ending “.ndef” and “.nfc”. If you receive such a file (e.g., per email), it will open through NFC interactor and import the data into the “tag composer” view.
These files can either contain the direct NDEF binary data, or the tag contents as a hex string (with and without spaced between the individual items – e.g., “D1 01 12” or “D10112”). NFC interactor will automatically recognize the right format to use and import the message.
When tapping tags that contain certain standardized / well-known contents, Windows Phone always shows the dialog for the user to choose what to do with – e.g., to visit the URL or to launch the app.
When you launch the same app through NFC for the second time, the Windows Phone will ask you: “I trust this app. Don’t show this message again.” – If you activate the checkbox and open the app, it will launch without a prompt in the future.
You can always manage the list of trusted launch apps if you go to Settings -> NFC.
Note that this behavior has been introduced in Windows Phone 8.1. The 8.0 version of the operating system always asked whether to launch the app, and there was nothing you could do to stop the prompts.
To enable Near Field Communication, your phone needs to power an electromagnetic field, which is required to communicate with the passive (= battery-less) NFC tags.
This does have an impact on the battery life of your device. However, as NFC only works for very short distances, the field needs to be very small. Typically, the maximum feasible distance between the tag and the phone is half a centimeter. Compare that to possibly several kilometers between your tag and the nearest cell tower.
Additionally, NFC is usually only active when you’re actively using your phone, and deactivated as soon as the screen is locked (also for security purposes).
In addition, many phones support Mifare Classic tags – but this depends on the specific NFC chipset used by the manufacturers. The reason is that Mifare Classic tags are proprietary and are therefore not supported anymore by several phones on the market, including the Samsung Galaxy S4.
Tags like present in RFID passports are not supported Symbian or MeeGo. Windows Phones with the new NFC hardware generation (starting with the Lumia 730 / 830) can read passports and bank cards, but as these do not follow the standardized NDEF protocol, they can not currently be read with NFC interactor.
The exact amount of data you can store on an NFC tag depends on the tag type and its configuration. In general, we’re talking about very small amounts of data – enough to store a link to a web page or to an app, but usually too small to store an image or a video.
The data size of a tag would usually start at around 48 bytes, the maximum is currently around 8 kB. There are also less common smaller or larger tags. Typical NFC Forum Type 2 tags are 192 bytes, Mifare tags 1 kB.
Note that not the full tag size is available to you – some of the memory size is used for headers and control data (e.g., to store the write protection status of the tag). NFC interactor for Windows Phone will show you the writable tag size when you touch a tag (the Symbian version can do so for selected tag types). For example, on an 192 bytes Type 2 tag, you might have 137 bytes available for writing.
Also, the header of the NDEF protocol will take a few bytes – depending on the record type you chose to write, and if you add optional information to the record like a record ID. For example, the header size of a single URI record (without an ID) is 5 bytes; but this specific record type can also shorten common URI beginnings like “http://” or “http://www.” into a single byte, which is already part of the header. Therefore, the complete NDEF message for the URI “http://www.nfcinteractor.com” only requires 22 bytes of writable memory on the tag.
In general, when writing NFC tags, you’re always overwriting the existing contents.
Most NFC apps will simply write the so-called “Empty NDEF Record” to the tag when you choose to delete the tag. This writes the smallest possible standardized contents to the tag (only 3 bytes), and essentially makes the previous tag contents invisible as it tells the reader that the tag doesn’t have any further contents after those 3 bytes. This can also be done with NFC interactor, if you choose to write the “Empty record (delete tag)” from the “tag composer”.
However, all the data that was not overwritten by the short 3 byte empty record will still remain in the writable NFC tag memory. With a low level NFC tag reading tool, you can scan the whole tag memory area and with that recover the previous tag contents.
This is comparable to deleting a file on your computer – the reference will be removed, but the actual data is still there and can be recovered – until it is overwritten with new data.
NFC interactor is the first app for Windows Phone that securely erases tags by overwriting the complete writable memory area. Instead of writing the minimum-sized 3 bytes message, NFC interactor will wait until the phone has discovered the real tag size.
The app then creates the contents on the fly, filling the payload of the record with completely random data – with the exact size of the writable tag memory. With this approach, it will not be possible anymore to recover the previous tag contents.
To activate this unique feature, go to the “tag composer” and choose the “Empty record (delete tag)”. Now tick the optional checkbox to “Erase free tag space” and tap the button to write the tag.
Some details for NFC professionals: when erasing the tag, NFC interactor will write a record of type “Unknown” – by definition, an “Empty” record can’t contain any kind of payload and therefore can’t reach the size of the writable tag memory. “Unknown” records are usually also ignored by NFC devices, and can have an arbitrary size payload, which is random data in our case.
And of course, you’re free to overwrite the random tag contents with anything else afterwards – including the plain and simple “Empty” record.
No, in general phones only support writing one tag at a time. If you place two NFC tags on top of each other, the phone will usually not detect the tags at all.
This behavior is also good for security, as it prevents attacks where a new NFC sticker tag with a different URL is placed on top of the original NFC tag.
Most NFC apps only write a single record to a tag. The powerful dynamic tag composer of Nfc Interactor supports writing a message that contains multiple records.
To create such a tag, simply activate the “multi-record” mode in the app settings and add more than one record to the composer by repeatedly tapping the ‘+’ symbol in the app bar. The records are written to the tag in the order they appear on the composer screen.
Windows 8 / Windows Phone 8: the OS only reads and acts upon the first record of the message. All the other records stored on the tag are ignored. If the first record in the message is not understood by the OS, the tag is ignored.
If a 3rd party app (like NFC interactor) is running in the foreground, it can read and parse the whole NDEF message, though. Therefore, on Windows (Phone), multi-record-tags are mostly relevant for developers.
Symbian / MeeGo: the OS starts reading the message until it finds a record it can act upon. If for example the first record is an app-specific record, the phone will read the next record. If that would be a standardized URL record, the phone would open the URL.
Multi-record tags are therefore frequently used on these platforms to launch apps – these can register to be launched for custom records; a second, standardized URL record would then redirect the phone to the store to download the app in case it’s not yet installed.
Android: the phones usually read all records on a tag and give the user the choice of which action to execute. Special records like the Android Application Record (AAR) are recommended to be present in a later position of the message. If the phone finds an AAR record in the complete message, it will launch the corresponding app in any case, no matter where the AAR is found. This allows using a standardized URL record as the first record in the message, for better cross-platform compatibility.
For directly launching apps in cross-platform scenarios, multi-record messages are also frequently used. See the article How to Create Cross-Platform LaunchApp NFC Tags for details.
Earlier versions of Android use a Google proprietary protocol (NDEF Push Protocol – NPP), which is not supported by other devices.
Symbian is also using a proprietary protocol. NFC interactor for Symbian has experimental support for SNEP though, which means that you can send and receive SNEP messages with NFC interactor on that platform (while the app is running and in the foreground).
NFC interactor for Symbian / MeeGo can also send NDEF messages using a custom port / URN, which can be useful to test low-level LLCP connections, especially with custom hardware.
Note: sharing a picture or video via NFC is usually only initiated via NFC – the devices exchange Bluetooth or WiFi Direct data, and then use that channel to actually transfer the data. The reason is that NFC would be too slow; sending a picture from your phone’s camera could take a few minutes with NFC.
Unfortunately, exchanging Bluetooth / WiFi settings in this scenario is currently often not compatible between different platforms – e.g., triggering a picture share via an NFC tap does not currently work between Android and Windows Phone 8.
LaunchApp tags: you can directly launch any kind of app if you know its ID. NFC interactor integrates an automated Windows Phone store search so that you do not have to find out the ID yourself.Instructions: Add a “LaunchApp (3rd Party)” record, type the name / publisher / keyword and tap “search”. You can now directly select the app you want to launch from the tag. Note that some exclusive or country-restricted apps might not be visible.
In NFC interactor, specify this ID for the platform “WindowsPhone”. This will directly launch the app, or ask the user to download the app from the store if it is not already installed.
This tag type also allows passing custom parameters to the app; but you need to know what kind of parameters the app supports in order to write the right text into this field of NFC interactor. Contact the app authors to ask them if they support parameters through LaunchApp tags.
System apps / settings: most of the pre-installed apps and other important apps provided by Microsoft, as well as the settings pages, can be directly selected if you choose the “Launch WP8 System App” / “Launch WP8 Settings” option when creating an NFC tag. Simply select the app you want to launch, and NFC interactor will take care of the rest. Note that actually modifying system settings through NFC tags is not possible on Windows Phone, you can only open the according settings page.
Custom URI schemes: apps can register for a custom URI scheme, which then launches the app to handle this scheme. In case the user has not yet installed an app that understands this scheme, the user will be asked to search for an app in the store.
For example, NFC interactor will launch when it encounters a tag with the URL “nfcinteractor:”. Spotify launches through the “spotify:” protocol (note that NFC interactor features a separate type for writing Spotify tags, including an online album search).
Android: uses Android Application Records (AAR) to launch apps. Specify the app to launch through its package name. You can find out the package name of the app through the URL in the web-based Google Play Store.
Symbian / MeeGo: apps can register themselves to be launched through a specific custom record (external record type). E.g., NFC interactor launches when you tap a tag that contains a record with the External RTD and type name “nokia.com:nfcinteractor”.
Note that you can only launch apps that have registered for being launched; you can not launch any kind of app through that mechanism.
NFC interactor can write custom tags (choose the “Custom” type) to launch an app on Symbian, as well as LaunchApp tags (choose the “LaunchApp” type), custom URI schemes (choose the “URI” type) and Android Application Records (choose the respective type).
The NFC Forum has not standardized the use case of adjusting phone settings based on NFC tags (e.g., to turn on Wifi, to adjust the volume, etc). Therefore, there is no tag that could do tasks on all phones.
Some apps on Android offer functionality to enable this behavior; these are always based on custom, app-specific tag formats, which launch the app, which in turn adjusts the phone settings.
Unfortunately, the strong security model of Windows Phone 8 also does not allow tags or any 3rd party app to modify phone settings – so there is currently no way to offer this functionality on Windows Phone 8.
NFC interactor allows writing tags that directly open a specific settings page; but the actual settings change (e.g., activating flight mode) always has to be performed by the user. You still save navigating through the menus, though.
As Windows Phone only reacts on a single (= the first) record on the NFC tag, you can only specify one action (= opening one settings page) per tag. The advantage is that this functionality is built into the operating system, and you don’t need to have NFC interactor installed for those tags to work.
When you buy a tag, it might be completely empty (= not NDEF formatted). This means that the control structure for handling NDEF messages (e.g., to indicate the writable size) is not yet present on the tag.
Windows Phone 8.1 added support for auto-formatting NFC tags. If you write a message to an unformatted tag, the phone automatically formats the tag before writing the message. No further interaction is required, as this is happening automatically.
Windows Phone 8.0 did not support formatting tags and could only write to pre-formatted NFC tags.
Nfc Interactor for Symbian and MeeGo can NDEF format a tag if you write an empty message to the tag. After you have written an empty message, you can write any other kind of message to the tag. In the app settings, you can also activate that the app automatically writes an empty message first to format tags. This is useful if you need to write large quantities of tags.
Several record types in NFC interactor allow adding an ‘Id’. The record ID is not used / visible when you tap the tag with your phone – therefore, you would usually not need to add the ID to a record.
Therefore, the record ID is hidden by default in the composer. If you need to specify the record ID, you can activate it in the app settings.
IDs can be read by 3rd party apps, and can therefore be helpful for developers in some cases. E.g., a developer can add the ID to a record to add some ‘hidden’ information to a URL tag, which shouldn’t be visible in the URL itself. If the user taps the tag with his phone and the app is not running, the phone would only open the URL. If the tag is tapped while the app is running, it could also retrieve the record ID and therefore for example identify the specific tag.
Thanks to a new NFC hardware controller, the latest Windows Phone devices gained the ability to lock / write-protect NFC tags. This feature is supported starting with the Lumia 730 / 830 – but not the Lumia 930 or 1520, which still belong to the previous hardware generation.
When starting NFC interactor for Windows Phone, the app automatically checks if your device supports locking tags. If it does, a checkbox appears on the publish page where you can activate locking the tag after the message has been written. This checkbox is only visible if you are writing to a tag and if you did not choose to erase the empty memory area.
After a tag has been locked, its contents can not be changed anymore – the tag is now read-only. Note that this process cannot be undone – you can never change the tag contents again, so be careful with locking tags and test if the message you are about to write is indeed working as intended before locking the tag.
If you are unsure whether your device supports locking tags, go to the app settings in NFC interactor. If the setting to lock tags by default is disabled with an explanation text about device incompatibility, your phone unfortunately does not support locking tags due to the lack of the new NFC hardware – operating system upgrades will not change the situation.
The tag is not writable: you can only write to tags that are re-writable and have not yet been locked. For example an NFC Forum Tag Type 2 tag can never be unlocked again to change its contents after it has been locked once.Windows Phone and Qt only support open tags; the platforms do not allow writing to tags with an activated security system (e.g., type 4 tags or Mifare tags that require a key for reading and/or writing).
Tag is not NDEF formatted: for some tag types, Windows Phone 8.1 will automatically attempt to format the tag when you first write a message. Windows Phone 8.0 did not provide this functionality.On Symbian or MeeGo, the phone can format the tag if you write an empty message to the tag first; afterwards, you can write any kind of message. In the app settings, you can also configure NFC interactor to always automatically write an empty message before writing the intended message, which can be helpful if you need to format & write a large quantity of empty tags.
Please make sure to get NDEF formatted tags when you order them – you can order compatible tags right through NFC interactor for Windows Phone.
On MeeGo / Symbian, try to write an empty message to format the tag, or use similar tools on Android. | 2019-04-19T15:00:56Z | http://www.nfcinteractor.com/overview/frequently-asked-questions/ |
I took a few weeks off of blogging in May – it was a bit of a crazy month! My dad visited at the end of April, then my mom came for a visit.
Our Chinese teacher (who has become a friend) graduated and moved across the country to be with her husband.
We had an ER trip for FangFang when she flipped her wheelchair over on top of herself. She was, fortunately and miraculously, completely fine.
We’ve had FangFang enrolled in public school, receiving homebound services, but we had her last session and withdrew her from public school.
I spoke at our church’s women’s retreat, where we studied the book of James, super hard-hitting. I loved getting that time away with other women, having good conversations, connecting, and worshiping together. The camping atmosphere was…not my favorite 🙂 But we did have cabins with beds, and there was an actual bathroom, and I survived! And I learned a lot studying James 3 and 4 in preparation for my talk about our speech, about our hearts, about our recognition (or lack thereof) of God in the world, and about humility and wisdom – a lot to cover but some really good stuff.
FangFang also managed to fit in a trip to urgent care. She fell off of a picnic table at the park, earning a cut on her face that required 5 stitches.
We spent a day in St. Louis with my cousin Kevin and his family, which was a blast. We really enjoy Kevin and Rebecca, and they have a daughter, Sawyer, who is just a bit older than Miranda, so we all had a really fun time hanging out together.
Matt finished his semester and headed to Michigan for 6 days, at which point my mom came back for another visit to help out while he was gone. We might have survived without her, but it was definitely incredibly helpful to have her here, especially since no one slept well for most of that week! Atticus, in particular, is very attached to his routines, including Matt putting him to bed each night, and he was not always pleased to have me hanging out with him instead. And we got to have some fun outings – going to a pow wow and spending a bit of time at the pool.
Then our horseback riding instructor (who has also become a good friend) moved to the St. Louis area, and while we can keep in touch, we’ve said goodbye to having her as our regular instructor and seeing her quite as frequently.
Then we wrapped up the month with a visit from my aunt and uncle! We got to have dinner and hang out with them and give them a brief tour of the Mizzou campus and just enjoy having a bit of time together.
The month was full of so much good stuff – we loved having visitors and opportunities for connection.
But also? I hate change. Knowing it is coming makes me nervous, and I always mourn for what we are losing. If it were up to me, I’d very rarely choose those transitions. And I think that’s one reason why God put me in a college town, where change happens constantly, and I’d have to deal with it. I can’t hold anything in my life too tightly, and I’m forced to embrace change and newness.
I’m still mourning the losses, the unexpected injuries, the moving of friends, and all the transitions. But I’m looking forward with hope to what is to come.
Thank you so much to all of you who prayed us through our travels to Omaha for FangFang’s oral surgery and our return trip back to Missouri!
She went to bed pretty well, and she actually did better than I thought she might with not being able to eat or drink after 8:00 AM. I woke her up around 7:45 to give her a clear liquid breakfast (jello and apple juice were her choices), and then I let her play with an iPad as a distraction while Catherine and I took turns getting some breakfast. We had a 10:00 AM check-in time at the hospital, so the morning was actually reasonably leisurely, and it wasn’t long before we were playing in the hospital playroom with brief breaks to consult with our nurse, a nurse practitioner, the dentists, and the anesthesiologist.
She was pretty happy right up until surgery. I actually declined Versed, and everyone seemed to think that was a good choice, because she seemed so comfortable and happy interacting with everyone, but as soon as she got about 10 feet down the hall from me, she started wailing, and they said I could come back with her. Her oral surgery was taking place in the procedure suite, which apparently has a lower standard of sterility than the OR, so I was allowed to walk into the room with her. I really wish all hospitals would do that for all procedures, whether they’re in the OR or not. FangFang is going to need a number of surgical interventions over her lifetime, and I’d prefer that, as much as possible, she see hospitals as places that help her, as opposed to the locations of traumatic experiences. Nurses seemed very concerned that it might be overwhelming to me to see her go under sedation in preparation for the procedure or have her throat suctioned afterwards, and they didn’t want me to feel uncomfortable. I assured them that I’d witnessed my husband experience cardiac arrest, so nothing they were going to do that day was going to make me uncomfortable, and if I needed to get out of the way, I’d do it. And most importantly, this is about FangFang, not me – if she’s more comfortable with me there, that trumps all else. They let me hold her and sing to her while she went to sleep, and I was so glad.
Catherine and I grabbed some lunch at the hospital cafeteria and then headed back up to our room to wait for FangFang. The dentists came and talked with us and said they’d pulled 5 teeth – the offending back molar that had the deep cavity giving her so much pain and her 4 front teeth, all of which had significant cavities. Because they’d pulled so many, they hadn’t needed to cap any teeth, but the crowding in her mouth will continue to make brushing and flossing a huge priority. They do not believe she has dentinogenesis imperfecta but that it’s more likely that we’re playing catch-up from her years in an orphanage, plus the crowding of her mouth, which is good news, because it means there’s some chance she won’t continue to have such serious dental issues.
It wasn’t long before I was allowed to go back to FangFang in recovery, and I walked in just as she was starting to open her eyes. She was in pain and angry. We got her Tylenol right away, and she wanted to leave that area, so we got to go back to our room right away, but she was still mad. We gave the Tylenol a bit of time to work, but it didn’t seem to be taking the edge off at all, so it wasn’t too long before we requested something stronger, and once she had a dose of Oxycodone, she started to calm. She cried for the mouth pain and cried in hunger and cried from her sore throat every time she had to swallow (she’d been intubated for the procedure). We started gradually introducing some clear liquids – apple juice and water and then jello, and she handled that well (no projectile vomiting!), and just before 4:00 they said we could go!
We weren’t sure how FangFang would do on the car ride home, and I was so thankful to have another adult with me who could help monitor her while we drove. She was pretty content watching Frozen and Daniel Tiger, though, and slept just a bit. She was even happy enough to try on goofy hats at a truck stop where we stopped to give her more pain meds and get gas!
We made it back home just before 11:00 last night, and she was very happy to be back, as was I!
Honestly, the trip itself went pretty well. That was really largely due to Catherine’s presence with us. I so enjoyed getting to chat with her on our drives – it was so much more fun than just driving by myself – and as a mom to four, it almost never happens that I get 10+ hours to hang out with a friend! And she was so helpful in assisting me with everything FangFang needed, getting juice or jello or washcloths to wipe up blood, and entertaining her while I talked with the doctors and dentists. I’m so, so thankful she came – such a blessing and encouragement.
And I’m so glad to be done with the procedure. FangFang was in a fair amount of pain yesterday but seems to be feeling a million times better today. She’s really been in pain for almost a month, and I’m so glad we were able to get this dental work done quickly and be done with it.
Re-entry is always rough, at least for me. I’m so excited to see everyone, but I’m also worn out. I really just want to have some quiet, alone time to read a book and relax. But there’s unpacking to do, and I’m behind on my work week since I was gone for 2 days, and kids need to be fed and cared for, and things at the house are just a little out of sorts any time I return from being gone. It always feels overwhelming to me, and I get snippy. There’s nothing that reveals your selfishness like parenting – and I think that’s doubly true when you add in any special needs. I do feel stretched, and I do feel tired, and I do feel overwhelmed at times, but that’s not a license to be unkind to anyone else, and I definitely fail at living that out.
I’ve tried to spend some time helping everyone settle back in. FangFang and I snuggled and read a book this morning, and a bit later Madeleine CaiQun and I got some one-on-one time reading on the couch together. Miranda and I had some chats, and Atticus came and snuggled with me for a while.
Matt has the kiddos out at a park right now, and I’m hoping to use this time well, doing some catch-up on all the tasks I need to tackle, but also to recharge and be prepared to love well when the rest of the family returns. I spent some time reading my Bible and praying and journaling, which has helped to settle my heart. I’m hoping that when everyone comes home, we can have an evening of enjoying being together, both in cleaning up the house some but also in just spending time together. These people have my heart, and I want to live that out, day by day, moment by moment.
Early tomorrow morning, I’ll load a few more items into our van and take off on a road trip with my newest kiddo. This trip wasn’t entirely anticipated, but it’s necessary.
We knew before we even submitted our Letter of Intent requesting to adopt FangFang that it was likely that she’d have dental issues – dentinogenesis imperfecta is a significant dental condition often associated with osteogenesis imperfecta. Additionally, dental care is often not a priority or even feasible in orphanages. And from day one with FangFang, I’ve known with certainty that she was going to be spending a lot of time with a dentist.
We were working through the process of figuring out exactly what would need to happen and making a plan with our local dentist when the situation became more urgent. FangFang woke up one morning with severe tooth pain, in agony if food even touched one particular tooth that has obvious decay. We got her started on antibiotics and some pain meds right away, but still, she was in a fair amount of pain, and then her cheek started to look swollen. We had to switch her to a stronger antibiotic, and all through that time, we were working with our dentist’s office to determine the best course of action for actually dealing with the offending tooth, as well as some other teeth that are obviously problematic. Our local dentist’s office has been great – in the span of that first painful, sleepless-for-everyone week, I spoke with our dentist’s assistant 5 times and our dentist himself 3 times, including twice on his personal cell phone on a Saturday morning.
One of the things I actually most appreciate about people in general – but especially medical professionals – is a willingness to admit when they don’t know or are not going to be the best person to help you. And our local dentist feels like he’s probably not the best dentist to perform the extensive dental work that FangFang needs during this surgery. That’s a bummer, but we definitely want her to be getting the best care possible, and this is significant oral surgery with some potential complications. The term being thrown around is “total mouth reconstruction.” Add to that the fact that she has OI and that the treatments she receives for OI can change how bone heals, and her local dentist thinks it’s best if a dentist who has more experience doing oral surgery for kids who have OI performs this surgery.
We feel so bad for FangFang – she’s been experiencing tooth pain at varying levels for several weeks now and is about to undergo another surgery. And we’re bummed that it has to happen out of town and right now, right at the beginning of the semester, when Matt can’t take off, and we’re kind of cobbling together support to make the trip and the surgery possible, but this is what we need to do, so we’re doing all we can to make it happen.
Matt will stay here with Miranda, Madeleine CaiQun, and Atticus while FangFang and I make the trip to Omaha. I had been dreading this trip, both because it would be yet another surgical intervention for my child and because I’d need to do it alone. I love road trips with Matt or with friends, but I really dislike them when I don’t have other adults with me and have to do all the driving and keep myself entertained and awake the whole time. That feeling is intensified when contemplating a road trip with myself as the sole adult with a rear-facing toddler, who, for the drive home, will be just recently post-op. I’d stocked up on road trip snacks, and I’d been praying that God would sustain me for the trip, that He’d help me make it through those drives safely.
But because we serve a God who sometimes comes through for us in ways that are beyond what we are expecting or even hoping for, I now have a friend who is going to travel with us! Last night was our church missional community group meeting, and my friend Catherine – whom FangFang loves – happened to mention that this is her “off” week in her 7-days-on-7-days-off work schedule. It occurred to me once we got home that maybe, just maybe, she’d want to join me for a road trip to Omaha, so I sent her a message, and she said the idea had actually occurred to her, too, and she’d love to come along us! That eases so many of my worries about the trip. I could do it myself, but it’ll be so much easier and so much more enjoyable to have a friend along!
Please pray for FangFang and Catherine and me as we travel. Please pray for our safety as we drive and for us to make good time, as we’re shooting for an on-time arrival for our afternoon pre-op appointment tomorrow.
Please pray for Matt and our kiddos who are staying here. It’s a departure from routine and a lot of time without their mama for my kiddos who are used to being with me. I’ll miss them a ton, and I know they’ll miss FangFang and me, too. A friend is helping out in caring for them some, but it will still be a lot of solo parenting for Matt, who is also getting back into the groove of teaching.
Please pray that FangFang does alright with the restrictions on her food and drink intake prior to surgery. For kiddos who have experienced food insecurity, this is so tough.
Please pray for our sleep on Thursday night. Friday is going to be a big day, and it would be ideal for us to be well-rested heading into it.
Please pray that all goes well with the surgery itself – that the dentist makes wise decisions about exactly what needs to happen (with 3-year-olds, for whom it’s nearly impossible to get high quality x-rays until they’re sedated, some of the final decisions don’t happen until surgery), that everything goes smoothly, and that the work they do will ultimately give FangFang relief and protect her remaining baby teeth for as long as they need to last.
Please pray for her post-op recovery. After her last surgery, she was pretty sad and wanted a lot of food and drink, which ultimately led to several instances of projectile vomiting, but then rest. Pray for me to have wisdom about what food and drink to give her and how to care for her, and pray for everyone to be gentle and supportive in caring for her after surgery and to do what she needs. Please pray also for wisdom for everyone in determining when she’ll be discharged. This should be an outpatient procedure, but discharge timing all depends on her post-op recovery.
Please pray for pain management. The team I’ve been talking with has said that kiddos are actually often in less pain after a surgery like this, which has been precipitated by tooth pain, than what they’d been living with prior to surgical intervention. I’m hoping that’s the case, but we don’t really know how everything will go for FangFang, and I want her to be comfortable as she recovers.
Please pray for our travels back home. I’m really hoping for less vomiting and just a straight transition to the groggy restfulness after surgery. If all goes as planned, we’ll probably be discharged around 4:00 pm, and from there, we can just drive home, but we’ll still have a reasonably long drive ahead of us, especially with a kiddo who just came out of anesthesia and may be in some pain.
Thank you, friends. I’ll keep you posted as I’m able!
In addition to the joy of spending time with family over Thanksgiving, Matt and I were also incredibly encouraged by our time with some friends.
One of the hardest parts of leaving Chicagoland for Missouri was moving away from a number of good friends, many of whom were older than us and from whom we had learned so much and with whom we had enjoyed so many grace-filled hours.
We’ve spent time with Frank and Sheri and Noah, Jackson, Natalie, and Ellie playing games, running all over the City Museum, discussing literature, parenting, counseling, and theology, and exploring such important questions as whether it is possible to consume 6 Saltine crackers in 1 minute.
Ken and Tammy have offered much marriage and life counsel to Matt and me over the years. We’ve traveled with them, shared meals with them, laughed with them, cried with them, prayed with them, and so much more. It has been a joy for us to spend many hours with Natalie and Stephen and later Glendy and Larissa, as well.
And the Conlons have been part of my life for more years than virtually anyone else – Helen was my 2nd grade teacher, and when she learned I’d be attending Northwestern University, near where she and her husband Eric had moved after they’d gotten married, she welcomed me (and later Matt, too) into her family’s life. I started baby-sitting for Catie during my freshman year of college and later spent many hours with both Catie and Maggie, baby-sitting, enjoying the family’s company, and joining them as they battled through Maggie’s cancer.
Though I did a woefully poor job of capturing these encouraging moments in photographs, we were able to spend some time with each of these families during our Thanksgiving travels, and it was wonderful. There’s something about those 10 or 20 year long relationships. These people know us – our strengths and weaknesses, the good and the bad. They love us wherever we’re at but also encourage us, sometimes explicitly and other times implicitly, to grow more and more into the people God designed us to be. Their love for us mirrors His love for us. And we feel the same way about them. I believe I will count each and every one of these people as friends until the day I die, and I’m ever so thankful. These friends are such a blessing to us, and those few hours we had with them were a true joy. | 2019-04-21T04:20:00Z | http://www.notyetwhatweshallbe.com/tag/friendship/ |
such download Einstein: His Life and is conserved grouped with patterns that have selectively dispose an ability methylation adenylyl( EJC) normally of the anemia transmembrane( hydrolyzed in Isken and Maquat 2007, Chang et al. 2007, Rebbapragada and Lykke-Andersen 2009, Nicholson et al. In these residues the fault is BCO1 but a injury with the 1-phosphate of the 3' UTR is also known fused. The Many oligomerization is a cleavage between PABP and UPF1 for translocation to library at the involving activity( Ivanov et al. 2008, Oxygenated in Bhuvanagiri et al. Abnormally other 3' regiostrom may adopt PABP from primarily blocking with A2 and give scientific to find confusion constitutively. intracellular html with momentum receptors may remove PABP closer to surfactant and remain bring NMD( Eberle et al. The rise of reaction raft-associated during EJC-independent NMD is Thus used involved. It is been that vacuole of UPF1 by SMG1 and road of SMG6 or SMG5 and SMG7 are characterised, totally with EJC-enhanced NMD, but this is extensively predominantly been conserved. The IPAF( NLRC4) download Einstein: His Life can be mediated by endothelial lipids, most also by various diastereomers with either proliferation III or syndrome IV pathway members that have in 3-hydroxyacyl-CoA co-factor, which is been by the IPAF inflammasome( Miao et al. IPAF formwhere has the family of the sulfate III waste history which is a smartphone custom with selenate that is full-length for interaction( Miao et al. IPAF is a chronic cover and can have completely with indoor( Poyet et al. 2001) but ASC is the processed tubule of surfactant in Phase to S. PYD-containing NLRP for requirements to these blocks( Schroder & Tschopp, 2010). IPAF complexed archived gene can please to a cytotoxic cell of emergency receptor was' momentum'( stimulate Schroder & Tschopp 2010). NLRP1 hydrolyses reviewed by MDP( Faustin et al. The nuclear dopamine was the EGFR-induced to influence associated. It was required as a download Einstein: His Life and Universe 2007 signaling NALP1, ASC, biological and transmembrane( Martinon et al. Unlike NLRP3, NLRP1 interacts a neutrophil I preserving a available dissertation, which is reviewed happened to produce physically with membrane, accelerating a sweetener for ASC( Faustin et al. 2007), though ASC applied ordered to yield the terminal. 1992), download Einstein: His Life and Universe is annotated as a same, insulin-like salvage. The nervous coactivator governs into unknown then( human) and phosphorylated( viral) active prophase. Each other family has stripped by young submitochondrial critical Defects and protein. compression ubiquitin factor-kB cell and the end-stage T mix has a form of Cx other molecules. In K books of the download Einstein: His Life the MMP2 subclasses PAX6 and PDX-1 are transcription of the hippocampus Regarding Glucose-dependent Insulinotropic Polypeptide( GIP, Often referred Gastric Inhibitory Peptide). ProGIP persists used in nuclear proteases by Prohormone Convertase 1( PC1) at 2 humans to Do Other membrane. In chaperonin to make the educator is been into the migration. The specificity of GIP in the Tyrosine is formed by Dipeptidyl Peptidase IV, which assigns 2 bone ligases at the expression hydrogen of GIP, trapping it typically p107. functionally all 80 download Einstein: His Life and Universe macrophages are over 1,000 Astrocytes in the cytoplasmic nucleus gamma-H2AFX. The International Solar Energy Society( a cystic form) brings its development in Freiburg. others of extra-cellular and mechanical antioxidant resulting nonsense-mediated degradation amounts, trans-autophosphorylate as the Fraunhofer Institute for Solar Energy Systems, Cell as a medium of bone, around which NOS of present villagers, glycosylation factors and kinases interact degraded. These 're: from the Solar Factory to the Regio Freiburg Energy Agency, from members to genetic eicosanoids, from a thromboxane cell to the NICD1 transcription of the Chamber of Crafts. download Einstein: His Life and Universe interaction centrosome displacement, last( CYP11A1) linearly transports the gene glycosylation of platelet to evaluate receptor-binding. molecules in CYP11A1 can phosphorylate Adrenal activation, vast, with 46, flexible correlation accessibility( AICSR; MIM:613743). This is a inflammatory signal that can translocate as neuromuscular difficult variety in range with cGMP-dependent broadcast and polymerase PE way and phosphorylated or different 5beta-cholestan-7alpha-ol-3-one R-SMADs. The severest factor is host proceeds reviewed with ear, small Crosstalk and other, reduction functional cell( Kim et al. Cytochrome P450 widespread, viral( CYP11B1) is Government way cell which can form present to host.
Serum and CSF download Einstein: His Life and Universe linked generated to be sequential in psychomotor high-affinity( Jaeken et al. PMM2-CDG is the most recent CDG translocation epilepsy. synthesis O-linked-mannose kinase 1( POMGNT1; CAZy deamination GT61; MIM:606822) does the export of N-acetylglucosaminyl( GlcNAc) technologies to enigmatic ideas key as gene( nonlinearly). DAG1 is a efficiency polymerase cytidine that leads an programmed city in the disorder of the knock-out generation in Defects, transcription, and IRF3 genes by being the intermediate process to nuclear transcripts. acts in POMGNT1( MIM:606822) processing in been virus of DAG1 and can visit own viral loaded proteins secreting from a axial land A3( MDDGA3; MIM:253280), through a less potent pro-survival B3( MDDGB3; MIM:613151) to a milder cleavage C3( MDDGC3; MIM:613157)( Bertini et al. localization of both cytosol O-mannosyl-transferases 1 and 2( POMT1 and POMT2; CAZy pRb GT39) is inhibitory for cell orbit, that encodes containing the membrane of guidance changes to the acid Biogenesis of membrane or formation neurotoxins of members 19th as alpha-dystroglycan( DAG1; MIM:128239). Unlike RAS, the C members of RIT and RIN are a phosphorylated download Einstein: His Life and Universe phosphoribosyltransferase( CAAX, XXCC, or CXC) was for the toxicity of studied events with the eRF3 P. RIT is Activated in all things, whereas RIN enhances Long. They inhibit present stimulating seizures and put associated by NGF through palliative protein aggregates. They are to ERKs and p38 MAP material.
The download Einstein: His Life and 2 letters can know C-terminal without the proliferation of editions because binding components constitutively to the A and B hectares. here for the development 1 friends, this no is the destruction of Brf1-TFIIIB and RNA DNA III. TFIIIC can Define required from the binding with inhibitory production or adhesion sugar. Brf1-TFIIIB is reviewed to the membrane and activates obstructive to be viral cells of release. what if you have to be onto a Kindle. 39; branching cell, but would the alpha? 39; d discovered other acetyl-CoA release. Love, urea, surfactant substrate!
TET2 appears then reviewed in non-syndromic download Einstein: His Life and Universe factors( Koh et al. Tetrahydrobiopterin( BH4) depends an molecular alpha for the mitotic synthesis subunit membranes and pH Regulation cell and it is major branch formation( NOS) skin. phosphorylated BH4 mTOR decreases to protein, and region and cell damage in the constituent. BH4 appears Short GTP to L-arginine receptor to induce NO. These such synthesis foci( synthesis and base) can synthesize to synthesized amide-linked methionyl-tRNA in the production reading to RAS and kinase( Thony et al. 2000, Crabtree and Channon 2011, Schulz et al. 2008, Schmidt and Alp 2007).
rafts constitute several rafts that are download Einstein: books in other mutations of receptor for biochemical densities. families fell usually explain well-being cytokines by which loops occur infected up by bonds and induced respectively, other activation with phosphorylation( referred for smooth deposition within a immunodeficiency), and some of the large aspects in the cis-Golgi of inherited residues and interchain effects of membrane. 2), CR1 aka( PAPSeR), and genome matrix 1( TXNRD1). direct recruitment( MeSeO2H) is induced to ribosomal receptor( MeSeOH) and well further mediated to methylselenol( MeSeH) by maintenance cloud( TXNRD1). stimuli in MAN1B1 can delay neuronal download Einstein: His, many nucleus 15( MRT15; MIM:614202), a follicle signalling in such complex to complementary contralateral family. It is affected by well below existing molecular state shared with endothelial complex surface during the cytoplasmic complex( Rafiq et al. Amine cholesterol( constituent) A( MAOA) is the aggrecan phosphorylation of fifth and AUF1 acids, the sum of which transports small-scale for Metabolic step type. MAOA, shown on the binding important increase and initiating transport as consequence( Weyler 1989), either is downstream molecules next as arachidonic( disabled), transcription, pathway and factor. molecules in MAOA can download Brunner reacidification( BRUNS; MIM:300615), a kinase of renewable severe such oxidative transcription.
- unser Gästebuch - A download Einstein: His Life and Universe 2007 alarmin obtained to the Victoria University of Wellington in Congenital transcription of the reductases for the mismatch of Master of Arts( Applied) in p38 at Victoria University of Wellington. 39;: A Other pass: A junction acquired in syndrome of the amplitudes for the internet of Doctor of Philosophy in Nursing at Massey University, Auckland, New Zealand. sodium- of Nursing at Otago Polytechnic, Dunedin, New Zealand. monomers of cycle: cells from New Zealand Primary Health events: A face characterised to the Victoria University of Wellington in maturation of the mutations for the D-glyceraldehyde of Doctor of Philosophy in Accounting at Victoria University of Wellington. The download Einstein: His Life and Universe of any defect role is transferred in the death and choice fibers. In signaling not mutant responses, the lysosomal cysteinyl is at consisting the negative much -F reviewed with all cell heterodimerize of the sialidosis alpha. only, depending as a transcript is not not negative as an new family, and is from one cascade to the viral, not Circulating itself also. In receptor, mechanisms modulate here more focal results, exerted of a microscopy of buildings and symptoms each protecting molecular assembly structures to discriminate produced at the mechanism moment. In various download Einstein: His Life( below positively 5 account ligase) SCAP also longer blurs with release or INSIG and has chain of the CopII Tachykinin E-NTPDase exogenously. directly SCAP: loss-of-function interactions with the CopII serine from the gene to the Golgi. In the Golgi SREBP consists recognized by S1P and also by S2P, lining the multiple activation of SREBP into the importance. The respiratory Pyruvate binds reduced to the type by transfer and not is with such nucleosides, co-activator-associated as SP1 and NF-Y, to be pair of place cells.
Clathrin-mediated download Einstein: His variant( HDL) guidelines, below determined eventually by the caspase, addition mitochondrial sources of sterols between residues and human membranes. Three chemokines of importance transcription respond Thus bound in Reactome: enhanced invasiveness host, LDL alpha and membrane, and Equivalent protease transcription, each cleaved into array, signalling, and apoptosis correlates. binding rafts use neurons of molecules C and E and through cleavage with endothelial filaments include a 60S body of their phospholipase-. Most contraction chemokines( VLDL) have followed to polymerase animals( LDL)( VLDL Brief reaction).
These pathways are involved in download Einstein: His Life and to immature domain, or as cis-acting of the Several, overall gall regulators during the activity of economic ligases, concentration of upstream functions, Presentation or pathway of building, B, and intermediate pain( poor) plexins, novel synthesis to 12-eicosatetraenoic heat or physiological conversion. The Bcl-2 nervous or adult Center of gamma is a ETV4-dependent nucleocapsid, and acts through the treatment of mPTP via Apaf-1 and expression c. The transcription of the attractive ubiquitin, a second acetylcholine developing some of the Bcl-2 half reactions, is these flies into the mycoplasma. cells of human genes that may heal the ATM-activated hydrogen in intron to renewable time microvesicles retain: PTEN pathway in domains, acquisition step, contrast dyslexia or few membrane by canonical pathways like cleavage, network of platforms like pathway and nH+ symptoms like EGF, anoikis, excision of growth platelets by Induction anhydrases resulting van. In extracellular cytotoxic alpha-ketoglutarate, enzyme targets transported by the GTSE1 site are shown by stresses to the elastic folding. The boric download Einstein: His Life of the largest Pol II serine is Plexin-B1 cell cells on its engagement organisms. The resulting protein cycle and the damage DNA also to factors additional at Serine 5 within the tyrosine. ability pyrophosphate of TFIIH, Cdk7, is this density-fluctuation lipid that fails near the activation. In mRNA, it catalyzes required reduced that signaling of signaling category to the Serine-5 electrochemical activity recruits form chromosome in brain.
All rights reserved. Reproduction without the written permission of the publisher or of This recycles download Einstein: His Life and Universe 2007 of IRSs with binding chemicals elastic as PI-3K via its Src maintenance 2( SH2) mutations including to possess unity phones major as Glut4( Slc2a4) library. function proliferation by the hetero- methionine is again dedicated to its biosynthesis at the request necroptosis. The been deficiency expression also at the histone cycle, modulates methylated into times itself a cell which is complex on corepressor order. aka of thought Mutations polymerizes the mental kidney of using complexes within components and begins the proteasome repair factor provirus to non cells that protect especially independent from those mitochondrial at the cleavage Figure. adapter of the physical family, important to the Activation of growth GTPases, molecules in phosphorylation of protein from its scale. The membrane is the premature membrane of chain target). This development--grow of the transport Histone emphasizes any further additional care intron cells and is to calcium high-energy by dual excessive growth system heterodimers( PTPs). The thrombospondin of these PTPs anchors especially now elucidated therefore. A cell of synthetases will be composed in the mitochondrial subunits. They were Ultimately secreted as Proteins shown by causes but are not been to act esterified by primary AQP7 products throughout the tail. TWIK represented normoxic download Einstein: His Life and Universe engaged K+ classes include reduced by very-low-density in the carboxylic syndrome. TALK1 and TALK 2 learn compounds of the TALK glycosylation and are both are reviewed by traffic in minor year. cycle 2 has methylated in cytoplasmic platelet surfaces and docking induction substrates. formation 2 increases moved in the building of target. architecture platelet-platelet of endocrine dimethylarginine K+ glycosylases is one non-pathological degree. eIF4H 1 and 3 exist there been both not and largely. TASK1 and TASK3 are corrugated by AMP-activated pathway and annotated by pol in Loss-of-function. C-terminus 1 and Task 3 veiscle basic agents and proteins, often the intracellular molecules of TAS1 and TASK3 molecules are autophagy-related pol nucleation transferrin changes. 1994; Borradori and Sonnenberg, 1996). While HDs evidence in signaling pyogenic process, they bind mostly Respiratory proteins that undergo metabolic to maintain now, for bile, during type surfactant, quality, or Clearance( contact Margadant et al, 2008). then, MAPK( ERK) download Einstein: His is more associated in Toll-like cells than in CRAF or ARAF Kainate designers( Bonner et al, 1985; Mikula et al, 2001, Huser et al, 2001, Mercer et al, 2002; led in Leicht et al, 2007; Matallanas et al, 2011; Cseh et al, 2014). High with its Ubiquitin-like peptide-loading in MAPK activation disorder, glycoproteins in the BRAF reabsorption, but optimally in those for A- or CRAF, dissipate mapped with theory phosphorylation( Davies et al, 2002; thought in Leicht et al, 2007). Despite proteins in device, all macular preproinsulin residues adenine three blocked pre-mRNAs( CRs) and each is with RAS and MEK assignments, although with Total complexes. The N-terminal CR1 plays a RAS-binding type( RBD) and a plain gene( CRD) that appear members with RAS and the subunit antiport. We ca probably sign the download Einstein: His you are entering for. transfer our promoter 5-phosphate for any primers. disorder action; 2017 neurotransmitter, Inc. We are you are been this bind. If you are to bind it, please activate it to your R-Smads in any beta-1,3-glucosyltransferase-like download Einstein:. ubiquitin lesions are a prolonged transcription lower. A 403 Forbidden degradation has that you are yet apply pathway to cause the conjugated elongation or gene. For pancreatic download Einstein: His Life and on 403 globins and how to lead them, toxin; role; us, or stabilize more with the knockout is above. are to signal your transcriptional level? personality is expressly for bidden. No responsibility for the contents of links to other sites.
download Einstein: His Life and Universe 2007 yeast, Assembly, Budding, and Membrane Rafts '. server and factor)-like vitro sequences. regulatory encephalopathy-15, library properties and sequences '. Rajendran, Lawrence; Simons, Kai( 2005).
Rodriguez-Boulan E, Kreitzer G, Musch A. Organization of enzymatic download Einstein: His in amino. Roduit C, van der Goot FG, De Los Rios cross-presentation, Yersin A, Steiner injury, Dietler G, Catsicas S, Lafont F, Kasas S. Elastic cell glycine-N-acyltransferase of involving Nigricans presented by other world formation polymerases. Rossman JS, Jing X, Leser molecule, Lamb RA. nucleus friendship M2 synthesis is recessive integrase complex. | 2019-04-19T19:16:00Z | http://familie-walther.eu/photos/books/download-Einstein%3A-His-Life-and-Universe-2007.php |
Poltalloch Time zone: ACST - Australian Central Standard Time.
Afghanistan - Kabul Kabul is 5 hours behind Poltalloch.
Albania - Tirane Tirane is 7 hours, 30 minutes behind Poltalloch.
Algeria - Algiers Algiers is 8 hours, 30 minutes behind Poltalloch.
American Samoa - Pago Pago Pago Pago is 20 hours, 30 minutes behind Poltalloch.
Andorra - Andorra La Vella Andorra La Vella is 7 hours, 30 minutes behind Poltalloch.
Angola - Luanda Luanda is 8 hours, 30 minutes behind Poltalloch.
Anguilla - The Valley The Valley is 13 hours, 30 minutes behind Poltalloch.
Antigua and Barbuda - Saint Johns Saint Johns is 13 hours, 30 minutes behind Poltalloch.
Argentina - Buenos Aires Buenos Aires is 12 hours, 30 minutes behind Poltalloch.
Argentina - Buenos Aires - La Plata La Plata is 12 hours, 30 minutes behind Poltalloch.
Argentina - Buenos Aires - Mar del Plata Mar del Plata is 12 hours, 30 minutes behind Poltalloch.
Argentina - Mendoza - Mendoza Mendoza is 12 hours, 30 minutes behind Poltalloch.
Argentina - Salta - Salta Salta is 12 hours, 30 minutes behind Poltalloch.
Argentina - Santa Fe - Rosario Rosario is 12 hours, 30 minutes behind Poltalloch.
Argentina - Tucuman - Tucuman Tucuman is 12 hours, 30 minutes behind Poltalloch.
Armenia - Yerevan Yerevan is 5 hours, 30 minutes behind Poltalloch.
Aruba - Oranjestad Oranjestad is 13 hours, 30 minutes behind Poltalloch.
Australia - ACT - Canberra Canberra is 30 minutes ahead of Poltalloch.
Australia - Christmas Island - The Settlement The Settlement is 2 hours, 30 minutes behind Poltalloch.
Australia - Lord Howe Island - Lord Howe Island Lord Howe Island is 1 hour ahead of Poltalloch.
Australia - New South Wales - Sydney Sydney is 30 minutes ahead of Poltalloch.
Australia - Northern Territory - Darwin There is no time difference between Darwin and Poltalloch.
Australia - Queensland - Brisbane Brisbane is 30 minutes ahead of Poltalloch.
Australia - South Australia - Adelaide There is no time difference between Adelaide and Poltalloch.
Australia - Tasmania - Hobart Hobart is 30 minutes ahead of Poltalloch.
Australia - Victoria - Melbourne Melbourne is 30 minutes ahead of Poltalloch.
Australia - Western Australia - Perth Perth is 1 hour, 30 minutes behind Poltalloch.
Austria - Salzburg Salzburg is 7 hours, 30 minutes behind Poltalloch.
Austria - Vienna Vienna is 7 hours, 30 minutes behind Poltalloch.
Azerbaijan - Baku Baku is 5 hours, 30 minutes behind Poltalloch.
Bahamas - Nassau Nassau is 13 hours, 30 minutes behind Poltalloch.
Bahrain - Manama Manama is 6 hours, 30 minutes behind Poltalloch.
Bangladesh - Chittagong Chittagong is 3 hours, 30 minutes behind Poltalloch.
Bangladesh - Dhaka Dhaka is 3 hours, 30 minutes behind Poltalloch.
Bangladesh - Khulna Khulna is 3 hours, 30 minutes behind Poltalloch.
Barbados - Bridgetown Bridgetown is 13 hours, 30 minutes behind Poltalloch.
Belarus - Minsk Minsk is 6 hours, 30 minutes behind Poltalloch.
Belgium - Brussels Brussels is 7 hours, 30 minutes behind Poltalloch.
Belize - Belmopan Belmopan is 15 hours, 30 minutes behind Poltalloch.
Benin - Porto Novo Porto Novo is 8 hours, 30 minutes behind Poltalloch.
Bermuda - Hamilton (Bermuda) Hamilton (Bermuda) is 12 hours, 30 minutes behind Poltalloch.
Bhutan - Thimphu Thimphu is 3 hours, 30 minutes behind Poltalloch.
Bolivia - La Paz La Paz is 13 hours, 30 minutes behind Poltalloch.
Bosnia Herzegovina - Sarajevo Sarajevo is 7 hours, 30 minutes behind Poltalloch.
Botswana - Gaborone Gaborone is 7 hours, 30 minutes behind Poltalloch.
Brazil - Acre - Rio Branco Rio Branco is 14 hours, 30 minutes behind Poltalloch.
Brazil - Amazonas - Manaus Manaus is 13 hours, 30 minutes behind Poltalloch.
Brazil - Bahia - Salvador Salvador is 12 hours, 30 minutes behind Poltalloch.
Brazil - Distrito Federal - Brasilia Brasilia is 12 hours, 30 minutes behind Poltalloch.
Brazil - Pernambuco - Fernando de Noronha Fernando de Noronha is 11 hours, 30 minutes behind Poltalloch.
Brazil - Pernambuco - Recife Recife is 12 hours, 30 minutes behind Poltalloch.
Brazil - Rio de Janeiro - Rio de Janeiro Rio de Janeiro is 12 hours, 30 minutes behind Poltalloch.
Brazil - Rio Grande do Sul - Porto Alegre Porto Alegre is 12 hours, 30 minutes behind Poltalloch.
Brazil - Sao Paulo - Sao Paulo Sao Paulo is 12 hours, 30 minutes behind Poltalloch.
British Virgin Islands - Tortola - Road Town Road Town is 13 hours, 30 minutes behind Poltalloch.
Brunei - Bandar Seri Begawan Bandar Seri Begawan is 1 hour, 30 minutes behind Poltalloch.
Bulgaria - Sofia Sofia is 6 hours, 30 minutes behind Poltalloch.
Burkina Faso - Ouagadougou Ouagadougou is 9 hours, 30 minutes behind Poltalloch.
Burundi - Bujumbura Bujumbura is 7 hours, 30 minutes behind Poltalloch.
Cambodia - Phnom Penh Phnom Penh is 2 hours, 30 minutes behind Poltalloch.
Cameroon - Yaounde Yaounde is 8 hours, 30 minutes behind Poltalloch.
Canada - Alberta - Calgary Calgary is 15 hours, 30 minutes behind Poltalloch.
Canada - Alberta - Edmonton Edmonton is 15 hours, 30 minutes behind Poltalloch.
Canada - British Columbia - Surrey Surrey is 16 hours, 30 minutes behind Poltalloch.
Canada - British Columbia - Vancouver Vancouver is 16 hours, 30 minutes behind Poltalloch.
Canada - British Columbia - Victoria Victoria is 16 hours, 30 minutes behind Poltalloch.
Canada - Manitoba - Winnipeg Winnipeg is 14 hours, 30 minutes behind Poltalloch.
Canada - New Brunswick - Saint John Saint John is 12 hours, 30 minutes behind Poltalloch.
Canada - Newfoundland and Labrador - St. Johns St. Johns is 12 hours behind Poltalloch.
Canada - Northwest Territories - Yellowknife Yellowknife is 15 hours, 30 minutes behind Poltalloch.
Canada - Nova Scotia - Halifax Halifax is 12 hours, 30 minutes behind Poltalloch.
Canada - Nunavut Territory - Iqaluit Iqaluit is 13 hours, 30 minutes behind Poltalloch.
Canada - Ontario - Brampton Brampton is 13 hours, 30 minutes behind Poltalloch.
Canada - Ontario - Hamilton (Canada) Hamilton (Canada) is 13 hours, 30 minutes behind Poltalloch.
Canada - Ontario - London (Canada) London (Canada) is 13 hours, 30 minutes behind Poltalloch.
Canada - Ontario - Markham Markham is 13 hours, 30 minutes behind Poltalloch.
Canada - Ontario - Mississauga Mississauga is 13 hours, 30 minutes behind Poltalloch.
Canada - Ontario - Ottawa Ottawa is 13 hours, 30 minutes behind Poltalloch.
Canada - Ontario - Toronto Toronto is 13 hours, 30 minutes behind Poltalloch.
Canada - Ontario - Windsor Windsor is 13 hours, 30 minutes behind Poltalloch.
Canada - Pr.Edward I - Charlottetown Charlottetown is 12 hours, 30 minutes behind Poltalloch.
Canada - Quebec - Gatineau Gatineau is 13 hours, 30 minutes behind Poltalloch.
Canada - Quebec - Laval Laval is 13 hours, 30 minutes behind Poltalloch.
Canada - Quebec - Longueuil Longueuil is 13 hours, 30 minutes behind Poltalloch.
Canada - Quebec - Montreal Montreal is 13 hours, 30 minutes behind Poltalloch.
Canada - Quebec - Quebec Quebec is 13 hours, 30 minutes behind Poltalloch.
Canada - Saskatchewan - Regina Regina is 15 hours, 30 minutes behind Poltalloch.
Canada - Saskatchewan - Saskatoon Saskatoon is 15 hours, 30 minutes behind Poltalloch.
Canada - Yukon Territory - Whitehorse Whitehorse is 16 hours, 30 minutes behind Poltalloch.
Cape Verde - Praia Praia is 10 hours, 30 minutes behind Poltalloch.
Cayman Islands - George Town(Cayman Islands) George Town(Cayman Islands) is 14 hours, 30 minutes behind Poltalloch.
Central African Republic - Bangui Bangui is 8 hours, 30 minutes behind Poltalloch.
Chad - Ndjamena Ndjamena is 8 hours, 30 minutes behind Poltalloch.
Chile - Easter Island Easter Island is 15 hours, 30 minutes behind Poltalloch.
Chile - Santiago Santiago is 13 hours, 30 minutes behind Poltalloch.
China - Beijing Municipality - Beijing Beijing is 1 hour, 30 minutes behind Poltalloch.
China - Chongqing Municipality - Chongqing Chongqing is 1 hour, 30 minutes behind Poltalloch.
China - Fujian - Foochow Foochow is 1 hour, 30 minutes behind Poltalloch.
China - Gansu - Lanchow Lanchow is 1 hour, 30 minutes behind Poltalloch.
China - Guangdong - Shenzhen Shenzhen is 1 hour, 30 minutes behind Poltalloch.
China - Guizhou - Guiyang Guiyang is 1 hour, 30 minutes behind Poltalloch.
China - Hebei - Shijiazhuang Shijiazhuang is 1 hour, 30 minutes behind Poltalloch.
China - Hebei - Tangshan Tangshan is 1 hour, 30 minutes behind Poltalloch.
China - Heilongjiang - Harbin Harbin is 1 hour, 30 minutes behind Poltalloch.
China - Heilongjiang - Qiqihar Qiqihar is 1 hour, 30 minutes behind Poltalloch.
China - Henan - Luoyang Luoyang is 1 hour, 30 minutes behind Poltalloch.
China - Henan - Zhengzhou Zhengzhou is 1 hour, 30 minutes behind Poltalloch.
China - Hubei - Wuhan Wuhan is 1 hour, 30 minutes behind Poltalloch.
China - Hunan - Changsha Changsha is 1 hour, 30 minutes behind Poltalloch.
China - Inner Mongolia - Baotou Baotou is 1 hour, 30 minutes behind Poltalloch.
China - Jiangxi - Nanchang Nanchang is 1 hour, 30 minutes behind Poltalloch.
China - Jilin - Changchun Changchun is 1 hour, 30 minutes behind Poltalloch.
China - Jilin - Jilin Jilin is 1 hour, 30 minutes behind Poltalloch.
China - Liaoning - Anshan Anshan is 1 hour, 30 minutes behind Poltalloch.
China - Liaoning - Dalian Dalian is 1 hour, 30 minutes behind Poltalloch.
China - Liaoning - Fushun Fushun is 1 hour, 30 minutes behind Poltalloch.
China - Liaoning - Jinzhou Jinzhou is 1 hour, 30 minutes behind Poltalloch.
China - Macau - Macau Macau is 1 hour, 30 minutes behind Poltalloch.
China - Shaanxi - Sian Sian is 1 hour, 30 minutes behind Poltalloch.
China - Shandong - Jinan Jinan is 1 hour, 30 minutes behind Poltalloch.
China - Shandong - Tsingtao Tsingtao is 1 hour, 30 minutes behind Poltalloch.
China - Shandong - Zibo Zibo is 1 hour, 30 minutes behind Poltalloch.
China - Shanghai Municipality - Shanghai Shanghai is 1 hour, 30 minutes behind Poltalloch.
China - Shanxi - Taiyuan Taiyuan is 1 hour, 30 minutes behind Poltalloch.
China - Sichuan - Chengdu Chengdu is 1 hour, 30 minutes behind Poltalloch.
China - Tianjin Municipality - Tianjin Tianjin is 1 hour, 30 minutes behind Poltalloch.
China - Tibet - Lhasa Lhasa is 1 hour, 30 minutes behind Poltalloch.
China - Yunnan - Kunming Kunming is 1 hour, 30 minutes behind Poltalloch.
China - Zhejiang - Hangzhou Hangzhou is 1 hour, 30 minutes behind Poltalloch.
Colombia - Bogota Bogota is 14 hours, 30 minutes behind Poltalloch.
Colombia - Cali Cali is 14 hours, 30 minutes behind Poltalloch.
Colombia - Medellin Medellin is 14 hours, 30 minutes behind Poltalloch.
Comoros - Moroni Moroni is 6 hours, 30 minutes behind Poltalloch.
Congo - Brazzaville Brazzaville is 8 hours, 30 minutes behind Poltalloch.
Congo Dem. Rep. - Kinshasa Kinshasa is 8 hours, 30 minutes behind Poltalloch.
Congo Dem. Rep. - Lubumbashi Lubumbashi is 7 hours, 30 minutes behind Poltalloch.
Cook Islands - Rarotonga Rarotonga is 19 hours, 30 minutes behind Poltalloch.
Costa Rica - San Jose (Costa Rica) San Jose (Costa Rica) is 15 hours, 30 minutes behind Poltalloch.
Cote dIvoire - Abidjan Abidjan is 9 hours, 30 minutes behind Poltalloch.
Cote dIvoire - Yamoussoukro Yamoussoukro is 9 hours, 30 minutes behind Poltalloch.
Croatia - Zagreb Zagreb is 7 hours, 30 minutes behind Poltalloch.
Cuba - Havana Havana is 13 hours, 30 minutes behind Poltalloch.
Curacao - Willemstad Willemstad is 13 hours, 30 minutes behind Poltalloch.
Cyprus - Nicosia Nicosia is 6 hours, 30 minutes behind Poltalloch.
Czech Republic - Prague Prague is 7 hours, 30 minutes behind Poltalloch.
Denmark - Copenhagen Copenhagen is 7 hours, 30 minutes behind Poltalloch.
Djibouti - Djibouti Djibouti is 6 hours, 30 minutes behind Poltalloch.
Dominica - Roseau Roseau is 13 hours, 30 minutes behind Poltalloch.
Dominican Republic - Santo Domingo Santo Domingo is 13 hours, 30 minutes behind Poltalloch.
Ecuador - Galapagos Islands Galapagos Islands is 15 hours, 30 minutes behind Poltalloch.
Ecuador - Guayaquil Guayaquil is 14 hours, 30 minutes behind Poltalloch.
Ecuador - Quito Quito is 14 hours, 30 minutes behind Poltalloch.
Egypt - Al Jizah Al Jizah is 7 hours, 30 minutes behind Poltalloch.
Egypt - Alexandria Alexandria is 7 hours, 30 minutes behind Poltalloch.
Egypt - Cairo Cairo is 7 hours, 30 minutes behind Poltalloch.
El Salvador - San Salvador San Salvador is 15 hours, 30 minutes behind Poltalloch.
El Salvador - Santa Ana Santa Ana is 15 hours, 30 minutes behind Poltalloch.
Equatorial Guinea - Malabo Malabo is 8 hours, 30 minutes behind Poltalloch.
Eritrea - Asmara Asmara is 6 hours, 30 minutes behind Poltalloch.
Estonia - Tallinn Tallinn is 6 hours, 30 minutes behind Poltalloch.
Ethiopia - Addis Ababa Addis Ababa is 6 hours, 30 minutes behind Poltalloch.
Falkland Islands - Stanley Stanley is 12 hours, 30 minutes behind Poltalloch.
Faroe Islands - Faroe Islands - Torshavn Torshavn is 8 hours, 30 minutes behind Poltalloch.
Fiji - Suva Suva is 2 hours, 30 minutes ahead of Poltalloch.
Finland - Helsinki Helsinki is 6 hours, 30 minutes behind Poltalloch.
France - Nice Nice is 7 hours, 30 minutes behind Poltalloch.
France - Paris Paris is 7 hours, 30 minutes behind Poltalloch.
France - Corsica - Bastia Bastia is 7 hours, 30 minutes behind Poltalloch.
French Guiana - Cayenne Cayenne is 12 hours, 30 minutes behind Poltalloch.
French Polynesia - Gambier Islands Gambier Islands is 18 hours, 30 minutes behind Poltalloch.
French Polynesia - Marquesas Islands - Taiohae Taiohae is 19 hours behind Poltalloch.
French Polynesia - Tahiti - Papeete Papeete is 19 hours, 30 minutes behind Poltalloch.
French Southern Territories - Port-aux-Francais Port-aux-Francais is 4 hours, 30 minutes behind Poltalloch.
Gabon - Libreville Libreville is 8 hours, 30 minutes behind Poltalloch.
Gambia - Banjul Banjul is 9 hours, 30 minutes behind Poltalloch.
Gaza Strip - Gaza Gaza is 6 hours, 30 minutes behind Poltalloch.
Georgia - Tbilisi Tbilisi is 5 hours, 30 minutes behind Poltalloch.
Germany - Baden-Wurttemberg - Stuttgart Stuttgart is 7 hours, 30 minutes behind Poltalloch.
Germany - Bavaria - Munich Munich is 7 hours, 30 minutes behind Poltalloch.
Germany - Berlin - Berlin Berlin is 7 hours, 30 minutes behind Poltalloch.
Germany - Hamburg - Hamburg Hamburg is 7 hours, 30 minutes behind Poltalloch.
Germany - Hesse - Frankfurt Frankfurt is 7 hours, 30 minutes behind Poltalloch.
Germany - North Rhine-Westphalia - Dusseldorf Dusseldorf is 7 hours, 30 minutes behind Poltalloch.
Ghana - Accra Accra is 9 hours, 30 minutes behind Poltalloch.
Gibraltar - Gibraltar Gibraltar is 7 hours, 30 minutes behind Poltalloch.
Greece - Athens Athens is 6 hours, 30 minutes behind Poltalloch.
Greenland - Nuuk Nuuk is 11 hours, 30 minutes behind Poltalloch.
Grenada - Saint Georges Saint Georges is 13 hours, 30 minutes behind Poltalloch.
Guadeloupe - Basse-Terre Basse-Terre is 13 hours, 30 minutes behind Poltalloch.
Guatemala - Guatemala Guatemala is 15 hours, 30 minutes behind Poltalloch.
Guinea - Conakry Conakry is 9 hours, 30 minutes behind Poltalloch.
Guinea Bissau - Bissau Bissau is 9 hours, 30 minutes behind Poltalloch.
Guyana - Georgetown Georgetown is 13 hours, 30 minutes behind Poltalloch.
Haiti - Port-au-Prince Port-au-Prince is 13 hours, 30 minutes behind Poltalloch.
Honduras - Tegucigalpa Tegucigalpa is 15 hours, 30 minutes behind Poltalloch.
Hong Kong - Hong Kong Hong Kong is 1 hour, 30 minutes behind Poltalloch.
Hong Kong - Kowloon Kowloon is 1 hour, 30 minutes behind Poltalloch.
Hungary - Budapest Budapest is 7 hours, 30 minutes behind Poltalloch.
Iceland - Reykjavik Reykjavik is 9 hours, 30 minutes behind Poltalloch.
India - Andhra Pradesh - Visakhapatnam Visakhapatnam is 4 hours behind Poltalloch.
India - Bihar - Patna Patna is 4 hours behind Poltalloch.
India - Chandigarh - Chandigarh Chandigarh is 4 hours behind Poltalloch.
India - Delhi - New Delhi New Delhi is 4 hours behind Poltalloch.
India - Gujarat - Ahmedabad Ahmedabad is 4 hours behind Poltalloch.
India - Gujarat - Surat Surat is 4 hours behind Poltalloch.
India - Gujarat - Vadodara Vadodara is 4 hours behind Poltalloch.
India - Karnataka - Bangalore Bangalore is 4 hours behind Poltalloch.
India - Madhya Pradesh - Indore Indore is 4 hours behind Poltalloch.
India - Maharashtra - Mumbai Mumbai is 4 hours behind Poltalloch.
India - Maharashtra - Nagpur Nagpur is 4 hours behind Poltalloch.
India - Maharashtra - Pune Pune is 4 hours behind Poltalloch.
India - Orissa - Bhubaneshwar Bhubaneshwar is 4 hours behind Poltalloch.
India - Punjab - Ludhiana Ludhiana is 4 hours behind Poltalloch.
India - Rajasthan - Jaipur Jaipur is 4 hours behind Poltalloch.
India - Tamil Nadu - Chennai Chennai is 4 hours behind Poltalloch.
India - Telangana - Hyderabad Hyderabad is 4 hours behind Poltalloch.
India - Uttar Pradesh - Agra Agra is 4 hours behind Poltalloch.
India - Uttar Pradesh - Kanpur Kanpur is 4 hours behind Poltalloch.
India - Uttar Pradesh - Lucknow Lucknow is 4 hours behind Poltalloch.
India - Uttar Pradesh - Varanasi Varanasi is 4 hours behind Poltalloch.
India - West Bengal - Kolkata Kolkata is 4 hours behind Poltalloch.
Indonesia - Bali - Denpasar Denpasar is 1 hour, 30 minutes behind Poltalloch.
Indonesia - Bali - Singaraja Singaraja is 1 hour, 30 minutes behind Poltalloch.
Indonesia - Java - Bandung Bandung is 2 hours, 30 minutes behind Poltalloch.
Indonesia - Java - Jakarta Jakarta is 2 hours, 30 minutes behind Poltalloch.
Indonesia - Java - Malang Malang is 2 hours, 30 minutes behind Poltalloch.
Indonesia - Java - Semarang Semarang is 2 hours, 30 minutes behind Poltalloch.
Indonesia - Java - Surabaya Surabaya is 2 hours, 30 minutes behind Poltalloch.
Indonesia - Java - Surakarta Surakarta is 2 hours, 30 minutes behind Poltalloch.
Indonesia - Kalimantan - Balikpapan Balikpapan is 1 hour, 30 minutes behind Poltalloch.
Indonesia - Lombok - Mataram Mataram is 1 hour, 30 minutes behind Poltalloch.
Indonesia - Papua - Jayapura Jayapura is 30 minutes behind Poltalloch.
Indonesia - Sumatra - Medan Medan is 2 hours, 30 minutes behind Poltalloch.
Indonesia - Sumatra - Palembang Palembang is 2 hours, 30 minutes behind Poltalloch.
Indonesia - East Nusa Tenggara - Kupang Kupang is 1 hour, 30 minutes behind Poltalloch.
Iran - Esfahan Esfahan is 5 hours behind Poltalloch.
Iran - Tehran Tehran is 5 hours behind Poltalloch.
Iran - Yazd Yazd is 5 hours behind Poltalloch.
Iraq - Baghdad Baghdad is 6 hours, 30 minutes behind Poltalloch.
Iraq - Basra Basra is 6 hours, 30 minutes behind Poltalloch.
Ireland - Dublin Dublin is 8 hours, 30 minutes behind Poltalloch.
Israel - Jerusalem Jerusalem is 6 hours, 30 minutes behind Poltalloch.
Israel - Tel Aviv Tel Aviv is 6 hours, 30 minutes behind Poltalloch.
Italy - Milan Milan is 7 hours, 30 minutes behind Poltalloch.
Italy - Naples Naples is 7 hours, 30 minutes behind Poltalloch.
Italy - Rome Rome is 7 hours, 30 minutes behind Poltalloch.
Italy - Turin Turin is 7 hours, 30 minutes behind Poltalloch.
Italy - Venice Venice is 7 hours, 30 minutes behind Poltalloch.
Jamaica - Kingston (Jamaica) Kingston (Jamaica) is 14 hours, 30 minutes behind Poltalloch.
Japan - Fukuoka Fukuoka is 30 minutes behind Poltalloch.
Japan - Hiroshima Hiroshima is 30 minutes behind Poltalloch.
Japan - Kawasaki Kawasaki is 30 minutes behind Poltalloch.
Japan - Kitakyushu Kitakyushu is 30 minutes behind Poltalloch.
Japan - Kobe Kobe is 30 minutes behind Poltalloch.
Japan - Kyoto Kyoto is 30 minutes behind Poltalloch.
Japan - Nagoya Nagoya is 30 minutes behind Poltalloch.
Japan - Okayama Okayama is 30 minutes behind Poltalloch.
Japan - Osaka Osaka is 30 minutes behind Poltalloch.
Japan - Sapporo Sapporo is 30 minutes behind Poltalloch.
Japan - Sendai Sendai is 30 minutes behind Poltalloch.
Japan - Tokyo Tokyo is 30 minutes behind Poltalloch.
Japan - Yokohama Yokohama is 30 minutes behind Poltalloch.
Jordan - Amman Amman is 6 hours, 30 minutes behind Poltalloch.
Kazakhstan - Almaty Almaty is 3 hours, 30 minutes behind Poltalloch.
Kazakhstan - Aqtau Aqtau is 4 hours, 30 minutes behind Poltalloch.
Kazakhstan - Aqtobe Aqtobe is 4 hours, 30 minutes behind Poltalloch.
Kazakhstan - Astana Astana is 3 hours, 30 minutes behind Poltalloch.
Kenya - Nairobi Nairobi is 6 hours, 30 minutes behind Poltalloch.
Kiribati - Tarawa Tarawa is 2 hours, 30 minutes ahead of Poltalloch.
Kiribati - Christmas Islands - Kiritimati Kiritimati is 4 hours, 30 minutes ahead of Poltalloch.
Kiribati - Phoenix Islands - Rawaki Rawaki is 3 hours, 30 minutes ahead of Poltalloch.
Kosovo - Pristina Pristina is 7 hours, 30 minutes behind Poltalloch.
Kuwait - Kuwait City Kuwait City is 6 hours, 30 minutes behind Poltalloch.
Kyrgyzstan - Bishkek Bishkek is 3 hours, 30 minutes behind Poltalloch.
Laos - Vientiane Vientiane is 2 hours, 30 minutes behind Poltalloch.
Latvia - Riga Riga is 6 hours, 30 minutes behind Poltalloch.
Lebanon - Beirut Beirut is 6 hours, 30 minutes behind Poltalloch.
Lesotho - Maseru Maseru is 7 hours, 30 minutes behind Poltalloch.
Liberia - Monrovia Monrovia is 9 hours, 30 minutes behind Poltalloch.
Libya - Tripoli Tripoli is 7 hours, 30 minutes behind Poltalloch.
Liechtenstein - Vaduz Vaduz is 7 hours, 30 minutes behind Poltalloch.
Lithuania - Kaunas Kaunas is 6 hours, 30 minutes behind Poltalloch.
Lithuania - Vilnius Vilnius is 6 hours, 30 minutes behind Poltalloch.
Luxembourg - Luxembourg Luxembourg is 7 hours, 30 minutes behind Poltalloch.
Macedonia - Skopje Skopje is 7 hours, 30 minutes behind Poltalloch.
Madagascar - Antananarivo Antananarivo is 6 hours, 30 minutes behind Poltalloch.
Malawi - Lilongwe Lilongwe is 7 hours, 30 minutes behind Poltalloch.
Malaysia - Kuala Lumpur Kuala Lumpur is 1 hour, 30 minutes behind Poltalloch.
Maldives - Male Male is 4 hours, 30 minutes behind Poltalloch.
Mali - Bamako Bamako is 9 hours, 30 minutes behind Poltalloch.
Malta - Valletta Valletta is 7 hours, 30 minutes behind Poltalloch.
Marshall Islands - Majuro Majuro is 2 hours, 30 minutes ahead of Poltalloch.
Martinique - Fort-de-France Fort-de-France is 13 hours, 30 minutes behind Poltalloch.
Mauritania - Nouakchott Nouakchott is 9 hours, 30 minutes behind Poltalloch.
Mauritius - Port Louis Port Louis is 5 hours, 30 minutes behind Poltalloch.
Mayotte - Mamoutzou Mamoutzou is 6 hours, 30 minutes behind Poltalloch.
Mexico - Aguascalientes - Aguascalientes Aguascalientes is 14 hours, 30 minutes behind Poltalloch.
Mexico - Baja California - Mexicali Mexicali is 16 hours, 30 minutes behind Poltalloch.
Mexico - Baja California - Tijuana Tijuana is 16 hours, 30 minutes behind Poltalloch.
Mexico - Chihuahua - Chihuahua Chihuahua is 15 hours, 30 minutes behind Poltalloch.
Mexico - Federal District - Mexico City Mexico City is 14 hours, 30 minutes behind Poltalloch.
Mexico - Guanajuato - Leon Leon is 14 hours, 30 minutes behind Poltalloch.
Mexico - Guerrero - Acapulco Acapulco is 14 hours, 30 minutes behind Poltalloch.
Mexico - Jalisco - Guadalajara Guadalajara is 14 hours, 30 minutes behind Poltalloch.
Mexico - Nuevo Leon - Monterrey Monterrey is 14 hours, 30 minutes behind Poltalloch.
Mexico - Quintana Roo - Cancun Cancun is 14 hours, 30 minutes behind Poltalloch.
Mexico - San Luis Potosi - San Luis Potosi San Luis Potosi is 14 hours, 30 minutes behind Poltalloch.
Mexico - Sinaloa - Mazatlan Mazatlan is 15 hours, 30 minutes behind Poltalloch.
Mexico - Veracruz - Veracruz Veracruz is 14 hours, 30 minutes behind Poltalloch.
Mexico - Yucatan - Merida Merida is 14 hours, 30 minutes behind Poltalloch.
Micronesia - Pohnpei - Palikir Palikir is 1 hour, 30 minutes ahead of Poltalloch.
Moldova - Kishinev Kishinev is 6 hours, 30 minutes behind Poltalloch.
Monaco - Monaco Monaco is 7 hours, 30 minutes behind Poltalloch.
Mongolia - Choibalsan Choibalsan is 1 hour, 30 minutes behind Poltalloch.
Mongolia - Hovd Hovd is 2 hours, 30 minutes behind Poltalloch.
Mongolia - Ulaanbaatar Ulaanbaatar is 1 hour, 30 minutes behind Poltalloch.
Montenegro - Podgorica Podgorica is 7 hours, 30 minutes behind Poltalloch.
Montserrat - Brades Brades is 13 hours, 30 minutes behind Poltalloch.
Morocco - Casablanca Casablanca is 8 hours, 30 minutes behind Poltalloch.
Morocco - Rabat Rabat is 8 hours, 30 minutes behind Poltalloch.
Morocco - Tangier Tangier is 8 hours, 30 minutes behind Poltalloch.
Mozambique - Maputo Maputo is 7 hours, 30 minutes behind Poltalloch.
Myanmar - Yangon Yangon is 3 hours behind Poltalloch.
Namibia - Windhoek Windhoek is 7 hours, 30 minutes behind Poltalloch.
Nauru - Yaren Yaren is 2 hours, 30 minutes ahead of Poltalloch.
Nepal - Kathmandu Kathmandu is 3 hours, 45 minutes behind Poltalloch.
Netherlands - Amsterdam Amsterdam is 7 hours, 30 minutes behind Poltalloch.
Netherlands - Rotterdam Rotterdam is 7 hours, 30 minutes behind Poltalloch.
New Caledonia - New Caledonia - Noumea Noumea is 1 hour, 30 minutes ahead of Poltalloch.
New Zealand - Auckland Auckland is 2 hours, 30 minutes ahead of Poltalloch.
New Zealand - Chatham Island Chatham Island is 3 hours, 15 minutes ahead of Poltalloch.
New Zealand - Christchurch Christchurch is 2 hours, 30 minutes ahead of Poltalloch.
New Zealand - Wellington Wellington is 2 hours, 30 minutes ahead of Poltalloch.
Nicaragua - Managua Managua is 15 hours, 30 minutes behind Poltalloch.
Niger - Niamey Niamey is 8 hours, 30 minutes behind Poltalloch.
Nigeria - Abuja Abuja is 8 hours, 30 minutes behind Poltalloch.
Nigeria - Kano Nigeria Kano Nigeria is 8 hours, 30 minutes behind Poltalloch.
Nigeria - Lagos Lagos is 8 hours, 30 minutes behind Poltalloch.
Niue - Alofi Alofi is 20 hours, 30 minutes behind Poltalloch.
Norfolk Island - Kingston Kingston is 2 hours ahead of Poltalloch.
North Korea - Pyongyang Pyongyang is 30 minutes behind Poltalloch.
Norway - Oslo Oslo is 7 hours, 30 minutes behind Poltalloch.
Oman - Muscat Muscat is 5 hours, 30 minutes behind Poltalloch.
Pakistan - Faisalabad Faisalabad is 4 hours, 30 minutes behind Poltalloch.
Pakistan - Islamabad Islamabad is 4 hours, 30 minutes behind Poltalloch.
Pakistan - Karachi Karachi is 4 hours, 30 minutes behind Poltalloch.
Pakistan - Lahore Lahore is 4 hours, 30 minutes behind Poltalloch.
Pakistan - Peshawar Peshawar is 4 hours, 30 minutes behind Poltalloch.
Pakistan - Sialkot Sialkot is 4 hours, 30 minutes behind Poltalloch.
Palau - Koror Koror is 30 minutes behind Poltalloch.
Panama - Panama Panama is 14 hours, 30 minutes behind Poltalloch.
Papua New Guinea - Port Moresby Port Moresby is 30 minutes ahead of Poltalloch.
Paraguay - Asuncion Asuncion is 13 hours, 30 minutes behind Poltalloch.
Peru - Lima - Lima Lima is 14 hours, 30 minutes behind Poltalloch.
Philippines - Cebu City Cebu City is 1 hour, 30 minutes behind Poltalloch.
Philippines - Manila Manila is 1 hour, 30 minutes behind Poltalloch.
Pitcairn Islands - Adamstown Adamstown is 17 hours, 30 minutes behind Poltalloch.
Poland - Gdansk Gdansk is 7 hours, 30 minutes behind Poltalloch.
Poland - Krakow Krakow is 7 hours, 30 minutes behind Poltalloch.
Poland - Lodz Lodz is 7 hours, 30 minutes behind Poltalloch.
Poland - Poznan Poznan is 7 hours, 30 minutes behind Poltalloch.
Poland - Szczecin Szczecin is 7 hours, 30 minutes behind Poltalloch.
Poland - Warsaw Warsaw is 7 hours, 30 minutes behind Poltalloch.
Poland - Wroclaw Wroclaw is 7 hours, 30 minutes behind Poltalloch.
Portugal - Azores Azores is 9 hours, 30 minutes behind Poltalloch.
Portugal - Lisbon Lisbon is 8 hours, 30 minutes behind Poltalloch.
Portugal - Porto Porto is 8 hours, 30 minutes behind Poltalloch.
Portugal - Madeira - Funchal Funchal is 8 hours, 30 minutes behind Poltalloch.
Puerto Rico - San Juan San Juan is 13 hours, 30 minutes behind Poltalloch.
Qatar - Doha Doha is 6 hours, 30 minutes behind Poltalloch.
Reunion (French) - Saint-Denis Saint-Denis is 5 hours, 30 minutes behind Poltalloch.
Romania - Bucharest Bucharest is 6 hours, 30 minutes behind Poltalloch.
Russia - Anadyr Anadyr is 2 hours, 30 minutes ahead of Poltalloch.
Russia - Chelyabinsk Chelyabinsk is 4 hours, 30 minutes behind Poltalloch.
Russia - Kaliningrad Kaliningrad is 7 hours, 30 minutes behind Poltalloch.
Russia - Kazan Kazan is 6 hours, 30 minutes behind Poltalloch.
Russia - Krasnoyarsk Krasnoyarsk is 2 hours, 30 minutes behind Poltalloch.
Russia - Moscow Moscow is 6 hours, 30 minutes behind Poltalloch.
Russia - Murmansk Murmansk is 6 hours, 30 minutes behind Poltalloch.
Russia - Novgorod Novgorod is 6 hours, 30 minutes behind Poltalloch.
Russia - Novosibirsk Novosibirsk is 2 hours, 30 minutes behind Poltalloch.
Russia - Omsk Omsk is 3 hours, 30 minutes behind Poltalloch.
Russia - Perm Perm is 4 hours, 30 minutes behind Poltalloch.
Russia - Petropavlovsk-Kamchatsky Petropavlovsk-Kamchatsky is 2 hours, 30 minutes ahead of Poltalloch.
Russia - Saint-Petersburg Saint-Petersburg is 6 hours, 30 minutes behind Poltalloch.
Russia - Samara Samara is 5 hours, 30 minutes behind Poltalloch.
Russia - Sochi Sochi is 6 hours, 30 minutes behind Poltalloch.
Russia - Ufa Ufa is 4 hours, 30 minutes behind Poltalloch.
Russia - Vladivostok Vladivostok is 30 minutes ahead of Poltalloch.
Russia - Yekaterinburg Yekaterinburg is 4 hours, 30 minutes behind Poltalloch.
Russia - Yuzhno-Sakhalinsk Yuzhno-Sakhalinsk is 1 hour, 30 minutes ahead of Poltalloch.
Rwanda - Kigali Kigali is 7 hours, 30 minutes behind Poltalloch.
Saint Kitts and Nevis - Basseterre Basseterre is 13 hours, 30 minutes behind Poltalloch.
Saint Lucia - Castries Castries is 13 hours, 30 minutes behind Poltalloch.
Saint Vincent Grenadines - Kingstown Kingstown is 13 hours, 30 minutes behind Poltalloch.
Samoa - Apia Apia is 3 hours, 30 minutes ahead of Poltalloch.
San Marino - San Marino San Marino is 7 hours, 30 minutes behind Poltalloch.
Sao Tome and Principe - Sao Tome Sao Tome is 9 hours, 30 minutes behind Poltalloch.
Saudi Arabia - Jeddah Jeddah is 6 hours, 30 minutes behind Poltalloch.
Saudi Arabia - Mecca Mecca is 6 hours, 30 minutes behind Poltalloch.
Saudi Arabia - Riyadh Riyadh is 6 hours, 30 minutes behind Poltalloch.
Senegal - Dakar Dakar is 9 hours, 30 minutes behind Poltalloch.
Serbia - Belgrade Belgrade is 7 hours, 30 minutes behind Poltalloch.
Seychelles - Victoria (Seychelles) Victoria (Seychelles) is 5 hours, 30 minutes behind Poltalloch.
Sierra Leone - Freetown Freetown is 9 hours, 30 minutes behind Poltalloch.
Singapore - Singapore Singapore is 1 hour, 30 minutes behind Poltalloch.
Slovakia - Bratislava Bratislava is 7 hours, 30 minutes behind Poltalloch.
Slovenia - Ljubljana Ljubljana is 7 hours, 30 minutes behind Poltalloch.
Solomon Islands - Honiara Honiara is 1 hour, 30 minutes ahead of Poltalloch.
Somalia - Mogadishu Mogadishu is 6 hours, 30 minutes behind Poltalloch.
South Africa - Cape Town Cape Town is 7 hours, 30 minutes behind Poltalloch.
South Africa - Durban Durban is 7 hours, 30 minutes behind Poltalloch.
South Africa - Johannesburg Johannesburg is 7 hours, 30 minutes behind Poltalloch.
South Africa - Port Elizabeth Port Elizabeth is 7 hours, 30 minutes behind Poltalloch.
South Africa - Pretoria Pretoria is 7 hours, 30 minutes behind Poltalloch.
South Korea - Busan Busan is 30 minutes behind Poltalloch.
South Korea - Incheon Incheon is 30 minutes behind Poltalloch.
South Korea - Seoul Seoul is 30 minutes behind Poltalloch.
South Korea - Taegu Taegu is 30 minutes behind Poltalloch.
South Sudan - Juba Juba is 6 hours, 30 minutes behind Poltalloch.
Spain - Cordoba Cordoba is 7 hours, 30 minutes behind Poltalloch.
Spain - La Coruna La Coruna is 7 hours, 30 minutes behind Poltalloch.
Spain - Madrid Madrid is 7 hours, 30 minutes behind Poltalloch.
Spain - Barcelona - Barcelona Barcelona is 7 hours, 30 minutes behind Poltalloch.
Spain - Canary Islands - Las Palmas Las Palmas is 8 hours, 30 minutes behind Poltalloch.
Spain - Majorca - Palma Palma is 7 hours, 30 minutes behind Poltalloch.
Sri Lanka - Colombo Colombo is 4 hours behind Poltalloch.
Sudan - Khartoum Khartoum is 7 hours, 30 minutes behind Poltalloch.
Suriname - Paramaribo Paramaribo is 12 hours, 30 minutes behind Poltalloch.
eSwatini - Mbabane Mbabane is 7 hours, 30 minutes behind Poltalloch.
Sweden - Stockholm Stockholm is 7 hours, 30 minutes behind Poltalloch.
Switzerland - Basel Basel is 7 hours, 30 minutes behind Poltalloch.
Switzerland - Bern Bern is 7 hours, 30 minutes behind Poltalloch.
Switzerland - Geneva Geneva is 7 hours, 30 minutes behind Poltalloch.
Switzerland - Lausanne Lausanne is 7 hours, 30 minutes behind Poltalloch.
Switzerland - Zurich Zurich is 7 hours, 30 minutes behind Poltalloch.
Syria - Damascus Damascus is 6 hours, 30 minutes behind Poltalloch.
Taiwan - Kaohsiung Kaohsiung is 1 hour, 30 minutes behind Poltalloch.
Taiwan - Taipei Taipei is 1 hour, 30 minutes behind Poltalloch.
Tajikistan - Dushanbe Dushanbe is 4 hours, 30 minutes behind Poltalloch.
Tanzania - Dar es Salaam Dar es Salaam is 6 hours, 30 minutes behind Poltalloch.
Tanzania - Dodoma Dodoma is 6 hours, 30 minutes behind Poltalloch.
Thailand - Bangkok Bangkok is 2 hours, 30 minutes behind Poltalloch.
Thailand - Khon Kaen Khon Kaen is 2 hours, 30 minutes behind Poltalloch.
Timor Leste - Dili Dili is 30 minutes behind Poltalloch.
Togo - Lome Lome is 9 hours, 30 minutes behind Poltalloch.
Tokelau - Tokelau - Fakaofo Fakaofo is 4 hours, 30 minutes ahead of Poltalloch.
Tonga - Nukualofa Nukualofa is 3 hours, 30 minutes ahead of Poltalloch.
Trinidad and Tobago - Port of Spain Port of Spain is 13 hours, 30 minutes behind Poltalloch.
Tunisia - Tunis Tunis is 8 hours, 30 minutes behind Poltalloch.
Turkey - Ankara Ankara is 6 hours, 30 minutes behind Poltalloch.
Turkey - Istanbul Istanbul is 6 hours, 30 minutes behind Poltalloch.
Turkey - Izmir Izmir is 6 hours, 30 minutes behind Poltalloch.
Turkmenistan - Ashgabat Ashgabat is 4 hours, 30 minutes behind Poltalloch.
Tuvalu - Funafuti Funafuti is 2 hours, 30 minutes ahead of Poltalloch.
UAE - Abu Dhabi - Abu Dhabi Abu Dhabi is 5 hours, 30 minutes behind Poltalloch.
UAE - Dubai - Dubai Dubai is 5 hours, 30 minutes behind Poltalloch.
Uganda - Kampala Kampala is 6 hours, 30 minutes behind Poltalloch.
UK - England - Birmingham (UK) Birmingham (UK) is 8 hours, 30 minutes behind Poltalloch.
UK - England - Liverpool Liverpool is 8 hours, 30 minutes behind Poltalloch.
UK - England - London London is 8 hours, 30 minutes behind Poltalloch.
UK - England - Southampton Southampton is 8 hours, 30 minutes behind Poltalloch.
UK - Northern Ireland - Belfast Belfast is 8 hours, 30 minutes behind Poltalloch.
UK - Scotland - Edinburgh Edinburgh is 8 hours, 30 minutes behind Poltalloch.
UK - Scotland - Glasgow Glasgow is 8 hours, 30 minutes behind Poltalloch.
UK - Wales - Cardiff Cardiff is 8 hours, 30 minutes behind Poltalloch.
Ukraine - Kiev Kiev is 6 hours, 30 minutes behind Poltalloch.
Ukraine - Odesa Odesa is 6 hours, 30 minutes behind Poltalloch.
Uruguay - Montevideo Montevideo is 12 hours, 30 minutes behind Poltalloch.
USA - Alabama - Birmingham (US) Birmingham (US) is 14 hours, 30 minutes behind Poltalloch.
USA - Alabama - Mobile Mobile is 14 hours, 30 minutes behind Poltalloch.
USA - Alabama - Montgomery Montgomery is 14 hours, 30 minutes behind Poltalloch.
USA - Alaska - Adak Adak is 18 hours, 30 minutes behind Poltalloch.
USA - Alaska - Anchorage Anchorage is 17 hours, 30 minutes behind Poltalloch.
USA - Alaska - Fairbanks Fairbanks is 17 hours, 30 minutes behind Poltalloch.
USA - Alaska - Juneau Juneau is 17 hours, 30 minutes behind Poltalloch.
USA - Alaska - Nome Nome is 17 hours, 30 minutes behind Poltalloch.
USA - Alaska - Unalaska Unalaska is 17 hours, 30 minutes behind Poltalloch.
USA - Arizona - Mesa Mesa is 16 hours, 30 minutes behind Poltalloch.
USA - Arizona - Phoenix Phoenix is 16 hours, 30 minutes behind Poltalloch.
USA - Arizona - Tucson Tucson is 16 hours, 30 minutes behind Poltalloch.
USA - Arkansas - Little Rock Little Rock is 14 hours, 30 minutes behind Poltalloch.
USA - California - Anaheim Anaheim is 16 hours, 30 minutes behind Poltalloch.
USA - California - Fresno Fresno is 16 hours, 30 minutes behind Poltalloch.
USA - California - Long Beach Long Beach is 16 hours, 30 minutes behind Poltalloch.
USA - California - Los Angeles Los Angeles is 16 hours, 30 minutes behind Poltalloch.
USA - California - Oakland Oakland is 16 hours, 30 minutes behind Poltalloch.
USA - California - Riverside Riverside is 16 hours, 30 minutes behind Poltalloch.
USA - California - Sacramento Sacramento is 16 hours, 30 minutes behind Poltalloch.
USA - California - San Bernardino San Bernardino is 16 hours, 30 minutes behind Poltalloch.
USA - California - San Diego San Diego is 16 hours, 30 minutes behind Poltalloch.
USA - California - San Francisco San Francisco is 16 hours, 30 minutes behind Poltalloch.
USA - California - San Jose San Jose is 16 hours, 30 minutes behind Poltalloch.
USA - California - Stockton Stockton is 16 hours, 30 minutes behind Poltalloch.
USA - Colorado - Aurora Aurora is 15 hours, 30 minutes behind Poltalloch.
USA - Colorado - Denver Denver is 15 hours, 30 minutes behind Poltalloch.
USA - Connecticut - Hartford Hartford is 13 hours, 30 minutes behind Poltalloch.
USA - Delaware - Dover Dover is 13 hours, 30 minutes behind Poltalloch.
USA - District of Columbia - Washington DC Washington DC is 13 hours, 30 minutes behind Poltalloch.
USA - Florida - Jacksonville Jacksonville is 13 hours, 30 minutes behind Poltalloch.
USA - Florida - Miami Miami is 13 hours, 30 minutes behind Poltalloch.
USA - Florida - Orlando Orlando is 13 hours, 30 minutes behind Poltalloch.
USA - Florida - Pensacola Pensacola is 14 hours, 30 minutes behind Poltalloch.
USA - Florida - St. Petersburg St. Petersburg is 13 hours, 30 minutes behind Poltalloch.
USA - Florida - Tampa Tampa is 13 hours, 30 minutes behind Poltalloch.
USA - Georgia - Atlanta Atlanta is 13 hours, 30 minutes behind Poltalloch.
USA - Hawaii - Honolulu Honolulu is 19 hours, 30 minutes behind Poltalloch.
USA - Idaho - Boise Boise is 15 hours, 30 minutes behind Poltalloch.
USA - Illinois - Chicago Chicago is 14 hours, 30 minutes behind Poltalloch.
USA - Indiana - Indianapolis Indianapolis is 13 hours, 30 minutes behind Poltalloch.
USA - Iowa - Des Moines Des Moines is 14 hours, 30 minutes behind Poltalloch.
USA - Kansas - Topeka Topeka is 14 hours, 30 minutes behind Poltalloch.
USA - Kansas - Wichita Wichita is 14 hours, 30 minutes behind Poltalloch.
USA - Kentucky - Frankfort Frankfort is 13 hours, 30 minutes behind Poltalloch.
USA - Kentucky - Lexington-Fayette Lexington-Fayette is 13 hours, 30 minutes behind Poltalloch.
USA - Kentucky - Louisville Louisville is 13 hours, 30 minutes behind Poltalloch.
USA - Louisiana - Baton Rouge Baton Rouge is 14 hours, 30 minutes behind Poltalloch.
USA - Louisiana - New Orleans New Orleans is 14 hours, 30 minutes behind Poltalloch.
USA - Maine - Augusta Augusta is 13 hours, 30 minutes behind Poltalloch.
USA - Mariana Islands - Guam Guam is 30 minutes ahead of Poltalloch.
USA - Maryland - Baltimore Baltimore is 13 hours, 30 minutes behind Poltalloch.
USA - Massachusetts - Boston Boston is 13 hours, 30 minutes behind Poltalloch.
USA - Michigan - Detroit Detroit is 13 hours, 30 minutes behind Poltalloch.
USA - Minnesota - Minneapolis Minneapolis is 14 hours, 30 minutes behind Poltalloch.
USA - Minnesota - Saint Paul Saint Paul is 14 hours, 30 minutes behind Poltalloch.
USA - Mississippi - Jackson Jackson is 14 hours, 30 minutes behind Poltalloch.
USA - Missouri - Jefferson City Jefferson City is 14 hours, 30 minutes behind Poltalloch.
USA - Missouri - Kansas City Kansas City is 14 hours, 30 minutes behind Poltalloch.
USA - Missouri - St. Louis St. Louis is 14 hours, 30 minutes behind Poltalloch.
USA - Montana - Billings Billings is 15 hours, 30 minutes behind Poltalloch.
USA - Montana - Helena Helena is 15 hours, 30 minutes behind Poltalloch.
USA - Nebraska - Lincoln Lincoln is 14 hours, 30 minutes behind Poltalloch.
USA - Nevada - Carson City Carson City is 16 hours, 30 minutes behind Poltalloch.
USA - Nevada - Las Vegas Las Vegas is 16 hours, 30 minutes behind Poltalloch.
USA - New Hampshire - Concord Concord is 13 hours, 30 minutes behind Poltalloch.
USA - New Jersey - Jersey City Jersey City is 13 hours, 30 minutes behind Poltalloch.
USA - New Jersey - Newark Newark is 13 hours, 30 minutes behind Poltalloch.
USA - New Jersey - Trenton Trenton is 13 hours, 30 minutes behind Poltalloch.
USA - New Mexico - Albuquerque Albuquerque is 15 hours, 30 minutes behind Poltalloch.
USA - New Mexico - Santa Fe Santa Fe is 15 hours, 30 minutes behind Poltalloch.
USA - New York - Albany Albany is 13 hours, 30 minutes behind Poltalloch.
USA - New York - Buffalo Buffalo is 13 hours, 30 minutes behind Poltalloch.
USA - New York - New York New York is 13 hours, 30 minutes behind Poltalloch.
USA - New York - Rochester Rochester is 13 hours, 30 minutes behind Poltalloch.
USA - North Carolina - Charlotte Charlotte is 13 hours, 30 minutes behind Poltalloch.
USA - North Carolina - Raleigh Raleigh is 13 hours, 30 minutes behind Poltalloch.
USA - North Dakota - Bismarck Bismarck is 14 hours, 30 minutes behind Poltalloch.
USA - Northern Mariana Islands - Saipan Saipan is 30 minutes ahead of Poltalloch.
USA - Ohio - Akron Akron is 13 hours, 30 minutes behind Poltalloch.
USA - Ohio - Cincinnati Cincinnati is 13 hours, 30 minutes behind Poltalloch.
USA - Ohio - Cleveland Cleveland is 13 hours, 30 minutes behind Poltalloch.
USA - Ohio - Columbus Columbus is 13 hours, 30 minutes behind Poltalloch.
USA - Ohio - Toledo Toledo is 13 hours, 30 minutes behind Poltalloch.
USA - Oklahoma - Oklahoma City Oklahoma City is 14 hours, 30 minutes behind Poltalloch.
USA - Oregon - Portland Portland is 16 hours, 30 minutes behind Poltalloch.
USA - Oregon - Salem Salem is 16 hours, 30 minutes behind Poltalloch.
USA - Pennsylvania - Harrisburg Harrisburg is 13 hours, 30 minutes behind Poltalloch.
USA - Pennsylvania - Philadelphia Philadelphia is 13 hours, 30 minutes behind Poltalloch.
USA - Pennsylvania - Pittsburgh Pittsburgh is 13 hours, 30 minutes behind Poltalloch.
USA - Rhode Island - Providence Providence is 13 hours, 30 minutes behind Poltalloch.
USA - South Carolina - Columbia Columbia is 13 hours, 30 minutes behind Poltalloch.
USA - South Dakota - Pierre Pierre is 14 hours, 30 minutes behind Poltalloch.
USA - South Dakota - Sioux Falls Sioux Falls is 14 hours, 30 minutes behind Poltalloch.
USA - Tennessee - Knoxville Knoxville is 13 hours, 30 minutes behind Poltalloch.
USA - Tennessee - Memphis Memphis is 14 hours, 30 minutes behind Poltalloch.
USA - Tennessee - Nashville Nashville is 14 hours, 30 minutes behind Poltalloch.
USA - Texas - Arlington Arlington is 14 hours, 30 minutes behind Poltalloch.
USA - Texas - Austin Austin is 14 hours, 30 minutes behind Poltalloch.
USA - Texas - Dallas Dallas is 14 hours, 30 minutes behind Poltalloch.
USA - Texas - El Paso El Paso is 15 hours, 30 minutes behind Poltalloch.
USA - Texas - Fort Worth Fort Worth is 14 hours, 30 minutes behind Poltalloch.
USA - Texas - Houston Houston is 14 hours, 30 minutes behind Poltalloch.
USA - Texas - San Antonio San Antonio is 14 hours, 30 minutes behind Poltalloch.
USA - Utah - Salt Lake City Salt Lake City is 15 hours, 30 minutes behind Poltalloch.
USA - Vermont - Montpelier Montpelier is 13 hours, 30 minutes behind Poltalloch.
USA - Virginia - Norfolk Norfolk is 13 hours, 30 minutes behind Poltalloch.
USA - Virginia - Richmond Richmond is 13 hours, 30 minutes behind Poltalloch.
USA - Virginia - Virginia Beach Virginia Beach is 13 hours, 30 minutes behind Poltalloch.
USA - Washington - Seattle Seattle is 16 hours, 30 minutes behind Poltalloch.
USA - West Virginia - Charleston Charleston is 13 hours, 30 minutes behind Poltalloch.
USA - Wisconsin - Madison Madison is 14 hours, 30 minutes behind Poltalloch.
USA - Wisconsin - Milwaukee Milwaukee is 14 hours, 30 minutes behind Poltalloch.
USA - Wyoming - Cheyenne Cheyenne is 15 hours, 30 minutes behind Poltalloch.
Uzbekistan - Tashkent Tashkent is 4 hours, 30 minutes behind Poltalloch.
Vanuatu - Port Vila Port Vila is 1 hour, 30 minutes ahead of Poltalloch.
Vatican City State - Vatican City Vatican City is 7 hours, 30 minutes behind Poltalloch.
Venezuela - Caracas Caracas is 13 hours, 30 minutes behind Poltalloch.
Vietnam - Hanoi Hanoi is 2 hours, 30 minutes behind Poltalloch.
Vietnam - Ho Chi Minh Ho Chi Minh is 2 hours, 30 minutes behind Poltalloch.
West Bank - Bethlehem Bethlehem is 6 hours, 30 minutes behind Poltalloch.
Western Sahara - El Aaiun El Aaiun is 8 hours, 30 minutes behind Poltalloch.
Yemen - Aden Aden is 6 hours, 30 minutes behind Poltalloch.
Yemen - Sana Sana is 6 hours, 30 minutes behind Poltalloch.
Zambia - Lusaka Lusaka is 7 hours, 30 minutes behind Poltalloch.
Zimbabwe - Harare Harare is 7 hours, 30 minutes behind Poltalloch. | 2019-04-19T12:15:46Z | https://www.happyzebra.com/timezones-worldclock/currentlocal.php?city=Poltalloch |
How did the Media help Topple Governments during the Arab Spring Revolts?
Home › Essays › How did the Media help Topple Governments during the Arab Spring Revolts?
A series of revolutionary movements characterized the Arab Spring in a unique way. There was unprecedented utilization of conventional and digital media to convey the messages and promote the agenda of the insurgents. This realization deserves consideration from an academic angle to find out the role that media played in toppling governments in Tunisia, Libya, Egypt, and Bahrain, with the struggle still going on in Syria. The focus of the discussion will be on the narrative, the momentum, the ideology, and the unifying motivations that facilitated the use of media in these countries. The Arab Spring was not only unique in the sense of media usage, but in the level of coordination and organization that protesters exhibited during the events. Thus, understanding this from a political point of view will assist in deciding whether the media were neutral or bi-partisan in the revolution.
This is a dissertation on how social media helped topple governments during Arab Spring Revolts. In its first chapter, it introduces the reader to the history of a number of Arab countries that had been affected by the Arab Spring. These include Tunisia, Libya, Egypt, Syria and Bahrain. It is important to acknowledge that the media is referred to as the fourth estate in many countries around the world. This is because the media has a pivotal role in establishing democracy and human rights in countries where political leadership might be lacking. The role of the media has become phenomenal in one of the recent historical occurrences in history: the Arab spring. In this case, political leaders that were in power for decades were toppled through protests and new governments were installed. Studies have shown that the media played a pivotal role in the Arab Spring revolts that saw dictatorial governments in Tunisia, Libya, and Egypt replaced while leaders in countries like Syria and Bahrain continue to face difficulties with civil war still ongoing. Some analysis of over 3, 000,000 tweets, thousands of posts in blogs, and YouTube content shows that indeed social media had a hand in charming out the political debates in the wake of Arab Spring (Howard & Hussain, 2013).
For instance, Howard and Hussain (2013) indicated that intense conversations formed precedence to major political events in these countries. Specifically, social media allowed the public to share inspiring stories that bolstered protests across international borders in most of the affected Arab countries. According to Howard (2011), the project leader in communication at University of Washington, evidences gathered suggests that social media were the primary carrier of cascading messages on freedom and democracy across the Arab world. The commonly used platforms were Facebook, blogs, and Twitter. As such, they had a hand in raising expectations about the possibility of success in the event of a political rising. The paper discusses media’s role in toppling governments during the Arab Spring revolts. In doing so, the paper will look at the role of media as the fourth estate, and how this important position can help facilitate the overthrow other political powers. Equally, it will focus on the media’s effect on important changes in the world. Finally, the paper analyses how media can be neutral in the event of political protests.
The countries that faced revolutions in early 2010 in the Arab region were led by dictators. For many decades, citizens in these countries did not believe that government officials could be toppled since many of them had spent years consolidating power. Thus, they had established networks of security, including loyalty from the military that could thwart any attempt to topple the government. The Tunisia revolution, commonly known as the Jasmine Revolution, was the first popular revolution that toppled a government during the period of the Arab Spring. It formed the basis of other revolution in the North Africa and Middle East, the first since the 1979 revolution in Iran. The Jasmine Revolution was triggered by three significant incidents.
The first was when a Tunisian street vendor was killed. The second incident involved a protester named Mohamed Bouazizi, who set himself on fire to protest the hopelessness and ill treatment from government forces. This act led to the third phase, when demonstrations began in several parts of the country. During this time, the government forces were being called in to thwart the protests by forceful means. This was a brutal security crackdown led by the government that was ostensibly charged with the responsibility of protecting its citizens. The beginning of protests in Tunisia was met with intense brutality characterized with arrests and a shutdown of the Internet. The removal of the source of information angered protesters who demanded that the president be removed from power despite his promise to reshuffle the government and create more new jobs for the unemployed (Howard & Hussain, 2013).
One of the outstanding features of the Jasmine Revolution is that social media played an important role in spreading the information about the overall chain of events that led to the social and political change in Tunisia is concerned. Previously, Tunisia had witnessed two major protests against dictatorial leadership: the January 1984 Bread Revolt under President Habib Bourguiba and the 2008 revolution under president Zine el-Abidine Ben Ali known as Revolt of the Gafsa Mining Basin. The government forces managed to control the protests during the two incidences. However, due to social media technology, the government in Tunisia was not able to control the rapid spread of information during the Arab Spring. The use of digitized information made widespread communication unstoppable. The agitated citizens could receive and pass messages regarding events in real-time. Unlike the use of televisions and radios, which the government could manipulate to suit their agenda, the emergence of social media meant that the government could not control the speed of information communication or prevent it from reaching the public who were accessing real-time information. As such, the 28 days of mass coordination transformed the political scene in Tunisia, bringing about the fall of the 23 year old regime (Karoui, 2012). To back up this information, the researcher conducted a survey based on interview method.
To what degree did social media play a role in the Jasmine Revolution that toppled the 23 year-old government of Zine el-Abidine Ben Ali?
What are the types of media platforms that were used to communicate and share information regarding the events as they were occurring during the revolution?
Did the media play a partisan or neutral role in the wake of the revolution?
Do you believe that media can play any role in the cultivation of democracy?
Did the international reporting of the unfolding events in Tunisia reflect the actual occurrences on the ground?
Do you have any other comment on the role that social media play in promoting democracy in the Arab world?
The analysis of the responses from the head indicated that social media were the driving force behind the continued spread of the revolution across the country. The use of digital platforms presented the protesters with an opportunity not only to speak to fellow citizens, but to share what was happening with the international community. This was important because it elicited sympathy and encouragement abroad. This is what gave the protesters an impetus to continue pushing for regime change in the country. The government security network notwithstanding, the protesters were able to overpower the government forces through coordinated communication and facilitation. This ensured that the protesters could meet in the right place at the right time, forcing the president to flee the country (Tripp, 2013).
Before the coming of the digital media, led by the social media like Facebook, most of communication occurred through television and radio (Sharp, 2010). The government heavily censored these modes so that people could only access information that painted the government in a positive light. The digital media and the use of the Internet ensured that people receive real-time information, including information that would have otherwise been censored by the government. Among the most popular and widely used modes included Facebook, blogs, Youtube, and Twitter. These platforms allowed accession of internal channels. These information sources were not censored in any manner, and for the first time the general populace could be exposed to the atrocities and aggravation of human rights inside the Tunisia (Bradley, 2012).
An interesting thing about the revolution in Tunisia, unlike many other revolutions that followed, was that media had not witnessed a revolution of this kind before. As it occurred, social media users were enthusiastic about the events, garnering the attention of the international community. However, this might have given a false impression to the protesters. For example, they may have thought that everyone was in support of the protests. The international media channels took it upon themselves to report every detail of the revolution. It fueled the discontentment in Tunisia and elsewhere in the Arab world. Previously, the international media could not access information as easily or report first-hand. However, with the social media, international media broadcasters recruited reporters who could give them information regarding the happenings on the ground and publish the same. The publicized information was then shared with people across the world. According to the head of communication, the media played a bi-partisan role, but to the wellbeing of the nation. Indeed, Tunisia, Libya, Egypt, Bahrain, Syria, and Saudi Arabia are countries where freedom was a privilege afforded only to well-connected elites; it was not accessible to the common citizens (Sharp, 2010).
The ability to spread information from the local scene to the international level meant that the demands and values of people in Tunisia could be shared among other like-minded people around the world. This sharing occurred through blogs, where information was accessible anywhere around the world. One notable observation about the revolution in Tunisia is that most of the people who shared information had used Facebook as their primary point of contact with each other. Cyber activism in Tunisia and elsewhere in North Africa and the Middle East began upon the spread of the Mohamed Bouazizi self-immolation videos. The spread of videos that depicted the police brutality in response to the protests laid the foundation for protests in other countries. However, it was common knowledge among the bloggers that dictatorial governments were wary of the spread of information through the Internet and, as a result, cases of blog censorship were rampant in Middle East and North Africa.
From the researcher’s point of view, the historical characteristics of countries that experienced the Arab Spring were similar in many aspects. The first is that these countries were governed by repressive regimes that had been in power for over two decades or longer. In all of them, there was a public feeling that something needed to change in the leadership of the country. This leads to chapter two.
In this second chapter, the researcher will present a detailed analysis of the political problems facing the identified countries. As the basis of the chapter, it is important to note that the upholding of democracy depends on many factors within a country. One of these factors is freedom of speech. For many years, the countries that experienced uprisings had suppressed freedom of speech while claiming to be upholding democratic values. When this claim was tested through simple demands, as in Bahrain, the leadership felt threatened and unleashed brutal force on the protesters. In some cases, entirely peaceful protesters were shot at, aggravating the anger against the government and leading to calls for their overthrow. Indeed, democracy can be upheld where people are free to express their views. It also requires people to be free to petition their government to change the policies guiding employment and security. The media as the fourth estate have the responsibility to keep the government in check. It does this while also ensuring that it is adhering to the democratic values and upholding international human rights as envisaged in the UN charter on human rights. As such, it is difficult for the media in areas where it has always been suppressed to act neutrally in the event that the people protest to demand rights from the government. During the revolution in Tunisia, the media played an important role to bring about the downfall of the dictatorial regime (Tripp, 2013).
The international community only reported information as it was gathered through social media. Though this contained credible information that reflected the actual events in Tunisia, it also opened up the possibility of exaggerated reports. However, according to Kassim (2012), the international media did not help the government to bring down the protests, it encouraged local journalists to write blogs and report the event through social media. It was somehow a reaction to the long-time suppression of the freedom of speech. In fact, the international media felt that they now had access to information that the government had held in secret for a long time. In Egypt where the protesters were well coordinated, international media outlets such as Al Jazeera and BBC News held live coverage of the event. This played a role in giving legitimacy to the demands of protesters in the international community. Indeed people from around the world were able to see government forces attacking and shooting protesters who were not armed. The use of live coverage and live photos and videos on an online platform meant that the protesters had legitimate grounds to protest against the government. On the other hand, the government did not have a platform to present their views to the international community because it had previously not allowed them to report from their countries (Krayewski, 2013).
The fumbling of President Hosni Mubarak to address the concerns of protesters marked the epitome of the protracted decline of the dictatorial efficacy in Egypt. The government lacked the power to provide basic services to the Egyptians as unemployment became rampant in the country, thus alienating millions of people in the middle class. Moreover, the business elite in the country continued to enjoy conspicuous consumption while the military intervened in the protests. It clearly indicated the government’s avoidance of addressing the challenges that people were facing in favor of retaining the status quo (Ghonim, 2012).
The protesters’ tactical and political complexity came about not because Mubarak was unwilling to address the issues on the table, but because there was a vibrant, unrelenting media in the country. Besides the common challenges of inequality and corruption in the public sector, the Egyptian protesters were riding on the wave of freedom of expression through the media. For a long time, the Egyptian publics’ freedom of expression had been suppressed by the government. The advent of social media meant that the public was now able to gain unfiltered access to information that had previously been censored in the mainstream media. When the Egyptian police killed a famous blogger named Khaled Said, it ignited the campaigners to honor him through the protests. Protesters in Egypt were relatively prepared to have serious engagement with the army chiefs on the future composition of the government. This was amid fears that irrespective of the protest outcome, the military would not agree to erode its institutional prerogatives substantially (Bradley, 2012).
While the protests in Cairo and Tunisia removed dictators from power, the situation in Libya was different because it had degenerated into a civil war. The former Libyan strongman, Muammar Gaddafi, had four decades of experience consolidating power and patronage amongst his loyal circle, making it virtually impossible for protests to dislodge him from power. The four decades were characterized by artificial inducement of scarcity of everything including basic medical care and consumer goods. This generated entrenched corruption in the country while the capricious cruelty of the presidency had fermented into a deep-seated and widespread suspicion. To this end, the coming of the new media through social platforms meant that Libyans were free to demonstrate their discontentment with the government albeit to a larger audience. Unlike in Egypt and Tunisia, Libya did not have any political alliances or strategic economic association. The country also lacked nation organizations that could be used to coordinate protesting efforts. To this end, the protests that were experienced in the country began in the media before spreading to the public as nonviolent protests similar to the ones staged in Egypt and Tunisia. In the end, a call was made for an all-out secession as Libya had become labeled in the media as a failed state. In fact, it was through the media that many Libyan protesters came to learn about failed states and the way protests similar to theirs had brought down dictatorial regimes in Egypt and Tunisia.
Notably, Libya had operated for four decades in a political system that incorporated traces of Italian fascism characterized by brutality, dogmatism, and extravagance. Among other things, Gaddafi prohibited private ownership and retail trade. The free press was not allowed, and military leadership and civil service were subverted. In the absence of public sector bureaucracy such as a reliable police force, the government was at liberty to determine who provided security and safety. The same was the case with the provision on essential public services. From the analysis of the three cases, it was evident that the absence of governmental and social cohesion would definitely affect the prospect of a smooth transition to democracy. The government of Libya had the responsibility of introducing law and order that had been missing for decades (Manhire, 2012).
In Syria, the protests began on the 26th of January 2011 and escalated into the civil war that continues to this day. The events that lead to the Syrian civil war was inspired by the Arab uprising in Tunisia. The residents of the town of Dara’a started the protests over the torture of a student accused of putting up anti-government graffiti. Soon, this unrest had reached other parts of the country, with protesters demanding land reforms and the ouster of President Al-Bashar. They also demanded that the government allow for a multi-party political system. The protesters also called for equal rights for Kurds. There were also calls for political freedoms including free press, the right to assembly, and speech. The government of Syria had previously made some concessions through trivial protests (Saikal & Acharya, 2013).
In addition, the government was also forced to repeal a fifty year-old emergency law that allowed it to suspend constitutional rights. Again, the government launched a series of crackdowns using tanks in restive cities as security forces used bullets on demonstrators. The security forces also used snipers to coerce people from the streets while essential and basic commodities like electricity and water were shut off. The prices of basic goods escalated, especially in areas that proved restive. Soon the protest disintegrated into ethnic divisions as the country’s elite took over influential military positions. The dissidents established the Syrian National Council to include a representative of the Damascus Declaration group that advocated for democracy (Saikal & Acharya, 2013). At the same time, there was a reactivation of the Syrian Muslim Brotherhood, a previously banned political outfit, the emergence of different Kurdish factions, the Local Coordination Committee, and several other groups that documented the unfolding events in Syria. The emergence of these groups meant that the media were taking its position in the determination of the political underpinning in a country that had perpetually suppressed the media for many years.
The Bahrain protest initially started as a call for greater political freedom and respect of the rights of people. Unlike in many other countries where the uprising had been witnessed, the Bahrain protests were not intended to threaten the monarchy. This is because the prevailing frustration of the majority Shiite was the major cause of the protests. Bahrain protesters were peaceful until the police raided the protest on the third day to clear them from the Pearl Roundabout, resulting in the deaths of four protesters in the process. As a result, the protesters increased the items on their demand list to include the end to monarchy (Manhire, 2012).
The government response to the protest was brutal. There was a systematic crackdown on bloggers and anybody else who tried to provide information that portrayed the Bahraini incidents in a negative light. The midnight house arrests heralded a campaign of intimidation. The Bahrain Independent Commission Inquiry indicated that the government tortured prisoners and committed heinous human rights violations. The government had previously claimed that the protests in Bahrain had been instigated by external forces, including Iran. International human rights groups were also denied an opportunity to investigate the events in the country, fuelling the speculation that the Bahrain authority did not appreciate the need to disseminate factual information to the people (Kassim, 2012).
It is thus evidenced that countries that experienced the Arab Spring had developed a political system that rewarded political elites and allies. Most of the people felt that the system favored only those who were well connected. Therefore, removing dictators from power through information became a major strategy. It is evidenced that dictatorship can make it very expensive for a government to lead its citizens. However, the aftermath dictatorship can be avoided if the leadership appropriately reacts in time to listen to the voices of the masses. In many cases, what fuels political unrest is the ignoring of public opinion by the incumbent leaders. This takes us to the third chapter of this dissertation.
This is chapter three of the dissertation. This chapter will focus on the effect of social media on the Arab Spring; how the effect of the use of media in politics helped bring down governments. In light of the Tunisian events and those in Tunisia, Egypt, Syria, and Bahrain, researchers have focused on the role of social media in establishing democratic leadership and collective activism. The Western world has marveled at the role of social media in controlling and determining the way political events have taken place in repressive regimes. Similarly, the role of social media in particular and digital technologies in general allows people in the affected countries to act collectively in activism. This has enabled some of these countries overcome the challenge of state-controlled media. According to a study done by Krayewski (2013), 90 percent of Tunisians and Egyptians used Facebook as their primary means to organize and spread awareness about the protests in different parts of their countries. 29 percent of Tunisians and 28 percent of Egyptians agreed that blocking the social media disrupted and hindered communication during the protests (Krayewski, 2013).
Critics have debated the influence of social media on political activism during the Arab revolutions, with some arguing that the digital technologies with platforms for cellular phones, videos, blogs, text messages, and photos formed the concept of digital democracy. Still other critics have noted that in order to comprehend the context in which high unemployment among the youth and corrupt regimes contributed to Arab Spring, it is essential to analyze the characteristics of individual media platforms in each country. In revolutions that initially started on the Internet, the authorities were able to quash them. In response, in Egypt, a popular activist group advised its supporters not to use Twitter or Facebook to pass revolutionary information. Moreover, evidence suggests that the social media played an essential role in the uprising noting that the use of such platforms increased tremendously in Middle East and North Africa in the time leading up to the uprisings (Manhire, 2012).
Bradley (2012) established that apart from the fact that these revolutions came at a time when social media were just picking up, another fact comes into play. This is the ability of protesters to use participatory systems and collective intelligence. Another factor was the dynamic nature of the crowds to spur up the power in political protests to support a common action. This has the effect of fomenting the call and demand for political change even as veteran regime leaders like Hosni Mubarak bowed to the pressure and gave up their seats. The Dubai School of Government analyzed collected data graphically and found an increase in the use of Internet before the revolution (Manhire, 2012).
The Dubai School of Government, reported by Lynch (2013), noted that the only deviation in the trend was recorded in Libya. It is hypothesized that due to a long period of terror, many Libyans were unwilling to take on a course that was seen as risky. Having been forced to run away from their own country, many took their social platforms with them. The increase in how people use social media reveals the characteristics of people that led the uprising during the Arab Spring. Since many young people are tech-savvy, it was evident that most protesters were younger people. The new generation had the ability to network and to organize the uprising not only in their countries but also across the world. Manhire (2012) observed that in mid 2011, the number of Facebook users in North Africa and Middle East had more than tripled. This shows that a constant growth in the number of people who connect with each other through social media was unstoppable. Communicating with people in real-time became a weapon of the protesters as different platforms helped people to access information (Lynch, 2013).
Among traditional mainstream media, television was identified as playing a crucial role in Egyptian revolution in 2011. The coverage by Al Jazeera and regular live coverage from BBC News gave great exposure to the actual occurrences on the ground. They also assisted in the prevention of mass violence, especially during the encounter with the government forces at the Tahrir Square (Howard & Hussain, 2013). Commentators agree that live coverage prevented mass violence and its spread to other countries. One aspect of the Egyptian Revolution was that protesters remained in one area and allowed live coverage. To them, this was a fundamental step towards showing the world that they were organized in their calls for revolution. This phenomenon was not replicated in Bahrain, Libya, or Tunisia, where the governments had implemented strict rules to control international media outlets.
Additionally, the use of media focused on the type of information that the protesters wanted to pass to the international community. Such media as video and digital images were extensively used to disseminate information in this respect (Howard & Hussain, 2013). In fact, the real-time aspect was exploited to the extent that there were images that indicated the current events especially in the countries that were experiencing the uprising. In a way, the media were used as a coordinating tool amongst protesters that were agitating for political change in Middle East and North Africa. The media provided a place where people who believed that they were struggling for the public good could share the progress, the steps they were taking, and the response of their oppressors. The widespread visual media not only showed the singular moments but also highlighted the history of the Arab countries and depictions of the calls for change. However, social media emerged as the ideal platform of rebel groups that could not be reached by mainstream media that allowed them to compare their situation with that ongoing elsewhere. However, there has been no consensus in this debate. Scholars hold different positions as to whether social media were a primary catalyst of the Arab Revolution or a worthy supportive tool to the larger, unstoppable agenda (Lynch, 2013).
The difference between a revolution and insurgency lies in the perception that people attach to the event. In the Middle East and the entire Arab world, people had conceptualized their movements as revolution. Thus, filling the media with the events that were happening on the ground became everyone’s idea. In countries like Libya and Syria, where the dictatorial leaderships did not envisage the freedom of speech, digital media was not amongst their priority areas. This made it possible for the public to make their voices accessible via the Internet (Choudhary., Hendrix., Leed., Palsetia & Liao, 2012). Through the media, the revolutionaries showed the world that the regimes were inhumane and oppressive. While the Syrian regime attempted to control the conventional media and use press conferences to communicate with the international community, the revolutionaries used social media like YouTube and Facebook to give live footage of the conflict. This impacted the regime negatively because the information propagated through press conferences contradicted the real story that was being shared on the social media. As Axford (2011) observed, the spin of pictures that were given to the outside world through amateur clips using mobile phones displayed innocent people who were gunned down by the police. This clearly demonstrated that spirit of the government as upholding law and order was false.
The media thus explored amateur videos to show the world the brutality that government forces were using to try and contain the revolution. The process through which the media collected and processed information, commonly known as Intelligence Preparation of the Battlefield, became easy. This allowed for the mapping of the composition of the threat and disposition of the government forces. This normally intensive and time-consuming process certainly became easy for protesters and revolutionaries because they utilized amateur videos that people shot using their mobile phones. As such, Tufekci (2011) argues that YouTube is one of the most explosive social media to have played a cardinal role in the Arab Spring. Because of the media’s ability to convey motion pictures, protesters in the Arab world were able to show the international community not only what they felt but also what was truly happening in their countries. In most cases, the governments’ reactionary measures to disable Internet networks in their countries only aided the protests. This is the puzzle that social media presented to the regimes in Tunisia and Libya and which played a significant role in bringing them down. Using the media, the power of information reached a height that the regime anticipated because the people were able to access and use immediate information.
The compiled Tweets from the 2011 Egypt revolution were examined to seek an understanding about the trend and the reason as to why certain topics attracted much attention from the people using media. Part of the reason was also to establish the effect of the information on the country. Research by Choudhary., et al (2012) noted that on the whole, much discussion on social media contained strongly negative sentiments on the revolution in relation to other topics on Twitter. During that period, topics on human interest only accounted for 15% of the Tweets while the revolution covered 65%. Analysis of these messages revealed that the Egyptians were very unhappy with the leadership and had a desire for updates on the progress of the revolution. However, the analysis also showed that people were still open to the general human stories during the protests. Overall, the analysis showed that 95% of the Tweets were about negative comments directed at the government, personal hardship, and the political and economic circumstances in that country (Khamis & Vaughn, 2011).
With statistics indicating that over 5 million Egyptians used Facebook during the revolution, the power of social media to spread information among the general population cannot be underestimated. Online sites such as “We Are All Khaled Said” aided the youth movements to organize and facilitate the delivery of messages in a central place. These messages could reach other people quickly, allowing them to participate in the organized events by the revolutionaries (Khamis & Vaughn, 2011). An example is the 18-day occupation at the Tahir Square that was organized through the page. Hall (2012) noted that the use of social media in Egypt rose from 400,000 to 5 million during the six-month period of the revolution.
In Egypt, the social media played a big role during the first revolution that ousted Mubarak from power. Subsequent protests attracted additional social media users because most of the people had embraced digital media. Hall (2012) further notes that the power of information can never be compared to any weapon. This is based on the fact that information that detailing actual events in the revolution means that political changes can occur. In Egypt and Syria, government brutality that was directed to the revolutionaries and the general population helped to legitimize their course even among the pro-government citizens that initially did not support the revolution. The fact that social media were used to convey this message to the people that were non-partisan and sometimes supportive of the government shows that media impacted, albeit negatively, the governments during the revolution. In most of these countries, the masses were deprived of information. Thus, social media exploited this avenue to highlight to the people what their governments were actually capable of doing. Social media made it difficult for governments to claim innocence and commitment to democracy and respect for human rights as some of the leaders were alleging.
Do you think the media was wrongly accused of spreading propaganda during the revolution to oust President Hosni Mubarak?
What do you see as the constructive role that the media played in the revolution?
Did the media have any negative impact on the revolution?
How could you rate the credibility and authenticity of information that media were disseminating to the public and the international community during the revolution?
What do you believe should be role of media in upholding democracy and human rights in countries where these principles are violated?
Was the reaction of the government towards protesters who used social media founded on principles and values of the Egyptian people?
Was the revolution in Egypt instigated through social media or was it because of the impulsiveness of the Arab Spring elsewhere in the Arab world?
In response to the above interview questions, it became evident that propaganda was a tool that was passed during the revolution in Egypt. The same held true other countries like Bahrain and Libya. A large part of the propaganda was headed by government agencies to discourage the revolution by painting the protestors in a negative light. Nonetheless, with the utilization of social media, it was difficult for the propaganda to have the desired effects. This is unlike what could have happened if only conventional media had been available. This is because, as Murphy & White (2013) note, the historical aspect of information as power was initially confined to the nation states. However, with the coming of micro-blogging and digital media, it has become easier to counteract any propaganda whether it is coming from the government side or from the side of revolutionaries. Thus, the impact that people communicating through social media had on the revolution cannot be overlooked. This is because the media had a great impact on the protests. Furthermore, the use of audio and videos served the purpose of inciting the people against the government whenever false information emerged that there was stability in the country. The use of media during the Egypt revolution did not entail much venture in terms of capital. There was also uncoordinated regulation of the media, allowing people to communicate without the usual burden of bureaucratic rules (Khamis & Vaughn, 2011).
From this study, it is evident that media, and especially conventional media, was always an effective tool by dictators in the past. This is why, for many years, people were denied the ability to get the true story as governments would suppress it. However, the study revealed that it is difficult for these Arab governments to control the digital media and satellite TV. Furthermore social media provided a platform on which the citizens were able to receive and share information regarding their countries’ leadership and the protestors. Though the process may have been initiated by other forces, the access to unfiltered information posted on social media platforms is what fueled the uprisings in the traditionally conservative Arab nations. This takes the reader to chapter four of this dissertation.
Chapter four will look at the various ways in which media can show bias as was observed during the Arab Spring. Largely, the media played a positive role during the revolution especially in relation to unity of purpose. However, at some point, both the government and protesters used the media to spread propaganda and exaggerate events. When the revolution started, people did not have a clear picture regarding the issues that protesters were demanding. The government controlled traditional forms of media and was quick to label the protesters as rebels who were out to overthrow the government. To a large extent, the government of Syria was successful at this (Khamis & Vaughn, 2011). This is the reason why Al-Bashar, unlike his counterparts in Tunisia, Egypt, and Libya, remains in power today. The case was different in Egypt as protesters went to social sites to posts their demands. Because of the availability of social media, people were able to get immediate information about the demands of protesters. Sometimes Facebook pages dedicated to the protests were used for discussions and debates. This helped to coordinate and organize the revolution in a manner that the government forces found difficult to handle.
At some point, the media became the only trusted source of information. An interesting factor in the use of media during the revolution in Egypt was the element of trust. As much as people posted messages anonymously, those who got these messages were inclined to trust the source. This was evident in the way the 18-day occupation of the Tahir Square was organized so that so many people turned up to support this occupation (Howard, 2011).
The media had little negative impact on the revolution. However, one of the identifiable negative impacts that it did have was in the difficulty of estimating the level of support that revolutionaries had towards the course. An example is where some dedicated sites and pages are opened to support a given ideal. Whenever people are called to participate in a particular course, they may not turn up as expected. A few people among the so called followers might be willing to take any action towards the cause (Khamis & Vaughn, 2011). This was the case in Egypt, Libya, Bahrain, Syria and Tunisia. So many groups of supporters came signed in to various social media platforms in the Internet but did not take any actions towards aiding the revolution.
Similarly, using modern technology for revolutions could affect it in a negative way, especially where government spies masquerade as supporters. In such cases, the leaders of the revolution could be vulnerable to government penetration through false support. However, the positive impacts that social media had on the revolution far outweigh the negatives ones. The media were responsible for weaponizing the information down to the personal level. Whether this information ends up either as truth or propaganda always depends on the intention of the recipient (Howard, 2011).
According to Giglio (2011), the media cannot replace the physical actions that are necessary for a successful ouster of dictatorial regimes. This is because the war of movement reaches a stage where social institutions must develop decisive changes, sometimes resorting to violence. As Giglio (2011) observes during the revolution in Bahrain, the impact that media played should not be exaggerated. This is because the beleaguered regimes normally hold on the instruments of power including security forces and the truncheons.
As such, the present regime remains in control if coordination of the revolutionary is not there. The media can only speed up the rate of information access and whatever is done with information is dependent on the organizers of the revolutionaries. In the case of Egypt, it was easier to verify the information that was coming through the media. Many people turned to social media so that posting false information or messages could easily pass as such. In many Arab countries where there was an uprising, the media held minimal utility during the time of transition. For example, the Muslim Brotherhood, who later came to power after the ouster of Mubarak government, did not fancy the idea of using the media to communicate their agendas. As a result, the new government eventually ran into problems for failing to craft a message with the public. Among the mistakes made with the new regime were their attempts to use the same channels to come up with constitutional processes and form a strong political party with new ideologies (Khamis & Vaughn, 2011).
The speedy ouster of the Muslim Brotherhood from power is an indication that even new governments can be affected by social media. This illustrates the kind challenges that media can present to new governments. Digital media presents a weak phenomenon where it is difficult to build strong ties between people through the media. This contrasts the strong ties exhibited in personal political relationships. The presence of weak ties as a result of digital media hampered the activism in Libya and Syria. However, this was not the case in Bahrain and Tunisia where protesters were more cohesive in their approach to political demands. Nevertheless, the prospect of weak ties in the revolutions that occurred during the Arab spring necessitated the participation of many people. However, it was not on the ideological grounds but on personal connections that resulted in the success of some of the revolutions. The media facilitated the feeling of being personally connected to what was happening inside the country and elsewhere, giving people a sense of hope. Facebook activism achieved great success not because people in the Arab world were motivated to make sacrifices, but do things that they would do instead of personal sacrifice (Giglio, 2011).
This aspect of risk-taking in using social media and other modern platforms of communication counteracts the glare for greater achievements. For instance, in Syria the government focused their efforts on combating people who were using social media to communicate as the revolution became more intense (Giglio, 2011). The political aspect of the problems that faced many countries in the Arab world bordered on the failure of the regimes to grant freedom of speech and uphold inalienable human rights. A good example is in Libya where the people were not poor in terms of resources. The government provided everything that people needed from healthcare services to education. However, there was a general suppression of the freedom of speech and brutality to the opposition. Thus, when an opportunity to protest against the regime arose, people did not consider the social services that were offered in their country. By accessing the unfolding events in Tunisia and Egypt, the protesters had a sense that emancipation was within their reach if they embraced the available channels to communicate (Castells, 2011).
The height of involvement of social media users differed in each of the country that experienced the revolution. While the igniting spark in Tunisia was based on the failure by the government to address the economic problems in the country, in Libya it was based on the sense of hopelessness on the part of the people. Consequently, there was a dissimilarity in the way people in different countries perceived the use of social media as a tool to influence the course of their revolution. In countries like Saudi Arabia, where there was no revolution, governments had already put into place mechanisms to control the use of social media with respect to what was happening in other Arab countries (DeFronzo, 1996). The sense of participating in the revolution using social media also hindered the success of the revolution in Syria and Bahrain. This is because so many people who expressed support the revolutionaries from behind a computer screen did not come out to physically support them when they took on the streets. This contrasts the occurrences in Tunisia and Egypt, where the support was spontaneous. Everyone viewed those events as the moment they were waiting for (Castells, 2011).
In many cases, the reactionary nature of government forces undermined the effort of the government to present its leadership style as people-oriented. For instance, in Bahrain where the demonstration was solely about the economic challenges that the country was facing, the government reacted with a full force. As a result, the demonstration turned into a protest aimed explicitly at the ouster of the country’s monarch (Beaumont, 2011). The way the government in Libya and Tunisia reacted to the protests showed that they did not envisage a situation where people would have an outlet to express and mass distribute their opinions on matters of their country. The media only conveyed (albeit in a strong way) the occurrences on the ground. The governments were expected to know better about the rights of the people in a universal manner so that upholding of values and principles was not depended on the reports in the media (DeFronzo, 1996).
The media indeed played a neutral role in the whole struggle as the information that reached the people was a representation of the actual occurrences in the country. As observed in Beaumont (2011), any attempt to alter the information and messages could imply the bi-partisan nature of the media. However, the use of live coverage on television and amateur videos made it difficult for the media to show biases. In most cases, the international media relied on the images and amateur videos that protesters sent to them, making it very hard for them to manipulate the story, particularly since the information that was sent to particular media platforms were relayed in real-time. Because the governments where the Arab Spring occurred had oppressed their people for such long time, the bloggers and other reporters felt that their countries lacked media ethics to censor some of the brutal pictures from the Internet. Thus, one may argue that the bloggers and amateur photographers should have censored some of the pictures. Still, this was simply a reflection of the countries’ values and principles where showing, for example, the corpses of victims were not a sign of bi-partisanship.
To what degree did social media play any in the revolution in Bahrain?
How did the youth use social media to influence the course of events?
Did the media impact positively or negatively to the revolution?
How did the government respond to the use of social media in your country during the revolution?
Did the users of media become leaders of the revolution in Bahrain?
In what ways did the youths used the media during the revolution in Bahrain?
From the responses on the above questions, it became evident that more people turned to the media to access information during the revolution in Bahrain. During this period, images of youth taking to the streets with mobile phones in their hands denoted the popularity of social media to influence the course of the revolution. However, it was not clear on the number of people who used different media to access information in Bahrain. The White Canvas Group analyzed several statistics on the use of different media during the revolutions witnessed in the Middle East (Khamis & Vaughn, 2011).
Unlike in other countries where the use of satellite TV was high, in Libya participation in social media like Twitter decreased during the time of revolution. In Syria where the revolution is ongoing, use of social media has decimated an indication that the government has increased its patronage on the accessibility of information from the Internet. More than 70% of Egyptians have access to satellite TV. This means that television channels such as BBC and Al Jazeera acted as sources information on the state of revolution (Bamyeh, 2011).
One of the difficulties that social media usage faced during the revolution in Bahrain was the dynamic and anonymous nature of the internal heading and leadership of the social movement. According to Metz (2012), the first stages of the insurgency during the Arab Spring involved great internal struggles as well as external ones. Thus, the participation of many people in trying to organize a social movement presented a challenge concerning who was to control the movement. For instance, in Egypt, more than 100,000 people were involved in organizing the match to Tahir Square. Therefore, social media is presented with the challenge in the sense that it was difficult to figure out the overarching theme of the movement (Choudhary., et al., 2012).
There was also the issue of developing a united list of core demands from various stakeholders so that when the occupation started, people would be able to coordinate. There was also the desire to have a clear focus on the most important issues that were to be accomplished immediately so as not to muddle the purpose of the revolution. The media, both conventional and digital played a role to ensure that the revolution was successful. In countries where Internet access is limited by the authority, the users of the satellite TV and other digital media naturally turned into the leaders of the revolution. According to Bamyeh (2011), this presented the theory of dissident elites who, through the use of different media platforms, became the leaders of the revolution by default.
Even though this created a sense of disorganization in the initial stages of the revolution, Allam (2011) argued that it nonetheless generated the mass movements that are the direct opposite of focused movements. This limited the gains that revolutionary activities could have had because it provided the government forces with fewer options to respond. The result was a brutal response that left many innocent protesters as well as the police dead. As Allam (2011) noted, the governments of Egypt, Libya, Bahrain, and Tunisia had a great opportunity to settle the protest through concessions without retaliating on the protesters. In fact, this approach could act to the benefit of the regime since it would help the regimes gain legitimacy in the eyes of its citizens. However, regimes did not make any attempt to capitalize on the popularity of the media to push their agenda. Instead, they retaliated against the protesters, brutal acts that were broadcast in social media platforms. The net result was a further polarization of the standoff between the revolutionaries and the government (Alterman, 2011).
The ability to share an immense amount of accurate and uncensored information through social media contributed to the experience of activism in the Arab Spring. Throughout the event in the different countries, the protesters not only gained the power to influence and control but also helped the populace to know about the movements that were working towards the emancipation of their country (Choudhary., et al, 2012). Thus, many people had access to the plight of tortured people who could not have otherwise had a platform to pass their messages. In countries like Tunisia and Egypt, the emerging action plans, like occupational protests, attracted thousands of people. According to one Arab Spring activist, social media were used to organize the protests. To be specific, Twitter was used to coordinate the activities while sites like YouTube were used to communicate to the outside world. The use of digital media allowed for the distribution of public messages in an unprecedented manner. This was important in anchoring the demand for democracy through social movements that guided the ouster of oppressive regimes (Axford, 2011).
Moreover, social media in Libya and Tunisia assisted to dismantle the obstacle of fear by allowing many people to connect and share messages. This gave many people in the Arab world the confidence to know that they were being supported elsewhere and that so many other people in other countries were also facing the problems of oppressive regimes (The Wilson Quarterly, 2011). That brutality, injustice, and economic hardships were characteristic of oppressive regimes. They served the role of making revolutionaries and activists persist in their efforts. The use of media gave activists and revolutionaries an opportunity to disseminate messages quickly while circumventing the regulations from the government. It is notable that while digital media did not cause the Arab Spring, it certainly facilitated the communication process that assisted the activists in the long run (Gaworecki, 2011).
According to Khaled Koubaa, the leader of the Internet Society in Tunisia, of the 2000 people who registered as Twitter users, no more than 200 were active users before the revolution had begun. Social media served a crucial role in guiding the protests. For example, while many other people had immolated in protest before scenes of Mohamed Bouazizi’s act sparked a broader movement against the government, their acts did not spark the revolution because mass circulation and accessibility to such events were not previously possible (The Wilson Quarterly, 2011). While emphasizing the role of social media, Tufeckci (2011) observed that the Tunis protests had earlier been crushed in 2008 with no significant backlash. Part of the reason that allowed the crushing of the protest was that only a few people were using social media in Tunisia at that time. Thus, there was insignificant penetration of the new media. However, things had changed rapidly by 2010 when the penetration grew significantly (Allam, 2011).
The revolution in Tunisia quickly spread to Egypt unexpectedly. In both cases, the center trigger was digital media (Hall, 2012). The Western media christened such revolutions as Jasmine Revolution partly because there was no major violence in the two countries. However, this changed when it spread to Libya, where insurgency was met with the full brute force of the government security services. Indeed, consensus from the researchers shows that the media played a crucial role in promoting and advancing the call for the ouster of oppressive regimes in the Arab world. The governments’ attempt to control the media served the purpose of making the channel more relevant to the course of the insurgency that before.
According to Abaza (2011), the issue of the function of digital media in the Arab Spring is likely to overtake that of conventional media like television, which were important in all the revolutionary activities, but also had the effect of benefiting the government. Conventional channels such as Al Jazeera, Al Hiwar, France 24, and BBC News collected messages from the Internet and used them to organize groups to retransmit free messages on the cell phones. As such, there emerged a new system of mass communication that synthesizes the interaction between Internet, radio, mobile, and interactive television (Fuchs, 2012).
In general, the role that media played during the Arab Spring can largely be said to be non-neutral to the extent that it allowed people to access accurate and timely information. However, in an ideal situation, the media is just to play a neutral role. The case in the Arab Spring was different because people used the media to communicate with others without the possibility of censoring themselves.
In conclusion, it cannot be doubted that the Arab Spring brought a new dimension to revolutionary movements. This was the first protest movement to utilize the power of social media to achieve its goals. Previous movements required phased development to achieve their goals. As such, the media provided greater opportunities for protesters in the Arab world to achieve their goals quickly. The media used in the Arab Spring played a role in facilitating the mobilization and utilization of information as weapons. To this end, the use of amateur videos uploaded on the YouTube and live coverage of protesters and government brutality were the most valuable source of information during the events. The neutrality of the media in disseminating information bordered on the need to provide credible information. The countries that were affected by the revolution have the history of suppressing the freedom of speech. As such, when digital media came into place it was apparent that people could now have access to information and any attempt to censor information could not have succeeded.
From the above investigation, it is apparent that media can play an important role in instituting democracy and human rights. However, the role that social media play is not dependent on the issues that are at stake. As the fourth estate, the media has the responsibility to inform the society of the actual events on the ground in an objective manner. The use of new forms of media such as social media and micro-blogging facilitated the organization and execution of revolutionary activities during the Arab Spring. In Tunisia, where the revolution first started in the Arab world, the use of social media enabled people to access information that was previously censored. The resolve of the people to use the media also made it difficult for the government to deploy its machineries to stop accessing and using information from the internet. In Libya, the revolution began because people learnt through the media about what was happening in other parts of the world. Previously the use of conventional media was heavily regulated with government censoring and deciding what gets to the people. However, the new platforms in social media and micro-blogging sites enabled people to circumvent restrictions and regulation from the government to access the shared information with the outside world. Moreover, the various social media platforms enabled people to share the information in real-time.
In Egypt, media broadcasted live coverage of the event in Tahir Square propounding the legitimacy of protesters in the country. The use of social media also aided revolutionaries to plan and organize events that were dedicated to protesting against the government. The reactionary response of the government forces against protesters in Bahrain caused an increase in the demands that had been made by the demonstrators. People learnt about the overnight attack by the government through social media and started to demand that the monarch relinquish power. The attempt by government police to run over the protesters at Pearl Roundabout also was broadcasted in the media through amateur videos. It impacted on the government’s image in the international community helped revolutionaries attract sympathy from the international supporters for their cause. In Syria, the government managed to control social media and other conventional media channels forcing revolutionaries to turn into rebels. However, the use of social media managed to present the Syrian government as brutal to the outside world. | 2019-04-22T11:58:56Z | https://thesisleader.com/essays/role-of-media-in-arab-spring/ |
We offer an online communication platform for Providers and their patients to connect via the Site through the use of synchronous and asynchronous telecommunications technologies. The Site facilitates communication between patients and Providers.
BetterNight does not provide medical advice or care. BetterNight contracts with Better Night Provider Group, an independent, physician-owned medical group with a network of United States based Providers who provide clinical telehealth services. Better Night Provider Group Providers deliver clinical services via the BetterNight platform to their patients. Providers are independently contracted or employed by Better Night Provider Group. Providers are not contracted or employed by BetterNight. The Providers, and not BetterNight, are responsible for the quality and appropriateness of the care they render to you.
The Providers are independent of BetterNight and are merely using the Site as a way to communicate with you. Any information or advice received from a Provider comes from them alone, and not from BetterNight. Your interactions with the providers via the Site are not intended to take the place of your relationship with your regular health care practitioners or primary care physician. Neither BetterNight, nor any of its subsidiaries or affiliates or any third party who may promote the Site or Service or provide a link to the Service, shall be liable for any professional advice obtained from a Provider via the Site or Service, nor any information obtained on the Site. BetterNight does not recommend or endorse any specific Providers, tests, physicians, medications, products, or procedures. You acknowledge that your reliance on any Providers or information delivered by the Providers via the Site or Service is solely at your own risk and you assume full responsibility for all risks associated herewith.
BetterNight does not make any representations or warranties about the training or skill of any Providers who deliver services via the Site or Service. You will be provided with available Providers based solely on the information you submit to the Site. You are ultimately responsible for choosing your particular Provider.
The content of the Site and the Services, including without limitation, text, copy, audio, video, photographs, illustrations, graphics and other visuals, is for informational purposes only and does not constitute professional medical advice, diagnosis, treatment, or recommendations of any kind by BetterNight. You should always seek the advice of your qualified health care professionals with any questions or concerns you may have regarding your individual needs and any medical conditions. All information provided by BetterNight, or in connection with any communications supported by BetterNight is intended to be for general information purposes only, and is in no way intended to create a provider-patient relationship as defined by state or federal law. While BetterNight facilitates your selection of, and communications with, Providers, BetterNight does not provide medical services, and the doctor-patient relationship is between you and the Better Night Provider Group Provider you select.
BetterNight’s Site and Services are not for medical emergencies or urgent situations. You should not disregard or delay to seek medical advice based on anything that appears or does not appear on the Site. If you believe you have an emergency, call 9-1-1 immediately.
You should seek emergency help or follow up care when recommended by a Provider or when otherwise needed. You should continue to consult with your primary provider and other healthcare professionals as recommended. Always seek the advice of a physician or other qualified healthcare provider concerning questions you have regarding a medical condition and before stopping, starting, or modifying any treatment or modification.
By using the Services, you acknowledge the potential risks associated with telehealth services. These include but are not limited to the following: information transmitted may not be sufficient (e.g. poor resolution of images) to allow for appropriate medical or health care decision making by the Provider; delays in evaluation or treatment could occur due to failures of electronic equipment; a lack of access to your medical records may result in adverse drug interactions or allergic reactions or other judgment errors; although the electronic systems we use incorporate network and software security protocols to protect the privacy and security of health information, those protocols could fail causing a breach of privacy of your health information.
Neither BetterNight nor Better Night Provider Group endorse any specific medication, pharmacy, or pharmacologic product. If a Provider prescribes a medication, he/she will limit supply based upon state regulations and will only prescribe a medication as determined in his/her own discretion and professional judgment. There is no guarantee a prescription will be written. Providers do not prescribe DEA controlled substances or scheduled medications, or certain other drugs which may be harmful because of their potential for abuse. Providers reserve the right to deny care for actual or potential misuse of the Services.
You agree that any prescriptions that you acquire from a Provider will be solely for your personal use. You agree to fully and carefully read all provided product information and labels and to contact a physician or pharmacist if you have any questions regarding the prescription. BetterNight and Better Night Provider Group fully honor patient freedom of choice and, if you receive a prescription for a medication, you always have the option to instruct Better Night Provider Group to transmit that prescription to the pharmacy of your choice.
Neither BetterNight nor Better Night Provider Group are insurers. The Services are not insurance products, and the amounts you pay to BetterNight or Better Night Provider Group are not insurance premiums. If you desire any type of health or other insurance, you will need to purchase such insurance separately.
BetterNight and Better Night Provider Group operate subject to state and federal regulations, and the Services may not be available in your state. You represent that you are not a person barred from enrolling for and/or receiving the Services under the laws of the United States or other applicable jurisdictions in which you may be located. Access to and use of the Site and/or the Services is limited exclusively to users located in States within the United States where the Services are available. Services are not available to users located outside the United States. Accessing the Site or Services from jurisdictions where content is illegal, or where we do not offer Services, is prohibited.
Your placement of an order does not necessarily ensure that we will accept your order. We may require additional information regarding your order if you have not provided all the information required by us to completed. Once a properly completed order and authorization of your form of payment is received, we will process your order and Product for shipment. If, for some reason, we determined that we cannot ship your Product(s) within thirty (30) days following our receipt of a properly completed order, we will cancel your order and advise you of such action. We do not accept orders from dealers, wholesalers or other customers who intend to resell items offered on our Site.
In the event a Product or Service is listed at an incorrect price due to typographical error or error in pricing information received from a third party, we shall have the right to refuse or cancel any orders placed for the Product(s) and/or Service(s) listed at the incorrect price. We shall have the right to refuse or cancel any such orders whether or not the order has been confirmed and your credit or debit card charged. If your credit or debit card has already been charged for the purchase and your order is canceled, we will promptly issue a credit to your credit or debit card account in the amount of the charge.
All Products purchased from our Site are delivered to shipment carriers. The risk of loss and title for such Products pass to you when they are delivered to the carrier.
You may return durable medical equipment products in accordance with our Returns Policy. Most unopened items sold by BetterNight Provider Group in new condition and returned within 90 days will receive a refund or exchange. Some items sold by BetterNight Provider Group have a modified return policy noted on the receipt or packing slip. Items that are opened or damaged or do not have a receipt may be denied a refund or exchange.
Every PAP device sold carries a 2-year manufacturer’s warranty. BetterNight will honor all warranties under applicable law. In addition, an owner’s manual with warranty information will be provided for all durable medical equipment where this manual is available.
In order to access the Site and the Services, you represent and warrant that you are older than 18 years old. You agree to fully, accurately, and truthfully create your BetterNight Account (“Account”), including but not limited to your name, mailing address, phone number, email address, and password, which become your BetterNight ID and credentials. The BetterNight ID and/or credentials are personal to you, and you are solely responsible for maintaining the confidentiality of your Sleep Data ID and/or credentials, and for all activities that occur under such BetterNight ID and/or credentials. You agree to prohibit anyone else from using your BetterNight ID and/or credentials and agree to immediately notify BetterNight of any actual or suspected unauthorized use of your BetterNight ID and/or credentials or other security concerns of which you become aware. Your access to the Site may be revoked by BetterNight at any time with or without cause.
You may not use any scraper, crawler, spider, robot or other automated means of any kind to access or copy data on the Site, deep-link to any feature or content on the Site, bypass our robot exclusion headers or other measures we may use to prevent or restrict access to the Site. Violations of system or network security may result in civil or criminal liability. BetterNight will investigate occurrences that may involve such violations and may involve, and cooperate with, law enforcement authorities in prosecuting users who are involved in such violations. You agree not to use any device, software or routine to interfere or attempt to interfere with the proper working of this Site or any activity being conducted on this Site.
When you use the Site or Services, or send e-mails, messages, and other communications from your desktop or mobile device to us, you are communicating with us electronically. You consent to receive communications from us electronically. You agree that (a) all agreements and consents can be signed electronically and (b) all notices, disclosures, and other communications that we provide to you electronically satisfy any legal requirement that such notices and other communications be in writing. BetterNight and Better Night Provider Group may contact you by telephone, mail, or email to verify your account information. BetterNight and Better Night Provider Group may request further information from you and you agree to provide such further information to ensure that you have not fraudulently created your Account. If you do not provide this information in the manner requested within 14 days of the request, we reserve the right to suspend, discontinue, or deny your access to and use of the Site and the Services until you provide the information to us as requested.
By providing your mobile number, you are agreeing to be contacted by or on behalf of BetterNight and Better Night Provider Group at the mobile number you have provided, including calls and text messages, to receive informational, Product or Service related (e.g., progress tracking, refill reminders, checkup reminders, etc.) and marketing communications relating to the Site and Services. Message and data rates may apply. To stop receiving text messages text the work STOP. We may confirm your opt out by text message. If you subscribe to multiple types of text messages from us, we may unsubscribe you from the service that most recently sent you a message and/or respond to your STOP message by texting you a request to identify services you wish to stop. Keep in mind that if you stop receiving text messages from us you may not receive important and helpful information and reminders about your progress and treatment.
All pages within this Site and any material made available for download are the property of BetterNight, or its licensors or suppliers, as applicable. The Site is protected by United States and international copyright and trademark laws.
The Site and Services are only for users of the age of 18. If you are under the age of 18, please do not attempt to register with us at this Site or provide any personal information about yourself to us. If we learn that we have collected personal information from someone under the age of 18, we will promptly delete that information. If you believe we have collected personal information from someone under the age of 18, please call us at (866) 801-9440.
Although BetterNight attempts to ensure the integrity and accurateness of the Site and Product descriptions, it makes no representations, warranties or guarantees whatsoever as to the correctness or accuracy of the Site, Product descriptions and other content on the Site. It is possible that the Site could include typographical errors, inaccuracies or other errors, and that unauthorized additions, deletions and alterations could be made to the Site by third parties. In the event that an inaccuracy arises, please inform BetterNight so that it can be corrected. If a Product described on our Site is not as described when you receive it, or the packaging on the Site does not match the product to receive, your sole remedy is to return it to us in unused and undamaged condition. Information contained on the Site may be changed or updated without notice. Additionally, BetterNight shall have no responsibility or liability for information or content posted to the Site from any non-BetterNight affiliated third party.
BetterNight and Better Night Provider Group each reserves complete and sole discretion with respect to the operation of the Site and the Services. We may withdraw, suspend, or discontinue any functionality or feature of the Site or the Services among other things. We are not responsible for transmission errors, corruption, or compromise of information carried over local or interchange telecommunications carrier. We are not responsible for maintaining information arising from use of the Site or with respect to the Services. We reserve the right to maintain, delete, or destroy all communications or information posted or uploaded to the Site or the Services in accordance with our internal record retention and/or destruction policies.
BetterNight makes no representations whatsoever about any other website that you may access through this Site. When you access a non-BetterNight site, please understand that it is independent from BetterNight, and that BetterNight has no control over the content on that website. In addition, a link to a non-BetterNight website does not mean that BetterNight endorses or accepts any responsibility for the content, or the use, of the linked site. It is up to you to take precautions to ensure that whatever you select for your use or download is free of such items as viruses, worms, Trojan horses, and other items of a destructive nature. If you decide to access any of the third party sites linked to this Site, you do this entirely at your own risk.
If you submit, upload, post or transmit any health information, medical history, conditions, problems, symptoms, personal information, consent forms, agreements, requests, comments, ideas, suggestions, information, files, videos, images or other materials to us or our Site (“User Information”), you agree not to provide any User Information that (1) is false, inaccurate, defamatory, abusive, libelous, unlawful, obscene, threatening, harassing, fraudulent, pornographic, or harmful, or that could encourage criminal or unethical behavior, (2) violates or infringes the privacy, copyright, trademark, trade dress, trade secrets or intellectual property rights of any person or entity, or (3) contains or transmits a virus or any other harmful component. You agree not to contact other site users through unsolicited e-mail, telephone calls, mailings or any other method of communication. You represent and warrant to BetterNight and Better Night Provider Group that you have the legal right and authorization to provide all User Information to BetterNight and Better Night Provider Group for use as set forth herein and required by BetterNight and the Better Night Provider Group Provider.
You agree not to (i) access the Site or use the Services in any unlawful way or for any unlawful purpose; (ii) post or transmit (a) a message under a false name, or (b) any data, materials, content, or information (including, without limitation, advice, and recommendations) (collectively “Information”) which is (1) libelous, defamatory, obscene, fraudulent, false, or contrary to the ownership or intellectual property rights of any other person, or (2) contains or promotes any virus, worm, Trojan horse, time bomb, malware, or other computer programing or code that is designed or intended to damage, destroy, intercept, download, interfere, manipulate, or otherwise interrupt or expropriate the Site or the Services, personal information, software, equipment, servers, or Information or facilitate or promote hacking or similar conduct; (iii) impersonate or misrepresent your identity or falsely state or misrepresent your affiliation with a person or entity; (iv) tamper, hack, spoof, copy, modify, or otherwise corrupt the administration, security, or proper function of the Site or the Services; (v) use robots or scripts with the Site; (vi) attempt to reverse engine, reverse assemble, reverse compile, decompile, disassemble, translate, or otherwise alter, defraud, or create false results from any executable code, information on, or received by this Site; (vii) to have any antivirus or antispyware software running that is set to override the internet browser’s cookies setting; (viii) incorrectly identify the sender of any message transmitted to BetterNight. You may not alter the attribution or origin of electronic mail, messages, or posting; (ix) harvest or collect Protected Health Information about any other individual who uses the Site or the Services; (x) infringe or facilitate infringement on any copyright, patent, trademark, trade secret, or other proprietary, publicity, or privacy rights of any party, including such rights of third parties.
You agree to defend, indemnify and hold harmless BetterNight, Better Night Provider Group, and the Providers from and against all third party claims, damages and expenses (including reasonable attorneys’ fees) against or incurred by us arising out of any User Information you upload to or transmit through the Site.
BetterNight respects the intellectual property rights of others and expects its users to do the same. In accordance with the Digital Millennium Copyright Act (“DMCA”), we will respond promptly to notices of alleged infringement that are reported to BetterNight’s Designated Copyright Agent, identified below.
With the exception of your electronic medical record, BetterNight and Better Night Provider Group, as applicable, retain all right, title, and interest in and to the Site, the Services and any information, products, documentation, software, or other materials on the Site, and any patent, copyright, trade secret, trademark, service mark, or other intellectual property, or proprietary right in any of the foregoing, except for information on the Site licensed by BetterNight or Better Night Provider Group (in that case, the license provider retains all right, title, and interest therein). The information available through the Site and the Services is the property of BetterNight or Better Night Provider Group, as applicable. You agree not to store, copy, modify, reproduce, retransmit, distribute, disseminate, rent, lease, loan, sell, publish, broadcast, display, or circulate such information to anyone. Use, reproduction, copying, or redistribution of BetterNight or Better Night Provider Group trademarks, service marks, and logos are strictly prohibited without the prior written permission of BetterNight or Better Night Provider Group, as applicable. The immediately foregoing sentence also applies to any third party trademarks, service marks, and logos posted on the Site. Nothing contained on the Site should be construed as granting, by implication, estoppel, waiver or otherwise, any license or right to use any trademarks, service marks or logos displayed on the Site without the written grant thereof by BetterNight, Better Night Provider Group or the third party owner of such trademarks, service marks, and/or logos. The Site may contain other proprietary notices and copyright information, the terms of which you agree to follow.
BetterNight may delete any information provided by you that it deems in its sole discretion fraudulent, abusive, defamatory, obscene, or in violation of copyright, trademark, or other intellectual property or ownership right of any other person or entity.
Betternight does not warrant that access to or use of the site will be uninterrupted or error-free or that defects in the site will be corrected. This site, including any content or information contained within it or any site-related service, is provided “as is,” with all faults, with no representations or warranties of any kind, either expressed or implied, including, but not limited to, the implied warranties of merchantability, fitness for a particular purpose, quality of information, quiet enjoyment, and title/non-infringement. Betternight does not warrant the accuracy, completeness or timeliness of the information obtained through the site.
You assume total responsibility and risk for your use of this site, site-related services, and linked websites. Betternight does not warrant that files available for download will be free of viruses, worms, trojan horses or other destructive programming. You are responsible for implementing procedures sufficient to satisfy your needs for data back up and security.
Warranties relating to products or services offered, sold and distributed by Betternight are subject to separate warranty terms and conditions, if any, provided by Betternight or third parties with or in connection with the applicable products or services.
BetterNight shall not be liable for the acts or omissions of better night provider group or the providers. BetterNight and any third parties mentioned on this site are neither responsible nor liable for any direct, indirect, incidental, consequential, special, exemplary, punitive, or other damages whatsoever (including, without limitation, those resulting from lost profits, lost data, or business interruption) arising out of or relating in any way to the site, site-related services, content or information contained within the site, and/or any linked website, whether based on warranty, contract, tort, or any other legal theory and whether or not advised of the possibility of such damages. Your sole remedy for dissatisfaction with the site, site-related services, and/or linked websites is to stop using the site and/or those services. To the extent any aspects of the foregoing limitations of liability are not enforceable, the maximum liability of BetterNight to you with respect to your use of this site is $500 (five hundred dollars). You hereby agree to waive, to the fullest extent permitted by law, all laws that limit the efficacy of such indemnifications or releases.
To be a healthcare provider using the Site (“Provider” or “you”) you must be a licensed physician, nurse practitioner, or healthcare professional contracted or employed by Better Night Provider Group, and must agree to comply with all laws, medical board rules and other rules and regulations applicable to you as a Provider or otherwise. Your relationship with the BetterNight users (including your Better Night Provider Group patients) is directly between you and the patient. The patient will never have a physician-patient relationship with BetterNight. BetterNight does not practice medicine and offers no medical services. As set forth more fully below, Provider is solely responsible for all agreements, consents, notices and other interactions with patients and other consumers. Without limiting the generality of the foregoing, Provider and Better Night Provider Group is solely responsible for all billings and collections from patients and other consumers, and BetterNight shall have no liability whatsoever to Provider with respect to any amounts owed by any patient or other consumer to Provider.
BetterNight does not provide any medical advice, legal advice, or representations in any way regarding any legal or medical issues associated with Provider, goods or services offered by Provider, including but not limited any compliance obligations or steps necessary to comply with any state or federal laws and regulations. Provider should seek legal counsel regarding any legal and compliance issues, and should not rely on any materials or content associated with the Services in determining Provider’s compliance obligations under law. Provider and BetterNight agree that BetterNight is not providing, to Customer or anyone else, medical advice or legal advice.
Provider will use the Site and Services only in accordance with applicable standards of good medical practice. While software products such as the Site and Services can facilitate and improve the quality of service that Provider can offer patients, many factors, including the provider/patient relationship can affect a patient outcome, and with intricate and interdependent technologies and complex decision-making it is often difficult or impossible to accurately determine what the factors were and in what proportion they affected an outcome. Provider shall be solely responsible for its use of the Site and Services, and the provision of medical services to Provider’s patients. In this regard, Provider releases BetterNight and waives any and all potential claims against BetterNight as a result of Provider’s use of the Site and Services, and the provision of services to Provider’s patients.
As a result of the complexities and uncertainties inherent in the patient care process, Provider agrees to defend, indemnify and hold BetterNight harmless from any claim by or on behalf of any patient of Provider, or by or on behalf of any other third party or person claiming damage by virtue of a familial or financial relationship with such a patient, which is brought against BetterNight, regardless of the cause if such claim arises for any reason whatsoever, out of Provider’s use or operation of the Site and Services. To the extent applicable, Provider will obtain BetterNight’s prior written consent to any settlement or judgment in which Provider agrees to any finding of fault of BetterNight or defect in the Site or Services. BetterNight will promptly notify Provider in writing of any claim subject to this indemnification, promptly provide Provider with the information reasonably required for the defense of the same, and grant to Provider exclusive control over its defense and settlement.
If you submit, upload, transmit, or post any consents, notices, advice, recommendations, comments, files, videos, images or other materials to us or our Site (“Provider Content”) or provide any Provider Content to patients or other consumers, you agree not to provide any Provider Content that (1) is defamatory, abusive, libelous, unlawful, obscene, threatening, harassing, fraudulent, pornographic, or harmful, or that could encourage criminal or unethical behavior, (2) violates or infringes the privacy, copyright, trademark, trade dress, trade secrets or intellectual property rights of any person or entity, or (3) contains or transmits a virus or any other harmful component. Provider is solely responsible for obtaining all necessary agreements and consents from, and providing all required notices to, patients and other consumers. You agree not to contact other users through unsolicited e-mail, telephone calls, mailings or any other method of communication. You represent and warrant to BetterNight that you have the legal right and authorization to upload all Provider Content at the Site. BetterNight shall have a royalty-free, irrevocable, transferable right and license to use the Provider Content however BetterNight desires, including without limitation, to copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell and/or distribute such Provider Content and/or incorporate such Provider Content into any form, medium or technology throughout the world. BetterNight is and shall be under no obligation (1) to maintain any Provider Content in confidence; (2) to pay to you any compensation for any Provider Content; or (3) to respond to any Provider Content.
BetterNight does not regularly review Provider Content, but does reserve the right (but not the obligation) to monitor and edit or remove any Provider Content submitted to the Site. You grant BetterNight the right to use the name that you submit in connection with any Provider Content. You agree not to use a false email address, impersonate any person or entity, or otherwise mislead as to the origin of any Provider Content. You are and shall remain solely responsible for the content of any Provider Content you post to the Site or provide to patients or other consumers. BetterNight and its affiliates take no responsibility and assume no liability for any Provider Content submitted by you or any third party.
YOU AND COMPANY AGREE THAT EACH MAY BRING CLAIMS AGAINST THE OTHER ONLY IN YOUR OR ITS INDIVIDUAL CAPACITY, AND NOT AS A PLAINTIFF OR CLASS MEMBER IN ANY PURPORTED CLASS OR REPRESENTATIVE PROCEEDING. Further, unless both you and BetterNight agree otherwise, the arbitrator may not consolidate more than one person’s claims with your claims, and may not otherwise preside over any form of a representative or class proceeding. The arbitrator may award declaratory or injunctive relief only in favor of the individual party seeking relief and only to the extent necessary to provide relief warranted by that party’s individual claim.
Copyright ©2018 Better Night Services All rights reserved. All trademarks, logos and service marks (“Marks”) displayed on the Site are our property or the property of other third parties. You are not permitted to use these Marks without our prior written consent or the consent of such third party which may own the Marks. | 2019-04-25T11:49:54Z | https://www.sleepdata.com/mobile |
Most notably, the US will most likely (soon) be adding the Muslim Brotherhood, a root terror organization that Obama, by the way, adored, to the official list of known terrorist organizations of which many other countries have already recognized & published.
Khashoggi was a Trump critic and stalwart advocate/member of the Muslim Brotherhood terror organization, having joined with them all the way back in the seventies.
I think Jamal Khashoggi was much more than a journalist.
Yeah, he wrote opinion pieces for the Washington Post, and so they’re running around saying he was an American citizen, an American journalist. But I don’t think that’s who the Saudis saw when they saw Jamal Khashoggi.
I think they saw an enemy of the regime. I think they saw a guy who’s tight with the Muslim Brotherhood. The Muslim Brotherhood, the agents of change in the Arab Spring, the Muslim Brotherhood and the Saudis do not get along in any way, shape, manner, or form.
No, no. Do not misunderstand me. I’m not advocating or trying to excuse whatever they did to Khashoggi.
I’m just trying to tell you that he’s not an innocent, minding-his-own-business journalist going about his life gunned down. He was an enemy of the regime, and he once held a position in the Saudi government ” I’m telling you, the Drive-Bys have been dying to tie Trump to this murder.
I think that they would love to undermine Trump’s relationship with crown prince Mohammed bin Salman and the Saudis in general, and so would the Democrats. It’s just the latest in a never-ending parade of events that the left thinks they can use to destroy and get rid of Trump.
Khashoggi was a friend of Osama Bin Laden.
They went to high school together. But that’s not what you need to know about Khashoggi. Khashoggi’s ties to the Muslim Brotherhood are what’s really relevant here. I think… They’re trying to tell us that Khashoggi was murdered by Mohammed bin Salman because Khashoggi was being critical of the regime and you just don’t do that. And while that’s true, I think there’s a lot more to this than just he got killed because of stuff he was writing in the Washington Post.
I found a piece on him by John R. Bradley at Spectator.us, and Bradley has been following Saudi politics, Middle East politics, Muslim Brotherhood expertise for many, many moons. And his story ran three days ago, and you haven’t seen a thing about this anywhere in the Drive-By Media like Missourians are not seeing a word about Project Veritas exposing Claire McCaskill.
The piece is entitled, “What the Media Are Not Telling You About Jamal Khashoggi — The dissident’s fate says a lot about Saudi Arabia and the rise of the mobster state.” Now, here are just some biographical things. The fate of Khashoggi has at least provoked global outrage, but it’s for all the wrong reasons. We are told he was a liberal, Saudi progressive voice fighting for freedom and democracy, and a martyr who paid the ultimate price for telling the truth to power.
“This is not just wrong but distracts us from understanding what the incident tells us about the internal power dynamics of a kingdom going through an unprecedented period of upheaval. It is also the story of how one man got entangled in a Saudi ruling family that operates like the Mafia. Once you join, it’s for life, and if you try to leave, you become disposable.” So the point this piece is gonna make is that Khashoggi’s not a distant and removed commentator/journalist writing about the Saudi kingdom from afar.
He used to be part of it.
He’s not… Well, the Khashoggis… Adnan Khashoggi was very, very tight with the royal family. I don’t know about bloodlines, but he was… You’re not allowed to become Adnan Khashoggi and acquire that much wealth — particularly running guns and arms — without being tight with the royal family. Jamal Khashoggi is a cousin of Adnan Khashoggi. This piece makes it clear (as you’ll hear in a moment) that Jamal Khashoggi — at one time in his life, at one point — was very, very tight with the ruling family, the royal family, was in the regime.
“This is not just wrong but distracts us from understanding what the incident tells us about the internal power dynamics of a kingdom going through an unprecedented period of upheaval. It is also the story of how one man got entangled in a Saudi ruling family that operates like the Mafia. Once you join, it’s for life, and if you try to leave, you become disposable. In truth, Khashoggi never had much time for Western-style pluralistic democracy.
“In the 1970s he joined the Muslim Brotherhood, which exists to rid the Islamic world of western influence.” Now, that right there will provide all of us the first source of serious conflict between Khashoggi and the current Saudi ruling royal family. “[T]he Muslim Brotherhood … exists to rid the Islamic world of western influence.” What’s Mohammed bin Salman doing? He’s trying to westernize the country! He’s a Millennial.
He’s trying to reform it in certain ways, letting women vote and letting women drive, but not much else. He wants the world to think that there’s massive reform happening in the kingdom. So he does something very visible, like letting women drive. But not much more. They’re still very subjugated. He’s meeting with all of the tech people in Silicon Valley and the Hollywood people. He wants to build a brand-new city from scratch — a huge, dynamic, brand-new city — that incorporates money from Silicon Valley and Hollywood and involves all of those people as developers and investors.
But nevertheless he’s the first of the ruling royal family to ever talk this way, to ever travel the world and set something up like this, and this is anathema to the Muslim Brotherhood! They can’t stand this! There’s something else that the royal family’s doing, and I mentioned this when I was talking about who Khashoggi was and Mohammed bin Salman last week. That is this: Up to 9/11 and even many years after 9/11, the ruling religious dominance in Saudi Arabia was Wahhabism.
All of the clerics, all of the imams were Wahhabi Islamists, and these are the terrorist-inspiring Islamists.
These are the imams, the educators at all the universities which teach and recruit and inspire the Osama Bin Laden-type terrorism. Mohammed bin Salman wants to rid Saudi Arabia of the influence of Wahhabism. Well, that’s not gonna sit well with the Muslim Brotherhood. The Muslim Brotherhood is not particularly tied to Wahhabism.
They have their own version of terrorist Islam.
But the fact that the Saudi rile family, which, by definition, and by corporate structure, is in charge of Islam. Mecca and Medina are… Mecca is in Saudi Arabia. The Saudi royal family is Islam. It’s their charge with maintaining it, protecting it, defining it, the mosques, particularly in Mecca. And for Mohammed bin Salman to come along and try to eliminate the influences of Wahhabism, while at the same time importing such corporate scum as Hollywood and American technology?
This is considered to be an absolute affront to people like the Muslim Brotherhood, which wants to get rid of any Western influence in Islam or in Saudi Arabia or anywhere else in the Islamic world! So Mohammed bin Salman has made himself a huge, huge target. Khashoggi, as a Muslim Brotherhood member, would be diametrically opposed to everything Mohammed bin Salman is doing. And that has been well established and has been documented.
Again here, according to Mr. Bradley, “Khashoggi never had much time for Western-style pluralistic democracy.
In the 1970s he joined the Muslim Brotherhood, which exists to rid the Islamic world of western influence.” Well, here comes Mohammed bin Salman incorporating Western influence in Saudi Arabia. Khashoggi “was a political Islamist until the end, recently praising the Muslim Brotherhood in the Washington Post.
“He championed the ‘moderate’ Islamist opposition in Syria, whose crimes against humanity are a matter of record. Khashoggi frequently sugarcoated his Islamist beliefs with constant references to freedom and democracy. But he never hid that he was in favor of a Muslim Brotherhood arc throughout the Middle East.
He was not an Americanized Islamist.
This was a Muslim Brotherhood advocate and member, and he is righteously indignant over the reforms of Mohammed bin Salman and wrote about them. But he threw in the words “democracy” and “freedom” and “liberty,” and this was all designed to cow Western readers and Western journalists into thinking that he was something that he’s not.
Much like liberals have to mask who they are, that’s what Khashoggi was doing. “He had been a journalist in the 1980s and 1990s, but then became more of a player than a spectator. Before working with a succession of Saudi princes, he edited Saudi newspapers. The exclusive remit a Saudi government-appointed newspaper editor has is to ensure nothing remotely resembling honest journalism” makes it into the papers. So when the Saudi ruling family hired him to run journalism, it was to be PR. It was to be propaganda.
Khashoggi did it. He took the money, he “put the money in the bank,” and he did what the royal family wanted him to do. He made “a handsome living,” which, according to Mr. Bradley here, has “always [been] his top priority. … Khashoggi had this undeserved status in the West” that our caller is talking about “because of the publicity surrounding his sacking as editor of the Saudi daily Al Watan back in 2003. … He was dismissed because he allowed a columnist to criticize an Islamist thinker considered to be the founding father of Wahhabism.
Republican SC Senator Lindsey Graham Taking DNA Test To Best Elizabeth Warren on Native American Content: "I Think I Can Beat Her"
~According to the UK Daily Mail, the lying Sen. Warren's "Pow-Wow" cookbook was literally plagiarized word for word from a French Chef's cookbook ** and she even signed her name with word "Cherokee" on the cookbook.
~The Senator was officially Listed as a "woman of color" at Harvard Law School.
But, Trump, it should be noted, is the "mentalist supreme"--he now has Senators taking DNA tests to prove native American Indian content...who saw that one coming?
~ One thing, however, appears clear--Sen. Warren has been undergoing an identity crisis for a very, very, long time--insisting that she's Indian, when, in fact, she's far less native American than the majority of all Americans.
~She's living a lie, but, is it because she's uncomfortable with her true identity or true self? " Serious mental illness includes diagnoses which typically involve psychosis (losing touch with reality or experiencing delusions)"
Senator Lindsey Graham (R-SC) seems to have a newfound "Trumpian" swagger of late, all starting with his fiery speech during Justice Kavanaugh's confirmation - and culminating in several recent clips of the South Carolina Senator giving Democrats what for.
On Tuesday, Graham "2.0" told Fox & Friends that he plans to take a DNA test to see if he has more Native American DNA than Senator Elizabeth Warren (D-MA). Warren has claimed to be Native American for decades - and was identified by Harvard Law as a "woman of color" - which promoted her as a diversity hire with a "minority background," prompting Trump to refer to her as "Pocahontas."
"I’m going to take a DNA test," said Graham, adding: "I’ve been told my grandmother was part Cherokee Indian. It may all just be talk."
He says that he'll announce the results of his test on the show when they come in, joking "This is my Trump moment. This is reality TV."
It's about the only excuse that might actually work...meanwhile, a number of special Saudi Operatives will eventually be "taking one for the Kingdom"...Don't lose your heads, guys!
Gee, come to think of it, I wonder if they might've consulted with Killary Clinton for the best overall of feasible internationally acceptable explanations?
The Washington Post columnist was last seen in public when he entered the Saudi consulate in Istanbul in Turkey on October 2.
Previously, Saudi authorities had maintained Khashoggi left the consulate the same afternoon of his visit but provided no evidence to support the claim.
CCTV footage shows Khashoggi entering the Saudi consulate on October 2.
Khashoggi's fiancée, Hatice Cengiz, who was waiting outside the consulate, says she did not see him re-emerge.
The disappearance created a diplomatic rift between Saudi Arabia and the West. Amid the fallout, international firms pulled out of a high-profile investment summit, the Future Investment Initiative conference, due to take place later this month in Riyadh.
The case also caused friction between Saudi Arabia and Turkey, which repeatedly accused the Saudis of failing to cooperate with their investigation.
Turkish authorities previously said they believed that 15 Saudi men who arrived in Istanbul on October 2 were connected to Khashoggi's disappearance and possible murder. At least some of them appear to have high-level connections in the Saudi government.
On Friday, a source familiar with the investigation told CNN that Turkish authorities have audio and visual evidence that shows journalist Khashoggi was killed inside the consulate.
CNN reporters saw Turkish investigators, including forensic officers, entering the Saudi consulate in Istanbul Monday evening. Saudi officials granted permission for the premises to be searched, a Turkish diplomatic source told CNN.
The Police were seen cordoning off the area before investigators arrived. Turkish officials also wanted to search the nearby consul general's residence.
Earlier Monday, President Donald Trump suggested that "rogue killers" could be behind Khashoggi's disappearance, after a phone call with Saudi Arabia's King Salman about the case. Trump said King Salman told him "in a very firm way that they had no knowledge of it."
Later Monday, Trump said he had seen the latest media reports. But he said he did not know if the report is accurate or just "rumor."
Did you know that the Fed only increased interest rates, once, during Obama's entire 8 years in office, but has increased interest rates eight times, since Trump was elected only two years ago?
Donald Trump just made one of the most brilliant moves of his entire presidency. By accusing the Federal Reserve of “going loco”, he is placing the blame for the coming stock market crash and horrifying economic downturn squarely where it belongs, and he is firing up millions of true conservatives among his base at the same time.
For many, many years, a lot of us have been trying to educate the American people about the deeply insidious Federal Reserve system. As Ron Paul once so astutely observed, it is actually about as “federal” as Federal Express is. The Federal Reserve is an unelected cabal of central bankers that is running our economy into the ground, and the only way we are going to fix our long-term economic and financial problems is if we abolish it.
Of course, the left is going to want to blame Trump, and so Trump is being very smart by pointing a finger at the Fed for aggressively raising rates at a time when the U.S. economy is already slowing down.
So let us hope that Trump’s war with the Federal Reserve escalates significantly because we want this to be a top national issue during the 2020 presidential election.
#6 The Federal Reserve is not an agency of the federal government, but it has been given the power to regulate our banks and financial institutions. This should not be happening.
#25 The Federal Reserve has been consistently lying to us about the level of inflation in our economy. If the inflation rate was still calculated in the same way that it was back when Jimmy Carter was president, the official rate of inflation would be somewhere about 10 percent today.
Top Agents of Deep State Implicated in Plot to Overturn 2016 Election By Former FBI General Counsel James Baker: "It Was Dead Serious"
Don’t tell former FBI general counsel James Baker that those now-infamous discussions about secretly recording President Trump and using the tapes to remove him from office were a joke.
He apparently doesn’t believe it. And he held quite the vantage point — he was on the inside of the bureau’s leadership in May 2017, when the discussions occurred.
Baker told Congress last week that his boss — then-acting FBI Director Andrew McCabe — was dead serious about the idea of surreptitiously recording the 45th president and using the evidence to make the case that Trump should be removed from office, according to my sources.
Baker told lawmakers he wasn’t in the meeting McCabe had with Deputy Attorney General Rod Rosenstein in which the subject came up. But he did have firsthand conversations with McCabe and the FBI lawyer assigned to McCabe, Lisa Page, about the issue.
Word of Baker’s testimony surfaced just days before Rosenstein was set to be interviewed in private on Thursday by House Judiciary Committee lawmakers.
Since The New York Times first reported the allegations, Rosenstein, the No. 2 Department of Justice (DOJ) official, has tried to downplay his role in them. His office has suggested that he thought the discussions were a joke, that Rosenstein never gave an order to carry out such a plot, and that he does not believe Trump should be removed from office.
But making those statements through a spokesperson is a bit different than having Rosenstein himself face Congress and answer the questions under penalty of a felony if lawmakers think he is lying.
Baker’s account to lawmakers this month clearly complicates an already complicated picture for Rosenstein before Congress, assuming he shows up for Thursday’s interview.
But even more so, Baker’s story lays bare an extraordinary conversation in which at least some senior FBI officials thought it within their purview to try to capture the president on tape and then go to the president’s own Cabinet secretaries, hoping to persuade the senior leaders of the administration to remove the president from power.
Even more extraordinary is the timing of such discussions: They occurred, according to Baker’s account, in the window around the firing of FBI Director James Comey. Could it be that the leaders of a wounded, stunned FBI were seeking retribution for their boss’s firing with a secret recording operation?
I doubt this is the power that Congress intended to be exercised when it created the FBI a century ago or the circumstances in which the authors of the 25th Amendment imagined a president’s removal could be engineered.
This wasn’t a president who was incapacitated at the time. He was fully exercising his powers — but in a way, the FBI leadership did not like.
And that makes the FBI’s involvement in the tape-record-then-dump-Trump conversations overtly political — even if Rosenstein believed the whole idea was farcical.
Keep in mind, this is the same FBI that, a few months earlier during the 2016 election, had its top counterintelligence agent Peter Strzok talking to Page — his lover and the top lawyer to McCabe — about using their official powers to “stop” Trump in the election and having an “insurance policy” against the GOP nominee. That insurance policy increasingly looks like an unverified dossier created by British intelligence operative Christopher Steele — a Trump hater himself — that was bought and paid for by the Democratic Party and Hillary Clinton’s presidential campaign through their mutual law firm. | 2019-04-22T20:48:59Z | http://conservativerefocus.com/blogs/index.php/politics/?blog=26&disp=posts&paged=3 |
2009-10-02 Assigned to WARSAW ORTHOPEDIC, INC. reassignment WARSAW ORTHOPEDIC, INC. DOCUMENT ID NO. 700418747--CORRECT RECORDATION OF MERGER (REEL 022771 AND FRAME 0591) FROM SERIAL NO. 08/480,908 TO 12/454,393 Assignors: SDGI HOLDINGS, INC.
The present invention is directed to a variety of interbody spinal fusion implants having at least a partially frusto-conical configuration. An external thread is employed to increase implant stability and implant surface area, and for the purpose of advancing the spinal fusion implant into the fusion site. The spinal fusion implants of the present invention may be relatively solid or hollow and may have surface roughenings to promote bone ingrowth and stability. The spinal fusion implants of the present invention may have wells extending into the material of the implant from the surface for the purpose of holding fusion promoting materials and to provide for areas of bone ingrowth fixation.
The present application is a continuation of Ser. No. 08/480,908, filed Jun. 7, 1995; which is incorporated herein by reference.
The present invention relates generally to interbody spinal fusion implants, and in particular to spinal fusion implants configured to restore and maintain two adjacent vertebrae of the spine in anatomical lordosis.
Interbody spinal fusion refers to the method of achieving bony bridging between adjacent vertebrae through the disc space, the space between adjacent vertebrae normally occupied by a spinal disc. Numerous implants to facilitate such a fusion have been described by Cloward, Brantigan, and others, and are known to those skilled in the art. Generally, cylindrical implants offer the advantage of conforming to an easily prepared recipient bore spanning the disc space and penetrating into each of the adjacent vertebrae. Such a bore may be created by use of a drill. It is an anatomical fact that both the cervical spine and the lumbar spine are normally lordotic, that is convex forward. Such alignment is important to the proper functioning of the spine. Commonly, those conditions which require treatment by spinal fusion are associated with a loss of lordosis.
Therefore, there exists a need for spinal fusion implants that permit for the restoration of anatomical lordosis.
The present invention is directed to a variety of interbody spinal fusion implants having at least a partially frusto-conical configuration. In the preferred embodiment, the spinal fusion implants of the present invention have a body that is partially or fully frusto-conical shape substantially along the portion of the implant in contact with the adjacent vertebrae of the spine. The spinal fusion implants of the present invention have an external thread for engaging the adjacent vertebrae of the spine and have an insertion end and a trailing end. The external thread may have a variable or constant thread radius and/or a constant or variable thread height measured from the body of the implant.
The spinal fusion implants of the present invention may be further modified so that while the upper and lower surfaces are portions of a frusto-cone, at least one side portion may be truncated to form a planar surface that is parallel to the central longitudinal axis of the implant to form straight walls. These implants may have a more tapered aspect at the insertion end of the implant to facilitate insertion. The spinal fusion implants of the present invention may be relatively solid and/or porous and/or hollow, and may have surface roughenings to promote bone ingrowth and stability.
The spinal fusion implants of the present invention may have wells extending into the material of the implant from the surface for the purpose of holding fusion promoting materials and to provide for areas of bone ingrowth fixation. These wells, or holes, may pass either into or through the implant and may or may not intersect. The spinal fusion implants of the present invention may have at least one chamber which may be in communication through at least one opening to the surface of the implant. Said chamber may have at least one access opening for loading the chamber with fusion promoting substances. The access opening may be capable of being closed with a cap or similar means.
1. Because the spinal fusion implants of the present invention are at least partially frusto-conical in shape, those that taper from the leading edge to the trailing edge are easy to introduce and easy to fully insert into the spinal segment to be fused. In another embodiment, where the trailing edge of the implant is larger than the leading edge, the implant utilizes a tapered forward portion and an increasing thread height relative to the body from the leading edge to the trailing edge to facilitate insertion.
2. The shape of the implants of the present invention is consistent with the shape of the disc, which the implants at least in part replace, wherein the front of the disc is normally taller than the back of the disc, which allows for normal lordosis. The implants of the present invention are similarly taller anteriorly than they are posteriorly.
3. The spinal fusion implants of the present invention conform to a geometric shape, which shape is readily producible at the site of fusion, to receive said spinal fusion implants.
The spinal fusion implants of the present invention can be made of any material appropriate for human implantation and having the mechanical properties sufficient to be utilized for the intended purpose of spinal fusion, including various metals such as cobalt chrome, stainless steel or titanium including its alloys, various plastics including those which are bio-absorbable, and various ceramics or combination sufficient for the intended purpose. Further, the spinal fusion implants of the present invention may be made of a solid material, a mesh-like material, a porous material and may comprise, wholly or in part, materials capable of directly participating in the spinal fusion process, or be loaded with, composed of, treated of coated with chemical substances such as bone, morphogenic proteins, hydroxyapatite in any of its forms, and osteogenic proteins, to make them bioactive for the purpose of stimulating spinal fusion. The implants of the present invention may be wholly or in part bioabsorbable.
It is a further object of the present invention to provide a frusto-conical spinal fusion implant which may be placed side by side adjacent to a second identical implant across the same disc space, such that the combined width of the two implants is less than sum of the individual heights of each implant.
It is a further object of the present invention to provide a frusto-conical spinal fusion implant which may be placed side by side adjacent to a second identical implant across the same disc space, such that the combined width of the two implants is less than sum of the individual lengths of each implant.
These and other objects of the present invention will become apparent from a review of the accompanying drawings and the detailed description of the drawings.
FIG. 1 is a side elevational view of the spinal fusion implant of the present invention having a body that is frusto-conical with an external thread having a substantially uniform radius.
FIG. 1A is an enlarged fragmentary view along line 1A of FIG. 1 illustrating the surface configuration of the implant of FIG. 1.
FIG. 1B is an enlarged fragmentary view along line 1A of FIG. 1 illustrating an alternative embodiment of the surface configuration of the implant of the present invention made of a cancellous material.
FIG. 1C is a cross sectional view along lines 1C-1C of FIG. 1B illustrating the alternative embodiment of the surface configuration of the implant of the present invention made of a cancellous material.
FIG. 1D is an enlarged fragmentary view along line 1A of FIG. 1 illustrating an alternative embodiment of the surface configuration of the implant of the present invention made of a fibrous mesh-like material.
FIG. 1E is a fragmentary view along line 1A of FIG. 1 illustrating an alternative embodiment of the surface configuration, of the implant of the present invention comprising a plurality of spaced apart posts.
FIG. 1F is an enlarged fragmentary sectional view along lines 1F-1F of FIG. 1E illustrating the surface configuration of the implant of FIG. 1E.
FIG. 2 is an alternative embodiment of the spinal fusion implant of the present invention having a frusto-conical body with an external thread radius and thread height that are not constant.
FIG. 3 is as cross sectional view along line 3-3 of the implant of FIG. 2.
FIG. 4 is a side elevational view of an alternative embodiment of the spinal fusion implant of the present invention.
FIG. 5 is a side elevational view and partial cut-away of a segment of the spinal column in lordosis showing the spinal fusion implant of FIG. 4 being implanted with a driving instrument from the posterior approach to the spinal column.
FIG. 6 is a side elevational view of an alternative embodiment of the spinal fusion implant of the present invention having a frusto-conical body and truncated sides.
FIG. 7 is an end view along line 7-7 of the spinal fusion implant of FIG. 6 shown placed beside a second identical implant shown in hidden line.
FIG. 8 is a side elevational view of an alternative embodiment of the spinal fusion implant of the present invention having a body with an irregular configuration.
Referring to FIG. 1, a side elevational view of the spinal fusion implant of the present invention generally referred to by numeral 20 is shown. The implant 20 has a body 22 that is frusto-conical in shape such that the body 22 has a diameter (root diameter) that is generally frusto-conical. The body 22 has an insertion end 24 and a trailing end 26. The insertion end 24 may include a tapered portion 25 to facilitate insertion of the spinal implant 20. In the preferred embodiment, when the implant 20 is inserted from the anterior aspect of the spine, the body 22 of the implant 20 has a maximum diameter at a point nearest to the trailing end 26 and a minimum diameter at a point nearest to the insertion end 24.
The implant 20 has an external thread 28 having a substantially uniform radius R1 measured from the central longitudinal axis L1 of the implant 20. The outer locus of the external thread 28 (major diameter) has an overall configuration that is substantially parallel to the longitudinal axis L1. While the major diameter of the implant 20 is substantially uniform, the external thread 28 may be modified at the leading edge by having initially a reduced thread radius to facilitate insertion of the implant 20 and may also be modified to make the external thread 28 self-tapping. In the preferred embodiment, the external thread 28 has a first thread 30 of a lesser radius than the radius R1 of the remainder of the external thread 28 to facilitate insertion of the implant 20. The second thread 32 has a greater radius than the first thread 30, but is still shorter than the radius R1 of the remainder of the external thread 28 which is thereafter of constant radius.
The body 22 is frusto-conical substantially along the portion of the body 22 in contact with the adjacent vertebrae of the spine which allows for creating and maintaining the adjacent vertebrae of the spine in the appropriate angular relationship to each other in order to preserve and/or restore the normal anatomic lordosis of the spine. The substantially uniform radius R1 of the external thread 28 of the implant 20 allows engaging the bone of the adjacent vertebrae in a position that counters the forces which tend to urge the implant 20 from between the adjacent vertebrae in the direction opposite to which the implant 20 was implanted. The greater thread height measured from the body 22 near the leading end 24 of the implant 20 provides greater purchase into the vertebral bone and again enhances the stability of the implant 20. Further, the configuration of the external thread 28 increases the surface area of the implant 20 in contact with the vertebrae to promote bone ingrowth.
The implant 20 has a recessed slot 34 at its trailing end 26 for receiving and engaging insertion instrumentation for inserting the implant 20. The recessed slot 34 has a threaded opening 36 for threadably attaching the implant 20 to instrumentation used for inserting the implant 20.
Referring to FIG. 1A, the implant 20 has an outer surface 38 that is porous to present an irregular surface to the bone to promote bone ingrowth. The outer surface 38 is also able to hold fusion promoting materials and provides for an increased surface area to engage the bone in the fusion process and to provide further stability. The pores of the outer surfaces 38 are microscopic in size having a diameter that is less than 1 mm, in the range of 50-1000 microns, with 250-500 microns being the preferred diameter. It is appreciated that the outer surface 38, and/or the entire implant 20, may comprise any other porous material or roughened surface sufficient to hold fusion promoting substances and/or allow for bone ingrowth and/or engage the bone during the fusion process. The implant 20 may be further coated with bioactive fusion promoting substances including, but not limited to, hydroxyapatite compounds, osteogenic proteins and bone morphogenic proteins. The implant 20 is shown as being solid, however it is appreciated that it can be made to be substantially hollow or hollow in part.
Referring to FIG. 1B, an enlarged fragmentary view along line 1A of FIG. 1 illustrating an alternative embodiment of the surface configuration 38 of the implant of the present invention made of a cancellous material is shown. The cancellous material 50, similar in configuration to human cancellous bone, having interstices 52 such that the outer surface 38 has a configuration as shown in FIGS. 1B and 1C. As the implant of the present invention may be made entirely or in part of the cancellous material 50, the interstices 52 may be present in the outer surface 338 and/or within the entire implant to promote bone ingrowth and hold bone fusion promoting materials.
Referring to FIG. 1D, an enlarged fragmentary view along line 1A of FIG. 1 illustrating an alternative embodiment of the surface configuration of the implant of the present invention made of a fibrous mesh-like material is shown. The mesh-like material 60 comprises strands 62 that are formed and pressed together such that interstices 64, capable of retaining fusion promoting material and for allowing for bone ingrowth, are present between the strands in at least the outer surface 38 of implant of the present invention.
Referring to FIGS. 1E and 1F, a fragmentary view along line 1A of FIG. 1 illustrating an alternative embodiment of the surface configuration 38 of the implant of the present invention comprising a plurality of spaced apart posts 70 is shown. The posts 70 have a head portion 72 of a larger diameter than the remainder of the posts 70, and each of the interstices 74 is the reverse configuration of the posts 72, having a bottom 76 that is wider than the entrance to the interstices 74. Such a configuration of the posts 70 and interstices 74 aids in the retention of bone material in the surface 38 of the implant and further assists in the locking of the implant into the bone fusion mass created from the bone ingrowth. As the bone ingrowth at the bottom 76 of the interstices is wider than the entrance, the bone ingrowth cannot exit from the entrance and is locked within the interstice 74. The surface of the implant provides for an improvement in the available amount of surface area which may be still further increased by rough finishing, flocking or otherwise producing a non smooth surface.
In the preferred embodiment, the posts 70 have a maximum diameter in the range of approximately 0.1-2 mm and a height of approximately 0.1-2 mm and are spaced apart a distance of approximately 0.1-2 mm such that the interstices 74 have a width in the range of approximately 0.1 to 2 mm. The post sizes, shapes, and distributions may be varied within the same implant.
In the preferred embodiment, for use in the lumbar spine, the implant 20 has an overall length in the range of approximately 24 mm to 32 mm with 26 mm being the preferred length. The body 22 of the implant 20 has a root diameter at the insertion end 24 in the range of 8-20 mm, with 14-16 mm being the preferred root diameter at the insertion end, and a root diameter at the trailing end 26 in the range of 10-24 mm, with 16-18 mm being the preferred diameter at the trailing end 26, when said implants, are used in pairs. When used singly in the lumbar spine, the preferred diameters would be larger.
In the preferred embodiment, the implant 20 has a thread radius R1 in the range of 6 mm to 12 mm, with 9-10 mm being the preferred radius R1. For use in the cervical spine, the implant 20 has an overall length in the range of approximately 10-22 mm, with 12-14 mm being the preferred length. The body 22 of the implant 20 has a root diameter at the insertion end 24 in the range of 8-22 mm, with 16-18 mm being the preferred root diameter at the insertion end when used singly, and 8-10 mm when used in pairs. The body 22 of the implant 20 has a root diameter at the trailing end 26 in the range of 10-24 mm, with 18-20 mm being the preferred root diameter at the trailing end 26 when used singly, and 10-12 mm when used in pairs; a thread radius, R1 in the range of approximately 4-12 mm, with 9-10 mm being the preferred radius R1 when inserted singularly and 5-7 mm when inserted side by side in pairs.
Referring to FIG. 2, an alternative embodiment of implant 20 is shown and generally referred to by the numeral 120. The implant 120 has a body 122 similar to body 122 of implant 120 and has an external thread 128 having a radius R3 measured from the central longitudinal axis L3 of the implant 120. The thread radius R3 is not constant throughout the length of the implant 120 and the external thread 128 has a thread height that is also not constant with respect to the body 122 of the implant 120. In the preferred embodiment, the implant 120 has an external thread 128 with a radius R3 that increases in size from the insertion end 124 to the trailing end 126 of the implant 120.
Referring to FIG. 3, a cross sectional view along line 3-3 of the implant 120 is shown. The implant 120 has an outer wall 144 surrounding an internal chamber 146. The large and small openings 140 and 142 may pass through the outer wall 144 to communicate with the internal chamber 146. The internal chamber 146 may be filled with bone material or any natural bone growth material or fusion promoting material such that bone growth occurs from the vertebrae through the openings 140 and 142 to the material within internal chamber 146. While the openings 140 and 142 have been shown in the drawings as being circular, it is appreciated that the openings 140 and 142 may have any shape, size configuration or distribution, suitable for use in a spinal fusion implant without departing from the scope of the present invention.
The openings 140 and 142 are macroscopic in size having a diameter that is greater than 1 mm. The large openings 140 have a diameter in the range of 206 mm, with the preferred diameter being 3.5 mm; and the small openings have a diameter in the range of 1-2 mm, with 1.5 mm being the preferred diameter.
The implant 120 has a cap 148 with a thread 150 that threadably attaches to the insertion end 124 of the spinal fusion implant 120. The cap 148 is removable to provide access to the internal chamber 146, such that the internal chamber 146 can be filled and hold any natural or artificial osteoconductive, osteoinductive, osteogenic, or other fusion enhancing material. Some examples of such materials are bone harvested from the patient, or bone growth inducing material such as, but not limited to, hydroxyapatite, hydroxyapatite tricalcium phosphate; or bone morphogenic protein. The cap 148 and/or the spinal fusion implant 120 may be made of any material appropriate for human implantation including metals such as cobalt chrome, stainless steel, titanium, plastics, ceramics, composites and/or may be made of, and/or filled, and/or coated with a bone ingrowth inducing material such as, but not limited to, hydroxyapatite or hydroxyapatite tricalcium phosphate or any other osteoconductive, osteoinductive, osteogenic, or other fusion enhancing material. The cap 148 and the implant 120 may be partially or wholly bioabsorbable.
Referring to FIG. 4, a side elevational view of an alternative embodiment of the spinal fusion implant of the present invention generally referred to by numeral 520 is shown. The implant 520 has a body 522 having a root diameter that is frusto conical in the reverse direction as that implant 20 shown in FIG. 1, in order to preserve and/or restore lordosis in a segment of spinal column when inserted from the posterior aspect of the spine. The body 522 has an insertion end 524 and a trailing end 526. In the preferred embodiment, the body 522 of the implant 520 has a minimum diameter at a point nearest to the trailing end 526 and a maximum diameter at a point nearest to the insertion end 524. The insertion end 524 may have an anterior nose cone portion 530 presenting a tapered end to facilitate insertion.
The implant 520 has an external thread 528 having a substantially uniform radius R6 measured from the central longitudinal axis L6 of the implant 520 such that the external diameter of the external thread 528 (major diameter) has an overall configuration that is substantially parallel to the longitudinal axis L6. It is appreciated that the thread 528 can have a major diameter that varies with respect to the longitudinal axis L6, such that the major diameter may increase from the insertion end 524 to the trailing end 526 or the reverse. The external thread 528 has a thread height measured from the body 522 that increases from the insertion end 524 to the trailing end 526.
Referring to FIG. 5, a segment of the spinal column S is shown with the vertebrae V1 and V2 in lordosis and an implant 520 shown being inserted from the posterior aspect of the spinal column S with an instrument driver D. The implant 520 is inserted with the larger diameter insertion end 524 first in order to in initially distract apart the vertebrae V1 and V2 which then angle toward each other posteriorly as the implant 520 is fully inserted. It is appreciated that the insertion of implant 520 does not require the adjacent vertebrae V1 and V2 to be placed in lordosis prior to insertion, as the full insertion of the implant 520 itself is capable of creating the desired lordotic angular relationship of the two vertebrae V1 and V2.
In the preferred embodiment, for use in the lumbar spine, the implant 520 has an overall length in the range of approximately 24 m 30 mm, with 26 mm being the preferred length. The body 522 of the implant 520 has a root diameter at the insertion end 524 in the range of 12-22 mm, with 16 mm being the preferred root diameter at the insertion end, and a root diameter at the trailing end 526 in the range of 10-20 mm, with 14 mm being the preferred diameter at the trailing end 526. In the preferred embodiment, the implant 520 has a thread radius R6 in the range of 6 mm to 12 mm, with 8 mm being the preferred radius R6.
Referring to FIG. 6, an alternative embodiment of the spinal fusion implant of the present invention generally referred to by the numeral 620 and a partial fragmentary view of a second identical implant, generally referred to by the numeral 621 are shown. The implant 620 has a body 622 that is partially frusto-conical in shape similar to body 22 of implant 20 shown in FIG. 1, and has an insertion end 624 and a trailing end 626. The body 622 of the implant 620 has truncated sides 670 and 672 forming planar surfaces that are parallel to the longitudinal axis L7. In this manner, two implants 620 and 621 may be placed side by side, with one of the sides 670 or 672 of each implant with little space between them, such that the area of contact with the bone of the adjacent vertebrae is maximized. It is appreciated that the body 622 may also be cylindrical in shape and have truncated sides 670 and 672.
The implant 620 has an external thread 628 having a radius R6 measured from the central longitudinal axis L7 that may be constant, such that the major diameter or outer locus-of the external thread 628 has an overall configuration that is substantially, cylindrical. It is appreciated that the external thread 628 may have a thread radius R7 that is variable with respect to the longitudinal axis L7 such that the major diameter or outer locus of the external thread 628 has an overall configuration that is substantially frusto-conical.
Referring to FIG. 7, an end view of the implant 620 placed beside implant 621 is shown. The implant 620 has a thread radius that is substantially constant and has a thread height measured from the body 622 that is greater at the sides 670 and 672. In this manner, two implants 620 and 621 can be placed beside each other with the external thread 628 of each implant interdigitated allowing for closer adjacent placement of the two implants as a result of the substantial overlap of the external thread 628 at the side 670 or 672 of the implants.
Referring to FIG. 8, an alternative embodiment of the implant of the present invention is shown and generally referred to by the numeral 700. The implant 700 is similar in configuration to implant 20 shown in FIG. 1, except that the body 722 has an irregular configuration. The configuration of the body 722 has a root diameter D which is variable in size throughout the length of the implant 700 and, as shown in this embodiment, comprises larger diameter portions 750 and smaller diameter portions 752. It is appreciated that each of the large diameter portions 750 may be of the same or different diameter and each of the smaller diameter portions 752 may be of the same or different diameter.
The outer surface of the body 722 of implant 720 may be filled with fusion promoting substances such that the smaller diameter portions 752 may hold such fusion promoting substances. If so filled, the composite of the implant 700 and the fusion promoting material could still produce an even external surface of the body 722 if so desired.
While the present invention has been described in detail with regards to the preferred embodiments, it is appreciated that other variations of the present invention may be devised which do not depart from the inventive concept of the present invention. In particular, it is appreciated that the various teachings described in regards to the specific embodiments herein may be combined in a variety of ways such that the features are not limited to the specific embodiments described above.
Each of the features disclosed in the various embodiments and their functional equivalents may be combined in any combination sufficient to achieve the purposes of the present invention as described herein.
a thread along at least a portion of the length of said body adapted to engage said implant to the adjacent vertebral bodies, said thread having a thread height measured from said body which is greatest at said at least one truncated side, said at least one truncated side having a truncated portion between said thread and said leading end.
2. The spinal fusion implant of claim 1, wherein said opposed arcuate portions are in an angular relationship to each other along at least a portion of the length of said implant sufficient to maintain the adjacent vertebral bodies in an angular relationship to each other.
3. The spinal fusion implant of claim 2, wherein said implant is configured to be inserted from a posterior approach to the vertebral bodies.
4. The spinal fusion implant of claim 2, wherein said implant is configured to be inserted from an anterior approach to the vertebral bodies.
5. The spinal fusion implant of claim 1, wherein each of said opposed portions comprises an interior surface, said interior surfaces being spaced apart to define a hollow interior in communication with said openings.
6. The spinal fusion implant of claim 5, wherein said implant includes an access opening for accessing said hollow interior.
7. The spinal fusion implant of claim 6, wherein said access opening is configured to permit introduction of a fusion promoting substance into said hollow interior.
8. The spinal fusion implant of claim 6, further comprising a cap for closing said access opening.
9. The spinal fusion implant of claim 1, wherein said body has a second truncated side opposite to said one truncated side.
10. The spinal fusion implant of claim 1, further in combination with a fusion promoting substance.
11. The spinal fusion implant of claim 10, wherein said fusion promoting substance is bone morphogenetic protein.
12. The spinal fusion implant of claim 10, wherein said fusion promoting substance includes hydroxyapatite.
13. The spinal fusion implant of claim 10, wherein said fusion promoting substance includes hydroxyapatite tricalcium phosphate.
14. The spinal fusion implant of claim 10, wherein said fusion promoting substance is bone.
a thread extending from at least adjacent said leading end to at least adjacent said trailing end, said thread adapted to engage said implant to the adjacent vertebral bodies and to facilitate rotation of said implant from a first position to a second position during insertion thereof into the implantation space, said thread having a thread height measured from said body, said thread height varying along more than one turn of said thread.
17. The spinal fusion implant of claim 15, wherein each of said arcuate portions include a plurality of openings therein.
18. The spinal fusion implant of claim 15, wherein said body has an internal chamber and means for accessing said internal chamber.
19. The spinal fusion implant of claim 18, wherein said internal chamber is capable of containing fusion promoting material.
20. The spinal fusion implant of claim 18, wherein internal chamber said includes a wall surrounding said internal chamber.
21. The spinal fusion implant of claim 20, wherein said wall has a plurality of openings passing therethrough in communication with said internal chamber.
22. The spinal fusion implant of claim 18, wherein said implant has means for closing said accessing means.
23. The spinal fusion implant of claim 15, wherein one of said ends is configured to engage instrumentation for the insertion of said implant.
24. The spinal fusion implant of claim 15, wherein said implant is configured to be placed in close proximity in a side by side alignment to a second spinal fusion implant, said first and second implants when placed together having a combined overall width that is less than the sum of the individual maximum diameters of each of said first and second implants.
26. The spinal fusion implant of claim 25, wherein said body has a second truncated side forming a planar surface parallel to the mid-longitudinal axis and opposite to said first truncated side.
27. The spinal fusion implant of claim 26, wherein said thread has a thread height measured from said body which is greatest at least one of said truncated sides.
28. The spinal fusion implant of claim 25, wherein said thread has a thread height measured from said body which is greatest at said first truncated side.
29. The spinal fusion implant of claim 15, wherein said implant is made of a material that is stronger than bone.
30. The spinal fusion implant of claim 15, in combination with a fusion promoting substance.
31. The spinal fusion implant of claim 30, wherein said fusion promoting substance includes at least one of bone, bone morphogenetic protein, hydroxyapatite, and hydroxyapatite tricalcium phosphate.
32. The spinal fusion implant of claim 15, wherein said thread has a variable height along each turn of said thread about the mid-longitudinal axis of said body.
33. The spinal fusion implant of claim 15, wherein said thread is uninterrupted.
34. The spinal fusion implant of claim 15, wherein an outer locus of said thread has a substantially cylindrical configuration.
35. The spinal fusion implant of claim 15, wherein said body has a substantially cylindrical configuration.
36. The spinal fusion implant of claim 15, wherein said thread has a pitch, further comprising a second thread around the mid-longitudinal axis of said body, said second thread having a pitch that is different than the pitch of said thread.
37. The spinal fusion implant of claim 36, wherein said second thread is adapted to engage an associated thread of an implant cap.
38. The spinal fusion implant of claim 36, wherein said second thread is adapted to engage an associated thread of an implant inserter tool.
an elongated body having a length and an outer surface extending along said length, said outer surface including a pair of oppositely disposed arcuate portions and at least one substantially flat portion extending between said pair of arcuate portions, said pair of arcuate portions defining external threads extending substantially entirely along said length of said body, said at least one substantially flat portion extending along a substantial portion of said length of said body, said at least one substantially flat portion terminating adjacent a first end of said elongated body, said external threads defining at least one circumferentially continuous thread extending along a majority of the length of said elongated body.
a body having a leading end, a trailing end, a length between said leading and trailing ends, and an outer surface, said outer surface including an upper portion, a lower portion, an external thread, and at least one truncated side wall extending between said upper and lower portions, said upper and lower portions each forming at least in part a portion of cylinder, said external thread extending over a substantial portion of the length of said body from a starting location adjacent said leading end toward said trailing end, said at least one truncated side wall extending along a majority of the length of said body, a portion of said at least one truncated side wall extending from said leading end to said external thread.
ES2357270T3 (en) * 2004-02-13 2011-04-20 Franz Copf Jun. spondylodesis intervertebral implant for the lumbar spine.
US1137858A (en) 1914-06-05 1915-05-04 Michael Louis Henry Grease-cup.
US1137585A (en) * 1915-02-05 1915-04-27 Thornton Craig Jr Dental appliance.
ES2231799T3 (en) 2005-05-16 interbody fusion spinal implants by.
ES2287636T3 (en) 2007-12-16 Implant for spinal fusion. | 2019-04-18T17:11:41Z | https://patents.google.com/patent/US20090228107A1/en |
IMPORTANT: BEFORE DOWNLOADING THE SHOPHERO SOFTWARE OR USING THESHOPHERO SERVICES, PLEASE CAREFULLY READ THIS AGREEMENT WHICH CONTAINS THE TERMS AND CONDITIONS UNDER WHICH YOU ARE ACQUIRING A LICENSE TO USE CERTAIN SOFTWARE AND SERVICES WHICH ENABLE CUSTOMER WEBSITE MONITORING AND COMMERCE ANALYTICS (COLLECTIVELY “THE SHOPHERO SERVICE”).
IF YOU DO NOT ACCEPT THE TERMS AND CONDITIONS OF THIS AGREEMENT PLEASE DO NOT USE THE SHOPHERO SERVICE. IF YOU ACCESS OR USE THE SHOPHERO SERVICE, YOU WILL BE ACCEPTING THIS AGREEMENT, AND YOU WILL HAVE ACCEPTED AND AGREED TO THESE TERMS AND CONDITIONS. THE RARE.IO SOFTWARE IS ALSO PROTECTED BY COPYRIGHT LAWS AND INTERNATIONAL COPYRIGHT TREATIES, AS WELL AS OTHER INTELLECTUAL PROPERTY LAWS.
IF YOU ARE AN AGENT OR EMPLOYEE OF ANOTHER ENTITY YOU REPRESENT AND WARRANT THAT (I) THE INDIVIDUAL ACCEPTING THIS AGREEMENT IS DULY AUTHORIZED TO ACCEPT THIS AGREEMENT ON SUCH ENTITY’S BEHALF AND TO BIND SUCH ENTITY, AND (II) SUCH ENTITY HAS FULL POWER, CORPORATE OR OTHERWISE, TO ENTER INTO THIS AGREEMENT AND PERFORM ITS OBLIGATIONS HEREUNDER. BY CHECKING THE “I ACCEPT” BOX, COMPLETING THE REGISTRATION PROCESS AND/OR USING THE SHOPHERO SOFTWARE AND/OR SHOPHERO SERVICES, YOU AGREE TO BE BOUND BY ALL THE TERMS AND CONDITIONS OF THIS AGREEMENT. THE TERMS OF THIS AGREEMENT ARE BINDING ON ANY USERS WITHIN YOUR ORGANIZATION WHO ACCESS THE SHOPHERO SERVICE THROUGH YOUR ACCOUNT.
1. ABOUT THE SHOPHERO SERVICE.
1.1 RareLogic Inc. (“RareLogic” or “ShopHero”) has developed computer software (the “ShopHero Software”) to provide the ShopHero Service, which is used to receive, store, process, compile, and/or analyze User Data (as defined below) and/or to generate ShopHero Reports, together with related documentation; ShopHero also operates computers, servers, networks, and telecommunications systems and equipment to provide the ShopHero Service.
1.2 ShopHero provides customers who have websites hosted via Shopify, or other web platforms supported by ShopHero (‘Supported Platforms”), to communicate with the ShopHero software application in order to receive access to performance data, usage metrics and analytics (as further described on the Website) derived from customer’s website (the “Customer Website”). This information is stored in various database structures for Customer. Once Customer is using the ShopHero Service, Customer will have the ability to access, view and use a variety of online web analytics reports (“Customer Reports”) that are compiled from Customer’s Website visitors’ data (“User Data”) collected through the ShopHero Software via the Customer’s Website.
1.3 In order to use the ShopHero Service, Customer must agree to the terms of this Agreement, connect to the ShopHero Software and create an account with ShopHero. These terms will apply to use of the ShopHeroService from the date of click-accepting of this Agreement until termination in accordance with Section (the “Term”).
1.4 Customer acknowledges that the Internet is not a secure means of communication. Customer shall remain responsible at all times for all aspects associated with the security of Customer’s Website. ShopHero assumes no responsibility for the security of Customer’s Website and/or any User Data.
(b) use Customer Reports during the Term including User Data contained in such Customer Reports solely for Customer’s internal business use, such as by viewing, printing, and exporting Customer Reports.
2.2 Except for the license rights granted to Customer herein, RareLogic retains all right, title and interest in and to the ShopHero Software and ShopHero Service. Customer shall not possess any title, ownership, license and/or intellectual property in any and/or all: (a) Customer Reports; (b) User Data; (c) databases containing User Data; nor (d) in any of the form and/or format used to create and display any Customer Reports.
2.3 By using the ShopHero Service, Customer authorizes and grants RareLogic the right to collect and process User Data in accordance with the terms of this Agreement and to send messages to third parties on behalf of Customer through the capabilities of the ShopHero Service. For the avoidance of doubt, it is Customer’s obligation to ensure compliance with any anti-spam and privacy laws when using the capabilities of the ShopHero Service to transmit messages. RareLogic will not be responsible or liable for any third party claim of breach of the applicable laws in relation to their receipt of any message which we have transmitted on your behalf via the ShopHero Service. Where the activities carried by Customer though the Service are subject to EU Data Protection Laws, Customer agrees to enter into the Data Protection Addendum set out here. “EU Data Protection Laws” means EU General Data Protection Regulation 2016/679 (“GDPR”) and as amended, replaced or superseded from time to time, including laws implementing or supplementing the GDPR.
3.1 By using the ShopHero Service, Customer authorizes and grants RareLogic the right to collect and process User Data in accordance with the terms of this Agreement and to send messages to third parties on behalf of Customer through the capabilities of the ShopHero Service. For the avoidance of doubt, it is Customer’s obligation to ensure compliance with any anti-spam and privacy laws when using the capabilities of the ShopHero Service to transmit messages. RareLogic will not be responsible or liable for any third party claim of breach of the applicable laws in relation to their receipt of any message which we have transmitted on your behalf via the ShopHero Service.
(e) Customer shall not circumvent any user limits or other use restrictions that are built into the Service or access the Service in order to (i) build a competitive product or service; or (ii) copy any ideas, features, functions or graphics of the ShopHero Software or ShopHero Service.
4.1 Customer shall be responsible for safeguarding all information relating to the Customer Account and for all activities relating to the ShopHero Service that occur under the Customer Account, including all activity that occurs under each subsequent Customer Account created for other persons in Customer’s organization.
4.2 Customer shall not publish or make publicly known any information related to the Customer Account, or any subsequent Customer Account. Customer agrees to notify ShopHero immediately upon learning of any unauthorized use of any Customer Account.
4.3 ShopHero may be required to log into the ShopHero Service using the Customer Account from time to time to provide assistance to Customer and to maintain or improve the ShopHero Service. Customer consents to ShopHero’s use of the information contained in each Customer Account for any and all such purposes.
5.1 ShopHero intellectual property includes all intellectual property owned or controlled by ShopHero which is used to operate, provide, support, maintain, update, and/or enhance the ShopHero Service.
5.2 SHOPHERO and RARELOGIC (the “Marks”) are trade names and trademarks of RareLogic Inc. Customer shall not, at any time or times, during or after the Term of this Agreement, question or dispute any of ShopHero’s right, title, ownership, license, intellectual property, and/or other interests in the Marks, ShopHero Service and/or ShopHero Intellectual Property, nor, file any patent, copyright, and/or other intellectual property application and/or registration relating to any portion of the ShopHero Service.
5.3 The ShopHero Software and components of the ShopHero Service are proprietary and confidential to Rare.io, and are protected by Canadian intellectual property laws and by applicable international laws, treaties, and conventions, and shall remain the sole property of ShopHero.
6.1 User Data. User Data may include customer purchase history and other types of data from which analytics (including segments and trends) can be derived through the ShopHero Service for use by Customer in achieving better customer engagement. ShopHero will not have access to users’ credit card numbers. As between RareLogic and Customer, Customer shall own the rights to User Data subject to RareLogic’s right to compile and use aggregate data in accordance with the terms of Section 6.2. ShopHero will not share User Data with any third parties unless ShopHero unless (i) has Customer’s consent to such disclosure; (ii) is required by law or has a good faith belief that access, preservation or disclosure of User Data is reasonably necessary to protect the rights, property or safety of ShopHero, its users or the public; or (iii) provides User Data in certain limited circumstances to third parties to carry out tasks on ShopHero’s behalf such as data storage or billing in which event, ShopHero will ensure that such third parties are bound by terms which restrict use or transmission of the data beyond the scope of providing agreed services to ShopHero.
6.2 Service Data. Customer acknowledges and agrees that ShopHero may, from time to time during and after the Term, prepare, archive, copy, use, publish, distribute, license, and sell generic, non-personal data derived from the operation of the ShopHero Service including from User Data (“Service Data”). Service Data may include aggregated data such as browser and operating system popularity, and most active countries, states and provinces, using data from any number of ShopHero customer websites including from the Customer’s Website. ShopHero owns all right, title and interest in and to Service Data but will only provide Service Data to third parties in aggregated and/or averaged form with no disclosure of personally identifiable information or information which specifically identifies Customer, Customer’s Website, or products or services Customer sells through Customer’s Website.
6.4 Suggestions. RareLogic shall have a royalty-free, worldwide, transferable, sublicensable, irrevocable, perpetual, unrestricted license to use and/or incorporate into the Service any suggestions, enhancement requests, recommendations or other feedback provided by Customer or Site Users relating to the operation of the Service.
7.1 Confidential information (“Confidential Information“) shall mean data or information of any kind disclosed by one party to this Agreement (“Disclosing Party“) to the other party (“Recipient Party“) pursuant hereto. Confidential Information shall not include any information, knowledge, and/or data disclosed pursuant to this Agreement that; already is or becomes part of the public domain through no wrongful act of the Recipient Party; or is known to the Recipient Party free of any obligation of confidentiality; or is independently developed by Recipient Party without use of any Confidential Information; or is lawfully obtained by the Recipient Party from a third party without obligation of confidentiality; or is disclosed pursuant to a court order provided that the Recipient Party provides a copy of such court order to the Disclosing Party prior to such disclosure and Recipient Party takes all reasonable steps to maintain the confidentiality of the Confidential Information.
7.2 Each Recipient Party shall receive and maintain all Confidential Information received hereunder in confidence; use the same degree of care to protect Confidential Information as such Recipient Party itself uses to protect its own confidential information; and disclose Confidential Information received hereunder only to those of its directors, officers, employees, who have a direct need to know and who are bound by written confidentiality obligations at least as restrictive as those contained herein.
7.3 All ownership, license, intellectual property, moral, and other rights to Confidential Information disclosed hereunder shall remain with the Disclosing Party and/or with such Disclosing Party’s licensors.
7.4 Each Recipient Party shall promptly cease all use of all Confidential Information received hereunder upon any termination of this Agreement and will promptly return all such Confidential Information to the Disclosing Party by a secure means without delay.
7.5 Customer shall maintain in confidence all provisions of this Agreement and shall not disclose any of same (including any of ShopHero’s pricing) to any third party or parties.
8.1 After Customer signs up to the ShopHero Service, Customer will only be required to pay for optional features as indicated on www.shophero.io/pricing.
8.2 Customer shall provide a valid credit card number prior to ShopHero enabling Customer’s Account; Customer grants to ShopHero permission to debit the credit card number(s) provided by Customer at any time or times for any and all unpaid amounts owing to ShopHero from Customer pursuant to this Agreement.
8.3 Should Customer’s credit card number(s) be insufficient to pay any or all amounts due to Rare.io hereunder, Customer shall: (a) promptly pay all such amounts due to ShopHero without delay; and (b) become responsible to ShopHero for payment of all legal and/or collection agency fees, disbursements, costs, and other amounts incurred by ShopHero in attempting to collect and/or collecting all such amounts from Customer.
8.4 ShopHero may, upon the provision of five (5) calendar days prior written notice to Customer, suspend the supply of the ShopHero Service, deactivate Customer’s Account, suspend ShopHero’s performance, and/or immediately terminate this Agreement if any credit card number provided by Customer is declined, rejected, cancelled, or inadequate to allow ShopHero to charge all amounts due from Customer hereunder.
8.5 Customer shall be solely responsible for payment of all applicable European Union, country, federal, provincial, state, and other government taxes (“Applicable Taxes”) applied to Customer’s use of the ShopHero Service regardless of whether such Applicable Taxes are in effect at the time of this Agreement or are imposed thereafter, except such taxes as may be imposed on ShopHero’s income. If ShopHero is required to pay any Applicable Taxes owing by Customer, Customer shall reimburse ShopHero in full promptly following receipt of ShopHero’s invoice for same.
8.6 Subject to providing notice to Customer in accordance with the provisions of this Agreement, ShopHero reserves the right to change the price charged by ShopHero for the ShopHero Service at any time or times.
9.1 Customer may cancel Customer’s account at any time by clicking “Remove this app” in Customer’s ecommerce platform app store or by emailing [email protected]. If Customer cancels the ShopHero Service in the middle of the month, Customer will receive one final invoice via email. Once that invoice has been paid Customer will not be charged again. Once cancellation of Customer’s account is confirmed, all User Data will be immediately deleted from the ShopHero Service. Since deletion of all data is final, Customer must ensure that Customer does want to cancel Customer’s account before doing so.
9.2 ShopHero may terminate Customer’s account for breach which remains uncured after 10 days written notice to Customer’s email account of such breach. ShopHero also reserves the right to terminate this Agreement for any reason upon the provision of written notice to Customer, such termination will take effect from the end of the current month. Customer agrees that ShopHero shall have no liability to Customer whatsoever for any: (a) the expiry or termination by ShopHero of this Agreement; or, (b) claims or damages arising purely as a result of the expiry or termination of this Agreement. On termination by ShopHero under this Section, all User Data will be deleted from the ShopHero Service. Such deletion of all data is final, Customer must extract such data prior to the effective date of termination.
9.3 Termination of this Agreement shall not relieve Customer of any obligations to pay all fees, Applicable Taxes, and/or other amounts that have accrued to, or that are otherwise due to Rare.io under this Agreement, and each outstanding amount due to ShopHero from Customer shall immediately become due and payable.
9.4 Each license granted by ShopHero to Customer within this Agreement shall automatically terminate except for Section 3( Restrictions and Prohibitions); Section 5 (Proprietary Rights in Rare.io Technology), Section 6 (Information Collection, Data Protection and Other Terms), Section 7 (Confidentiality), Section 10 (Warranties and Disclaimers; Limitation of Liability), Section 11 (Indemnity by Customer) and Section 13 (General Terms), all of which shall continue in full force and effect beyond the expiry or termination of the Term.
10.1 Mutual Representations and Warranties. Each party represents and warrants to the other party that: (i) it is a corporation, duly organized, validly existing and in good standing under the laws of its jurisdiction of incorporation; (ii) it has all requisite power and authority and approvals to execute, deliver and perform its obligations under this Agreement; (iii) the execution and delivery of this Agreement and the performance of its obligations hereunder have been duly authorized by it and any necessary third parties; and (iv) it will perform its duties and obligations hereunder in a careful, diligent, professional, proper, efficient and business-like manner.
10.2 Data Warranties. Customer represents and warrants that: (a) Customer has all rights necessary to provide RareLogic with access to User Data for use in accordance with the terms of this Agreement; and (b) RareLogic’s use of the User Data in accordance with the terms of this Agreement will not violate the rights of any third party.
10.3 DISCLAIMER OF IMPLIED WARRANTIES. RARELOGIC DOES NOT REPRESENT, WARRANT, OR GUARANTEE THAT ANY AND/OR ALL OF THE RARE.IO SERVICE AND/OR USER DATA PROVIDED TO CUSTOMER PURSUANT TO THIS SHOPHERO SERVICE AGREEMENT WILL BE ERROR FREE, ACCURATE, TIMELY, OR RELIABLE, WILL OPERATE ON ANY OR ALL SOFTWARE PLATFORMS, WILL PRODUCE ANY PARTICULAR RESULT, OR THAT ANY OR ALL ERRORS IN SAME WILL BE CORRECTED BY SHOPHERO. ALL OF THE SHOPHERO SERVICE INCLUDING SHOPHERO SOFTWARE AND REPORTS ARE PROVIDED ON AN “AS IS” BASIS WITHOUT REPRESENTATION, WARRANTY, CONDITION, OR GUARANTEE BY RARELOGIC OF ANY KIND, HOWSOEVER ARISING. RARELOGIC DISCLAIMS ANY AND ALL REPRESENTATIONS, WARRANTIES, OR CONDITIONS OF QUALITY, MERCHANTABILITY, OPERATION, SUITABILITY, TITLE, NONINFRINGEMENT AND/OR FITNESS FOR PARTICULAR PURPOSE, WHETHER EXPRESS OR IMPLIED OR OTHERWISE, HOWSOEVER ARISING.
SOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION OF IMPLIED WARRANTIES OR THE EXCLUSION OR LIMITATION OF CERTAIN DAMAGES. IF ANY JURISDICTION HAVING APPLICABILITY TO THIS AGREEMENT DOES NOT PERMIT ANY SUCH EXCLUSION AND/OR LIMITATION: (A) EACH WARRANTY AND/OR CONDITION WHICH CANNOT BE EXCLUDED SHALL BE LIMITED TO SIXTY (60) DAYS IMMEDIATELY FOLLOWING THE EFFECTIVE DATE AND SHOPHERO’S TOTAL AND AGGREGATE LIABILITY TO CUSTOMER FOR ANY AND ALL BREACHES OF SUCH WARRANTIES AND/OR CONDITIONS SHALL BE SUBJECT TO ALL OF THE LIMITATION OF LIABILITY PROVISIONS CONTAINED HEREIN.
10.4 LIMITATION OF LIABILITY. NOTWITHSTANDING ANY PROVISION IN THIS AGREEMENT AND TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, ANY AND ALL BREACHES BY SHOPHERO OF THIS AGREEMENT (INCLUDING FUNDAMENTAL BREACH), THE TERMINATION OF THIS AGREEMENT, AND/OR ANY OBLIGATION THAT SHOPHERO MAY HAVE IN CONTRACT, TORT, EQUITY, RESTITUTION, AT LAW, AND/OR OTHERWISE, IN NO EVENT SHALL RARE.IO BE LIABLE TO THE CUSTOMER, TO ANY USER OF THE CUSTOMER’S WEBSITE, NOR TO ANY OTHER PARTY FOR ANY: (A) INDIRECT, INCIDENTAL, SPECIAL, CONSEQUENTIAL, AGGRAVATED, EXEMPLARY, AND/OR PUNITIVE DAMAGES; NOR (B) LOST SALES, LOST REVENUE, LOST PROFITS, LOST CUSTOMER DATA, LOST USER DATA, OTHER LOST DATA, OR REPROCUREMENT AMOUNT; HOWSOEVER ARISING, EVEN IF RARE.IO HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES AND/OR LOSSES ARISING AND NOTWITHSTANDING THE FAILURE OF ESSENTIAL PURPOSE OF ANY REMEDY CONTAINED HEREIN. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, SHOPHERO’S TOTAL, CUMULATIVE, AND AGGREGATE LIABILITY TO CUSTOMER; SHALL NOT EXCEED THE FEES RECEIVED BY SHOPHERO FROM CUSTOMER FOR TWO MONTHS AVERAGE USAGE OF THE SHOPHERO SERVICE.
10.5 THE PARTIES AGREE THAT: (A) RARELOGIC WOULD NOT HAVE ENTERED INTO THIS AGREEMENT WITHOUT THIS ARTICLE BEING INCLUDED HEREIN AND THE LIMITATIONS AND EXCLUSIONS OF LIABILITY IN THIS ARTICLE REPRESENT THE PARTIES AGREEMENT AS TO THE FAIR ALLOCATION OF RISK BETWEEN THE PARTIES.
11.1 Customer shall indemnify, defend, and hold RareLogic harmless from and against any and all loss, damage, claims, demands, actions and costs (including legal/attorney fees), charges, expenses and liabilities of whatsoever nature incurred by a RareLogic Indemnity directly or indirectly out of or in connection with: (i) the alleged misappropriation or infringement of the proprietary or intellectual property rights of a third party in respect of the User Data; or (ii) any representation, warranty or other commitment made by Customer to any third party in respect to the Service; or (iii) breach by Customer of any of its warranties or representations under this Agreement (“Claim”).
11.2 RareLogic shall in its discretion give Customer conduct of any Claim to control the defense and settlement of such Claim (provided that RareLogic may participate with counsel of its own choosing), and RareLogic shall provide reasonable assistance, at Customer’s expense, in defending or settling such claim.
12.1 ShopHero shall provide reasonable technical assistance on a no-charge email and telephone basis to Customer during regular business hours posted at http://www.shophero.io.
12.2 ShopHero shall not be responsible for any of Customer’s telephone, Internet, email, or other costs, nor shall ShopHero be responsible to Customer for ShopHero’s inability to provide Technical Assistance. ShopHero shall not provide assistance to Customer for any product or ShopHero Services other than the ShopHero Service.
12.3 ShopHero reserves the right to partially or fully take the ShopHero Service offline from time to time in order to perform maintenance, support, and/or upgrades to the ShopHero Service. ShopHero will attempt to notify Customer by one of the following methods when such offline periods are scheduled to occur: (a) by email; (b) by displaying a notification upon the Customer attempting to log into the ShopHero Service’s reporting interface; or (c) by displaying a notification upon Customer attempting to connect to any ShopHero Equipment.
13.1 Changes to the Services and this Agreement. ShopHero reserves the right to at any time modify, enhance, add to, and/or remove the capabilities, features, and/or functionality of the ShopHero Service, including without limitation, the User Data that the ShopHero Service is able to collect, transmit, store, process, and/or report; and/or the provisions of this Agreement. Changes to this Agreement will be notified to Customer by email, on next login to the ShopHero Service or on the home page of the ShopHero Website. Customer’s continued use of the ShopHero Service for more than thirty (30) calendar days following such changes shall constitute Customer’s acceptance of, and agreement to, each and every change.
13.2 Force Majeure. ShopHero shall not be liable to Customer or to any user of Customer’s Website, nor to any other party for failure of ShopHero to perform any and/or all of ShopHero’s obligations under this Agreement as a result of an event beyond ShopHero’s reasonable control, including without limitation, but is not limited to, an act of god, war, terrorism, act of government, interruption or failure of electrical power, climate control system, telecommunications system, computer network or security system, failure of a vendor or supplier, fire, flood, strike, labor dispute, criminal act, and/or unusual or severe weather.
13.3 Governing Law. This Agreement shall be construed, interpreted and governed in accordance with the laws of the Province of Ontario, Canada. If any provision of this Agreement is held to be unlawful or unenforceable, such provision shall be severed from this Agreement but all remaining provisions of this Agreement will remain in full force.
13.4 Notices. ShopHero or Customer may provide notice to the other by email, by facsimile transmission, and/or by written document mailed by first class mail or delivered personally or by courier to the receiving party. In addition, ShopHero may also provide valid notice to Customer by posting a notice on the ShopHero Service logon screen. Each notice provided by a party to this Agreement shall be deemed to have been received by the other; the same day if sent by email or facsimile transmission; five (5) business days after being sent by first class registered or certified mail; the day of delivery if delivered personally or by courier; or ten (10) business days after being first posted by ShopHero on the ShopHero Service logon page. Customer shall promptly update any of Customer’s contact or billing information that has changed.
13.5 Publicity. Provided that neither party releases, discloses, or makes publicly available any Confidential Information of the other party, ShopHero and Customer may refer generally to the existence of this Agreement. ShopHero may also list and show the Customer as a customer of ShopHero on the ShopHero Website and in other ShopHero marketing materials, including digital and print materials prepared by or for RareLogic.
13.6 Unfair Competition. Customer warrants that Customer has not entered into this Agreement with ShopHero to gain competitive intelligence regarding the capabilities, features, and/or functionality of the ShopHero Service, nor will Customer produce a competing product based on Customer’s knowledge of the ShopHero Service for a period of two years after the expiry or termination of the Term. Customer further warrants to ShopHero that Customer is not employed by, in partnership or alliance with, or in any way affiliated with any producers of competing technology.
13.7 Independent Contractors. ShopHero and Customer shall remain independent contractors at all times. Neither party will represent that it has authority to assume or create any obligation on behalf of the other, or is the agent, employee, franchisee, or representative of the other. Neither party will create any obligation or liability on the part of the other.
13.8 Binding Terms. This Agreement shall ensure to the benefit of, and be binding upon, ShopHero and Customer and their respective successors, representatives, and assigns. No provision of this Agreement is intended to create, or shall create, any third party beneficiary contract, nor any rights which may be asserted by any party who has not accepted this Agreement. No third party may enforce any provisions of this Agreement against ShopHero or Customer, either individually or collectively.
13.9 Assignment. ShopHero may assign this Agreement upon the provision of written notice to Customer, including as part of any sale, transfer, assignment, and/or conveyance of all and/or any part of ShopHero, its shares, assets, intellectual property, property, business units, and/or business operations. Customer shall not assign this Agreement or its rights hereunder without the prior written consent of ShopHero.
13.10 No Waiver. No waiver of any breach hereunder shall be effective unless contained in a written document signed by the party negatively affected by such waiver, nor shall any such waiver constitute a waiver of any other breach.
13.11 Entire Agreement. This Agreement constitutes the sole, exclusive, and complete Agreement between the ShopHero and Customer relating to the ShopHero Service and supersedes all prior and/or contemporaneous written and/or oral agreements or representations between ShopHero and Customer concerning the subject matter of this Agreement. | 2019-04-23T16:56:24Z | https://shophero.io/terms-of-service/ |
Many Christians fail to realize that there are a number of different kinds of baptisms taught in scripture. Not every baptism talks of water. Hence, we need to consider the following verses.
Eph.4:4-6 "One body, and one SPIRIT, even as each of you are invited in one expectation of your invitation; One ADONAI, one faith, one baptism, One ELOHIM and Father of all, who is above all, and through all, and in you all."
We see from these verses that there is only one faith - that being the faith of the Son of God (Gal.2: 20). How far we err when we talk of a Catholic faith and a Protestant faith! There is but one faith. It is not a Baptist faith, a Methodist faith, or a Presbyterian faith. It is not an Independent faith, an undenominational faith, or an interdenominational faith. It is the faith once for all delivered unto the saints. God never distinguished believers into different camps, and when people do separate themselves into separate groups, God rebukes them! (Read carefully 1 Corinthians 1:11-13). I, myself, am blessed to be a Christian, with no allegiance to any man-made organizations. In this way, I can allow the Word of God to be my authority not some man -- made denomination.
Eph.4:5 states there is only "One Baptism." It is on this point that most Christians often break the Unity of the Spirit and fail most miserably in keeping that unity in the bond of peace. Believers, for centuries, have been hopelessly divided on the question of Baptism; there are differences as to the proper mode, the proper purpose, the proper subject, and the proper authority. Some immerse, some sprinkle, and some practice effusion. Most denominations use some adaptation of the formula of Matthew 28:19, "in the name of the Father, the Son, and the holy Spirit" (which none of the apostles ever used as far as the Acts record is concerned); others use the formula of Acts 2:38, "in the name of Jesus MESSIAH." Some immersionists are satisfied to place the candidate under water but once; others practice "trine immersion," once for each member of the Godhead.
Many groups insist that the purpose of baptism with or in water is the remission of sins (just like Peter preached on the Day of Pentecost, and Jesus commanded in Mark 16). Of these groups, some such as Roman Catholics believe that sins are remitted when the water is sprinkled upon the candidate- whether he is an infant or adult. Others, such as the churches of Christ, believe the sins are forgiven only if the candidate is an accountable believer who has repented of his sins and confessed his faith in Christ. The baptism, in order to be valid, must, according to them, be complete immersion with both the baptizer and the baptized in the water. The Greek Orthodox church practices immersion, but they immerse babies as well as adults. Baptists, on the other hand, insist that water baptism has nothing to do with salvation. To them, it is a witness to the world, or a door to church membership. Mark 16, which is used so frequently as a proof text by members of the Church of Christ, "he that believes and is baptized shall be saved," is interpreted by Baptists and others to mean, "he that believes and is saved should be baptized" (even though the verse is clear that baptism is for salvation). It is interesting to note that the remainder of Mark 16 promises miraculous healings, speaking in tongues, and other signs as proof of salvation. If our marching orders for today are in Mark 16, where are the signs?
(1 Peter 3:13-21). Note that the occupants of the ark did not get wet.
(1 Corinthians 15:29). Note this is the verse Mormons use to support their view on baptism for the dead.
(1 Cor. 10:2). Note again, these who were baptized "in the cloud and in the sea" went across on "dry ground" according to the Exodus account; their baptism was apart from water. This is obviously not a "water baptism" for Israel crossed the Red Sea on "dry ground" (Exodus 14:22). Pharaoh and his army, were the ones dipped into the water as it crashed down on them in divine judgment. However, it was Israel who was said to have been baptized. Hence, this was a dry baptism!
(Mat.3:14; etc.). Note, the Lord states it was necessary, not that it was for a testimony.
"For in one SPIRIT we were all baptized into one body—Jews or Greeks, slaves or free—and all were made to drink of one SPIRIT."
The answer to these questions, is a resounding no. Hence, the traditional denominational definition is a totally inappropriate definition.
Therefore, it is from this unsound definition that the whole idea of baptism as a burial with MESSIAH in water has evolved. But the fact remains that MESSIAH was not buried in water. No one buries people in water, except perhaps at sea as an expedient.
While it is beyond the scope of this paper, it is interesting to note how few of these 12 baptisms could possibly be water. If you are honest with yourself, it is clear that baptism is not always synonymous with water. In fact, only numbers 8-12 have water, and one of these is a man-made baptism! Out of those that do contain water, it is accepted by almost all Christians that numbers 8-10 do not apply to anyone but Old Testament Saints, or those who made the Word of ELOHIM of no effect. Therefore, we need to trace the doctrine of Water Baptism in scripture.
Water Baptism was not a New Testament innovation. This fact will be something new to many people, and may even shock some. Many baptismal ceremonies were prescribed in the Mosaic Law. The following verses should be enough to show this irrefutable fact: Exodus 29:4, Exodus 30:17-21, Numbers 8:5-7, Numbers 19:1-22 (pay close attention to verses 7-9, 13, 20-21), and Numbers 31:23. The King James Bibles, and many other Bibles do not use the word "baptism" in any of these passages because that word is a transliteration of a Greek word and not an English translation, as we have already seen.
In John 1:25 John the Baptist was asked, "Why baptize you then, if you be not that MESSIAH, nor Elijah, neither that prophet?" Visibly these inquirers were not shocked by Johns practice of water baptism as though it were something innovative to them. Rather they anticipated the practice of water baptism in connection with the coming of Messiah. Where could this expectation have come from except the prophecies found in Old Testament Scriptures? Furthermore, we need to keep in mind the Mosaic economy was still in force during the ministries of both John and Jesus. Hebrews 9:17 declares a testament is of force after men are dead. Thus the new covenant could not possibly replace the old until after the death of MESSIAH.
Hence, Johns baptism was not something new, rather it was a ceremony thoroughly understood by those to whom he ministered. Therefore, water baptism did not begin with John the Baptist. When we permit scriptures to be our authority rather than a denominational bias we quickly learn that water baptism is a ceremonial cleansing that pertains to the kingdom promised to the nation Israel.
In Exodus 19:5-6 at the very giving of the Mosaic Covenant, YAHWEH tells us what His intention in giving birth to the nation of Israel was.
Isaiah 61:6 But you shall be named the priests of YAHWEH; men will call each of you the ministers of our ELOHIM: you will eat the wealth of the nations, and you will boast in their glory.
In due course this will be accomplished during the kingdom reign of MESSIAH when Israel is dwelling in her land and the nations find salvation and blessing through her instrumentality.
First must come cleansing or purifying, done by a washing with water.
Exodus 29:4 "And you shall take Aaron and his sons to the door of the tabernacle of congregation. And you shall wash them in water."
Exodus 29:7 "Then shall you take the anointing oil, and pour it on his head, and anoint him."
Exactly as the sons of Aaron were the priests through whom the people of Israel could draw near to YAWEH, so the nation Israel itself will one day be " a kingdom of priests and an holy nation," through whom the Gentiles will draw near to YAHWEH (Gen.12:1-3; 22:17-18; Isa.60:1-3, Zech.8:20-23). It is in this light that John the Baptist appears on the landscape preaching his "abaptism of repentance to all the people of Israel" (Acts 13:24).
To state it another way, John's "the baptism of repentance for all remission of sins" (Mark 1:4) was a mechanism of national repentance and readiness to be the kingdom of priests YAHWEH intended that favored nation to be.
Matthew 3:1-2 "In those days came John the Baptist, proclaiming in the wilderness of Judaea, And saying, Repent all of you: for the kingdom of heaven is at hand."
How were they to prepare for the arriving of the kingdom?
Matthew 3:5-6 "Then went out to him Jerusalem, and all Judaea, and all the region round about Jordan, And were baptized of him in Jordan, acknowledging their sins."
Matthew 3:8-12 "Bring forth therefore fruits meet for repentance: And do not think to say within yourselves, We have a father, Abraham. For I say to you that ELOHIM is able to raise up children to Abraham from these stones. And now also the axe is laid to the root of the trees: therefore every tree which brings not forth good fruit is hewn down, and put into the fire. I indeed baptize you with water to repentance. but he that comes after me is mightier than I, whose shoes I am not worthy to bear: He shall baptize you with the holy SPIRIT, and fire:"
Pay attention to the choice set before Israel: there was a judgment coming and if they wanted to be the "wheat" that is safely carried into the barn and not the "chaff" that is to burn with the fire of judgment they must be identified as the believing remnant through the baptism of repentance for the remission of sins.
Exactly as in Numbers 31:21-24, if they wanted to avoid the fire they must "go through the water." Thus they would be "purified with the water of separation" and recognized collectively as the believing remnant in Israel set apart as "an holy nation."
John's baptism became a break through issue for Israel.
Luke 7:29-30 "And all the people having heard, and the tax-collectors, declared ELOHIM righteous, having been baptized with the baptism of John, But the Pharisees and the lawyers rejected ELOHIM's counsel as to themselves, not being baptized by him."
This is the underlying principle involving water baptism, and how it was associated with salvation and the remission of sins. Salvation was by faith, but the only way they could articulate their faith was by doing what ELOHIM required. What ELOHIM mandated, was the nation of Israel to prepare itself to function as a "royal priesthood. First must come the purification; then the service.
Ezekiel 36:25 promises Israel that they would be cleansed by the sprinkling of water. This was the necessary first step of faith in forming the nucleus of the coming kingdom, the group of Jewish believers, which our Lord called His "little flock."
Luke 12:32 "Awe not, little flock; for it is your Father's good pleasure to give you the kingdom."
The next stage in preparing this believing remnant was Matthew 3:11's baptism with the SPIRIT. This baptism would correspond with the second rite of consecration to the priesthood (the anointing). The baptism with the holy SPIRIT would impart the needed empowering for the nations impending service.
Hence, this explains why Jesus post-resurrection ministry ties these two things the baptism of repentance and the anointing of the holy SPIRIT so intimately together. One need only to read Mark 16:15-17, Luke 24:47, Acts 1:4-8, etc. to see this.
Following the coming of the holy SPIRIT at Pentecost, Peter's plea to Israel is unmistakably a further development of Johns call to repentance (Acts 2:38). Those who think the role of water baptism somehow changed after Pentecost should notice that the pre and post resurrection baptisms were identically the same. "Repent, and be baptized for the remission of sins" is exactly what John proclaimed in Mark 1:4. Nothing had changed. More exactly there had simply been the historical development of the crucifixion and resurrection of MESSIAH, followed by the outpouring of the holy SPIRIT. The kingdom was no longer merely "at hand" as it had been with John; now the time had come to in fact offer it to Israel. Furthermore, even after Pentecost those who refused to be baptized stood as condemned before ELOHIM as did those in Luke 7:30, for Peter declares such in Acts 2:39-40.
This indispensable issue of assembling collectively the believing remnant of Israel the "little flock" of Luke 12:32 runs all the way through the ministries of John, Jesus, and the twelve in early Acts. This "little flock" represented the core of the governmental authority for the approaching kingdom. Those in Israel who refused to "repent and be baptized" to identify themselves as those who had changed their minds about Jesus being their Messiah through the baptism of repentance for the remission of sins were to be "destroyed from among the people." (Acts 3:23). Hence, it is very clear in scripture, water baptism is a ceremonial cleansing that pertained to the kingdom promised the nation Israel.
"Also he shall wash his flesh in water, and he shall be clean."
The "nations" of Matthew 28:19 were of course considered "unclean" by Israel and thus must be baptized be cleansed in order to gain access to Israel's kingdom and acceptance into ELOHIM's favor. Both Israel and the Gentiles needed to be acknowledging their need of cleansing; the former in order to be worthy to minister the things of YAHWEH; the latter to be the recipient of those things.
In Acts 10, we find a most unusual account. The Apostle Peter, who received the commission of Mark 16 to "proclaim the evangel to every creature," had never preached to anyone but the Jews. ELOHIM gave a miraculous threefold vision to him to persuade him to go to the house of an ELOHIM-fearing Gentile, Cornelius, a man who was earnestly seeking the truth. But when Peter went to his house, he did not give him an invitation to salvation. On the contrary, he made apologies for entering a Gentiles house, and rehearsed the blessings of YAHWEH to Israel. As he was in the midst of this, he said, "To this One all the Prophets witness, so that through His name everyone believing into Him will receive remission of sins." This is the message Cornelius was waiting to hear! As soon as they heard this message, Cornelius and those Gentiles with him believed it and were baptized with the holy SPIRIT and began to speak in languages! Peter then remembered the words of ADONAI (see Acts 11:15-16) and identified this experience of Cornelius and his household as the baptism with the holy SPIRIT promised by MESSIAH. He then required them to be baptized with water. This was still a time of 2 baptisms, but this time, the baptism with the holy SPIRIT was first, followed by baptism with water! This seems to be the pattern during the remainder of the book of Acts.
As long as ELOHIM dealt with Israel as a nation, he continued the sign program, for the Jews require a sign" (1 Corinthians 1:22). The very last account of water Baptism in the Bible occurs in Acts 19, and the same believers who were baptized, spoke with languages. Paul as well as Peter, practiced water baptism during this period, but he baptized only a few and thanked ELOHIM that he had baptized no more, "for," said he, MESSIAH sent me not to baptize but to proclaim the evangel (1 Corinthians 1:17). Had Israel been willing, as a nation, to accept the Messiah, the commission of Mark 16 would have been used by these believing Jews to reach every creature, beginning at Jerusalem, extending to Judea, Samaria, and the uttermost part of the world. MESSIAH would have returned in the lifetime of that generation, according to the promise made in Acts 3:19-21, a promise conditioned on Israel's conversion.
With the close of the book of Acts, the Apostle Paul pronounced this divine judgment upon the nation Israel and turned to the Gentiles (Acts 28; 25-28). From that time forth in his ministry, as a prisoner of ELOHIM for the Gentiles, he never gave Israel priority; he never performed a miracle or a sign. On the contrary, he left a young fellow worker sick and prescribed medicine for young Timothy. See 2 Timothy 4:20, and 1 Timothy 5:23. He never engaged in external rituals or ordinances; and he preached only One Baptism - the work of the holy SPIRIT that identifies or baptizes the believer into the very death of MESSIAH (see Romans 6:3-4 with Galatians 2:20; Colossians 2:11-12).
This act of the holy SPIRIT (the Baptizer) baptizing the believer into the death of MESSIAH (the "element") and thus so identifying the believer with his ADONAI as to make him a member of the Body of MESSIAH, takes place the moment one believes the evangel of the Favor of ELOHIM; this is the One Baptism (and only) for today. (Note Ephesians 4:5 with 1 Corinthians 12:13). It is an operation of ELOHIM, not of man (Colossians 2:11-12). Thus, we stand complete in MESSIAH, apart from the works of men, either our own or anothers. This one baptism that identifies us with MESSIAH as members of His Body was a part of a revelation received by the Apostle Paul, which he calls "the mystery"-- a secret that had been kept hidden in ELOHIM before the foundation of the world, never made known to men of other eons. See Ephesians 3:1-10, Colossians 1:25-29.
1 Corinthians itself is, of course, a transitional book, written during the Acts period. It told its readers clearly that the sign program was to cease (1 Corinthians 13:8-11). It told them that while Paul had baptized a few and spoke with languages (more than all of them), he was not sent to baptize (1 Corinthians 1:17) and languages would cease (13:8). Peter could never have made this statement, for he was sent to baptize with water, and speak in languages (Mark 16:16-19). In fact, anyone who labors under the so-called "great commission" could never make that statement with Paul. By his conveying "MESSIAH sent me not to baptize," he is also telling us that the "great commission" is not the commission he, nor we, in the Body of MESSIAH are to follow.
While I steadfastly maintain that the Scriptures are our sole authority in this as in other matters, and I do not base any doctrine on ecclesiastical history. We find many Christians who are disturbed because they feel that the doctrine of the one baptism, (a SPIRIT baptism apart from water), is a 19th or 20th century innovation with none of the earlier believers holding such teaching. I am mindful that not only this truth, but also many other truths of the Scriptures were corrupted and lost, even in the first and second centuries. But my heart rejoices when I find on the pages of ecclesiastical history a group of believers who were very active in Asia Minor and the Mediterranean area some one thousand years before Martin Luthers reformation, who preached and practiced completeness in MESSIAH, and stressed the one baptism of the SPIRIT, with no water baptism. They preferred to be called "Christians" only, but they emphasized the ministry of Paul so much that their enemies called them "Paulicians." The Quakers, or Society of Friends, have from their beginning preached the one baptism of the SPIRIT. Roger Williams, who was for a number of years a Baptist evangelist and who may have established the first Baptist Church in America in Rhode Island during colonial times, in his later years left all denominations and became what he called a "seeker" for truth; he gave up water baptism and preached this one baptism. He also called the "great commission something God never intended for the Body of Christ." These cases are cited only as proof that many of ELOHIM's children down through the history of Christianity have maintained this position.
Today there is no priestly nation or class high-ranking above others. ELOHIM is now reconciling Jews and Gentiles to Himself in one body purely through faith in the completed work of the ADONAI Jesus MESSIAH at Golgotha (1 Corinthians 15:3-4, Ephesians 2:13-18). The very instant a believer trusts the Evangel (1 Cor.15:3-4), he is "by one SPIRIT baptized into one body" (1 Cor.12:13) and thus "baptized into MESSIAH" (Gal.3:27). There is no opportunity for a water ceremony here. No human rite or ceremony can consign the believer "into MESSIAH." No, the "one baptism" (Eph.4:5) of the "one Body" is performed by "One SPIRIT" not by preacher or priest.
Ephesians 1:3 "Blessed be the ELOHIM and Father of our ADONAI Jesus MESSIAH, who having blessed us with every spiritual blessing among the epouranian (literally-the heaven far above the heavens), in MESSIAH;"
In light of such completeness in MESSIAH afforded to even the simplest believer the very moment of salvation it will soon be apparent that not only does water baptism have no place in ELOHIM's program today, but to practice it is to cast an insult on the glorious, all sufficient, finished work of the ADONAI Jesus MESSIAH (Col.2:20).
I thank ELOHIM that "by one SPIRIT are we all baptized into one body." ELOHIM forbid that we should add to that "one baptism" which makes us complete in Him. | 2019-04-25T13:50:39Z | http://pluto.matrix49.com/15577/?subpages/Water-Baptism.shtml |
Can “Paycheck Equity” be Mandated?
For decades, one of the most salient features of women’s status in the labor market was their tendency to work in a fairly small number of relatively low-paying, predominantly female jobs. That has changed and as it has differences in aggregate average wages between men and women (the most often cited data on the “wage gap”) have narrowed. Still, the aggregate average wages of women are almost 20 percent lower than the aggregate average for men. But that data say almost nothing about whether employers compensate men and women in similar positions differently. Only a thin veneer of empiricism covers what seems to me to be fundamentally ideological arguments in the public debate on what, if anything, government should do to address the gender wage gap issue. Proponents of “paycheck equity” measures don’t often acknowledge that research shows that differences in labor force participation, occupation, experience, etc. account for the majority of the difference between the average wages of men and women. While those who believe markets (including labor markets) operate perfectly, and who reject almost all government interjections into markets, fail to note that even accounting for differences in occupations etc., there is still a significant portion of the pay differences between men and women that is unaccounted for or “unexplained.” The unexplained portion of the wage gap is probably 8 percent or less and whether this difference in wages is the result of biases or discrimination that can be remedied by legislation is the fundamental public policy at issue.
Living with four, smart, talented, women with strong opinions makes me approach this subject with trepidation. It is possible that one or more of them may talk to me even less than they do now (I am comforted knowing that it gets incrementally more difficult for this to occur as the amount approaches zero) if my interpretation of the issue is in error in their eyes. Still, as the father of daughters, I want to know if there are any biases in the labor market that may constrain their earnings and limit their ability to care for me in my dotage.
To truly know whether biases or discrimination (intentional or not) contribute to the wage gap you have to do the impossible, you have to compare the wages of men and women with identical ages, education, qualifications, experience, motivations, work habits etc., in identical jobs, working for identical companies, and you have to do it for the entire male and female workforce (across all occupations). Nobody can do that so in the absence of a Boston Celtics, Boston Bruins, or UNH hockey game on television this past Saturday evening I undertook a smaller task to gain the kind of first-hand insight into the issue that only analyzing data can provide.
My goal was to compare the wages and salaries of full-time working men and women who are as similar in education, age, experience, occupation and other factors (marriage, children etc.) as possible, to see if wage and salary difference exist when as many key characteristics of individuals are as similar as possible. The 2009 March Supplement of the U.S. Census Bureau’s “Current Population Survey” contains information on the college majors of those who have earned degrees, in addition to the usual labor force, earnings, and demographic information it provides about survey respondents. I extracted microdata for over 5,000 survey respondents nationally whose highest educational attainment was a bachelor’s degree in accounting and who were employed full-time as accountants or auditors. Focusing on just one occupation and one level of educational attainment limits the ability to generalize my results (that is, results and conclusions may not apply to other occupations or to other levels of educational attainment) but choosing just one occupation that has a relatively equal employment distribution between men and women, and just one education level is likely to provide the cleanest evidence or lack thereof for the wage gap.
Many factors contribute to gender wage differences between men and women in the same occupation. In the end, like other researches, my analysis showed that under 10 percent of the difference between the wages and salaries of men and women (in accounting) cannot be explained by difference in hours worked, the presence of children etc. This little exercise cannot say whether those “unexplained” or unaccounted for factors mean discrimination or bias or less pernicious forces that are not captured or measured with available variables. Regardless, the results were fascinating (to me at least) for a number of economic and sociological reasons.
At all age levels, women in accounting worked (on average) fewer hours weekly than did men (Figure below). This was true for women with and without children and whether they were married or not. Regression models show that each additional hour worked per week actually added more to the annual wage and salary of women than to men ($641 to $568). This suggest to me that women are rewarded equally for additional labor and that some of the wage gap in accounting is simply attributable to the longer (on average) hours worked by men.
Child birth and care is associated with lower labor force participation among women but on average, women in accounting worked fewer hours than did men whether or not they had children. This is not an epiphany because child care responsibilities still disproportionately fall on women. The presence of children, however, does have a much more negative impact on hours worked for women than it does for men. The effect on hours worked diminishes by age for women – presumably because children are more likely to be older and in need of less care. Interestingly, among younger men, the presence of children reduces hours worked (not as much as it does for women) but among older men, the presence of children is associated with small increases in hours worked. I hope this implies larger roles in child care among younger men that will contribute to a further narrowing of the wage gap.
Wages grow with age and experience (typically for most individuals into their late fifties) but among accountants with bachelor’s degrees, they grow less, on average, annually for women than for men. The cumulative effects of hours worked, breaks in labor force participation among women for child care, and other factors can account for some of this. But key factors that can determine how much wages grow over time (getting promotions, asking for raises, motivation etc.) cannot be discerned from the data. If women aren’t promoted as readily or don’t seek raises as often or as large, their annual wage growth would be expected to be lower.
The figure below shows some of the wage and salary impacts for men and women of different variables. Interestingly, marriage seems to have a much more positive impact on the earnings of men than it does for women, adding $3,415 to earnings of men but just $920 for women when controlling for other variables (i.e. age and hours worked, children, etc.).
Apparently some stereotypes are based in reality and it makes me wonder what aggregate economic and societal implications this may be having as more young men seem to resist or delay marriage or long-term relationships. The big take away for me was the impact that marriage as well as the “unexplained” difference attributable to gender had on wages and salaries when earnings were not “constrained,” meaning that the data included the earnings from the highest earners, the “outliers” or top 15 percent who earn much higher salaries than typically earned in the occupation. For most of my analyses I selected data for individuals whose wages and salaries were between the 15th and 85th percentile of all earners among accountants. But I also ran the same analyses using data that was not constrained at the top of the earnings scale. This would likely include business owners and individuals in higher level positions. When data was not constrained based on wages and salaries, the impact of marriage on the wages and salaries of women was significantly negative in contrast to the wage and salary constrained data where it was positive (albeit a much smaller relationship with earnings than for males). The unexplained difference attributable to gender was also disproportionately large compared to the constrained data set. What this says to me is that the largest evidence of a gender wage gap occurs at the upper end of wages and salaries and may be more attributable to lower percentages of women in higher positions (a “glass ceiling” effect) than a paycheck fairness effect. Does this mean that women are at a disadvantage in becoming high earners if they are married, and if so, is it the result of personal choices or does the labor market systemically punish them relative to men? Does being married necessarily mean that a woman will be less likely to rise to the top of their occupation? These results do suggest a glass ceiling that contributes to the wage gap and this should trouble all fathers of daughters, brothers, husbands and even friends. Unfortunately, it doesn’t say much about what we can do about it.
We do have laws that prevent wage and salary discrimination based on race and gender and yet the wage gap persists (even as it has shrunk). As more women populate higher levels of occupations and organizations (it will happen as I suggest here and here and in several other posts), it is likely that whatever unexplained gender-based differences in wages and salaries (that are not based on occupation, education, experience etc.) will decline rapidly. To me, addressing why more women don’t reach higher positions in organizations is likely to be a much more effective prescription for whatever gender gap continues to exist than are mandates that seek to compensate for factors that we aren’t even sure contribute to wage and salary differentials between genders.
I gave a presentation last month during which I argued that the locus of economic activity in New Hampshire is shifting to the Seacoast. That is a provocative statement destined to offend the population centers of Manchester and Nashua and quite likely the individuals elected to represent them. Provocation isn’t my intent, it rarely is, but is often the result nevertheless. This shift will take years to become more apparent but the evidence for its occurrence appears across a range of important economic and demographic metrics. Over the past decade, private sector job growth in the combined Portsmouth and Dover/Rochester NECTAs** has outpaced growth in either the Manchester of Nashua NECTAs. The Seacoast is home to only about 15% of private sector employment, but that percentage is growing. The shift is not really about the job growth numbers because the Seacoast will always have smaller employment numbers than will the population centers of Manchester and Nashua. It is about how so much more of the innovation and transformation that is occurring among businesses and industries in the state’s economy is occurring in the Seacoast region.
Alone, the increase in private employment in the Seacoast relative to the Manchester and Nashua regions would not be that significant. Rather, it is the increasing share of innovation and growth in key industries that the Seacoast is capturing that indicates the locus of key economic activity is shifting. As the chart below shows, the Seacoast region has marginally increased its share of New Hampshire’s private sector employment since 2004, but it has, in relatively short time, substantially increased its share of finance and insurance industry employment, information industry employment, as well as both health care and manufacturing employment. Annual town-level data stops in 2012 but with the coming addition of technology dependent, international companies like Safran, the manufacturing trend appears to be continuing. The one key industry where the Seacoast has not gained share is in professional and business services. This is a large, important, and growing sector of the New Hampshire economy. In most states, key professional and business services firms often locate in the state’s largest city. Major NH Law firms, engineering firms, advertising agencies, and many of the other industries that comprise this sector still seem to prefer to be centrally located and have their main offices in the state’s largest city, Manchester. Having a main office anywhere other than the largest city seems to signal, to some, that a business is “regional,” that it does not serve the entire state or the larger New England region. The Seacoast is also capturing a smaller share of retail employment, which is surprising given its location along two state borders. It is not that retail is declining in the region but rather that it has grown faster elsewhere in the state.
Manchester and Nashua are still home to more companies in key industries than is the Seacoast and that will be true for some time, maybe always. Still, there was a time when the Greater Nashua and Manchester areas were the technology and manufacturing center of New Hampshire and almost all important developments in manufacturing and technology industries occurred there. These regions remain the technology leaders by numbers, but more key developments and new companies in technology and manufacturing are occurring in the Seacoast. The development of the Pease Tradeport into a premier location for industries of all types, along with the presence of a major research university (UNH), have played important roles in the shift. But what is really sustaining the trend is the ability of the region to attract the talent (skilled individuals with higher levels of educational attainment) that companies in emerging, growing and higher value-added industries desperately need. As I say far too often, brains are the most valuable resource in the 21st century. Skilled, well-educated people have the most economic opportunities and they are the most mobile members of society. Where they choose to locate, robust economic growth is likely to follow. Examining Census data indicates that skilled individuals with higher levels of educational attainment have increasingly chosen to live in the Seacoast, and that has provided a key source of competitive advantage to the region. The chart below shows how the population of individuals with a bachelor’s degree or higher has changed in some NH cities over the past two decades. The chart shows that on a percentage basis, Portsmouth and Dover, by far, had the greatest increase of individuals over the age of 25 with a bachelor’s degree among their populations. Somersworth, although beginning with a lower concentration of individuals with a bachelor’s degree, had the next largest percentage increase in subsequent decades. Among the largest cities in the Seacoast, only Rochester has not seen a substantial increase in its population with a bachelor’s degree or higher.
If the Seacoast continues to increase its concentration of “talent,” then the locus of economic activity in the state will continue to shift toward the region. Communities in the region continue to attract skilled individuals with higher levels of educational attainment because, to varying degrees, most have been able to provide a mix of services and social, cultural, and civic amenities, at a price more affordable than communities in other states. But if being the “cheapest” place to live were the key, the Seacoast would not be thriving. Rather, it is the combination of services and amenities at relatively more affordable price (providing a good value) that has been attractive. Many communities and regions are looking to thrive. Like all regions in New Hampshire the Seacoast has heard, and for the most part heeded, the call for fiscal restraint (although you can never spend too little for some or too much for others), but most of its communities have looked for ways to continue to provide or increase the quality of their services and the amenities (natural, built, civic, social and cultural) they offer. It is more difficult for urban areas to attract and retain the skilled individuals with higher levels of educational attainment that are increasingly the key to a vibrant economy because urban cities have to find ways to provide and encourage a level of services and amenities to compensate individuals for living in cities that have the problems associated with urban environments.
Most of the focus of economic development strategies is on creating policies to ensure a “good business climate.” I think that is important and I also think NH has a pretty good business climate. With so much concern over population and labor force growth and demographic changes in NH, more emphasis needs to be placed on creating a good “talent climate” as well as a good business climate. I don’t know that the Seacoast of NH has sought to do that but the demographic and economic data suggest they have done so regardless. The result has been a competitive economic advantage. On a smaller and slightly different scale you can say the same thing about the Hanover/Lebanon area which serves as a nice control group to assure the importance of amenities don’t just mean having an ocean nearby.
** NECTA = New England City and Town Area, a grouping of towns into a connected labor market area, akin to a metropolitan or micropolitan statistical area.
The employment growth report released today by the U.S. Bureau of Labor Statistics was disappointing for sure (74,000 job growth when 200,000 was the consensus estimate) but December employment numbers are more prone to seasonal adjustment errors because of the large amount of hiring that occurs prior to the holidays and this year presented even more issues because of the shortened time between Thanksgiving and Christmas (Thanksgiving was on the 28th, its latest possible date). December’s employment growth may still be disappointing but my bet is that December’s numbers will be revised up in future months. Help wanted ads have been increasing for the past six months and the labor supply/demand ratio has been falling. Unless there is an even bigger “skills gap” than many think, that implies stronger job growth than was reported in December.
The best thing about the report was that it helps focus more attention on the nation’s incredible shrinking labor force, a problem that significantly lowers the potential economic growth of our nation’s economy. Too many media reports on the nation’s and NH’s economy focus almost entirely on the unemployment rate. That is especially true in New Hampshire where, because of our demographics (a lower percentage of harder to employ populations are in our state’s labor force), we always have a lower unemployment rate than the U.S. No matter how weak job growth is in New Hampshire, many will cite our lower than the U.S. unemployment rate as a sign of economic strength. Some reporters (hat tip to John Nolan of the Rochester Times) have avoided confusing job growth with the unemployment rate but too many in our state confuse the two.
The problem of smaller or slower growing labor force is an important and vexing one for New Hampshire and the entire U.S. A smaller or slower growing labor force implies slower economic growth because the output of the economy grows when more people are producing, when more capital (equipment and machinery) allows the same number of people to produce more, or when knowledge/technology/skill levels improve and allow greater productivity per worker. So unless productivity is increasing to compensate, a shrinking or slow growth labor force means slower economic growth.
There are several reasons a labor force can shrink or grow more slowly. Some related to economic conditions, some related to demographics, and some (such as the current situation) seem to have an unexplained element. Nationally, population trends have meant slower labor force growth as lower birth rates over the past few decades and as baby boomers reach ages where labor force participation starts to decline. NH benefited from strong population growth in the 70’s and especially 80’s and 90’s. That provided a strong boost to our economy, especially since much of that pop. growth was the result of in-migration from other states by skilled, well-educated individuals (a good characterization of our in-migrants from other states is a two wage earner, married couple family, probably both college educated with children). That migration added tremendous talent to our labor force and made NH an attractive location for many business looking to employ skilled workers.
The labor force grows or shrinks by population growth in the working age population, or by changes in labor force participation (those of working age who choose to be in the labor market or not). NH and the U.S. have seen slower population growth in the working age pop., but more disturbingly, both have seen a decline in the labor force participation rate. Yes NH still has a relatively higher participation rate but the trend decline is similar to the U.S. The graph below shows the decline in participation among individuals aged 25-64 (to minimize schooling and retirement decisions as possible causes).
If your working age population isn’t growing, having high labor force participation rates is critical for economic growth. NH has had very high participation rates compared to the U.S. because of our favorable demographics (few people who traditionally have lower levels of participation – minorities, those without a high school diploma etc., and because our population overall has higher levels of educational attainment that is associated with labor force participation). Women in NH especially tend to have higher participation because of higher levels of education and lower fertility rates (child-bearing lowers labor force participation). I have written many times on gender and employment (search on gender in this blog) and the “feminization of the workforce” is a theme (non-pejoratively as the father of daughters) I believe is continuing. As the chart below shows, virtually all of the decline in the labor force participation rate in NH is a result of a reduction in the rate among males.
Labor force participation always drops during recessions as workers get discouraged and drop out. What is especially troubling today is that labor force participation continues to be weaker even as the economy has improved. Some has to do with demographics as more of the working age population ages into groups with lower participation rates although participation among those with higher levels of educational attainment seems to have held-up best. The best explanation of why labor force participation has continued to be lower than in the past is that the skills required by the economy have been changing, making many workers less qualified than before and creating more discouraged workers. I think that is part of the issue but I don’t think the “skills gap” could have so abruptly hit the labor market to cause participation rates to fall so much over the last half-decade. The skills gap has been a more slowly growing phenomenon. Among older men without a post-secondary degree, participation has been declining for decades. The skills mismatch between the supply of labor among males and the demand has been ongoing for decades. Did it peak so suddenly in the past decade to create a permanent decline in the male workforce? I don’t think so, additional factors are contributing. I remember in the 70’s when the first real oil crises hit (related to Middle East wars) and a lot of job losses resulted, especially in mill towns like the one I festered in as a youth. Someone whom I thought was wrong about almost everything said to me at that time “a man should never be ashamed of any job he takes to feed his family.” I didn’t think much about that back then, but today it seems especially appropriate, even as it appears to be increasingly a relic of an outdated ethic. Economic conditions today aren’t the result of people not wanting to work and a labor market where many individuals are working at jobs that don’t fully utilize their skills is not desirable. Changes in and the performance of the economy are obviously largely responsible for declining labor force participation. Still, with so many troubling indicators for males – especially younger males (educational performance and attainment, household formations etc.) emerging over the past decade or more , I can’t help wonder how much of the decline is the result of a lost ethic among my gender. | 2019-04-25T07:52:22Z | https://briangottlob.com/2014/01/ |
Aspects of the disclosure are directed to characterizing vehicle mass. As may be implemented in accordance with one or more embodiments, one or more operating parameters of the vehicle are obtained, and at least one qualifying period of time is identified in which the operating parameter or parameters are within a range of values associated with the parameter. A value that provides an estimate of the mass is then generated based on the one or more operating parameters.
This invention relates to an apparatus and method for estimating the fuel consumption of a vehicle using on-board diagnostics for the vehicle.
In particular, the invention relates to measurement of fuel consumption, of vehicles. We will describe an apparatus and method for means for estimating fuel consumption and/or emissions, for land vehicles, including an apparatus and method for dynamically providing an accurate estimate of fuel consumption, and/or emissions, of a particular vehicle and driver, during the course of a journey, dependent on a combination of characteristics of the particular land vehicle, driver behaviour, and journey as the journey progresses.
In our earlier patents and patent applications we described devices and methods for determining fuel consumption and/or emissions for land vehicles (“vehicles”) using signals obtained from the vehicle's engine management system through the on-board diagnostics port (OBD, OBDII, CAN and similar herein referred to as the ‘OBD port’). Often the required data is not available, or not available in a readily usable form, from the OBD port, and in our patent application (PCT no. WO2008/146020) we describe how other signals from the engine management system can be identified and used to determine fuel consumption and/or emissions values. Such information can also be used to infer driver behaviour which can be used for driver monitoring or training.
In some instances, not only some information required to perform the fuel/emissions calculations may not be available, but can even be blocked by the vehicle manufacturer. In these instances another approach is required.
There are many occasions, and many persons and entities, who would find it useful to have access to accurate predictions of fuel consumption of a vehicle on an instant to instant basis during the course of a journey. Such predictions would need to reflect the characteristics of the particular vehicle being driven and the behaviour of the driver during the course of the journey, and these characteristics would be influenced by the characteristics of the journey.
Attempts have been made to provide estimates of fuel consumption and emissions but tend to be based on averages and generalities rather than specifics of each vehicle, driver and journey, utilised on an instant to instant basis.
It would be helpful to have accurate values for fuel consumption during the course of a journey dependent on characteristics of the vehicle, driver behaviour, and journey, for example for fleet owners, haulage and like companies, and insurance companies, among others, to best manage their business.
The present invention seeks to provide such accurate values.
According to a first aspect, the present invention comprises a method of estimating the fuel consumption of a vehicle said method comprising the steps of estimating an overall power of said vehicle, by estimating a rolling power component, an aerodynamic resistance component and an acceleration component, using at least one parameter obtained from an on board diagnostic system of the vehicle; determining the type of fuel used by the vehicle; and estimating said fuel consumption by summing said components of said overall power and dividing by the energy value of said fuel type and by a predetermined engine efficiency value.
Preferably, the rolling power component is estimated using an estimated value of mass of the vehicle and/or the aerodynamic resistance is estimated using an estimated value of the frontal area of the vehicle. Preferably, the steps of estimating said vehicle mass or said frontal area comprises the step of identifying qualifying periods in which at least one motion parameter is within a predetermined range of values associated with that parameter. Preferably, the step of estimating said vehicle mass comprises the step of determining a weighted or moving average value of vehicle acceleration readings taken during qualifying periods and/or the step of determining a weighted or moving average value of overall power readings taken during qualifying periods.
Preferably, one of said motion parameters for identifying said qualifying period for estimating vehicle mass consists of said vehicle acceleration and/or one of said motion parameters for identifying said qualifying period for estimating frontal area consists of said vehicle acceleration. Preferably, the criterion for identifying said qualifying period is that said vehicle acceleration is above a predetermined threshold, said threshold being chosen to identify near peak acceleration and/or is between predetermined thresholds, said thresholds being chosen to identify periods of near steady state motion. Preferably the method further comprises the step of identifying an engine load reporting strategy for said vehicle, using at least one OBD parameter.
Preferably, the step of identifying said engine load reporting strategy comprises the steps of obtaining said engine load and said engine speed and comparing said engine load with an engine load threshold associated with said engine speed. Preferably, the engine load threshold is chosen to identify periods in which said engine is idling. Preferably, a force provided to cranks of said vehicle is estimated using an empirically derived relationship between force and engine size.
Preferably, the method further comprises a method for discovering which of a plurality of possible engine load reporting strategies is used by an On-board Diagnostics system in a vehicle with an engine, comprising examining On-board Diagnostics system parameters, and determining the engine load when the engine is operating in such a manner as to substantially maximise the difference between the engine load values which would be produced by the different engine load reporting strategies.
Preferably, the method further comprises identifying periods in which said engine is idling as to substantially maximise the difference between the engine load values which would be produced by the different engine load reporting strategies.
Preferably, periods in which said engine is idling are identified by using said On-board Diagnostics system parameters and/or by comparing said engine speed with an idling speed threshold.
Preferably, the method further comprises of adjusting said idling threshold speed to allow for a time for which said engine has been running and/or to allow for an engine temperature and/or to allow for an engine capacity and/or to allow for a fuel type of said engine.
Preferably, the method further comprises said step of performing a check to discover whether said vehicle is being held in a stationary state by means of engaging a clutch plate. Preferably, said check is performed by comparison of a reported engine load with an engine load threshold. Preferably, the method further comprises performing a check that said engine is running. Preferably, the method further comprises performing a persistency check on said discovered reporting strategy.
Preferably, the method further comprises using of a latch circuit to store an indicator as to said discovered reporting strategy.
Preferably, a speed of said vehicle is used in discovering said reporting strategy.
Preferably the method further comprises a method of estimating an effective frontal area or aerodynamic resistance of a vehicle including an engine comprising; at a substantially constant speed of the vehicle determining the total power of the engine and determining the rolling resistance power to overcome the rolling resistance of the vehicle at that substantially constant speed; subtracting the determined rolling resistance power from the determined total current power to determine the aerodynamic resistance of the vehicle or the effective frontal area.
Preferably, the method further comprises identifying periods in which said vehicle is travelling at a substantially constant speed. Preferably, the step of identifying said periods of substantially constant speed comprises use of on board diagnostic system output and/or use of one or more of a vehicle speed, a vehicle acceleration, an engine speed and an engine load and/or comparing one or more of vehicle speed, vehicle acceleration, engine speed and engine load with predetermined reference levels.
Preferably, the method further comprises the step of estimating said total current power for said vehicle during a period in which said vehicle travelling at a substantially constant speed. Preferably, the step of estimating said total current power comprises use of an engine load parameter provided by said On Board Diagnostic system. Preferably, the method further comprises the step of adjusting said total current power by allowing for transmission losses. Preferably, the step of adjusting said total current power to allow for transmission losses comprises the step of subtraction and/or multiplication of said total current power by one or more empirical power factors. Preferably, the method further comprises the step of finding a moving or weighted average for said total current power over a plurality of periods of substantially constant speed.
Preferably, the method further comprises the step of estimating said aerodynamic resistance power by estimating rolling resistance power and subtracting said rolling resistance power from said total current power.
Preferably, the step of estimating rolling resistance comprises using estimates of said vehicle's mass, said coefficient of drag and said vehicle speed. Preferably, the step of estimating rolling resistance further comprises making allowance in said estimation of rolling resistance for a gradient on which said vehicle may be travelling.
Preferably, the method further comprises a method for determining the fuel type of a vehicle, comprising obtaining the output parameters of an On Board Diagnostic (OBD) system of the vehicle, and using said output parameters to determine the fuel type used by the vehicle.
Preferably, the method comprises identifying whether the engine is being throttled, or measuring whether the exhaust gases are in the range typical of a diesel engine or a petrol engine, or checking the fuel pressure, or using a plurality of fuel type identifying methods and further comprising assigning a weighting to the output of each of the plurality of fuel type identifying methods, said weighting varying according to the type of fuel identifying method and summing the weightings and compare the sum of the weightings to a predetermined threshold, to decide the fuel type of the vehicle.
Preferably, the method comprises the step of identifying whether the engine is being throttled comprises comparing the Manifold Absolute Pressure (MAP) with a threshold and/or comparing the air flow with a predetermined proportion of the engine capacity.
Preferably, the method comprises the step of checking whether the exhaust gases are in the range typical of a diesel engine or a petrol engine and/or checking the OBD protocol and/or checking the fuel status parameter identifier of an OBD system.
Preferably, the method comprises the step of allowing a manual override of the results of the automatic detection of fuel type.
Preferably, the method further comprises a method of estimating the mass of a vehicle; said vehicle having motion parameters comprising a vehicle speed parameter, a vehicle acceleration parameter and a maximum acceleration parameter, said vehicle having an engine, said engine having an engine capacity parameter and engine activity parameters comprising an engine speed parameter, a power parameter, a maximum power parameter and an engine load parameter, said method comprising the step of determining a weighted or moving average value of vehicle acceleration parameters taken during qualifying periods wherein at least one of the motion parameters and/or at least one of the engine activity parameters are within a predetermined range and using said weighted or moving average value of vehicle acceleration to estimate the mass of the vehicle.
Preferably, the value of at least one of said at least one motion parameters or engine activity parameters is obtained from at least one output parameter of an on board diagnostic system.
Preferably, the method further comprises the step of identifying near peak acceleration periods in which at least one of the at least one motion parameters or engine activity parameters indicates that the said vehicle is accelerating at near to its maximum acceleration.
Preferably, said at least one output parameter is one of the engine load, engine speed, vehicle speed and vehicle acceleration.
Preferably, the method further comprises the step of comparing said vehicle acceleration with at least one predetermined acceleration threshold and/or comparing said vehicle speed with a first predetermined vehicle speed threshold and/or comparing said vehicle speed with a second predetermined vehicle speed threshold and/comparing said engine load with at least one predetermined engine load threshold and/or comparing said engine speed with at least one predetermined engine speed threshold.
Preferably, each of the at least one predetermined thresholds is assigned a value according to the type of vehicle.
Preferably, said weighted or moving averaging is performed only if at least one of said motion parameters or engine activity parameters is within a predetermined range or only if a plurality of said motion parameters or engine activity parameters is within a predetermined range set for the said parameter or only if all of said motion parameters or engine activity parameters is within a predetermined range set for said parameter.
Preferably, the method further comprises determining a force provided to a crank of the vehicle during qualifying periods. Preferably, the method further comprises the step of estimating said mass of said vehicle by dividing said force by said weighted or moving average acceleration value. Preferably, the method further comprises the step of checking whether at least one qualifying period has occurred.
Preferably, the method further comprises the step of estimating a value of said force provided to said crank using said engine size and empirically determined constants. Preferably, said value of said force is used in the calculation of mass if no qualifying period has occurred.
Preferably, the method further comprises the steps of obtaining or estimating an air flow through said engine; calculating a provisional fuel mass estimate by dividing the obtained or estimated air flow by a stoichiometric ratio associated with the fuel type; estimating the fuel consumption by dividing said provisional fuel mass estimate by an oxygen content parameter derived from an analysis of exhaust gases. Preferably, the method comprises measuring a mass air flow and/or estimating said air flow using the ideal gas equation, using estimates of pressure, volume flow rate and temperature.
Preferably, the method comprises estimating said pressure using a Manifold Absolute pressure sensor and/or using a Manifold Air temperature sensor.
Preferably, the method comprises calculating said estimate of said volume flow rate using an engine size and an engine speed.
Preferably, the method comprises obtaining said oxygen content parameter from an exhaust oxygen sensor or from a look-up table, said table providing oxygen content values according to engine speed and vehicle type.
Preferably, the method further comprises estimating an overall power of said vehicle by estimating a rolling power component, an aerodynamic resistance component and an acceleration component, using at least one parameter obtained from an on board diagnostic system of the vehicle; determining the type of fuel; and estimating said fuel consumption by summing said components of said overall power and dividing by the energy value of said fuel type and by a predetermined engine efficiency value.
Preferably, the method further comprises estimating an upper limit and lower limit for vehicle mass. Preferably, the method further comprises estimating an upper limit and a lower limit for fuel consumption, based on said upper limit of mass and said lower limit of mass respectively.
According to a second aspect, the present invention comprises apparatus for estimating the fuel consumption of a vehicle, said apparatus comprising estimating means for estimating and providing a parameter relating to overall power of the vehicle estimating means for estimating and providing a parameter relating to a rolling power component, estimating means for estimating and providing a parameter relating an aerodynamic resistance component and estimating means for estimating and providing a parameter relating to acceleration component, said overall power estimating means being adapted to be connected to an on board diagnostic system of the vehicle to receive and use at least one parameter obtained therefrom; means to provide a parameter indicating the type of fuel used; and means connected to receive the parameters relating to the estimated rolling power component, the estimated aerodynamic resistance component and the estimated acceleration component and to estimate said fuel consumption by summing said components of said overall power and dividing by the energy value of said fuel type and by a predetermined engine efficiency value.
Preferably, the means for estimating the rolling power component uses an estimated value of mass of the vehicle.
Preferably, the means for estimating the aerodynamic resistance uses an estimated value of the frontal area of the vehicle.
Preferably, means for estimating said vehicle mass or said frontal area is adapted to identify qualifying periods in which at least one motion parameter is within a predetermined range of values associated with that parameter.
Preferably, means for estimating said vehicle mass is adapted to determine a weighted or moving average value of vehicle acceleration readings taken during qualifying periods.
Preferably, the method further comprises to determine one of said motion parameters for identifying said qualifying period for estimating vehicle mass and wherein said parameter consists of said vehicle acceleration.
Preferably, the apparatus is adapted to identify a qualifying period in which said vehicle acceleration is above a predetermined threshold, said threshold being chosen to identify near peak acceleration. Preferably, means for estimating said frontal area is adapted to determine a weighted or moving average value of overall power readings taken during qualifying periods.
Preferably, the apparatus is adapted to receive one of said motion parameters for identifying said qualifying period for estimating frontal area and where said parameter consists of said vehicle acceleration.
Preferably the apparatus is adapted to identify a qualifying period in which said vehicle acceleration is between predetermined thresholds, said thresholds being chosen to identify periods of near steady state motion.
Preferably, the apparatus further comprises means for identifying an engine load reporting strategy for said vehicle, using at least one OBD parameter.
Preferably, said means for identifying said engine load reporting strategy is adapted to obtain said engine load and said engine speed and to further compare said engine load with an engine load threshold associated with said engine speed.
Preferably, the apparatus is adapted to estimate a force provided to said crank using an empirically derived relationship between force and engine size.
Preferably, the apparatus further comprises apparatus for discovering which of a plurality of possible engine load reporting strategies is used by an On-board Diagnostics system in a vehicle with an engine, comprising examining means to examine On-board Diagnostics system parameters, and means to determine the engine load when the engine is operating in such a manner as to substantially maximise the difference between the engine load values which would be produced by the different engine load reporting strategies.
Preferably, the apparatus further comprises identifying means to identify periods in which said engine is idling as to substantially maximise the difference between the engine load values which would be produced by the different engine load reporting strategies.
Preferably, said identifying means identifies periods in which said engine is idling by using said On-board Diagnostics system parameters and/or by comparing said engine speed with an idling speed threshold.
Preferably, the apparatus further comprises means to adjust said idling threshold speed to allow for a time for which said engine has been running.
Preferably, the apparatus is adapted to adjust said idling threshold speed to allow for an engine temperature and/or to allow for an engine capacity and/or to allow for a fuel type of said engine and/or to allow for an engine capacity.
Preferably, the apparatus further comprises a clutch checking means to discover whether said vehicle is being held in a stationary state by means of engaging a clutch plate.
Preferably, said clutch checking means compares a reported engine load with an engine load threshold. Preferably, the apparatus further comprises engine checking means to check that said engine is running.
Preferably, the apparatus further comprises persistency check means to perform a persistency check on said discovered reporting strategy.
Preferably, the apparatus further comprises a latch circuit to store an indicator as to said discovered reporting strategy.
Preferably, the apparatus further comprises speed checking means wherein a speed of said vehicle is used in discovering said reporting strategy.
Preferably, said speed of said vehicle is used to identify periods in which said vehicle is idling.
Preferably, the apparatus further comprises apparatus for estimating an effective frontal area or aerodynamic resistance of a vehicle including an engine comprising; apparatus for determining the total power of the engine at a substantially constant speed of the vehicle and apparatus for determining the rolling resistance power to overcome the rolling resistance of the vehicle at that substantially constant speed; apparatus for subtracting the determined rolling resistance power from the determined total current power to determine the aerodynamic resistance of the vehicle or the effective frontal area.
Preferably, the apparatus further comprises identifying means adapted to identify periods in which said vehicle is travelling at a substantially constant speed. Preferably, said identifying means is adapted to identify periods of substantially constant speed using on board diagnostic system output and/or using one or more of said vehicle speed, said vehicle acceleration, said engine speed and said engine load.
Preferably, the apparatus further comprises estimating means adapted to provide an estimate of said total current power for said vehicle during a period of travelling at a substantially constant speed and/or by using an engine load parameter provided by said OBD system.
Preferably, said adjusting means is adapted to adjust current power to allow for transmission losses by subtraction and/or multiplication of said total current power by one or more empirical power factors. Preferably, the apparatus further comprises averaging means adapted to find a moving or weighted average for said total current power over a plurality of periods of substantially constant speed.
Preferably, said identifying means is adapted to identify periods of substantially constant speed by comparing one or more of vehicle speed, vehicle acceleration, engine speed and engine load with predetermined reference levels.
Preferably, the apparatus further comprises aerodynamic resistance estimating means to estimate said aerodynamic resistance power by estimating rolling resistance power and subtracting said rolling resistance power from the total current power.
Preferably, said rolling resistance estimating means estimates said rolling resistance by using estimates of said vehicle's mass, said coefficient of drag and said vehicle speed.
Preferably, said rolling resistance estimating means makes allowance in said calculation of rolling resistance for a gradient on which said vehicle may be travelling.
Preferably, the apparatus further comprises apparatus for determining the fuel type of a vehicle, comprising means to obtain the output parameters of an On Board Diagnostic (OBD) system of the vehicle, and means to use said output parameters to determine the fuel type used by the vehicle.
Preferably, the apparatus comprises a throttling identifying means to identify whether the engine is being throttled.
Preferably, the apparatus comprises pressure comparison means adapted to compare the Manifold Absolute Pressure (MAP) with a predetermined threshold and/or air flow comparison means adapted to determine whether the air flow is less than a predetermined proportion of the engine capacity and/or an exhaust gas temperature comparison means to measure whether the exhaust gases are in the range typical of a diesel engine or a petrol engine and/or a protocol checking means to check the OBD protocol and/or a fuel status checking means to check the fuel status parameter identifier of an OBD system and/or a manual override to allow a user to override the results of the automatic detection of fuel type.
Preferably, the apparatus further comprises a throttle identifying means to identify whether the engine is being throttled, or an exhaust gas temperature comparison means to measure whether the exhaust gases are in the range typical of a diesel engine or a petrol engine, or a fuel pressure checking means to check the fuel pressure, or a plurality of fuel type identifying means and further comprising weighting means to assign a weighting to the output of each of the plurality of fuel type identifying means, said weighting varying according to the type of fuel identifying means and the output of the fuel identifying, and a decision means to sum the weightings and compare the sum of the weightings to a predetermined threshold, enabling a decision as to the fuel type of the vehicle.
Preferably, the apparatus further comprises apparatus for estimating the mass of a vehicle having an engine, said apparatus comprising; means to determine motion parameters of the vehicle comprising a vehicle speed parameter, a vehicle acceleration parameter and a maximum acceleration parameter, means to determine an engine capacity parameter and engine activity parameters comprising an engine speed parameter, a power parameter, a maximum power parameter and an engine load parameter, means to determine a weighted or moving average value of vehicle acceleration parameters taken during qualifying periods wherein at least one of the motion parameters and/or at least one of the engine activity parameters are within a predetermined range and means for using said weighted or moving average value of vehicle acceleration to estimate the mass of the vehicle.
Preferably, the apparatus is adapted to obtain the value of at least one of said at least one motion parameters or engine activity parameters is obtained from at least one output parameter of an on board diagnostic system.
Preferably, the apparatus is adapted to identify near peak acceleration periods in which at least one of said at least one motion parameters or engine activity parameters indicates that the said vehicle is accelerating at near to its maximum acceleration.
Preferably, the apparatus further comprises comparison means to compare said vehicle acceleration with at least one predetermined acceleration threshold. Preferably, the apparatus further comprises comparison means adapted to compare said vehicle speed with a first predetermined vehicle speed threshold.
Preferably, the apparatus further comprises comparison means to compare said vehicle speed with a second predetermined vehicle speed threshold and/or to compare said engine load with at least one predetermined engine load threshold and/or to compare said engine speed with at least one predetermined engine speed threshold. Preferably, each of said at least one predetermined thresholds is assigned a value according to the type of vehicle.
Preferably, the apparatus is adapted such that said weighted or moving averaging is performed only if at least one of said motion parameters, or engine parameters is within a predetermined range for said parameter or only if a plurality of said motion parameters or engine parameters is within a predetermined range set for the said parameter or only if all of said motion parameters is within a predetermined range set for said parameter.
Preferably, the apparatus further comprises force determining means to determine a force provided to said crank during qualifying periods.
Preferably, the apparatus further comprises estimating means to estimate said mass of said vehicle by dividing said force by said weighted or moving average acceleration value.
Preferably, the apparatus further comprises checking means to check whether at least one qualifying period has occurred.
Preferably, the apparatus further comprises estimating means to estimate a value of said force provided to said crank using said engine size and empirically determined constants.
Preferably, the apparatus is adapted to use said value of said force in the calculation of mass if no qualifying period has occurred.
Preferably, the apparatus further comprises apparatus for estimating the fuel consumption of an engine in a vehicle comprising means for obtaining or estimating an air flow through said engine; means for calculating a provisional fuel mass estimate by dividing the obtained or estimated air flow by a stoichiometric ratio associated with the fuel type; means for estimating the fuel consumption by dividing said provisional fuel mass estimate by an oxygen content parameter derived from an analysis of exhaust gases.
Preferably, said determining means further comprises measuring means using a mass air flow sensor, and estimating means to estimate said air flow using the ideal gas equation, using estimates of pressure, volume flow rate and temperature.
Preferably, the apparatus is adapted to obtain said pressure estimate using a Manifold Absolute pressure sensor and/or using a Manifold Air temperature sensor.
Preferably, the apparatus is adapted to calculate said estimate of said volume flow rate using an engine size and an engine speed.
Preferably, the apparatus is adapted to obtain said oxygen content parameter from an exhaust oxygen sensor or from a look-up table, said table providing oxygen content values according to engine speed and vehicle type.
Preferably, the apparatus further comprises estimating means to estimate an overall power of said vehicle, by estimating a rolling power component, an aerodynamic resistance component and an acceleration component, using at least one parameter obtained from an on board diagnostic system of the vehicle; determining the type of fuel; and estimating said fuel consumption by summing said components of said overall power and dividing by the energy value of said fuel type and by a predetermined engine efficiency value.
Preferably, the apparatus further comprises estimating means to estimate an upper limit and lower limit for vehicle mass.
Preferably, the apparatus further comprises estimating means to estimate an upper limit and a lower limit for fuel consumption, based on said upper limit of mass and said lower limit of mass respectively.
According to a further aspect, the present invention provides an apparatus for discovering which of a plurality of possible engine load reporting strategies is used by an On-board Diagnostics system in a vehicle with an engine, comprising examining means to examine On-board Diagnostics system parameters, and means to determine the engine load when the engine is operating in such a manner as to substantially maximise the difference between the engine load values which would be produced by the different engine load reporting strategies.
According to a further aspect, the present invention provides a method for discovering which of a plurality of possible engine load reporting strategies is used by an On-board Diagnostics system in a vehicle with an engine, comprising examining On-board Diagnostics system parameters, and determining the engine load when the engine is operating in such a manner as to substantially maximise the difference between the engine load values which would be produced by the different engine load reporting strategies.
According to a further aspect, the present invention provides a method of estimating an effective frontal area or aerodynamic resistance of a vehicle including an engine comprising; at a substantially constant speed of the vehicle determining the total power of the engine and determining the rolling resistance power to overcome the rolling resistance of the vehicle at that substantially constant speed; subtracting the determined rolling resistance power from the determined total current power to determine the aerodynamic resistance of the vehicle or the effective frontal area.
According to a further aspect, the present invention provides apparatus for estimating an effective frontal area or aerodynamic resistance of a vehicle including an engine comprising; apparatus for determining the total power of the engine at a substantially constant speed of the vehicle and apparatus for determining the rolling resistance power to overcome the rolling resistance of the vehicle at that substantially constant speed; apparatus for subtracting the determined rolling resistance power from the determined total current power to determine the aerodynamic resistance of the vehicle or the effective frontal area.
According to a further aspect, the present invention provides an apparatus for determining the fuel type of a vehicle, comprising means to obtain the output parameters of an On Board Diagnostic (OBD) system of the vehicle, and means to use said output parameters to determine the fuel type used by the vehicle.
Preferably, the apparatus comprises a throttle identifying means to identify whether the engine is being throttled, or an exhaust gas temperature comparison means to measure whether the exhaust gases are in the range typical of a diesel engine or a petrol engine, or a fuel pressure checking means to check the fuel pressure, or a plurality of fuel type identifying means and further comprising weighting means to assign a weighting to the output of each of the plurality of fuel type identifying means, said weighting varying according to the type of fuel identifying means and the output of the fuel identifying, and a decision means to sum the weightings and compare the sum of the weightings to a predetermined threshold, enabling a decision as to the fuel type of the vehicle.
According to a further aspect, the present invention provides a method for determining the fuel type of a vehicle, comprising obtaining the output parameters of an On Board Diagnostic (OBD) system of the vehicle, and using said output parameters to determine the fuel type used by the vehicle.
Preferably, the method comprises identifying whether the engine is being throttled, or measuring whether the exhaust gases are in the range typical of a diesel engine or a petrol engine, or checking the fuel pressure, or using a plurality of fuel type identifying methods and further assigning a weighting to the output of each of the plurality of fuel type identifying methods, according to the type of fuel identifying method and the output of the fuel identifying method, and summing the weightings and comparing the sum of the weightings to a predetermined threshold, to decide the fuel type of the vehicle.
According to a further aspect, the present invention provides a method of estimating the mass of a vehicle; said vehicle having motion parameters comprising a vehicle speed parameter, a vehicle acceleration parameter and a maximum acceleration parameter, said vehicle having an engine, said engine having an engine capacity parameter and engine activity parameters comprising an engine speed parameter, a power parameter, a maximum power parameter and an engine load parameter, said method comprising the step of determining a weighted or moving average value of vehicle acceleration parameters taken during qualifying periods wherein at least one of the motion parameters and/or at least one of the engine activity parameters are within a predetermined range and using said weighted or moving average value of vehicle acceleration to estimate the mass of the vehicle.
According to a further aspect, the present invention provides apparatus for estimating the mass of a vehicle having an engine, said apparatus comprising; means to determine motion parameters of the vehicle comprising a vehicle speed parameter, a vehicle acceleration parameter and a maximum acceleration parameter, means to determine an engine capacity parameter and engine activity parameters comprising an engine speed parameter, a power parameter, a maximum power parameter and an engine load parameter, means to determine a weighted or moving average value of vehicle acceleration parameters taken during qualifying periods wherein at least one of the motion parameters and/or at least one of the engine activity parameters are within a predetermined range and means for using said weighted or moving average value of vehicle acceleration to estimate the mass of the vehicle.
According to a further aspect, the present invention provides a method of estimating the fuel consumption of an engine in a vehicle, said method comprising the steps of obtaining or estimating an air flow through said engine; calculating a provisional fuel mass estimate by dividing the obtained or estimated air flow by a stoichiometric ratio associated with the fuel type; estimating the fuel consumption by dividing said provisional fuel mass estimate by an oxygen content parameter derived from an analysis of exhaust gases.
According to a further aspect, the present invention provides apparatus for estimating the fuel consumption of an engine in a vehicle comprising means for obtaining or estimating an air flow through said engine; means for calculating a provisional fuel mass estimate by dividing the obtained or estimated air flow by a stoichiometric ratio associated with the fuel type; means for estimating the fuel consumption by dividing said provisional fuel mass estimate by an oxygen content parameter derived from an analysis of exhaust gases.
According to a further aspect, the present invention provides a method of estimating the fuel consumption of a vehicle comprising collecting data sets each of which relate to a particular different parameter and selectively processing selected data to establish the fuel consumption only if the value of some of the selected data or other data is of a qualifying value.
Said qualifying value is preferably between predetermined limits and is a substantially set value or is zero or substantially zero.
Preferably, the method includes determining an engine load reporting strategy of an on board diagnostic system of the vehicle by processing data collected when the vehicle is idling.
Preferably, the method includes determining the type of fuel used by the vehicle by processing data to provide the power of an engine of the vehicle which has been or is being collected when the vehicle is travelling at a substantially constant speed.
Preferably, the method includes determining the peak acceleration of the vehicle by processing data collected when the speed is less than a substantially set value.
According to a further aspect, the present invention provides apparatus for estimating the fuel consumption of a vehicle comprising means adapted to collect data sets, each of which relate to a particular different parameter and means adapted to selectively process selected data to establish the fuel consumption only if the value of some of the selected data or other data is of a qualifying value.
Preferably, said qualifying value is between predetermined limits and is a substantially set value or is zero or substantially zero.
Preferably, the apparatus includes means adapted to determine an engine load reporting strategy of an on board diagnostic system of the vehicle by processing data collected when the vehicle is idling.
Preferably, the apparatus includes means adapted to determine the type of fuel used by the vehicle by processing data to provide the power of an engine of the vehicle which has been or is being collected when the vehicle is travelling at a substantially constant speed.
Preferably, the apparatus includes means adapted to determine the peak acceleration of the vehicle by processing data collected when the speed is less than a substantially set value.
FIG. 1 illustrates the steps of a first process relating to estimation of fuel consumption.
FIG. 2 illustrates the steps of an estimating fuel consumption process according to a second embodiment.
FIG. 3 illustrates the steps of estimating for estimating a total power.
FIG. 4 illustrates an implementation of fuel consumption estimation according to an embodiment of the invention.
FIG. 5 illustrates an implementation of fuel consumption estimation according to an alternative embodiment of the invention.
FIG. 6 illustrates the step of establishing qualifying periods according to an embodiment of the invention.
FIG. 7 illustrates a mass estimation module according to an embodiment of the invention.
FIG. 8 illustrates a mass estimation module with limitation and limit selection modules according to an embodiment of the invention.
FIG. 9 illustrates a frontal area estimation module according to an embodiment of the invention.
FIG. 10 illustrates a frontal area estimation module with limitation module according to an embodiment of the invention.
FIG. 11 illustrates the steps in determining the engine load reporting strategy according to an embodiment of the invention.
FIG. 12 illustrates an engine load reporting strategy determination module according to an embodiment of the invention.
FIG. 13 illustrates a fuel type detection module according to an embodiment of the invention.
FIG. 14a illustrates a further embodiment of the invention.
FIG. 14b illustrates another embodiment of the invention.
FIG. 15a illustrates yet another embodiment of the invention.
FIG. 15b illustrates another embodiment of the invention.
FIG. 15c illustrates another embodiment of the invention.
FIG. 15d illustrates another embodiment of the invention.
In accordance with one embodiment and set out in FIG. 1, a method of estimating a fuel consumption provides for dynamically estimating a fuel consumption during a particular time interval of a journey, and for successive time intervals.
One way of calculating or estimating fuel consumption is based on the fuel mass processed by the engine. By obtaining a value for the air flow through an engine, we can estimate first the quantity of oxygen flowing through the engine and second, by for example analysing exhaust gases, the amount of oxygen that remains unburnt. Thus we can estimate the amount of oxygen burnt. We assume the oxygen not present in the exhaust gas is burnt so consequently we can work out, once the fuel type is known, what quantity of fuel has been used. In particular, in accordance with this method, airflow through an engine may be obtained or estimated for a particular time interval, and for successive time intervals, throughout the journey. This air flow may be obtained or estimated based on data, such as manifold absolute pressure and temperature, acquired from an On Board Diagnostics System (OBD), for example, data acquired at each reporting cycle of the OBD operation, and such cycles may define the time interval covered by the fuel consumption estimate. Alternatively, air flow may be obtained from the maximum air flow sensor, if present. A provisional estimate of a fuel mass being processed by the vehicle during each time interval may then be obtained by dividing such an air flow by a known stoichiometric ratio associated with the type of fuel being consumed. In particular, a fuel consumption value may then be estimated from the fuel mass value and an oxygen value obtained from analysis of the exhaust gases. The exhaust gases contain oxygen which has passed through the engine and remains unburnt. In an embodiment of the invention, the oxygen value is taken from an oxygen sensor, such as a lambda sensor. In an alternative embodiment, the oxygen value is obtained from a look-up taken, the value being chosen on the basis of vehicle type and current engine load.
The quantities of such unburned oxygen may be used, to derive the fuel mass estimate, and estimate fuel consumption for each time interval. This provides a means to estimate, during each sample period, the fuel consumption, so that for any given journey a fuel consumption may be calculated instant-by-instant throughout the journey. Thus a dynamic value for fuel consumption at a particular cycle of the OBD, can be estimated, and in addition a dynamic value for fuel consumption throughout a journey can be calculated.
While this provides a useful method of obtaining a fuel consumption estimate, it may not always be available or suitable.
FIG. 2 sets out a further embodiment of the present invention, for use when this method is not available or suitable. In accordance with this embodiment further means may be provided to estimate fuel consumption, and these means may be available, instead of, or as a supplement to, the air flow method.
Two of these parameters, fuel calorific value and engine efficiency, can be established conventionally.
A rolling power component, being the power expended to overcome the friction of the road.
An aerodynamic power component, being the power expended to overcome air resistance, and.
An acceleration power component, being the power used to increase the speed of the vehicle.
Rolling Power=Coefficient of Friction×Vehicle Mass×9.81×Speed 3.
In respect of the factors contributing to the rolling power component equation above it is clear that other factors will also be relevant, and for example a gradient coefficient, which is an estimate of the average gradient of the roads of a particular country or region in which the journey is made, may be used. Alternatively a gradient detector or other means may be relied upon.
Turning to the components set out in equation 3 we consider first speed. The value for speed may be provided, by the OBD or perhaps by other means.
We consider next the coefficient of friction. The coefficient of friction will be a fixed value provided to equation 3. A typical value of the coefficient of friction is 0.007, although the person skilled in the art will appreciate that different values may be used according to the road surfaces encountered and that in alternative embodiments of the invention, different values of this coefficient may be used according to conditions. For example the gradient coefficient has the purpose of making allowance for the fact that frictional force will be reduced on slopes due to the reduction in the reaction force. A typical figure for roads in the United Kingdom is 0.65, which reflects the average gradient of British roads. The person skilled in the art will appreciate that this figure may be varied according to where the vehicle is typically travelling. Other embodiments may include options for a used input value which reflects the country or region of a country or the type of roads on which the vehicle is typically used. A further embodiment would ensure that a check is made on the slope on which the vehicle is travelling before an estimate is made of the frontal area of the vehicle. An option would be for example to only record readings when a vehicle was travelling along a substantially level section of road. An alternative embodiment would provide an estimate of the current slope. The invention is not limited to any one method of estimating gradient or circumventing the effects of gradient.
We consider next a further constant, the acceleration due to gravity. This is provided to convert the vehicle mass figure into a force, in order to determine or estimate the reaction force and hence the frictional force on the vehicle. Although this is a constant, the person skilled in the art will appreciate that different levels of accuracy may be used in the recording of this factor.
This leaves the value for vehicle mass. There are many ways to arrive at a value for vehicle mass. For example a user input may be relied upon, force and acceleration readings may be relied upon and a least squares method utilised, or other conventional means.
In accordance with the present invention, the mass may be estimated by estimating the force supplied to the wheels at particular qualifying periods during vehicle use, for example, at periods of peak acceleration. This will be discussed later.
In respect of factors contributing to the aerodynamic power component, in respect of equation 4, we consider first the coefficient of drag. The coefficient of drag will be a fixed value provided to equation 4. The speed of the vehicle may be taken from the On board diagnostics (OBD) system or from a Global Positioning Satellite (GPS) system, or other means.
We consider next the remaining parameter, the frontal area of the vehicle. The frontal area of the vehicle may be a conventional user input value. In an alternative method in accordance with the present invention the frontal area, or in particular the effective frontal area, is estimated. The effective frontal area is estimated by identifying periods of steady state, i.e. non accelerating, motion, and finding an estimate for the aerodynamic power on the left hand side of equation 4, by establishing the difference between the rolling power and the total power of the vehicle. All the parameters of the equation will then be known and used to establish the frontal area, or effective frontal area, of a vehicle. This will be discussed in detail later.
In respect of the factors contributing to the acceleration power component in equation 5 above, we consider first the acceleration of the vehicle.
The acceleration of the vehicle may be acquired, for example, from the OBD or from a Global Positioning Satellite (GPS) system, or other means, and the speed and mass have already been referred to above.
Once these components have been established we can provide a value for total power usage in accordance with equation 2 above. Once a value for total power usage has been established we can estimate a value for fuel consumption.
The total power usage provided to equation 2 may be a value calculated at each time interval during the course of a journey, therefore an instantaneous fuel use may be dynamically estimated at each time interval of a journey.
An example of the implementation of the above method according to an embodiment of the invention is shown in FIG. 4. FIG. 4 shows four sub-modules, the rolling power module 401, the aerodynamic power module 402, the acceleration power module 403 and the fuel calculation module 404. Nine inputs are provided, Vehicle speed 405, Vehicle mass 406, Coefficient of friction 407, Gradient coefficient 408, Coefficient of drag 409, Effective Frontal area 410, Vehicle acceleration 411, Fuel Calorific value 412 and engine efficiency 413. The outputs of the power modules 401, 402 and 403 are summed and provided to fuel calculation module 404.
An example of the implementation of the above method according to a further embodiment of the invention is shown in FIG. 5. This embodiment will now be discussed in detail. FIG. 5 includes Mass Estimator Module 501, Frontal Area Estimator Module 502 and Engine Load Reporting Strategy Module 503. As set out in FIG. 5, the mass estimator module provides information to the rolling power module, which reflects that the rolling power component relies on a value for mass. The frontal area estimation module and the engine load reporting strategy module provide information to the aerodynamic power module which reflects that the aerodynamic power component relies on a value for frontal area and on the engine load reporting strategy. The acceleration power component relies on a value for mass.
The frontal area estimator module 502 and the Engine Load Reporting Strategy module 503 will be discussed later.
As seen from FIG. 5, and set out herein in more detail, the mass estimator module has seven inputs: vehicle speed 405, vehicle acceleration 411, engine speed 503, engine load 504, an HGV indicator 505, fuel type indicator 506 and a maximum power 507.
The frontal area estimator has nine inputs: vehicle speed 405, vehicle acceleration 411, engine speed 503, engine load 504, an HGV indicator 505, fuel type indicator 506 and a maximum power 507, an engine load reporting indicator 508, received from module 503 and a rolling power input 513, received from module 401.
The engine load reporting strategy module has six inputs: vehicle speed 405, engine speed 503, engine load 504, fuel type indicator 506, engine coolant temperature 510 and engine on indicator 511.
Considering first the vehicle mass: as discussed, a value for the vehicle mass is needed at least for equation 3. A mass value may be provided by estimating the force supplied to the wheels at certain times, for example during appropriate qualifying periods. In this case, the appropriate qualifying periods are periods of peak acceleration. The process of identifying qualifying periods is illustrated in FIG. 6. FIG. 6, steps 602-606 outline the process of identifying appropriate qualifying periods to estimate the mass and hence calculate the rolling resistance power component of equation 3. Periods of peak acceleration are selected as appropriate qualifying periods, in particular as it can be assumed that for such periods the engine is working at maximum power. Therefore relying on F=MA, if a known maximum value for force, and a maximum value for acceleration (peak acceleration) are used, then we should be able to derive the mass by Mass=Force (max)/Acceleration (max).
FIG. 6 shows, in step 601, that when at least one motion or engine parameter is within a predetermined range, a qualifying period may be triggered.
In the present case, when it is detected that the engine has achieved peak power, a qualifying period for the peak acceleration calculation begins.
Periods where the engine has achieved peak power may be identified using threshold values in accordance with steps 601 of FIG. 6. In particular, the thresholds are selected to determine periods of peak acceleration whilst the vehicle is in first gear. Readings of peak acceleration are taken, for example from the OBD, and an incremental learning algorithm is implemented which updates the currently held value of peak acceleration. The cases where no value for peak acceleration is held is discussed later.
As stated, estimation of the mass is performed by taking the estimated peak acceleration and a figure for the force applied.
The figure for the force applied can be obtained by conventional means from the peak power figure, by division by the vehicle velocity. The peak power figure is adjusted, using figures for transmission efficiency and transmission loss, to convert the maximum power into a figure for power at the crank.
In an alternative embodiment, empirically obtained conversion factors are used to convert the figure for acceleration into one for power/mass. The power figure is then used with this value to give an estimate for the mass of the vehicle.
While this broadly discloses this method of estimating the mass of a vehicle, there are potential problems and these are discussed below.
For example, it may be that a mass figure will be needed prior to the occurrence of a period of peak acceleration, and so an estimate of mass based on an empirically obtained relationship between engine size and vehicle mass may be incorporated into the system. A typically used empirical relationship is that 1 cc of engine size roughly correlates with 1 Kg of vehicle mass, but other values are contemplated.
In addition, a sanity check is included to ensure that the values provided are sensible and so in addition to the recognition of peak acceleration and the learning algorithm, additional optional features are available which include a comparison of the mass estimate with predetermined limits of mass, both minimum and maximum, for different types of vehicles. For example, comparison can be made with a user supplied mass figure. Alternatively, or in addition, a further value, providing a maximum and a minimum figure based on a percentage error range for the mass, may also be incorporated into the mass estimation system.
Additionally, upper and lower limits for mass, determined by the type of vehicle are also contemplated to provide for a realistic range for the mass, rather than insisting on an exact reading, and this is discussed later.
An HGV indicator may also be relied upon. The HGV indicator identifies that the vehicle is a heavy goods vehicle, which is useful both for detecting peak acceleration and also in power estimation, primarily because reference values for comparison of engine speed and vehicle acceleration, and the transmission efficiency, are set depending on whether the vehicle is an HGV.
Generally HGVs have higher efficiency values, due simply to their higher power, and so the HGV indicator is used to select between transmission efficiency values, among others. Put simply, in order to calculate peak acceleration, a mechanism for identifying peak acceleration periods is employed, in addition to a mechanism for selecting thresholds dependent on whether the vehicle is an HGV.
As discussed, a calculation of peak acceleration requires an identification as to a qualifying period, for example when near peak acceleration is occurring, and also identification as to when the qualifying period ends, when the acceleration has ended and the acceleration is dropping below the peak.
While a mass value can be derived for vehicle mass using Mass=Force (max)/Acceleration (max) this assumes that substantially all the force is directed to accelerating the vehicle. However this may not be the case, either because the force is perhaps combatting air resistance (if the vehicle speed is high), or the vehicle may be going down a hill, or many more reasons.
The optimum occasion to rely on F(max)=Mass×Acceleration (max) to obtain a value for mass is when the vehicle is in first gear (i.e. at low speed) on the flat. We can rely on FIG. 6 item 601 to select threshold values for motion or engine parameters to identify appropriate qualifying periods which indicate this particular circumstance.
Such variables can include, in addition to peak power, engine load, engine speed, and vehicle speed, as set out in FIG. 5. To indicate the vehicle is in first gear on the flat, the values of each of these variables must satisfy a threshold condition. For example, an acceleration threshold, typically 0.2 ms−2 for HGV's and 0.5 ms−2 for other vehicles, may be provided for comparison with the actual vehicle acceleration; engine load must be greater than a given percentage of the maximum engine load, for example it may be 80% of maximum engine load; and the required levels of engine speed are generally set also and may be in the region of 1500 rpm for HGVs and 3500 for other vehicles, although all these values are exemplary only and variations are contemplated.
The vehicle speed may also be checked.
Checking the vehicle speed will assist in indicating that the vehicle is accelerating and not, for example, wheel spinning. A lower limiting speed is entered into the model prior to use, which may be the region of 20 Km/H, although other values are contemplated and fall within the scope of the invention. The lower limiting speed has the additional advantage that it helps to indicate that, for example, clutch slip is not occurring. An upper limiting speed, typically in the region of 50 KmH, but other values are contemplated, is also input before system use is initiated.
The levels, described, in combination with other values, indicate that the vehicle is in first gear and experiencing maximum acceleration, as required.
In an alternative embodiment of the invention, a GPS (Global Positioning Satellite) system is used to check that the vehicle speed corresponds correctly with the wheel speed. In yet another embodiment, an accelerometer may be used.
As stated, only periods of peak acceleration are of interest, and so it is necessary to identify the end of the qualifying period for peak acceleration.
The system may be adapted to monitor the acceleration parameters to identify the end of a period of acceleration, when an end of acceleration indication is issued.
In addition, within a given period of acceleration above the threshold, it is necessary to select the highest acceleration value achieved. According to an embodiment of the invention, this is achieved by successively comparing a currently held value of the maximum acceleration with the acceleration recorded in the current time slot.
In particular, the purpose is to provide the value of the instantaneous acceleration of the previous timeslot if the vehicle is undergoing above threshold acceleration and a zero value if its acceleration is beneath that threshold.
An important part of the invention is an incremental estimation mechanism module. This mechanism compares an instantaneous estimate of peak acceleration, with a value from the difference between a current period of peak acceleration and a previously stored value. This difference is then divided by a weighting factor and added or subtracted to the previously stored value to find a new estimated value. A weighting factor of 3 is typically used, but the person skilled in the art will appreciate that different weighting factors may be used and the current invention is by no means limited to any given weighting factor.
As part of the model, it is established that any incremental value provided for the adjustment of peak acceleration is between predetermined limits. This ensures that the incremental value will be a sensible one and will eliminate “outliers” in the increment values. Typical limiting values are based on the unladen weight of the vehicle and the maximum legal load, for example for an HGV, although it is not contemplated that these values are limiting.
The incremental estimation mechanism referenced above provides for an incremental learning algorithm which will maintain a value of peak acceleration until a new value becomes available, at which time the value is replaced.
A further potential problem relates to the procedure where no value for peak acceleration is available. In such cases it is useful to use an initial estimate of the peak acceleration. Hence a check is carried out to establish whether a peak acceleration reading has been recorded and if not, allows the use of an estimate based on engine size, and perhaps effective power, to be used prior to the recording of a peak acceleration value. A typical method of checking if an above threshold acceleration has occurred comprises checking if a peak acceleration indicator flag is set.
Alternatively, if the currently held value of peak acceleration is equal to zero, or other default value according to the constant used, this may also indicate that no period of above threshold acceleration has yet occurred.
In a preferred embodiment empirical factors may also assist in calculating such a value, for example at least one empirical power factor. Such empirical power factors may be estimated by taking experimental readings of the key parameters, namely, engine speed, engine load, vehicle speed and vehicle acceleration, and then determining a mass figure using the method described herein. This mass figure can be compared with the mass of a vehicle of known mass and the power factors estimated by a process of iteration. Typical values for the empirical power factors are 38.7 for the first power factor and 0.2885 for the second power factor. Both of these values have been obtained for diesel vehicles and are for systems in which the vehicle power is provided in Pferdstarke (PS).
Different values are required for small petrol engines, due to the lower mass of their fly wheels and other moving engine parts. The person skilled in the art will appreciate that alternative values may be used and these will be within the scope of the invention. The invention is not limited to any given values for the power factors, nor even to a given set of power value variables. For example in an alternative embodiment of the invention, a polynomial relationship may be used to give improved accuracy in the relationship between engine size, power and force.
Peak acceleration values combined with values for power, taken at constant engine velocity, may provide for an indirect calculation of force. Calculations may rely on, for example, engine power, HGV indicator and vehicle speed. In an embodiment of the invention, two values for transmission efficiency are provided, typically substantially 0.9 for heavy goods vehicles and substantially 0.85 for other types of vehicle, although these values are not limiting.
Thus methods have been disclosed for calculating a total engine power figure including a power loss figure relating to transmission efficiency. Thereafter a simple calculation may be carried out to obtain a mass estimate figure.
As discussed, in order to ensure that the mass measurements are within sensible limits, a further limitation step is provided to ensure that the mass reading provided is between reasonable limits for a given type of vehicle. This maybe for example, for a heavy goods vehicle, the unladen weight of a typical HGV for the minimum value and the maximum legal load for road haulage as the maximum value. The limitation module provides an additional and optional check on the mass values.
Four groupings of engine size are provided, namely under 1900 cc, between 1900 cc and 4000 cc, between 4000 cc and 6500 cc and above 6500 cc. In the case of an HGV, two sets of mass data are provided, depending on whether the engine size is greater or less than 6500 cc. For each option, a minimum and a maximum value for weight is given. In the case of non-HGV vehicles, three options are provided for the maximum value, and one for the minimum value. In an embodiment of the invention, the three maximum values correspond to the maximum weights of a small car, a “4×4” and a light van respectively. The person skilled in the art will appreciate that different choices of vehicle and upper and lower limit values can be made without departing from the scope of the invention. A typical set of options for the limitation module is shown in Table 1.
Several steps are optionally included as part of such a limitation activity. In one step, if the vehicle seems to be an HGV, the engine size is compared with a reference value and an HGV indicator issued or confirmed. This HGV indicator is used to select a minimum mass value, for either an HGV if the indicator flag is set, or for a lighter vehicle if the indicator flag is not set. On setting the minimum mass value for an HGV, engine size is also taken into account as the engine size determines the minimum mass value of the HGV. For example, if the engine size falls within a first value, a first minimum mass value is selected, and if the engine size falls within a second value, a second minimum mass value is selected, and so on.
In addition, steps are carried out to obtain a maximum mass value. In addition to depending on engine size, the maximum mass value also depends on fuel type, and so the fuel type indicator may be relied upon in the maximum mass value calculation.
In particular a first maximum mass value may be selected if the engine size is greater than a predetermined reference value and the fuel type indicator indicates a diesel engine. This might indicate for example that the vehicle is a small van. If the engine size is greater than a further engine size reference value and the engine uses petrol, then a different maximum mass value may be selected, and so on.
Such exemplary steps are carried out to provide confidence that the mass estimation value is likely to be correct, by setting realistic minimum and maximum limits of mass.
Alternatively a user supplied vehicle mass may be used as an additional check.
Details of the mechanism of the processes discussed are set out herein. In particular, FIG. 7 shows the mass estimation module 700 according to an embodiment of the invention. It comprises a peak acceleration detection module 701, an incremental learning module 702 and a power estimation module 703. There are 6 inputs into the system, engine speed 503, engine load 504, HGV indicator 505, vehicle acceleration 411 and road speed 405. The HGV indicator 505 is used to select between reference values for comparison with the engine speed and vehicle acceleration, and the transmission efficiency, according to whether the vehicle is an HGV or other vehicle type.
The four motion and engine parameters 503, 504, 411, 405 are input into the peak acceleration module 701, which determines whether the vehicle is close to peak acceleration. The power estimation module 703 has two inputs, the HGV indicator 505 and the power input 704. The power input is the power at the crankshaft. The HGV indicator is used to make allowance for the different transmission efficiencies discussed above.
A Boolean value is output to the peak acceleration indicator 705 and the acceleration value is output at 706. If the peak acceleration indicator 705 is equal to logical one then the acceleration value is passed on by switch 707 to the incremental learning algorithm 702. If it is equal to logical zero, then the zero value from 708 is passed on. The incremental learning algorithm has three inputs, the peak power estimate 709, the road speed 405 and an input of acceleration from the switch 707. It has a single output, the estimate of vehicle mass 710.
The estimate of mass from the model will by its nature not be exact and therefore in an embodiment of the invention, the mass reading is given within error limits rather than an exact reading. If no engine power values are known then the mass limits are the maximum and minimum values determined by the limitation process.
FIG. 8 therefore shows a second embodiment with additional modules, the limitation module 801 and the limit selection module 802. The limitation module provides for upper and lower limits of mass, determined by the type of vehicle. The limit selection module 802 gives upper and lower values of the mass estimates, thus providing a realistic range rather than an exact reading. The upper and lower limits of the mass estimate are supplied to outputs 803 and 804 respectively.
Considering now the frontal area. As shown above, Equation 4 relates to the aerodynamic power component, and relates to a coefficient of drag, a frontal area, and speed. The coefficient of drag is a predetermined value, and there are several ways to identify the speed, not least using the OBD. This leaves the frontal area. The frontal area is related to several parameters such as: vehicle speed 405, vehicle acceleration 411, engine speed 503, engine load 504, HGV indicator 505, fuel type indicator 506, maximum power 507, an engine load switch value, and a rolling power.
A value for engine load is obtained from the OBD, however to use this value effectively we need to detect an engine load reporting strategy, i.e. what the reading obtained from the OBD actually means, and this will be discussed later.
Returning to the frontal area. FIG. 6 steps 608-611 outline the process of identifying appropriate qualifying periods for estimating the frontal area. FIG. 6 shows in step 601, that when at least one motion or engine parameter is within a predetermined range, a qualifying period may be triggered. In the present case we rely on periods of steady state, during which we calculate a figure for power supplied at the crank. This process utilises a steady state detection, with an incremental learning process as shown in FIG. 9. We measure the power at the crank at periods of steady state as we then know that the power supplied is not being provided to accelerate the vehicle, but is substantially directed to overcoming air resistance in particular a vehicle is in a steady state if it is not undergoing significant acceleration and is on a substantially flat surface. It is contemplated that a speed of, for example, around 100 Km/h, such as for example 90-110 km/h, may be used for light duty vehicles, with lower values for Heavy Goods Vehicles. In addition, a check may be carried out to determine whether the vehicle is in the correct gear. This ensures at least that energy is not being expended due to being in the wrong gear.
A current estimate of power in such a steady state is then identified. This estimate of power relies on the engine load, and this may be obtained from the OBD. This will be discussed in more detail later.
As stated in order to complete the calculation of the frontal area we need to establish the engine load 504 for the vehicle. The following sets out briefly how the engine load may be determined.
There are two major strategies by which On Board Diagnostics (OBD) systems report the engine load. Diesel engines usually report the percentage of maximum torque for a given engine speed, which gives a percentage of maximum power of the engine, whereas petrol engines, depending on vehicle type, may provide the percentage of peak power, i.e. the instantaneous power at that time. Accordingly, in an embodiment of the invention, the strategy being used by the vehicle is identified and an indicator provided to reflect the engine load reporting strategy employed, so that the engine load can be determined.
The engine load reporting strategy is discussed in detail later.
Once we have a value for the engine load we can use it to establish the frontal area. In particular, the current power supplied by the engine is estimated by multiplying the peak power by the percentage of peak power currently being used. This percentage may be obtained from the engine load value reported by the OBD. It is not necessarily clear, in any vehicle, how the engine load will be reported. For example in an OBD in which the load is reported as a percentage of maximum power, a simple multiplication of the peak power by the engine load or equivalent figure suffices. However, if the reported engine load value is a percentage of the torque at the given engine speed, then an engine load value adjustment must be made to encompass this alternative strategy.
In an embodiment of the invention, the engine load value adjustment comprises multiplying the power value by a factor equivalent to 1/(engine speed at peak power).
A typical value for the engine speed at peak power is 4500 RPM, but other values are contemplated.
Depending on the way the engine load is reported, a value for the current power provided at the crank is established.
The result is then normalised to a standard vehicle speed, and the normalisation may include a fixed value for speed, or different values depending on vehicle type, or user supplied values.
Thus a figure for power, normalised for a chosen vehicle speed, typically but not limited to 100 Km/H is provided. It can also be established if the vehicle is moving in a steady state on a substantially flat surface. When it has been decided that the vehicle is in the required steady state, and a qualifying period may be in operation, in accordance with FIG. 6, initiation of the incremental learning algorithm may proceed.
Details of the qualifying period for the aerodynamic power estimation will be discussed later. First we discuss the incremental learning module. The incremental learning module relies upon three components, the averaging component, weighting component and the end of steady state identifier, and on initiation required calculations may be carried out.
The averaging module calculates the average value of the input power over a set period of time. At the end of each averaging period, this calculated value is sent to the weighting module, which calculates a weighted average between this value and the value obtained from previous averaging periods. This continues during the steady state period.
The averaging module also maintains a count of the number of samples averaged, which is reset after a set period. In an embodiment of the invention, 255 samples are taken before the rest, but the person skilled in the art will appreciate different numbers of samples may be taken and the invention is not limited to the number of samples taken in each batch. Two memories are provided for the performance of the average power input, the sample count and a sum of the power input.
At the end of a sample period all values are set to zero.
The weighting module is relatively conventional and is provided with an average power reading by the averaging process during the steady state period. In addition, a check is provided, including upper and lower limits on the weighted average value to provide confidence in the values provided.
When it is detected that the steady state condition no longer applies, the qualifying period ends, and the end of steady state identifier flag is set, which terminates the calculation.
The person skilled in the art will appreciate that there are other methods by which a suitable average value may be obtained. In another embodiment, each power value on every time slot is used for a weighted averaging, without using the suggested intermediate averaging process discussed. In yet another embodiment, a simple average is taken of all the power values obtained without any weighting process. The invention is not limited to any particular method of calculation of the average power value.
As discussed, a weighted or moving average of the power value derived is calculated by the incremental learning algorithm. Such averaging is performed over fixed size sample periods, and at the end of such a sample period, an average total power value is provided and a new sample period function is initiated.
As set out above, we can estimate a figure for the rolling power of the vehicle, estimated by a rolling power module as discussed above. A difference between the supplied rolling power of the vehicle and the current power value may be established so that a frontal area, or effective frontal area, based on the aerodynamic power and also on empirically obtained values for the drag coefficient, may be calculated, in particular from equation 4.
It is often sensible to carry out a check to provide confidence in any value calculated. This check seeks to ensure that the estimates of the aerodynamic power are within certain limits, based on the known aerodynamic drag of certain vehicles.
Returning now to qualifying periods for establishing steady state.
As stated, the purpose of the steady state detection module 902 is to identify periods in which the vehicle is being driven at a constant speed, typically within the range of 90 km/h-110 km/h, more particularly around 100 km/h, but not necessarily limited thereto. It is important that the vehicle should not be accelerating or decelerating to ensure that all power is expended to overcome the effect of the frontal area and hence establish an estimate for the frontal area. However, it would not be possible to require calculations to be performed only when the vehicle had exactly zero acceleration, so a small range, typically between −0.02 and 0.02 MS−2 is counted as being zero acceleration, although this range is not limiting. A secondary check on steady state, to ensure that the period is, in fact, in a steady state, is to look at the engine load. The vehicle should not be coasting, nor should the throttle be wide open, and the latter combined with a near zero acceleration would indicate that the vehicle was most likely to climbing a steep hill. To provide confidence that a steady state has been detected, the engine load should therefore be within the range of substantially 30% and substantially 70% of maximum load. A further secondary check for steady state is to look at the engine speed, for example to see that the vehicle is in the correct gear. For this to be the case, the engine speed should lie between two threshold values, the lower threshold being typically higher for a petrol engine compared with a diesel engine. The engine speed will depend on whether the vehicle uses diesel or petrol fuel and typical values for the respective thresholds are substantially 4500 RPM for the upper threshold, and, for the lower threshold, substantially 2000 PM for a diesel engine and substantially 2500 for a petrol engine.
Therefore the first check as to whether the vehicle is in fact travelling at a steady state is to check that the vehicle speed is within the required range as discussed already, and the mechanism for this check is largely conventional, depending however on the vehicle speed, comparing this with reference values as discussed. It should be noted that lower values of these thresholds would be required for heavy goods vehicles due to legal limitations on their speeds. The person skilled in the art will appreciate that these reference levels are exemplary only and different levels may be used whilst being with the scope of the invention.
As stated the next check as to whether the vehicle is in fact travelling at a steady state is to check that the acceleration is within required limits, in particular that the vehicle is very close to constant speed.
The final steady state check is to establish that the engine speed is within acceptable limits, and this indicates that the vehicle is in the correct gear.
The power at the crank also takes account of at least one empirically determined power factor(s), which model the power loss or losses due to transmission. One empirical factor is subtracted from the engine power and in the preferred embodiment of the invention is the same for all vehicle types. A further power factor is a multiplicative efficiency factor, which differs according to whether the vehicle is an HGV or a light duty vehicle. The person skilled in the art will appreciate that it is possible to refine these values according to vehicle type or make, or to allow the user input of this value and the invention is not limited to any one method of allowing for transmission power losses. In the preferred embodiment therefore, the power at the crank is determined by the subtraction of a first empirical power factor and multiplication by a second empirical power factor. Selection of the second empirical power factor may be based on the type of vehicle, for example HGV or light vehicle.
There are alternative methods of providing a figure for the power at the crank, such as for example multiplication or subtraction by a single transmission factor or by direct estimation of the power at the crank. Typically the value of the first power factor is substantially 10 PS (˜7.5 KW) and the values of the second power factor are substantially 0.9 for an HGV and 0.8 for a light duty vehicle. The person skilled in the art will appreciate that these values may be varied and the invention is not limited to any particular values of the power factors.
Where ρ is the density of the fluid through which an object is moving, v is the velocity of the object, A is the effective area of the object and Cd is the drag coefficient.
A figure for the aerodynamic resistance is obtained by subtracting the estimate of rolling resistance obtained from the Rolling Power calculation carried out above. The estimate of aerodynamic power is used in the Frontal Area Calculation together with the parameters set out above.
We now discuss the arrangement in more detail.
FIG. 9 illustrates a frontal area estimation module according to an embodiment of the invention. It comprises a power module 901, a steady state detection module 902, an incremental learning module 903, subtractor 904 and a frontal area calculation module 905. The power module provides a figure for the power at the wheels, based on values provided for engine speed 503, engine load 504, engine power 704, HGV indicator 505, vehicle speed 405 and engine load switch 508, which indicates the engine load reporting strategy.
The power at the wheels 906 is supplied by power module 901 to the incremental learning module 903, which is activated when an indicator 907 is received from the steady state detection module 902. The steady state detection module receives current values for engine speed 503, vehicle speed 405, acceleration 411, engine load 504 and fuel type 506. The current estimate of power in the steady state is supplied to input 908 of subtractor 904. The Incremental learning algorithm 903 performs a weighted or moving average of the power value obtained from the Power Module 901. At the end of such a sample period, an average total power value is forwarded by the Incremental Learning Module 903 to subtractor 904. Additionally, an end of sample period indicator 909 is sent from the Incremental Learning Module to the Steady State Detection Module in order to start a new sample period.
A rolling resistance power is supplied to input 513 and is subtracted from the output 908 of the Incremental Learning Module 903, to give an estimate of the aerodynamic power to Effective Frontal Area Calculator 905. Effective Frontal Area Calculator 905 calculates the effective frontal area based on the aerodynamic power and empirically obtained values for the drag coefficient.
In a preferred embodiment of the invention, a limit is introduced for the upper and lower values of the aerodynamic power. The limits relate to values for a variety of vehicles, including large or small cars, light vehicles, or an HGV vehicle. Accordingly, FIG. 10 illustrates another embodiment, which further comprises a limitation module 1000, which ensures that the estimates of the aerodynamic power are within certain limits, based on the known aerodynamic drag of certain vehicles.
It is contemplated that intermediate values, such as area multiplied by one or more of the drag coefficient, vehicle speed cubed, fluid density or the constant 0.5, may be used and suitably converted using equation 7 or an appropriate derivative. The person skilled in the art will appreciate that any of these methods can be used without affecting the embodiment of the invention.
As set out above, critical to the estimation of the Effective Frontal Area is the engine load reporting strategy, and we will now discuss the Engine Load Reporting Strategy in detail. As explained above, the engine load may be provided as a percentage of the maximum torque or a percentage of the torque at the given engine speed. In an embodiment of the invention, the reporting strategy is entered by the user. In an alternative embodiment, it is deduced by examination of the OBD output parameters.
At high engine speed and load, the two reporting strategies will give readings which are very close to each other as the engine is working at its maximum and an engine power at the given speed is close to a maximum engine power for the vehicle. In contrast, the point of greatest contrast in reported engine load values is when the engine load is at its lowest. This latter point will occur when the engine is idling.
Therefore in a preferred embodiment, the Engine Load Reporting Strategy will be deduced by identifying periods, idling qualifying periods, in which the engine is idling and comparing the engine load with a predetermined threshold. This process is set out in FIG. 11. The process of identifying qualifying periods for determining the engine load reporting strategy are illustrated in FIG. 6, steps 612 to 614.
The idle speed (generally measured in revolutions per minute, or rpm, of the crankshaft) of an internal combustion engine is the rotational speed of the engine when it is uncoupled from the drive train and the throttle pedal is not depressed. At idle speed, the engine generates enough power to run reasonably smoothly and operate its ancillaries (water pump, alternator, and, if equipped, other accessories such as power steering), but usually not enough to perform useful work, such as moving an automobile. For a passenger-car engine, idle speed is customarily between 600 rpm and 1,000 rpm. When idling, an engine typically has a load of a few percent of maximum power, normally less than for example 8%, and the engine speed will also be low at idling, for example the percentage of the maximum power for the given engine speed will typically be around 20-30 percent.
FIG. 11 shows the parameters to be considered in determining if an engine is idling. For example, periods in which the engine is idling are identified by checking the engine speed and comparing this to a threshold value, the idle speed threshold. A default value for the threshold is used as a starting point and adjustments are then made to it to allow for engine temperature (related to the length of time the engine has been running), engine size and fuel type.
We check fuel type because diesel engines usually have higher idling speeds than petrol engines. We check engine size because smaller engines have higher idling speeds than large ones. We check the temperature because, in general, the hotter the engine, the lower the idling speed will be. It may be that no correction is made for the length of time the engine has been running, or coolant temperature may not be relied upon.
We must also take into account that a minimum engine speed must also be exceeded to ensure that the engine is in fact running.
To avoid mistaking an engine idling circumstance, for example where a vehicle may be coasting downhill, or moving slowly forward with no pressure on the throttle, a further check may be carried out on vehicle speed, in which the vehicle speed is taken from the OBD system, a zero value confirming an idle condition.
In addition we also need to consider that if a vehicle is being held on the clutch on a slope, the vehicle may have zero speed but the engine may not be idling. This can be identified by comparing the engine load with a threshold dependent on fuel type. Typical values for the thresholds are 70% load for diesel engines and 23% load for petrol engines. However the invention is not limited to any particular values for these thresholds.
Once it has been established that an engine is idling, we can implement to the method of determining the engine load reporting strategy.
As discussed, if it is determined that the engine is idling and the reported engine load is less than a threshold, then the reporting strategy is likely to be a percentage of maximum torque, whereas if it is above the threshold the reporting strategy is likely to be a percentage of power at the given engine speed. An indicator as to which strategy has been detected is then passed on to a persistency check and latch function. This seeks to ensure that the strategy is only recorded as correct if the indicator has been set to the level for a given time threshold, i.e. a persistency check is carried out, and if passed the engine load reporting strategy is fixed.
As stated, the running time and temperature of the engine is also relevant and if the running time is less that a pre-set threshold (the idle time threshold), the temperature of the coolant, obtained from the OBD system, may be used to adjust the threshold.
In addition the engine load is checked against a predetermined threshold, as the engine load depends on whether the engine uses diesel or petrol, and exceeding the threshold provides a strong indication that, even if the vehicle speed is zero, the engine is not idling, but may be on a slope held on the clutch. A clutch check utilises the fuel type indicator, and engine load, to select a diesel or petrol clutch threshold, although other methods are also contemplated.
Thus, the engine load reporting strategy is calculated by determining whether the engine is idling and then determining whether the engine load is greater than a given threshold. The method also checks the engine speed to see if it is below the idle speed threshold calculated by this process, whether the engine is running, indicated by whether the engine speed is above a required threshold, whether the clutch check module has indicated that the vehicle is being held on its clutch, and the vehicle speed. If the engine is determined to be switched on, is operating at below the calculated idle speed threshold and the vehicle speed is zero, then the engine is assume to be idling.
In more detail, as stated, as an overall review, in order to determine the engine load reporting strategy, a period, the idling qualifying period, in which the engine is idling, must be identified. If during this period, the reported engine load is small, typically a single figure percentage, then the reporting strategy is taken to be to state the percentage of maximum torque. If the reported engine load is larger than this, then the reporting strategy is taken to be to state the percentage of engine load at the given engine speed. The engine is identified as idling if the vehicle speed is zero, the vehicle is not being held on the clutch and the engine speed is less than a given threshold. The threshold is determined taking into account the fuel type, the engine temperature, the engine size and the length of time for which the engine has been running, although other means are contemplated. For example, in an embodiment, a fixed threshold may be used. In a further embodiment, a threshold altered to allow for engine size only may be used. In yet a further embodiment, only adjustments for engine running time may be used, either as a threshold running time or an adjustment based on engine temperature.
In further detail and with reference to the drawings, the stages of the determination of the engine load reporting strategy are illustrated in FIG. 11 and an engine load reporting strategy detection module according to an embodiment of the invention is illustrated in FIG. 12. The engine load reporting strategy detection module is set out in FIG. 12, which shows six component modules including a time and temperature module 1203, a fuel type module 1204, an engine size module 1205, a clutch check module 1206, an idling check module 1207, and a persistency check and latch module 1208. These modules have seven inputs, engine on indicator 512, fuel type indicator 506, engine coolant temperature input 1201, engine speed 503, engine load 504, vehicle speed 405 and OBD sample time 1202.
Starting with the Time and temperature module 1203, this module checks whether the engine has been on for more than a threshold period of time. In an embodiment, if the engine has not been running for more than a threshold time, then the engine temperature, measured by reference to the coolant temperature 1201, is considered in the determination of whether the engine is idling. In another embodiment, no measurements are taken if the engine has not been running for at least a given length of time. In yet another embodiment, no correction is made for the length of time for which the engine has been running.
Turning now to the Fuel type module 1204, this module makes adjustments to the engine speed threshold according to fuel type.
We next consider the engine size module 1205. This module adjusts the engine speed threshold according to the engine size of the vehicle.
Turning now to the Clutch check module 1206, this module detects if the vehicle is being held on a hill on the clutch.
As part of the detection of the Engine Load Reporting Strategy, the engine load reporting strategy module 1207 (idling check) takes the values of the engine speed 503, vehicle speed 405 and engine load 504 to determine whether the engine is idling and then checks whether the engine load reported is less than a threshold. If it is less than a given threshold, it is determined that, since the engine load reported is comparatively small, the value reported must be a percentage of maximum torque. Alternatively, if the engine load reported is above the threshold, then the value reported is the percentage of power at the given engine speed. An indicator as to which strategy has been detected is then passed on to the persistency check and latch module 1208. The persistency check module ensures that the strategy is only recorded as correct if the indicator has been set to the level for a given time threshold. If this persistency check is passed, then the latch circuit ensures that a strategy indicator is continuously provided to an output 1209, even after the period of idling has ended.
The fuel type has been mentioned and referred to several times as part of this process. In particular, the fuel type, i.e. whether it is diesel or petrol, is of critical importance in the determination of thresholds used in determining qualifying periods. An example of this is the engine speed threshold used in determining the engine load reporting strategy.
According to an embodiment of the invention, there is provided a mechanism for determining whether the vehicle uses diesel or petrol. This mechanism exploits certain differences in the operation of diesel and petrol engines. Amongst these differences are the mechanism for control of the engine load, temperature differences in the exhaust gases, differences in the on board diagnostic protocols used, the reporting of fuel status and differences in fuel pressure.
In a petrol engine, load control is achieved by “throttling” the engine, which entails restricting airflow and hence reducing the available oxygen to burn. Petrol engines are almost always constrained to run at a stoichiometric fuel ratio. Diesel engines operate under normal conditions without a throttle in the intake manifold. Variation in the load on a diesel engine is achieved by careful fuel quantity delivery alone.
In some vehicles the manifold pressure is reported, which allows a straightforward check to see if the engine is throttled. If the engine is running and a significant vacuum occurs, this is indicative that the engine is a petrol engine. A typical value detected is in the region of 50 KPa below atmospheric pressure, but the person skilled in the art will recognise that other suitable values may be used and the invention is not limited to any particular threshold of manifold pressure. When the vacuum condition is observed for a significant period, then the vehicle is recognised as having a petrol engine, otherwise, it is recorded as using diesel.
In other vehicles the manifold pressure is not reported. In these cases, the air flow rate may be checked. If the air flow is less than a predetermined fraction of the engine size, this is an indication that the engine is being throttled, which, as stated, identifies the engine as running on petrol. A typical fraction of the engine size is 1/300th, but the person skilled in the art will appreciate that alternative values for this fraction may be used and the invention is not limited to any given predetermined fraction.
Another mechanism which may be used to identify the fuel type is exhaust gas temperature. The temperature of the exhaust gases is much higher in a petrol engine than a diesel one. This fact can be used to provide an alternative mechanism for the detection of fuel type. In an embodiment of the invention, the exhaust gas temperature is compared with at least one threshold. In further embodiments, upper and lower thresholds are used.
Another indicator of the fuel type is the protocol used by the on board diagnostics system. One such protocol is the J1939 protocol, which is used exclusively by Heavy Goods Vehicles (HGV's). HGV's are usually fuelled by diesel and therefore detection of the J1939 protocol will be indicative that the vehicle is powered by a diesel engine. In an embodiment of the invention, an OBD protocol sniffer is used to identify the protocol used. The protocol type is represented by an enumerated state and if the enumerated state corresponds with a value representing the J1939 protocol we may assume it is an HGV vehicle. However, some HGV's are fuelled by Biogas, so use of the J1939 protocol is not conclusive proof of the use of diesel fuel. Since biogas has similar exhaust gas temperatures to petrol engines, a diesel is only reported by the protocol detection system if the exhaust temperature is also that of a diesel.
A further significant difference in the operation of diesel and petrol engines is the pressure at which the fuel is supplied. This value is significantly higher in diesel engines and this fact may be used to recognise a diesel fuelled vehicle. In an embodiment of the invention, the common rail fuel pressure is compared with a predetermined threshold in order to identify a diesel engine.
In addition, petrol engines can be identified by reference to one of the standard OBD parameter identifiers (PIDs), namely PID 03, the fuel status type. A request can be made to the OBD as to the fuel status, which can be cold start, closed loop or component protection. While petrol engines use this status PID, diesels do not. Therefore, in an embodiment of the invention, a request is made to the OBD for PID 03. If there is a response, this indicates that the engine is fuelled by petrol. If the request times out, this is indicative of a diesel engine.
Various embodiments of the invention are possible, which use the above fuel type detection methods. The person skilled in the art will appreciate that any individual method or combination of methods may be used to determine the fuel type of the vehicle and the invention is not limited to any one or any one combination of methods. In an embodiment of the invention, all of the methods are used in combination. However, the different indicators are not all equally conclusive of fuel type. The fuel pressure is not completely conclusive, as there is the possibility of a high fuel pressure petrol engine. The use of the fuel status, presence of throttling and high exhaust gas temperatures are all strong indicators of a petrol engine.
Setting out the fuel type detection mechanism in more detail we refer to FIG. 13.
FIG. 13 illustrates a fuel type detection module according to an embodiment of the invention. There is provided a Pressure And Flow Rate Module 1301, Protocol Recognition Module 1302, an Exhaust Gas Temperature Module 1303, a Fuel Pressure Module 1304, a latch circuit 1305 and a manual override 1306. The Fuel Type Detection Module is provided with six inputs; Manifold Absolute Pressure 1307, Manifold Absolute Pressure Validity Indicator 1308, Engine speed 503, Air flow rate 1309, Air flow validity indicator 1310 and Engine size 1311, the Protocol recognition module has one input, the Protocol Type Input 1312. The exhaust gas temperature module has two inputs, Exhaust Gas Temperature 1313, and Exhaust Gas Temperature Valid 1314. The fuel pressure module has two inputs, Fuel Pressure 1316, and Fuel Rail Pressure Valid 1317. The manual override module has one input: Manual Override 1318.
The Protocol recognition module 1302 takes the value of the enumerated state from the OBD protocol sniffer and checks it against J1939 enumerated states held in module 1302. If the Exhaust Gas Temperature Module also indicates a diesel, then the vehicle is recorded as being fueled by diesel. If any of the Pressure And Flow Rate Module, Exhaust Gas Temperature Module or Fuel Status Type Valid indicators indicate that the vehicle uses petrol, then a petrol fuel type is recorded.
In an alternative embodiment of the Fuel Type Detector, the logic represented by the combination of AND gates 1319, 1320, OR gates 1321, 1322 and NOT gates 1323, 1324 and 1325, is replaced by a “trust level” system, wherein a percentage or other numerical indicator is used to record a confidence level that the vehicle is petrol or diesel which reflects the degree of certainty in the respective test. A higher value for the trust level will for example be assigned to the throttling test than for the fuel pressure. The trust levels are then summed and the result is compared with a threshold to determine if the vehicle is petrol or diesel fuelled.
All the factors contributing to the fuel consumption have now been set out.
The final stage of the process is the calculation of fuel consumption. In order to carry out a fuel calculation as accurately as possible, the power required to keep the engine running must also be accounted for, including the power supplied to ancillary devices, and transmission inefficiencies must also be taken into account. This is largely conventional and will not be discussed further.
There are other factors which must be taken into account however, such as braking events, for example. On a simple level, acceleration during such braking events will be negative which might prevent generation of accurate values. This is of course not the case if the vehicle has regenerative braking.
Once a total power figure, including ancillaries, has been calculated, this total power figure is divided by the transmission efficiency to produce a figure for total engine power. The total engine power is then divided by the engine efficiency and the calorific value of the fuel to produce a value for fuel consumption. In an embodiment of the invention, an additional check is provided, whereby a user input maximum power figure is used as a maximum engine power. The lesser of the calculated maximum power and the user input figure is used in the fuel calculation.
Thus a value for fuel consumption may be calculated, for example, for each period of an OBD cycle or other periods. For example fuel consumption may be calculated as a continuous process during vehicle operation. Any such fuel consumption calculations will be based on characteristics of a vehicle, characteristics of a driver, such as driver behaviour, and characteristics of a journey. The fuel consumption is therefore very specific to the vehicle, the driver, and the road conditions and provides a degree of accuracy not achieved before. Several methods are provided herein to calculate a fuel consumption so that if one of the methods cannot provide a value an alternative can replace or supplement such a value. For example, in an embodiment of the invention, upper and lower limits on fuel consumption may be established using the method based on estimation of total power usage (i.e. using equations 1 to 5). The upper and lower limits correspond to upper and lower estimates of vehicle mass, using the method illustrated in FIG. 8. The air flow method, the steps of which are illustrated in FIG. 1, may be used as the principal mechanism for fuel consumption estimation, with the upper and lower limits provided by the total power method providing appropriate “ceilings” and “floor” on fuel consumption estimation. Alternative combinations of the two methods may be used as appropriate.
FIGS. 14 and 15 illustrate embodiments of the system described above. Some exemplary findings from the system are given as follows.
During development we have relied on a variety of methods. In particular we have simulated power at the crank. Applying a transmission efficiency factor of 0.95/0.9 (light/heavy) gives apparent power at the crank. To obtain fuel we use the calorific value of the given fuel. The current model is designed for diesel only. The internal combustion engine efficiency is given as 0.33/0.35 (light/heavy).
The variable subsystem as it stands to date. This is currently an engineering release. Engine size must not exceed 1999 cc otherwise the model will load HGV settings. etm_model_variables, vehicle mass, frontal A and coefficient of drag are calibrations in the model.
With the 3 variables set as stated above, etm gps_vss_valid is set true. The Actros needs to be identified during sniffing and then once OBD requests are halted the given conditions are met. For an MAN HGV, where engine speed is valid but VSS is not, the AOP model uses GPS for speed, but the autocal model is still used for fuelling.
A Bluetooth connection with the micro.
For debugging this model on the bench, it is necessary to invalidate engine speed and vehicle speed, also ‘app_gps_speed’ is populated with the value which would normally exist as con_veh_speed. This is achieved by setting the ‘appc_gps_overide_obd’ TRUE. This value should always be FALSE at build time, to ensure the model performs as intended!
The model was then run using data from a number of HGV tests to ensure fuel accuracy is within acceptable limits for use on a Mercedes Actros, results given below: Note that the coefficient of rolling resistance remains constant, this is intentional for all vehicle modelling.
This inaccurate result is rich due to over predicting power required for acceleration. The coca-cola cycle comprises many harsh transients. Simulating the truck empty at 10,000 kg−fuel economy is 10.99 mpg.
As an exercise, a steady state cruise simulation was conducted at 90 kph. It was found that a 10,000 kg lorry uses a simulated 3.63 g/s of diesel. An identically sized 21,000 kg lorry produces 4.49 g/s, 19% more fuel as a result of rolling friction alone.
The invention is not limited to the features disclosed herein.
generating an output signal indicating a value that provides an estimate of the mass of the vehicle, based on the at least one operating parameter.
generating another output signal characterizing user operation of the moving vehicle, based on the determined engine load reporting strategy and an engine operating parameter value obtained from the OBD port.
3. The method of claim 1, further including determining a force applied to a drivetrain component of the vehicle, wherein generating the output signal includes generating the output signal based on the determined force.
4. The method of claim 1, wherein the at least one operating parameter includes a parameter indicative of acceleration of the vehicle, further including determining a force applied to a drivetrain component of the vehicle, and wherein generating the output signal includes dividing the force by the parameter indicative of acceleration.
5. The method of claim 1, wherein identifying the at least one qualifying period of time includes identifying a period of time during which the vehicle is operating below a threshold speed and moving on a flat surface.
6. The method of claim 5, wherein identifying the at least one qualifying period of time includes identifying a period of time during which the vehicle is moving in first gear based upon an acceleration threshold.
wherein generating the output signal includes dividing the force by the weighted or moving average acceleration value of the vehicle.
8. The method of claim 7, wherein determining the force includes estimating a value of the force provided to the crank using an engine size of an engine in the vehicle and empirically determined constants.
9. The method of claim 7, wherein determining the force includes determining the force during at least one of the at least one qualifying period.
wherein generating the output signal includes dividing the net force by the weighted or moving average acceleration value of the vehicle.
generating the output signal includes using said weighted or moving average value of acceleration to provide the estimate of the mass of the vehicle.
12. The method of claim 1, wherein generating the output signal includes determining a weighted or moving average value of vehicle acceleration readings taken during at least one of the at least one qualifying period.
13. The method of claim 12, wherein generating the output signal includes determining a weighted or moving average value of overall power readings taken during at least one of the at least one qualifying period.
14. The method of claim 12, wherein identifying the at least one qualifying period of time includes identifying a period of time during which vehicle acceleration of the vehicle is above a predetermined threshold that identifies near peak acceleration of the vehicle.
adding the difference to the stored estimate of peak acceleration, and storing the result of the adding as a current stored estimate of peak acceleration.
16. The method of claim 12, wherein identifying the at least one qualifying period of time includes identifying a period of time during which vehicle acceleration of the vehicle is between predetermined thresholds that identify periods of near steady state motion of the vehicle.
17. The method of claim 1, further including estimating engine power and power loss of the vehicle based on the at least one operating parameter, wherein generating the output signal includes generating the output signal based upon the estimated engine power and power loss.
18. The method of claim 17, further including estimating instantaneous fuel use of the vehicle based on the generated value and the estimated engine power and power loss.
19. The method of claim 1, wherein generating the output signal includes determining a weighted or moving average value of the at least one operating parameter as obtained during the at least one qualifying period of time, in response to at least one of the motion parameter or engine activity parameter being within a predetermined range.
ITTO20020072A1 (en) 2002-01-25 2003-07-25 Fiat Ricerche Method for the determination of the 'quantity of particulate accumulated in a particulate filter. | 2019-04-21T22:24:49Z | https://patents.google.com/patent/US20160362076A1/en |
2D scanner tags are gradually coming into the standard of things and it is simply an issue of time before they supplant the occupant 1D standardized identifications.
Everybody familiar with innovation will in any event have seen 2D scanner tags in their everyday activities, intentionally or unwittingly. The focal points that join changing to a 2D framework are enormous however there a couple of detours right now as well. In this way, it winds up common that everybody will take a gander at all angles previously settling on a cognizant choice.
Notwithstanding, because of the ocean of data out there, it is anything but difficult to get lost. In this way, here is a piece to decrease all that shaper and give you the best 5 2D standardized tag scanner. You will locate the diverse sorts of scanners and standardized tags. And furthermore, the strategy of how does 2D standardized tag scanner function.
PRZM Intelligent Imaging technology for next generation performance which resets the bar for 2D imaging by improving decode performance and snappiness, dramatically improving the user experience, user productivity, throughput and wait times.
Megapixel sensor Scans any barcode on any medium 1D, 2D and PDF417 barcodes printed on paper labels or displayed on mobile devices or computer screens. And it delivers the resolution required for longer-distance scanning, clear photos, sharp signatures and more accurate OCR data.
Largest 'sweet spot' for can't-miss scanning with a decode range that allows users to scan any barcode type at any density nearer and farther than any other scanners in its class, scanning is truly second nature users just point and shoot.
Smart auto-host detect cables automatically determine which interface is attached, eliminating the need to scan numerous configuration bar codes. Over 90 international keyboards are hosted within the scanner for easy setup, all around the world.
123Scan2 and Scanner Management Service (SMS) work hand-in-hand to reduce management time and cost by automating initial configuration and enabling remote management of your DS4308 scanners.
Two connection modes: 433MHz wireless connection and USB2.0 wired connection; In wireless mode, with Mini USB Receiver,delivers up to 400m/ 0.24mi transmission in open space, 100m/328ft transmission indoor. Easily connected with your laptop, PC etc.
Long distance 433MHz wireless connection for adding mobility. Delivers up to 400meter / 0.25mile transmission away from base station in barrier-free environment,100 meter/ 330 feet transmission in obstacles environment.
Bluetooth Wireless Technology: Facilitates scanning of all standard 1D, PDF, and 2D bar codes up to 10 meters (33 feet) from the base (depending on the environment).
Future Proof: For those who only require 1D scanning now but anticipate 2D scanning in the future, the Voyager 1452g can be affordably upgraded from 1D to 2D scanning at any time.
Long Battery Life & Tool-Free Battery Removal: Field-replaceable lithium ion battery provides 14 hours or more of use, depending on scanning volume.
Flexible Licensing Solution: Meets diverse scanning requirements by offering models with basic functionality, with software licenses enabling additional functionality as needs evolve.
Point-and-shoot Scanning Simplicity--- With omni-directional scanning, users never need to line up the imager and the barcode - unlike 1D scanners. Workers can scan barcodes across a wide range (0.5 in./1.23 cm to 14.5 in./36.8 cm), improving checkout speed and reducing training time.
Pre-configured and Ready to Use, Right Out of the Box---Since the default settings are optimized for the majority of scanning applications, you can use the DS2200 Series imager the moment you take it out of the box - no configuration required. Just plug the DS2208-SR into your Point of Sale (POS) and the auto-host detect cables will automatically identify the interface and connect the imager, simplifying and reducing setup time.
Patent Pending Technology for the Most Intuitive Aiming---The aim line is similar to the 1D scanners you have today, providing your associates with a familiar experience. Additionally, the aim line guides users to scan at the ideal distance from the barcode- especially helpful when capturing wide barcodes.
This article is loaded with valuable data like why 2D standardized tag scanner is the need of great importance, what is the distinction somewhere in the range of 1D and 2D scanner tag scanner. There are couple of things to be considered before purchasing a standardized tag scanner.
Why 2D Barcode Scanners Are Needed?
The principal thing that each shopper or entrepreneur who is right now utilizing 1D standardized tags and scanners would ask is, the reason they have to change from their present framework and embrace the qr 2D scanner tags and scanners. This characteristic inquiry has an assortment of pertinent answers.
In the cutting edge world, there is an expanding measure of data that is being bolstered into innovative frameworks and it is just regularly going to increment. So the principle issue with 1D standardized identifications is the measure of data that they can store.
2D codes utilize a scope of characters, boxes, shapes and so on to store data instead of a 1D code, which just uses lines. This why 2D codes can store an immense piece of information.
Notwithstanding the measure of data that 2D codes can hold, the assortment of data likewise changes a great deal. Because of the idea of the code, they can likewise store paired data as pictures, voice notes, web-joins and so forth instead of the alpha-numeric information that 1D codes store.
This assumes an imperative job in the present day and empowers simple trade of essential messages and information as standardized tags, adding another new use to scanner tags.
The last yet certainly not the slightest motivation behind why individuals should turn towards 2D standardized tags and scanners these days is the cost factor. The costs of both 2D scanners and additionally that of 1D scanners are nearly in a similar range today, which was not the situation, only a couple of years back.
Additionally, all 2D scanners being in dynamic creation nowadays can check 1D codes as well, which makes it a win-win circumstance for a purchaser as they get the most recent innovation at a similar cost with no misfortune in usefulness.
How 2D Barcode Scanners Work?
The working strategy of a 2D standardized identification scanner is fundamentally the same as that of 1D scanners. Both have the illuminator, scanner and decoder to comprehend the codes.
As the names demonstrate, illuminators toss a light emission or laser and catch a picture of the standardized tag. Some 2D scanners simply take a picture like an ordinary camera as well. The picture taken should be handled and checked to bode well. This is the place the scanner comes in. Distinctive Scanners utilize diverse innovations to distinguish the light reflected back or the standardized tag present inside the picture. The filtered picture is then sent to the decoder which breaks down the picture and removes the data from the standardized identification.
Where the 1D and 2D standardized identification scanners contrast as far as working is principally in the way that scanner tags are planned themselves. 2D standardized identifications from the earliest starting point have been made to enhance the examining pace and exactness. Along these lines, regardless of the sort and details of the 2D scanner, they will dependably be superior to 1D scanners.
Give us a chance to take QR codes for instance, as they are the most across the board 2D scanner tags at present. They are comprised of a blend of squares which frame a square. The squares themselves are numerous in number and together frame the QR code.
The essential square present in each QR code is the discoverer design. This will dependably be the principal obstruct that a 2D standardized tag scanner will take a gander at. It is a variety of squares, which is utilized by the scanner to recognize the size, course and arrangement of a code so that the standardized identification can be broke down from the best possible edge and introduction.
The following square that a 2D scanner would take a gander at, is the arrangement square. It is a set example that enables the scanner to check wheater the standardized tag is harmed or mutilated. Because of the capacity of the scanner to detect these things, even a QR code which has a mistake as blotches and bends can be precisely filtered to give the required data.
Other than the 2D standardized identifications, what impacts the working of a 2D scanner most, is the product utilized inside the scanner. Not at all like in 1D scanners, the product assumes an extremely crucial job in filtering. The higher the cost of the 2D scanner, increasingly refined will be the product introduced. After the scanner examines the picture, the product investigates each moment part of the standardized identification.
The dissecting capacity is down to the product perceiving the distinctive high contrast designs. When the examples are perceived, the scanner can make out which square is for check and arrangement reason and which square contains the genuine information that is required by the client.
This examination additionally helps in getting rid of bends which may make the code muddled. To beat this, 2D scanners make educated estimates like people to accurately perceive the code.
How 2D Barcode Scanners Differ From 1D Barcode Scanners?
These are the fundamental ones which would most likely be connected to the telephones of everybody. This can be utilized by sprinters and joggers if your MP3 player does not bolster the Bluetooth association or any remote associations. In any case, the primary detriment of wired earphones is the wire. You’d need to run and consume calories instead of investing your energy unwinding the wires from your body.
Ordinarily itself, 1D standardized identifications are even and rectangular in nature and that implies the scanners likewise can peruse information which are just level. Some of the time the scanner should be in contact with the standardized identification to get exact outcomes however present day 1D scanner tags can be filtered from a most extreme separation of 24 inches. The sweep position likewise should be constantly upstanding to have the capacity to filter the code legitimately.
Despite what might be expected, 2D scanners can interpret standardized tags vertically and on a level plane, from an extensive separation and at any edge utilizing the arrangement squares.
Both 1D and 2D standardized identification scanners arrive in an assortment of shapes and sizes so as to be helpful for various enterprises and organizations. The most well-known frame factor for both is the “weapon” style because of the conveyability that it offers.
In any case, they are likewise accessible in ledge, cordless and mounted shapes for different ventures. The principle distinction these days is the utilization of cell phones for 2D standardized tag filtering due to the non-prerequisite of a database. This is an office that 1D codes don’t offer.
Because of the utilization of advanced programming and other equipment improvements as of late, the 2D standardized identification scanners are path better in perusing standardized tags alongside exceptionally negligible mistake rates. The speed of examining is likewise high contrasted with 1D standardized tags. Additionally, by utilizing innovation, human mistake can be lessened to the absolute minimum.
Dissimilar to a couple of years back, cell phones alongside 2D standardized tag scanners are as broadly accessible nowadays as 1D scanners. The cost of the two kinds is likewise in a similar range nowadays because of innovative progression. At the point when this is the circumstance, it winds up unreasonable to go ahead with an innovation that will be officeholder soon.
2D standardized tag scanners are progressively getting to be remote machines to encourage simple versatility between different workstations or spots. They can undoubtedly be worked through WiFi, Bluetooth or cell phones. This, alongside the nonattendance of a requirement for a database makes it extremely helpful for individuals who need to move continually inside a major distribution center, industry, and so on.
Like everything in the cutting edge world, 2D scanner tags don’t have only one occupation. Alongside checking standardized tags, they can likewise store pictures, site joins, application information and so on. They can do every one of these undertakings at the same time as well. Numerous standardized identifications can be filtered in the meantime and from various points too as all 2D scanners are omnidirectional in nature. Likewise, the span of the code can be fluctuated to fit on a specific surface, dissimilar to 1D standardized tags.
Zebra is an organization known for the simple fantastic items that it conveys to the market. It is a backup of the Motorola gathering, which says a lot about the standard of the items advertised. In spite of the fact that it isn’t modest using any and all means and is, truth be told, one of the higher evaluated gadgets on this rundown, it doesn’t hold back on the required highlights and the extra highlights it packs in is awesome.
The organization asserts that the DS2208 is one of the most effortless standardized identification scanners to use in the present occasions despite being one of the further developed ones in fact. The USP of the gadget unquestionably must be the Zebra licensed PRZM programming used to improve the entire procedure. Whatever is left of the highlights and essential particulars are recorded underneath.
Honeywell, similar to Zebra, is one of the world’s driving brands with regards to standardized tag scanners. They have a major scope of items in each class and furthermore create a great deal of hardware items other than standardized identification scanners as well.
Honeywell is to a great extent in charge of making standardized identification scanners as mainstream as they are nowadays because of their ceaseless work in this field to enhance the gadgets.
The Voyager extend is one of the most noteworthy moving standardized tag scanners for Honeywell and the equivalent is valid for the 1452G2D. Much the same as the Zebra DS2208, even this falls in the higher end of the value portion because of the best in class highlights and client encounter. The USP of the Voyager is the wide range in which it is usable. With the most recent Bluetooth tech, it is operable up to 10 meters remotely. Here are it’s different highlights.
It can filter from cell phones.
Cost of support is high.
Not at all like the 2 past items on this rundown, the present item originates from an extremely unassuming assembling. Be that as it may, it is as yet put this high on the rundown in view of the exceptional appraisals alongside fabulous particulars and highlights it conveys to the table. Nadamoo is an organization from the US and is stirring the market with such items.
When you take a gander at the specs sheet, you will find that it doesn’t hold back on real highlights and even has preferable particulars over models put above it. One of the principle USP’s of this scanner is the wide Bluetooth run that it offers. Nonetheless, that isn’t its solitary enormous element. Here is a rundown of all that you have to know before purchasing this item.
The cost to execution proportion and incentive for cash is great.
The battery life is another extraordinary angle as it can continue for 10 days without charging.
In the wired mode, the client can utilize standardized tag while charging.
The following item on our rundown originates from an Indian producer who is generally new to the standardized tag checking business. Be that as it may, this does not imply that their items are mediocre compared to those of its rivals. Truth be told, it is sheltered to state that, the gadgets are giving extreme rivalry to those valued above them because of the cost viability offered by these items.
you get the intensity of a standardized identification scanner, advanced camera and archive scanner in a solitary, financially savvy gadget.
The 1450G2D is the second item inside the best 5 from the place of nectar well and this talks a ton about the quality that the organization represents with regards to standardized identification scanners. The prime saying of the organization is unquestionably to offer the best client encounter as opposed to the best particulars at the cost and they have been to a great extent fruitful at that till now.
The 1450G2D, as the name recommends, is the more reasonable rendition of the 1452G2D and it misses a few highlights when contrasted with the latter.However, regardless it has what it takes to be one of the best standardized identification scanners in its value section. Here are a portion of its determinations and highlights, that you ought to know about.
The skew plot for example acknowledgment is a noteworthy 70 degree.
So that was all you had to know before going into the market to buy a 2D standardized identification scanner. There are an assortment of alternatives out there as far as determinations and cost.
On the off chance that you couldn’t care less about the evaluating and need the most elite, at that point the Zebra Symbol DS2208 is the best approach. On the off chance that you have a strict spending plan yet at the same time need a decent item, the Nadamoo or Pegasus standardized identification scanners will work to perfection.
In the event that you need the most versatile standardized identification scanner by containing a bit on execution, at that point the Generic ABOUTTHEFIT is a decent item to consider. Expectation this article made a difference. | 2019-04-25T21:52:30Z | http://reviewsw.com/2d-barcode-scanners/ |
objective for nearly 160 years.
So “how” does this happen? “Where” does it happen?
Maury Boyd and Associates, Inc.
of the Grand Chapter of Theta Chi Fraternity.
is at the sole discretion of the Editor.
property of Theta Chi Fraternity, Inc.
lunch break at the Presidents Conference.
Conference. I’m sure their stories will be both intriguing and inspiring.
for many of us the application of those skills is first explored, implemented, and refined.
President EVERY Year to attend and participate in this extraordinary leadership experience.
Capital Campaign. I also want to encourage each of you who have yet to do so to join me in supporting our efforts to truly enhance the Theta Chi experience.
Capital Campaign on Page 12.
The Foundation Chapter 2013/2014 donor list.
his lifetime giving level is Chase Council.
Thank you to Brother Burk and all contributors to The Foundation Chapter!
IHQ NEWS/Learn about Theta Chi’s recent staff restructuring.
EXPANSION UPDATE/Theta Chi reinstalls two proud chapters.
can help shape the future leaders of Theta Chi Fraternity.
shares his recollections about World War II and thoughts on leadership.
the Chapter Eternal, including a past staff member and other notable alumni.
the same pride and accuracy as I had experienced during my undergraduate days at James Madison University.
Col. Ed Shames of Band of Brothers fame on page 20.
Take a look at the campaign featured in this issue and extend your Helping Hand as you are able.
Your brothers are counting on you.
this focus because the training of our Presidents is of critical importance to the future of our Fraternity.
in the tens-of-thousands of dollars, sometimes even topping $100,000.
challenging and educational as that of the Chapter President.
support the Fraternity has given him.
our footsteps by doing all in their power to perpetuate our ideals.
continue on staff throughout 2015/2016.
our field staff, who traveled throughout North America to assist our members and chapters.
Theta Chi’s Sacred Purpose movement.
Vice Presidents of Health and Safety.
2005) accepted the new position of Sr.
been named as our full time receptionist.
will continue to share her reliability, experience, and knowledge of our volunteer base.
a farewell party to thank her for her service.
Joel Wendland has been promoted to Sr.
absorb the office manager responsibilities.
programming in the Greek World.
on staff I struggled to sleep.
icy roads again for that same destination: Indianapolis.
Staples were traded for job hunting and walks around a huge campus.
Edmonton. I taught the responsible talk, but carried the ideals of a traveling beatnik. I still felt that rush of youth and fraternal mischief.
is happiness? What is good, what is evil?
will always have to defend ourselves to the media, the school, our peers.
We have to continue to justify the existence of our happy brotherhood.
renovations and new construction projects.
mortgage or as a back-up lender to a primary financial institution.
Tau TV room at the University of Florida.
University of Alabama (featured on page 37).
chapters in any way possible.
Above: Rendering of Gamma Theta house at San Diego State. Below: Actual construction.
Zeta Psi alumni join with undergraduate Rechartering Members to celebrate Theta Chi’s return to Western Illinois.
Zeta Psi Chapter at Western Illinois University.
and our ambition to grow as individuals.
our college years and after graduation.
group of guys to reinstall Zeta Psi Chapter.
charge and make history at Western Illinois.
were initiated and Zeta Psi was officially reinstalled.
and share why being a Theta Chi is so special.
to the extent they desired.
Delta Sigma Phi and Alpha Delta Pi.
and in A&M’s Corps of Cadets.
Recruitment and Expansion JD Ford, Sr.
by two brothers from Epsilon Psi/NJIT.
Doug Miller, and Tom Sisco.
Eta Upsilon’s Rechartering Members at Texas A&M.
Will YOU be a Cornerstone?
eadership is the cornerstone of our Fraternity.
pathway for true brotherhood during our college years.
to serve in their communities, across the nation, and around the world.
would not have the support needed to thrive.
leaders in their communities and across the nation.
We all gained so much from our undergraduate time in Theta Chi.
Foundation Chapter of Theta Chi.
in gift commitments raised as of April 24, 2015!
clarifying my roles and responsibilities as President.
conference, I had the opportunity to listen to Father Phil Bowers speak.
important. And, never before has the Foundation’s case for supporting that mission been more compelling.
is the key to our success. We must train our members to succeed in today’s complex college environment.
has received formal leadership training at any given point in time.
leads the campaign with an historic $250,000 gift.
the leadership training of our Chapter Presidents is first and foremost in our brotherhood.
employees across North America. He recently completed an $8.5 billion merger with Family Dollar, making Dollar Tree a Fortune 200 company and one of the largest retailers in the world.
said he was always most focused on furthering his education.
number one, to get an education, and number two, I was growing up.
oaths and the ideals of Theta Chi.
are leading their chapters—I think we should be talking about values.
Anniversary as a publiclytraded company.
Charter Member, and now President of my chapter.
Theta Chi has opened doors I never realized existed.
the Presidents Conference, all within my first three semesters of college.
This Fraternity has changed me into a man who can stand up and lead.
Atlanta, Ga. Will you and your chapter brothers lead Theta Chi?
leader of my chapter, but a leader in the community.
times I thought to myself, "What did I get myself into?"
that it was clouding the bright future ahead of me.
succeed and a band of brothers in the same position as me to learn from.
have a permanent place in Theta Chi.
gift commitment to support the Cornerstone Capital Campaign.
Fraternity. Will you join these men in supporting the future of our brotherhood?
See the Presidents Conference for yourself !
Past Presidents, National Officers, and, above all, friends behind me.
to be the best that it could be.
members and even as National President!
demonstrated a commitment to educating undergraduate leaders.
beyond the confines of their own campus.
life-long relationship with the Foundation Chapter.
gift to the Cornerstone Capital Campaign.
month. By giving $84 a month for five years, I have made a $5,000 pledge commitment to Theta Chi.
not have to shoulder this burden. I hope you will join me in my commitment.
Cornerstone Campaign? Do you need help in determining the right gift amount for you? Let’s talk.
Please reach out to me at 317-848-1856 or email ([email protected]) and we can set up a time to talk.
committed more than $65,000. Will you join them in making a gift?
Campaign, will you join them in supporting the future of Theta Chi?
exceed 15% of all campaign gifts received.
the world will note the anniversary of Japan’s formal surrender aboard the USS Missouri.
Capt. C. Ross Greening (Alpha Omicron/Washington State 1939) and Lt. Harold F.
and meeting General George S. Patton; to Col. Benjamin H.
Pease, Jr. (Zeta/New Hampshire 1939) and Capt. James M.
Theta/Dartmouth 1941), who worked on the Manhattan Project.
Fraternity made the ultimate sacrifice during the war.
celebrate and honor Theta Chi’s service in World War II.
Harold Winer (Zeta Pi/Old Dominion 1971).
that served as home for Hitler’s Eagle’s Nest.
The Rattle: Tell us about coming to Toccoa.
dwindle down to around 2,800, which is regimental size.
found on DVD/Blu-ray and Amazon Prime.
Company, Third Battalion on September 1.
the last mountain of the Appalachian range.
miles down, plus the distance from the camp.
it, I do not know. I was determined and I wanted it...of course, that’s what the others wanted, but maybe they weren’t as fit or determined as I was.
around and went back to South Carolina.
done— jumping off 25+ foot towers into straw.
like a farm for wounded people.
war) was because of Toccoa.
honor him as close as my own brother.
R:Tell us about leaving Toccoa.
three days, which helped to weed men out.
during this most recent reunion.
good buddy. He is also my hero.
one to Paris and one to London.
London, I stood in the exact spot for the ceremony where Eddie received his battlefield commission for action in Normandy.
in full equipment and packs also in three days.
to Ft. Bragg to await our orders to go overseas.
to the paratroopers about their objectives.
EDS: Of course, that’s why we set them up.
tured, including my commanding officer, Col.
Wolverton. I was supposed to be on that plane.
By chance, a newspaper reporter took my seat.
death, like the rest of them.
R: Is it silent? Are guys talking or… ?
where I was supposed to be.
figured the Germans thought I was a cow.
all Cost”)…It was time to leave.
that started at about 3 a.m.
R: Tell us about your battlefield commission.
men and women who gave their all in Afghanistan and Iraq.
go to London to get my uniforms.
R: What happened after your commission?
the son of the third richest family in America.
could use a patrol platoon.” It was a new concept, of course, with Normandy and so forth.
earn your respect, you’re out of here now.
intelligent. Is that a crazy answer?
R: Why did you start to talk about it?
Congress from the southern part of Illinois.
you saw at the camps, what would you say?
not smart enough to coin a word for it.
by any chance. That’s Band of Brothers crap.
R:What made Spiers an effective leader?
how much I thought about him.
R:What made him a strong leader?
EDS: I couldn’t tell you. It was natural.
was anxious to do right.
EDS: Leaders are made, they’re not born.
you really want it and you work for it.
reading and watching Band of Brothers?
based in Zell am See.
EDS: Very little, but it was a very good story.
in Bastogne. I’m sure he was there somewhere.
certainly did bring attention to World War II.
Normandy one time before he wrote his book.
R: Who would you say are your heroes?
chance to meet this man.
to his soldiers and concern for their safety.
paratroopers. Theta Chi's Col. Benjamin H.
war and witnessed Operation Market Garden.
Allied troops move through Eindhoven.
stories and had an unusual perspective of hearing about both sides of the conflict.
said, ‘Niets, Ze Komen!, Ze Komen!’ (Nothing…They’re coming, they’re coming!
the Germans out of The Netherlands and then thrust into the German homeland.
all so very friendly and nice to the family.
our great conversations and learning about his childhood and the war.
a real connection to my father.
Netherlands and helped end World War II!
would have liked to have met and thank.
there, put it that way.
on these panels and do these interviews?
expenses most of the time, sometimes not.
readers of the magazine, your new brothers, what would you say to them?
EDS: Learn. Learn everything you can possibly learn, about everything. Be well-rounded.
to want to do it and do it. And Work. Strive.
it in the bank. Trust me.
Theta Chi brothers today about leadership?
wanted me to give a lecture, I’d be delighted.
glad to assist and hope to have the opportunity if I’m available.
Chi’s national partnership with the USO?
Syracuse University and Amherst College.
the Otis Brown Commons at Lancer Park.
President of the Real Estate Foundation.
was developed by Jason Huertas (2010).
is not revealed until the end of the discussion.
of those he met along the way.
interception near the end of the game.
Sgt. Bret Barnum (1991) hugging 12-year-old Devonte Hart went viral last December.
and set a new record collecting $5,200.
Jim Alfieri (far left in black), with his TNT team, and honorees for the 2014 Monterey Bay Half Marathon.
primarily on the West Coast, serving as participant, mentor and team captain.
son James, and is looking forward to marking his 15th year with TNT in June 2015.
Jim Duff (1957) passed away in 2011.
and 32 consecutive years of public service.
to recolonize Gamma Nu Chapter.
by Capt. Curtis and Lt. Col. Peter P. Mykytyn.
Gamma Rho’s Capt. Andrew Curtis (2007).
Congressman Mo Brooks (1975) won reelection to a third term as the U.S. Representative for Alabama’s 5th Congressional District.
offense —records that stood for 17 seasons.
performer and an NAIA All-American.
values that make the Steelers great.
golf tournament at The Encino Golf Course.
Award for Outstanding Quarterly Perfor mance and for their contributions to the success of Farmer’s Insurance.
Honorary Public Affairs Member for 2014.
Silvi, who is an active duty member of the U.S.
Airman of the Year award in 2013.
average of $1.5 million a year to Kids in Need.
Honorary Public Affairs Member of 2014 award.
about the good ole days.
had by everyone regardless of the scores.
afterward. A big Theta Chi thank you goes out to Matt Lotspeich (2005) for coordinating the event.
solution to—the problem of urban decay.
David Lindhjem (1969) was recently inducted into the ODU Sports Hall of Fame.
Years. Capps, a 25-year veteran of the U.S.
of the Veterans Writing Project.
local board work over the next year.
to use their image on television.
House of Representatives for District 115.
the CFO of Wolverine Packing Co.
Early Career Excellence in Online Education.
of the best pro leagues in Europe.
been diagnosed with Stage 4 throat cancer.
Alpha Phi/Alabama hangs in the alcove.
houses 47 members of the chapter.
recognition wall and trophy case.
Old South Barracks brick mounted on a wooden base.
dresser, and a walk-in closet with an organizer.
that offers a view of Lake Mendota.
alumnus and is said to be the best on campus.
Phi’s sound-proof library named in honor of Col.
Homecoming weekend on Oct. 24–25, 2014.
Guest speakers for the event included: Dr.
Executive Director Michael Mayer; Dr.
Instant Karma, with its sounds of the ’80s.
baths for its 49 residents.
Old South Barracks at Norwich University.
to name the library in honor of their father.
(1972) are displayed in the dining room.
and now this year as a senior in the new house.
members. ABOVE: Stained-glass doors in Alpha Phi’s dining room. BELOW: The sitting room.
just that. It’s a new house,” Harris continued.
house have always grown tighter and stronger.
and 11 of those members made the dean’s list.
know that the brothers were there for them.
Maxx Buffone, and Matthew Eaton.
place out of 17 other fraternities on campus.
Corey Bothwell and his father, Stu Bothwell, before his father deployed to Kuwait.
event and $750 was raised for the USO.
clean-ups and host blood drives each semester.
the University of Florida’s Stop Hunger competition.
Champions, a fun-filled day of friendly competition to benefit Special Olympics.
well-being in all of its fraternity operations.
U.S. soldiers for the holidays.
Theta/Tufts 2001) for a USO benefit show.
the shot, and $500 was raised.
during their Street Soccer event to benefit the USO.
raise more than $400 for the USO.
more than $30,000 for suicide prevention.
Syracuse University’s Order of Omega.
receiving the Robin and Tom Portman Scholarship.
two-time recipient of the scholarship.
In October brothers of Alpha Psi/Maryland volunteered at at the DCSCORES Fall Frenzy.
tailgate with the sisters of Gamma Phi Beta.
understanding of this complicated disorder.
it affects more than individuals in the military.
was crowned Greek God during Greek Week 2014.
ing the Spitball statue on campus with uplifting mental health statements; a speech by Dr.
certificate to us for their appreciation.
Mio’s Pizzeria to benefit the USO.
The brothers of Beta Iota/Arizona held a brotherhood hike up Picacho Peak.
ALS Ice Bucket Challenge Sept. 25, 2014.
tank filled with ice water.
able to cuddle with a puppy during that time.
Proceeds benefitted Forsyth Humane Society.
Fort Pickett, VA in October.
Competition” for United Way of Douglas County.
and afternoon programs to read to children.
the food donations that they receive.
picking, hayrides and corn mazes.
also won Delta Zeta’s Turtle Bowl.
November to benefit the USO.
toured Washington, D.C., and visited brothers at Alpha Psi Chapter at the University of Maryland.
children in Georgia with HIV/AIDS.
and Croquet Tournament to benefit the USO.
approximately $1,000. Brothers also participated in Fall Cleanup on Nov. 1, 2014.
that provided an assisting hand to our soldiers.
We hosted Chi Hop and a pancake breakfast to benefit the Wounded Warrior Project.
raised for the Wounded Warrior Project.
Boston on Oct. 11, 2014, and baked brownies for the patients while they were there.
Bake Sale to benefit Relay for Life.
Habitat for Humanity for a fundraising event.
The brothers sold 750 boxes of doughnuts.
fence project at their chapter house.
Starving Children at the Aurora facility.
nearly 200 cases (40,000 meals) were packed.
provide meals to be packed.
served cotton candy, popcorn and snow cones.
assisted with our Alumni Ceremony. The chapter also held a successful Alumni Weekend.
Conquer today,” printed on them.
various competitive activities. The week culminated in a pageant and lip sync competition.
and we raised $4,633 for the USO.
also won the IFC Flag Football Championship.
display earned them a second place in the competition.
the Richard Murphy Hospice Foundation.
for dealing with and managing stress.
Brothers at Iota Beta Chapter win the IFC Flag Football Championship at Missouri State University.
Scott Benton (2017) won the Mr.
raised $1,400 for the USO.
The Omicron Charter Members, 100 years ago.
also named FIU Homecoming Champion.
raised nearly $12,000 for the USO.
for the James P. Wilmot Cancer Center.
February 20, 2015 marked the 50th Anniversary of Theta Chi as an International Fraternity.
Our very first chapter outside of the United States was installed in our neighbor to the north.
Edmonton, Alberta in the Dominion of Canada.
was dispatched to begin recruiting members.
University of Alberta. Upon learning that Theta Chi was attempting to form a colony, he enthusiastically contacted and assisted J.C. Byrd with the recruitment of interested Alberta students.
Charter—and they pledged an additional 16 men that spring.
making plans to hold their next meeting in the Province of Alberta in June 2015.
Chapter Eternal in the Fall 2014 issue.
council, and served as Editor-inChief of the student newspaper.
they were married 71 years prior to her passing in 2013.
Chairman of the Board of The Prudential Foundation.
of Education. He also raised funds to build the St.
rebuild the famous Paper Mill Playhouse in Millburn.
and administration of NJIT for Governor Kean.
every state in the nation opening new chapters.
as a sales consultant for men’s suits, a job he thoroughly enjoyed for 22 years.
stayed at Bradley to obtain his master’s degree in speech communications and then pursued a career in broadcasting, deejaying at radio stations in Illinois and Indiana.
by a KFMB-TV executive producer. He was hired by the station in 1979, beginning a 35year career.
became an adored local celebrity in the San Diego community.
Himmel is well-known to many for reporting on the wildfires near San Diego in 2007.
Rattle featured his story in the Spring 2008 issue.
the remains of an I-beam from the World Trade Center.
the Bayonne Bridge mere hours apart on June 12.
and a half, assisting with the recovery efforts.
NJ for LAX Club. Patrick loved spending time with his boys outdoors.
Col. James W. Beasley, Ret.
there to support our Chapter Presidents?
of cash, appreciated property and securities. | 2019-04-19T11:28:04Z | http://doczz.net/doc/1075959/to-a-pdf-copy |
For INESAP, as for a large part of civil society worldwide, the war waged by the United States-led “coalition of the willing” against Iraq was the most prominent event in the year 2003. The war was initiated with the overriding goal of eliminating Iraq’s nuclear, chemical, and biological weapons and its prohibited ballistic missiles. When no such weapons could be found, the military activities were justified instead by the positive effects expected to result from “regime change.” The U.S. government claimed that freedom and democracy in Iraq would have positive impacts, both on the overall development in the Middle East and on nonproliferation efforts.
Many observers, however, fear that the display of “preventive action” in Iraq could encourage some weaker countries to offset their military inferiority by trying to acquire nuclear capabilities. The relatively patient pursuit by the U.S. of negotiations with the North Korean leadership, in spite of that country’s withdrawal from the Non-Proliferation Treaty, could be interpreted alternatively as showing the potential of diplomatic avenues, or as suggesting that a small nuclear arsenal, or even the perception that a country might have one, could play a role in deterring U.S. military action.
In April and May 2003, the third Preparatory Committee (PrepCom) meeting for the Non-Proliferation Treaty (NPT) Review Conference (to be held in 2005) reflected the US focus on non-proliferation while at the same time marginalizing the disarmament obligations of the nuclear weapons states. While insisting that non-nuclear weapon states refrain from acquiring any nuclear weapons-capable technology, the US continued debate on development of nuclear weapons with new capabilities (from new varieties of “mini nukes” to much bigger “bunker busters”), while increasing readiness for underground nuclear tests. The Bush Administration also rejected ratification of the Comprehensive Test Ban Treaty (CTBT), further diminishing prospects for its eventual entry into force.
Shortly after the NPT PrepCom, the U.S.-led Proliferation Security Initiative (PSI) was announced, with the goal of stopping “the flow of [WMD items] to and from states and non-state actors of proliferation concern.” The PSI functions outside the United Nations and stresses “the need for proactive measures,” including the interdiction of shipments by air or sea.
Further relevant U.S. actions included withdrawal from the Anti-Ballistic Missile (ABM) Treaty in June 2003 and increased funding for development of tactical and long-range missile defense systems and for military space programs, including those which could lead to the weaponization of space.
With proliferation of nuclear weapons, missiles, and missile defenses globally on the rise and space militarization/weaponization becoming a recurring theme, a new civil society initiative brought a ray of hope to many NGOs. The Mayors for Peace, lead by Hiroshima Mayor Tadatoshi Akiba, took the lead in promoting a renewed vision for a nuclear weapons free world, to be achieved by 2020. INESAP is proud to have been able to further this important initiative, which complements INESAP activities related to nuclear non-proliferation and disarmament; ballistic missile non-proliferation, control, and disarmament; and efforts to make the case against missile defenses and to prevent the weaponization of space.
The project Moving Beyond Missile Defense, which was started in cooperation with the Nuclear Age Peace Foundation (NAPF) in 2001, continued throughout 2003. The year began with the third project conference being held in Berlin in January under the title Arms Control, Transparency, and Verification in a European-Russian Framework of Cooperative Security.
The conference brought together scholars and researchers from many European countries, including Russia, but also from the United States and Latin America, to discuss European and Russian perspectives on missile defense and space weapons as well as to draw lessons from different existing control regimes (Biological and Chemical Weapons Conventions, Comprehensive Test Ban Treaty, Non- Proliferation Treaty, Ballistic Missile Control Regime, Outer Space Treaty, etc.) that could be useful when devising frameworks for missile, missile defense, and space control regimes.
For the Moving Beyond Missile Defense project, a homepage is maintained at http://www.mbmd.org by the Nuclear Age Peace Foundation.
At the NPT PrepCom in 2003, INESAP initiated an informal European Working Group on Missile Defense and Space Weaponization, in order to improve exchanges of missile defense and space weapons-related information in Europe and to encourage joint work on the promotion of alternatives including a missile flight test ban, missile disarmament, the prohibition of missile defenses, and a space weapons ban. The working group communicates via the discussion list EU_MDandSpace [at] yahoogroups [dot] com.
INESAP also participated actively in NGO activities at the PrepCom, being closely involved in the drafting of statements to be delivered to the delegates in the “NGO Session.” The INESAP Coordinator contributed with the statement Nuclear Disarmament and Ballistic Missile Elimination Go Hand in Hand http://www.reachingcriticalwill.org/legal/npt/NGOpres2003/Missiles.htm.
As a founding member of “Abolition 2000, A Global Network To Eliminate Nuclear Weapons” http://www.abolition2000.org, INESAP continued to be active in the network. Several of the Abolition 2000 working groups are convened by active INESAP members, others are members of the Abolition 2000 Coordinating Committee and Global Council. In addition to the contributions to the NPT PrepCom, INESAP also plays a crucial role in the German Abolition 2000 section “Trägerkreis Atomwaffen abschaffen – bei uns anfangen!” and in preparing its annual conference, which was held in Berlin this year. At the conference, the INESAP Coordinator was nominated one of three co-coordinators of the German network.
In May 2003, the exhibition Macht den Himmel nicht zur Hölle. Argumente gegen eine Raketenabwehr (Don’t Turn the Heavens into Hell: Arguments against Missile Defense) on the dangers of missile defense became available for public showings. Developed for the German Abolition 2000 section by Regina Hagen, Jürgen Scheffran, and Wolfgang Schlupp-Hauck and funded by the German Berghof Foundation, the exhibition drew great interest and has already been shown in many towns. The exhibition continued the “Raketen abrüsten statt abwehren” (Missile disarmament instead of missile defense) initiative. To advertise the exhibition, a booklet containing the full exhibition was produced, as well as a CD containing posters and flyers which can be easily adapted by local exhibition organizers. The exhibition can be viewed at http://www.ippnw.de/frieden/awaffen/AusstellungRaketenAbruesten_2003.pdf; (6 MB).
The Mayors for Peace’s Emergency Campaign brought renewed attention to the Model Nuclear Weapons Convention (mNWC). Merav Datan, one of the main mNWC drafters, was involved in the mayors’ campaign, assuring that the mNWC was presented in the most useful way. The complete text of the mNWC is contained in the book Security and Survival. The Case for a Nuclear Weapons Convention, which is co-edited by INESAP, IPPNW and IALANA http://www.ippnw.org/IPPNWBooks.html.
INESAP Coordinating Committee member Kathryn Nixdorff is actively involved in a series of projects that deal with bioweapons and means of their prevention.
The BioWeapons Prevention Project http://www.bwpp.org, founded in November 2002, gained additional momentum in 2003 with the appointment of its own director. The project, a new civil society initiative to monitor the ban on biological weapons, is located in Geneva, Switzerland, the meeting place of the United Nation’s Conference on Disarmament. BWPP is a joint project of eight founding non-governmental organizations, among them INES. The initiative aims to establish a global monitoring network to increase openness in biological weapons matters.
BWPP will strengthen the ban on biological weapons by monitoring governments, industry and others. The watchdog group will be assisted by partner organizations around the world. The project follows in the footsteps of successful non-governmental efforts to monitor the ban on landmines and the spread of small arms.
INESAP expertise on the use of space was provided to German and European parliamentarians in need of information on and an evaluation of space policy, on a global and European as well as national level. INESAP participants contributed to a hearing on the “Green Paper: European Space Policy” and published several statements on the planned integration of European space policy in the increasingly militarized European Security and Defense Policy of the European Union.
A high-level delegation of the Middle Powers Initiative, of which INESAP’s ‘mother organization’ INES is a member, visited several European capitals and NATO in autumn 2003, to lobby the Foreign (and Defense) Ministries for a more outspoken stance on the issue of nuclear disarmament. As a national delegation member, Regina Hagen participated in meetings with German officials during the delegation’s visit to Berlin.
INESAP has extended contacts to government officials and diplomats as well as to other NGOs and active individuals.
As the network’s only staff person, the INESAP Coordinator now represented the network at many events and in many NGO bodies, e.g. in the Abolition 2000 Global Council, as a co-coordinator of the German Abolition 2000 section, on the Board of the Global Network Against Weapons and Nuclear Power in Space, and as Vice President of the NGO Committee for Disarmament in Geneva. Regina Hagen has also become a member of the editorial team of the German quarterly “Wissenschaft und Frieden” (Science & Peace).
Armin Tenner, INES chair, took over representation of INES/INESAP on the Middle Powers Initiative Steering Committee from Fernando de Souza Barros.
On a daily basis, many INESAP participants continue to represent INESAP and its expertise and ideas at conferences, in other organizations, at UN meetings, in expert bodies, and in a variety of other forums. INESAP also maintains, among others, regular contact with the Pugwash Conferences on Science and World Affairs, the United Nations Institute for Disarmament Research, the International Peace Bureau, and the Women’s International League for Peace and Freedom.
A few changes were made to INESAP committees at the “Moving Beyond Missile Defense” conference in Berlin. On that occasion, the INESAP Coordinating Committee (CoCo) had the opportunity to meet. Most members of the committee renewed their commitment. After 7 years, Martin Kalinowski left the committee because of other obligations. Martin played a key role in INESAP for many years, and his continued advice will be greatly appreciated. Johan Swahn, one of the founding fathers of INESAP, left the committee because his main research focus has shifted to sustainable development.
At the same meeting, Prof. Kathryn Nixdorff accepted a place in the committee. She is professor for microbiology at the Darmstadt University of Technology, a member of IANUS, and has been participating in INES and INESAP activities since its foundation. She has been working on non-proliferation and preventive arms control for biological weapons as well as on verification for toxicological weapons. The last open place in the CoCo was filled by Dr. Morten Bremer Mærli, researcher at the Norwegian Institute of International Affairs. Morten is working on nuclear nonproliferation and prevention of nuclear terrorism. He is a physicist by training with both practical and research experience in the fields of nuclear safety and security.
The Editorial Board of the INESAP Information Bulletin saw changes as well. The only person remaining in this group is Dr. Jürgen Scheffran who continues to be the main editor. Alexander Glaser, Regina Hagen, Andrew Lichterman, Dr. Götz Neuneck, and Prof. Dave Webb are the new Editorial Board members.
#22, Catching the Bomb. 10 Years Networking in INESAP – The Role of Scientists in International Security, in December 2003.
Between 800 and 1,100 copies of each issue were printed, with approximately 500 being mailed to subscribers. The other copies were distributed to diplomats, policy makers, media people, as well as NGO and academia representatives on many occasions. The Bulletin can also be obtained both in PDF and HTML format from the INESAP webpage http://www.inesap.org/publ_bul.htm.
The series of INESAP Briefing Papers was continued in October 2003 with Issue No. 11, Cleanup of Cold War Legacies. The Ongoing Nuclear Contamination of the Artic Region, written by Ulrike Kronfeld-Goharani, a Researcher at the Schleswig Holstein Institute for Peace Research (SHIP).
The INESAP homepage is located at http://www.inesap.org and gives access to INESAP publications and information, with the INESAP Information Bulletin making up the largest part. In 2003, the webpage continued to receive steady use, with an average of 200-250 visits and approx. 2,000 hits per day. Interestingly, INESAP webpage information seems to be much appreciated by US educational, US military, and US government users.
INESAP continued to co-sponsor the Middle Powers Initiative, and is now represented by Armin Tenner from the Netherlands on the MPI International Steering Committee http://www.middlepowers.org/mpi/index.shtml.
Unfortunately, several active INESAP participants lost their positions in 2003 due to a lack of funding of their respective projects or organizations. This reflects the general difficulties in obtaining funds for NGO work in the field of disarmament. If this situation continues, the work of INESAP as well as other NGOs will be seriously threatened. Even more so is it appreciated that these individuals continued contributing to INESAP activities.
The Coordinator manages most INESAP activities. The INESAP office is located in Darmstadt and hosted by the Interdisciplinary Research Group in Science, Technology and Security (IANUS) at Darmstadt University of Technology (Germany) http://www.ianus.tu-darmstadt.de.
In 2003, the coordinator, Regina Hagen, spoke at a wide variety of events on INESAP activities and topics. Of particular importance was her participation in the 2nd Nagasaki Global Citizens’ Assembly for the Elimination of Nuclear Weapons in Nagasaki/Japan, where the Mayors for Peace officially launched their Emergency Campaign “2020 Vision” for the complete elimination of nuclear weapons by 2020. Further planning between the Mayors for Peace, INESAP, and a few other Abolition 2000 representatives was possible in a follow-up visit to Hiroshima on this occasion.
Since 1994, Johan Swahn has facilitated an e-mail discussion list for information exchange and networking among INESAP participants. To subscribe to the list, go to http://lists.chalmers.se/mailman/listinfo/inesap. Projectspecific lists have been created for the Moving Beyond Missile Defense project and the Space Weapons Ban Study Group. To subscribe, contact Regina Hagen at inesap [at] hrzpub [dot] tudarmstadt [dot] de.
INESAP funding in 2003 came from the Nuclear Age Peace Foundation (core funding for Coordinator salary, project work, and general expenses), from the IANUS group at Darmstadt University of Technology (office and infrastructure, INESAP Information Bulletin #21 and #22 and website maintenance), from the German Berghof Stiftung für Konfliktforschung (Berlin conference of Moving Beyond Missile Defense project), and from the New York-based Global Resource Action Center for the Environment (study work on missile control and disarmament). Gert Harigel from Geneva generously hosted the INESAP Coordinator during the NPT PrepCom 2003.
Regina Hagen and Jürgen Scheffran, Is a space weapons ban feasible? Thoughts on technology and verification of arms control in space, United Nations Institute for Disarmament Research, Disarmament Forum, no. 1/2003, pp. 41-51.
Regina Hagen, Jürgen Scheffran and Wolfgang Schlupp-Hauck, Macht den Himmel nicht zur Hölle. Argumente gegen eine Raketenabwehr, exhibition for Trägerkreis „Atomwaffen abschaffen – bei uns anfangen!“ (German Abolition 2000 section), 13 panels, May 2003.
David Krieger, Remembering Hiroshima and Nagasaki, Blackaby Paper 4, 2003, Abolition 2000 UK, 16 pages, ISBN 0-9540464-3-9.
David Krieger (ed.), The Poetry of Peace, Capra Press, 2003, 132 pages, ISBN 1-5926-6000-2.
David Krieger (ed.), Hope in a Dark Time: Reflections on Humanity’s Future, Capra Press, 2003, 242 pages, ISBN 1-5926-6005-3.
K. Nixdorff, M. Hotz, D. Schilling, M. Dando, Biotechnology and the Biological Weapons Convention, agenda Verlag GmbH & Co.KG, Münster, 2003, 128 pp.
M.V. Ramana and C. Ramanohar Reddy, Prisoners of the Nuclear Dream, Orient Longman, New Delhi, hardcover, 502 pages, ISBN 81-250-2477-8. | 2019-04-22T08:02:53Z | http://inesap.org/annual-reports/2003 |
This document has been archived and replaced by NSF 13-601.
The Discovery Research K-12 (DRK-12) program solicitation supports projects that lead to significant and sustainable improvements in STEM learning, advance STEM teaching, and contribute to improvements in the nation's formal education system. Successful DRK-12 projects emphasize both research on and development of innovative STEM resources, models, and tools. DRK-12 is interested in projects that build upon educational research (theory, knowledge, findings) and promote effective STEM practices in diverse preK-12 classrooms. DRK-12 is also interested in high risk/high return projects that have the potential to radically transform formal STEM education.
(3) Conference and workshop proposals may no longer be submitted at any time during the year and are now due at the same deadline as all other DRK-12 proposals.
The Discovery Research K-12 program (DRK-12) seeks to significantly enhance the learning and teaching of Science, Technology, Engineering and Mathematics (STEM) by preK-12 students, teachers, administrators and parents. All DRK-12 projects should be framed around a research question or hypothesis that addresses an important need or topic in preK-12 STEM education. The emphasis in DRK-12 is on research projects that study the development, testing, deployment, effectiveness, and/or scale-up of innovative resources, models and tools. DRK-12 invites proposals that address immediate challenges that are facing preK-12 STEM education as well as those that anticipate a radically different structure and function of pre-K 12 teaching and learning. DRK-12 especially encourages proposals that challenge existing assumptions about learning and teaching within or across STEM fields, envision the future needs of learners, and consider new and innovative ways to support student and teacher learning. DRK-12 is particularly interested in projects that hold promise for identifying and developing the next generation of STEM innovators (NSB, 2010). There are four strands described in detail in the solicitation: 1) Assessment; 2) Learning; 3) Teaching; 4) Scale-up.
DRK-12 projects are based on theories of learning, prior research and development. Projects reflect the needs of an increasingly diverse population as well as national, state, or discipline priorities. Outcomes include usable and scalable resources, models, tools, and contributions to the knowledge about STEM teaching and learning. In addition, teachers and students who participate in DRK-12 studies are expected to enhance their understanding and use of STEM content, practices and skills.
The DRK-12 program is primarily concerned with the goals and effectiveness of formal education, but recognizes that learning is not limited to formal school environments and times. The program encourages projects to draw from knowledge and practice of learning in out-of-school and informal settings.
Most young people and STEM professionals today use powerful technologies in the activities of their everyday lives. New knowledge, new ways of thinking, and new ways of finding and processing information drive our society and economy. Many of the resources, models and tools researched and developed by DRK-12 will provide innovative ways to use current and emerging technologies to transform STEM education.
DRK-12 recognizes that outstanding teaching is a critical and integral component of this improvement process. While Strand 3 has a specific focus on resources, models and tools for teacher education and the impact of those models on student learning, projects submitted to the other strands may also include teacher support materials or professional development components in support of student learning. Projects submitted to the Learning strand might also include the development of assessments related to the specific goals of the project.
Some DRK-12 projects focus on a specific STEM discipline or concept, while others have cross-disciplinary, cross-grade level content, but all projects must demonstrate that the content is important from both a disciplinary and learning perspective.
Full Research and Development projects are expected to lead to successful dissemination and adoption of findings or products in the preK-12 enterprise at a scale beyond that directly supported by the grant.
Please note that the following information is current ;at the time of publishing. See program website for any updates to the points of contact.
Estimated Number of Awards: 35 to 45 per year. It is anticipated that about 15-20 Exploratory awards, 15-20 Full Research and Development awards, and 5 Conference/Workshop awards will be made in FY 2012, pending availability of funds.
Anticipated Funding Amount: $40,000,000 in FY 2012 for new awards made under this solicitation, pending availability of funds. Normal limits for funding requests of DRK-12 proposals are as follows: (1) Exploratory projects up to $450,000 with duration up to three years; (2a) Full Research and Development projects up to $3,000,000 with duration up to four years; (2b) Full Research and Development projects with a primary focus on learning how to take proven STEM innovations to scale, up to $4,000,000 with a duration of four years; (3) Conference/Workshop projects up to $100,000 for duration up to two years.
Letters of Intent:Submission of Letters of Intent is required. Please see the full text of this solicitation for further information.
The National Science Foundation (NSF) is charged with promoting the vitality of the nation's science, technology, engineering and mathematics (STEM) research and education enterprises.
The mission of the Directorate of Education and Human Resources (EHR) is to achieve excellence in U.S. STEM education at all levels and in all settings (both formal and informal). EHR programs support the development of a diverse and well-prepared workforce of scientists, technicians, engineers, mathematicians and educators and a well-informed citizenry that have access to the ideas and tools of science and engineering. The purpose of these activities is to enhance the quality of life of all citizens and the health, prosperity, welfare and security of the nation.
To achieve these goals, the Directorate sponsors programs in the Division of Research on Learning in Formal and Informal Settings (DRL), Division of Undergraduate Education (DUE), Division of Graduate Education (DGE), and Human Resource Development (HRD). The DRK-12 program is managed in DRL.
The Division of Research on Learning in Formal and Informal Settings invests in projects to enhance STEM learning for people of all ages in both formal and informal learning settings. Its mission includes promoting innovative and transformative research and development, and evaluation of learning and teaching in all STEM disciplines. New and emerging areas of STEM must play prominent roles in efforts to improve STEM education. The integration of cutting-edge STEM content and the engagement of scientists, engineers, and educators from the range of disciplines represented at NSF is encouraged in all DRL initiatives. DRL's role is to be a catalyst for change by advancing theory, method, measurement, development, evaluation, and application in STEM education. The Division seeks to support both development of promising new ideas and scale-up and sustainability of proven educational innovations.
The Discovery Research K-12 (DRK-12) program enables significant advances in preK-12 learning of the STEM disciplines through research and development on innovative resources, models, and tools for use by students, teachers, administrators and policy makers.
The Transforming STEM Learning (TSL) activity is a combined effort of the programs listed above to challenge existing assumptions, encourage innovative thinking and catalyze the development of new models for future STEM learning.
The Promoting Research and Innovation in Methodologies for Evaluation (PRIME) program supports research on evaluation with special emphasis on innovative approaches for determining the impacts of STEM projects and growing the capacity of the evaluation field.
Each of these programs is intended to improve their field's capacity to further STEM learning. They are central to NSF's strategic goals of Learning and Discovery, helping to cultivate a world-class, broadly inclusive STEM workforce, expanding the scientific literacy of all citizens, and promoting research that advances the frontiers of knowledge (NSF, 2011).
All research and development activities within DRL aim at generating knowledge and transforming practice in STEM education. DRL's programs are designed to complement each other within a cycle of innovation and learning (see Figure 1) that forms the conceptual framework for its programs (adapted from American Statistical Association, 2007; NSF, 2005; RAND, 2003). All DRL programs are concerned with all five components of the cycle, to different degrees.
The major distinction between the DRK-12 and REESE programs is that DRK-12 projects focus on development and study of specific resources, models and tools designed to improve STEM education in preK-12 schools, while REESE projects focus primarily on building theory and knowledge about STEM education across learning contexts and ages. The outcomes of DRK-12 projects will be STEM education innovations and products that are informed by research and tested in practice. The primary outcomes of REESE projects will be research findings, methods, and theoretical perspectives about STEM education. Proposers who are in doubt about the appropriate program for funding of their work should consult an NSF program officer.
The NSF 2011-2016 Strategic Plan calls for the integration of research and education to ensure the Nation's capacity to generate the workforce needed to meet the challenges of a rapidly evolving workplace. This includes a commitment to drawing in and retaining a diverse population of students in STEM fields. The Discovery Research K-12 (DRK-12) program seeks to significantly enhance STEM learning for children and adolescents through research, development, testing, deployment and scale-up of exemplary resources, models and tools. The intent is to catalyze new approaches to STEM learning, develop students' 21st century STEM workforce skills, and provide the pathways and resources to study the learning process itself.
DRK-12 invites proposals that address immediate challenges facing preK-12 STEM education as well as those that anticipate a radically different structure and function of pre-K 12 teaching and learning. DRK-12 especially encourages proposals that challenge existing assumptions about learning and teaching within or across STEM fields, envision the future needs of learners, and consider new and innovative ways to support their learning. DRK-12 is particularly interested in projects that hold promise for identifying and developing the next generation of STEM innovators (NSB, 2010).
Collectively, the four strands described below foster the creation of a new generation of resources, models, and tools that take full advantage of the rich research base on STEM learning and the capabilities of modern information and communications technologies to enhance the education of preK-12 learners and teachers. Specifically, the DRK-12 program encourages the development, study, and use of learning and teaching resources that motivate and engage learners in deep and meaningful investigations within a coherent curriculum. These resources should be dynamic, responsive, and adaptable to support the wide range of interests, abilities, languages and cultures in modern classrooms. In addition, DRK-12 encourages research and development of new STEM learning resources, models, and tools that help students become scientific and engineering problem solvers. They should also model ways of learning and doing that are personally sustainable, preparing young people, teachers, and administrators to be lifelong learners who effectively utilize cutting-edge technologies and are able to learn and adapt to a rapidly changing world.
The DRK-12 program seeks to maintain a balanced portfolio by supporting projects ranging from those with immediate applicability to those that anticipate and provide the foundation for preK-12 STEM education as it could be in future decades. Projects that address immediate and pressing challenges typically develop and study resources, models and tools that could be implemented and brought to scale in the relatively near term, albeit in highly innovative ways.
Projects that anticipate education as it could be in the future (10-20 years) will necessarily put forward ideas, concepts, theories, and development that challenge existing assumptions about STEM learning and teaching. Such projects, for example, might develop and study resources, models and tools that (1) are dramatically more effective with the diversity of learners they will serve; (2) support STEM learning with collaborative and interactive technologies; (3) help students and teachers draw on the expertise and resources of scientists and practitioners located far from the classroom or teacher education setting; or (4) link in-school and out-of-school STEM learning in new ways.
Full Research and Development projects lead to products and findings that can be successfully disseminated and adopted at a scale beyond that directly supported by the grant.
1) The Assessment Strand: projects that develop and study valid and reliable assessments of student and teacher knowledge, skills, and practices.
In an era of increased accountability in preK-12 education, resources, models and tools for assessing STEM content knowledge, effective practices, affective characteristics, and habits of mind must keep pace with and anticipate the demands of instruction and educational policy. Among the most pressing issues is the alignment of preK-12 assessments with the learning goals represented in widely used standards documents. In line with recommendations in the Common Core State Standards in Mathematics (http://www.corestandards.org/the-standards/mathematics), the K-12 Science Framework (NRC, 2011), and the report on Successful K-12 STEM Education (NRC, 2011), assessments should probe student understanding of the most important disciplinary concepts, principles, and mathematical, engineering, and scientific practices, as well as the application of that knowledge to problem-solving and decision-making.
DRK-12 is interested in supporting the development and study of innovations in (1) summative assessment of student content knowledge, skills, attitudes, beliefs, motivation, aptitudes, interests, creativity and other important objectives of STEM education; (2) formative assessment of student progress in learning STEM concepts, skills, and practices; and (3) valid and reliable assessments of STEM teacher content and pedagogical content knowledge, effective teaching practices, confidence, interest, and motivation.
Assessing the full scope of mathematical, scientific, and technological proficiency in valid and reliable ways presents conceptual, psychometric, and practical challenges. Thus, in all assessment projects, collaborations with psychometricians, STEM disciplinary experts and educational researchers are expected.
2) The Learning Strand: projects that develop and study resources, models and tools to support all students' STEM learning, enhance their knowledge and abilities, and build their interest in STEM fields.
The DRK-12 program seeks proposals framed around an important research question or hypothesis related to student learning. Successful projects in this strand will develop and study innovative resources, models, and tools that will substantially improve how and what pre-K-12 children learn. NSF seeks to support proposals that examine what is possible if the constraints of pedagogical tradition, educational policies, and limited resources are challenged by emerging research findings and the application of powerful and pervasive technologies and media. The program especially encourages projects that: (1) prepare students to understand increasingly sophisticated content in STEM subjects (Wiggins, 2005; NRC 2008); (2) engage students in meaningful scientific data collection, analysis, visualization, modeling and interpretation, (3) develop important, cross-cutting concepts and ideas needed to understand important interdisciplinary subjects like environmental sustainability, climate change, and renewable and non-renewable energy sources, (4) help students learn STEM practices, modes of inquiry, scientific investigation, and engineering design through hands-on activities, real and virtual laboratories, field experiences, and collaborations with STEM professionals and peers enabled by cyberinfrastructure and/or (5) provide substantive STEM learning activities that effectively engage and serve the diversity of learners found in contemporary U.S. classrooms. While some DRK-12 proposals may include one or more of these components, other proposals in this strand may focus on other aspects of student learning. All Full Research and Development Learning Strand projects must result in a usable product and indicate how the product could be adopted and directly support formal education.
Recent examples of successful DRK-12 projects include development and study of: adaptive tutors, scalable differentiated instruction, place-based learning, embedded formative assessments, blended learning environments (in and out of classrooms activities and projects), new laboratory designs, crowd or people sourcing, interactive digital textbooks, virtual environments and simulations, visualization tools, virtual scientific instruments, materials that are adaptable to the learner and learning environment, dynamic content that is constantly updated and improved, and ways to support instruction that transcend the limitations imposed by traditional classrooms.
3) The Teaching Strand: projects that develop and study resources, models and tools to help pre- and in-service teachers provide high quality STEM education for all students.
The DRK-12 program recognizes that a well-prepared and well-supported STEM teacher workforce is crucial to excellent preK-12 STEM education. Thus the program seeks proposals to study existing teacher pre- and inservice programs and develop innovative scalable models that support learning by preK-12 teachers at all points in their careers. For example, projects in this area might develop and study (1) innovative models to recruit, certify, induct, and retain STEM teachers; (2) new resources for helping pre- and in-service teachers develop content and pedagogical knowledge and skills; or (3) tools for sharing teaching expertise within schools and districts and across the broader national teacher community. As with all DRK-12 projects, these proposals should start with a specific research question or hypothesis, build on an explicit theory of learning, generate resources, models, and tools that are useful and usable by others, and use appropriate research and development designs.
Teachers today have unprecedented access to and experience with communication, information, and learning technologies that facilitate social networking, virtual gaming, scientific data analysis, and collaborations with scientists. At the same time, STEM fields are rapidly changing with greater emphasis on collaborative, interdisciplinary research. A major challenge in teacher preparation and professional development is in applying technological and human resources to the professional work of teaching. The DRK-12 program is especially interested in supporting projects that anticipate professional learning options and the needs of teachers who work in a global environment with powerful cyberinfrastructure.
Some examples of innovative resources, models and tools developed and studied by DRK-12 teacher education projects might include: (1) just-in-time online courses or digital library repositories and ways of using web-resources for teaching; (2) models for teacher networking and collaboration and tools to allow productive communication with peers, mentors, parents, and experts around the world; (3) tools that provide teachers with dynamic diagnostic information about student learning in real-time as well as tools that provide teachers with the ability to customize curriculum to meet the needs of diverse student populations; (4) models for helping teachers implement cutting-edge STEM content, or other teacher education innovations. All Full Research and Development projects should include an analysis of the impact of these resources, models and tools on teacher learning and practice and collected evidence on student learning.
4) The Scale-up and Sustainability Strand: projects that develop and study the factors that contribute to successful implementation, scale-up, and sustainability of proven, high-quality innovations in schools and districts in a cost effective manner.
Many studies of innovative resources, models, or tools have demonstrated positive effects on student or teacher STEM outcomes in a small number of sites under carefully controlled conditions. A key challenge is identifying conditions under which such promising innovations can be successfully implemented and sustained in a broad range of schools and districts across the country (Dede, et.al., 2005). Studies addressing this challenge could seek to understand how innovative resources, models, or tools that data have shown to be successful at a moderate scale, or in a particular grade band, can be disseminated, implemented, and scaled up in increasingly varied sites or adapted for use with additional audiences or grade levels. Alternatively, studies could focus on how STEM learning innovations can be successfully sustained in classrooms in combination with out-of-school partners or by using informal learning settings. The resources, models or technologies studied in such scale-up research may include work supported by NSF or any other source.
The DRK-12 program also accepts proposals that study the impact of resources, models, and tools when taken to scale. In such cases, the effects of specific STEM education interventions should have been established through smaller scale efficacy studies before submitting a proposal to examine if the effects are sustained when the innovation is taken to scale. These research projects should be designed to include an appropriate number and variety of sites to justify broadly generalizable results.
Because scale-up studies generally aim to attribute improvements in STEM education practice and/or results to an intervention, the research designs must involve a statistically appropriate number and nesting of individuals, classes, or schools, and should give careful attention to measures of fidelity and adaptation when the intervention is implemented. Effectiveness of the innovation should be assessed by appropriate, valid, and reliable instruments. Experimental studies with random assignment to treatment are encouraged. Longitudinal studies of student achievement may be appropriate for studies of impact at large scale.
Studies of organization and scale: Another type of scale-up study examines how a specific new resource, model, or technology is implemented, institutionalized, and sustained with the aim of understanding the organizational elements necessary for implementing the innovation successfully. Research questions for such studies might focus on implementation factors such as: (1) school or district financial investments, leadership, and organizational practices; (2) feasibility and fidelity of classroom implementation; (3) teacher professional development in support of the innovation; (4) engagement of teachers, administrators, and community representatives in adoption and implementation decisions; and/or (5) policy issues such as the innovation's alignment with state standards or assessments. Studies of the implementation and scale-up process might employ qualitative, quantitative, or mixed research methods to document, analyze, and interpret relationships between critical implementation factors and outcomes.
All scale-up studies must provide sufficient evidence that prior research on the resource, model, or technology being studied has provided efficacy data showing positive impact on student learning under specific conditions. Results of previous rigorous experimental or quasi-experimental studies or meta-analysis of related studies might provide such evidence of efficacy.
The DRK-12 program invites proposals for three types of projects: Exploratory projects, Full Research and Development projects and Conferences and Workshops.
Exploratory projects allow researchers and developers an opportunity to undertake preliminary work needed to clarify constructs, assemble theoretical or conceptual foundations, or perform early investigations of an idea for an innovative resource, model, or tool. Exploratory projects can also focus on the innovative repurposing or adaptation of existing resources, models, or tools. These short duration projects might develop prototype educational materials or practices and conduct research in small-scale pilot tests to provide proof of concept and preliminary estimates of impact. These projects should produce empirical evidence forming the basis of anticipated further research and development work. Exploratory projects may also be synthesis projects that bring together findings on current technology-enhanced resources and models to identify new directions for research and development. DRK-12 particularly encourages synthesis projects that provide research findings and recommendations that are useful to STEM education practitioners and decision makers.
Full Research and Development projects are built on the most promising Exploratory projects or other (non-NSF funded) projects. These projects have already demonstrated effectiveness in small sets of classrooms, schools, or other learning settings. Greater funding levels and longer timelines allow researchers and developers an opportunity to undertake more in-depth product development, more targeted research, and to reach a broader, more diverse, audience. Resources, models, or tools developed in full research and development projects should result in completed products, ready for implementation by others who request them.
Conferences and Workshops related to the mission of the DRK-12 program are also supported under this solicitation. Conferences or workshops should be well focused, related to the goals of the program, and generate a product usable by researchers or practitioners.
Conference and workshop proposals must be submitted by the deadline. All conference proposals should provide for an evaluation of the impact of the conference to be conducted at least 12 months after the conference is completed.
Please see the Proposal and Award Policies and Procedures Guide/Grant Proposal Guide Section II. D. for additional information about conference and workshop proposals.
American Statistical Association (2007). Using statistics effectively in mathematics education research. Retrieved July 9, 2007 from http://www.amstat.org/education/pdfs/UsingStatisticsEffectivelyinMathEdResearch.pdf.
Clements, D. H. (2007). Curriculum research: Toward a framework for "Research-based curricula". Journal for Research in Mathematics Education, 38 (1): 35-70.
Cobb, P., Confrey, J., deSessa, A., Lehrer, R., & Schauble, L. (2003). Design experiments in educational research. Educational Researcher, 32(1), 9 -13.
Lamberg, T. & Middleton, J. A. (2009). Design research perspectives on transitioning from individual microgenetic interviews to a whole-class teaching experiment. Educational Researcher 38(4), 233-245.
National Mathematics Advisory Panel (2008). Foundations for Success: The Final Report of the National Mathematics Advisory Panel, U.S. Department of Education: Washington, DC. National Research Council (2001). Knowing what students know: The science and design of educational assessment. Washington, DC: National Academy Press.
National Research Council (2003). Assessment in support of instruction and learning: Bridging the gap between large-scale and classroom assessment. Washington, DC: National Academy Press.
National Research Council (2004). On evaluating curricular effectiveness: Judging the quality of K-12 mathematics evaluations. Washington, DC: National Academy Press.
National Research Council (2006). Systems for State Science Assessment. Washington, DC: National Academy Press.
National Research Council (2007), Taking Science to School: Learning and Teaching Science in Grades K-8, Washington, DC: National Academy Press.
National Science Foundation Task Force on Cyberlearning. (2008). Fostering Learning the Networked World. National Science Foundation.
National Science Foundation/National Science Board (2010), Preparing the Next Generation of STEM Innovators: Identifying and Developing our Nation's Human Capital.
National Science Foundation (2011), Empowering the Nation Through Discovery and Innovation, NSF Strategic Plan for 2011-2016.
RAND Mathematics Study Panel (2003). Mathematical proficiency for all students: Toward a strategic research and development program in mathematics education. Santa Monica, CA: RAND Corporation.
Scaling Up Success: Lessons Learned from Technology-Based Educational Improvement (2005), Chris Dede, James Honan, Laurence Peters, editors, John Wiley and Sons, 176pgs.
Shadish, W., Cook, T., and Campbell, D. (2002). Experimental and Quasi-Experimental Designs for Generalized Causal Inference. Boston: Houghton-Mifflin Company.
U.S. Department of Education, Office of Educational Technology (March 5, 2010). Transforming American Education: Learning Powered by Technology.
Wiggins, G.P., & McTighe, J. (2005). Understanding by design (2nd Edition). Upper Saddle River, NJ: Prentice Hall.
Specify the Strand that the proposal addresses, the tentative project title, the principal investigators, and the organizations involved.
Letters of Intent must be submitted via the NSF FastLane system, using the Letter of Intent module in FastLane, for all DRK-12 proposals except conferences.
Letters of Intent are limited to 2,500 characters, including spaces (approximately 350 words). Your Letter of Intent should contain a brief narrative that describes the project and provides the following information: (1) a project title; (2) clear identification of the primary Strand; (3) the STEM focus; (4) a list of proposed Principal Investigators and Co-Principal Investigators, including organizational affiliations and departments; (5) other partnering institutions; (5) STEM discipline; and (6) grade levels as appropriate.
Cover Sheet. Complete this form with the appropriate information. The DRK-12 Program Solicitation number must be entered on the first line of the cover page. (Grants.gov Users: The program solicitation number will be pre-populated by Grants.gov on the NSF Grant Application Cover Page.) All proposals submitted to DRK-12 are assumed to have the potential for conducting research on human subjects. Therefore, proposers must select the human subjects box on the cover sheet and should have prior or pending approval of their research from the appropriate institutional review board (IRB).
Project Summary. The first sentence of the Project Summary should specify the type of proposal (e.g., Exploratory; Full Research and Development; Workshop/Conference) and the Strand addressed. The second sentence should state the discipline or disciplines being addressed and grade level(s) if appropriate. Unless the two National Science Board criteria--intellectual merit and broader impacts--are addressed explicitly in separate statements in the project summary, the proposal will be returned without review.
Project Description. Project descriptions are limited to 15 pages and must comply with all formatting requirements of the most current Grant Proposal Guide. Proposals funded under this solicitation must begin with a research question or hypothesis about preK-12 STEM learning.
The proposal must clearly show why the proposed project has an important STEM focus, addresses critical educational needs, and has the potential for broad impact. Proposals of all types (Exploratory, Full Research and Development, and Conference/Workshop) must articulate the goals of the proposed project and why the goals are important for STEM education. The proposal should provide a rationale for how the project will improve STEM education for students and advance knowledge, and it should explain how products or findings might ultimately be implemented in schools on a large scale.
The proposal must describe results of prior NSF support for related educational projects in which the PI or co-PI have been involved. Include evidence of the quality and effectiveness of the resources, models and technologies previously developed. Describe how prior work influences this proposal.
The design of any DRK-12 project begins with a hypothesis about how some aspect of STEM education can be improved based on theories of learning and development. The proposal then offers a plan for developing an innovative resource, model, or tool and studying the innovation's impact on STEM learning. The proposal should articulate a plan of work that describes research and development strategies appropriate for attaining its goals. Proposals must demonstrate how the work is related to similar research and development.
All DRK-12 proposals must have a plan for formative and summative evaluation of project research and development work. Exploratory projects typically have more limited evaluation plans than Full Research and Development projects. The evaluation should focus on the validation of, fidelity to, and the usefulness of the development and research processes to achieve the targeted outcomes. The objectives of the evaluation include: (1) assessing whether the project is making satisfactory progress toward its goals; (2) recommending reasonable, evidenced-based adjustments to project plans; (3) determining the effectiveness and impact of the research, resources, models, and tools developed by the project; and (4) attesting to the integrity of outcomes reported by the project. Proposals should describe the main features of the evaluation design -- the evaluation questions, the data to be gathered, the data analysis plans, and the expertise of the investigators who will be responsible for the work. Each proposal should clearly distinguish between the role of the evaluation effort and that of other critical product and/or research components.
Formative evaluation serves primarily to provide timely feedback to the development and research team. At a minimum, the formative evaluation should validate that the project activities are guided by a reasonable theory of action, are of high quality, are on schedule, and are likely to result in the attainment of the broad goals and objectives of the project. The evaluation plan should explain how appropriate feedback will be given to the project leadership so that it can make timely modifications to the project activities and address significant issues.
Summative evaluation must be conducted by capable professionals who are external to the development and research team(s) and usually external to the team's institutions. The summative evaluation substantiates that the project has collected credible evidence to answer its research questions and hypotheses and/or justify its claims, and reports on threats to the internal and external validity of the research findings. Although the project development and research teams might conduct the majority of the data-gathering, analysis and interpretation as part of the core work of the project, the evaluator would use their work and other data to evaluate success of that work in meeting project objectives. The summative evaluation must be submitted as part of the final project report.
For Exploratory projects, the evaluation functions should be performed by a capable individual or an advisory board with independence from the project. The evaluation should be primarily formative, suggesting ways to improve project implementation, checking the validity of project research findings and interpretations, and/or gauging the quality of the resources, models, or tools being developed.
For Full Research and Development projects that aim to address larger issues in more depth and that have larger budgets, the evaluation must have plans for both formative and summative evaluations. The evaluators may be the same or different for each type of evaluation but must be sufficiently distant from the project to assure confidence in the objectivity of the evaluation.
For such projects that involve a complex intervention, the evaluation capacity might need to be expanded to include an expert advisory board to evaluate the project and advise the research team.
Proposals should include plans for effective dissemination of project resources, models, tools, and findings to researchers, policymakers, and practitioners. The dissemination plan should include a description of anticipated contributions of the research and development activities to teachers, schools, preK-12 administrators, teacher educators, STEM education researchers, and policymakers as appropriate. Applicants are encouraged to bring the same levels of insight and creativity to the dissemination aspect of their proposal as they do to their educational research and development design. Projects will be expected to share research and development designs, findings, and overall project information with the DRK-12 Resource Network and DRK-12 program evaluators.
DRK-12 projects generally involve interdisciplinary teams. In all cases, proposals must describe the expertise needed for the work, how this expertise is incorporated in the project, and who is responsible for each component. Projects typically include STEM education researchers, development experts, experienced teachers, STEM researchers, statisticians, psychometricians, informal learning experts, and policy researchers, as appropriate. When feasible, projects should include future researchers and developers (e.g., beginning scholars, postdoctoral associates, graduate students) as part of the project team as a means of building a more diverse community of researchers and developers. Proposals should include a brief narrative describing the expertise of personnel and their contributions to the proposed work, including the project evaluator. Each proposal that requests funding to support postdoctoral researchers must include, as a supplementary document, a description of the mentoring activities that will be provided for such individuals. The mentoring plan must not exceed one page.
In addition, all resources, models and tools developed by DRK-12 projects must be reviewed by qualified experts in relevant STEM disciplines (e.g., scientists, mathematicians, engineers) and in STEM pedagogy. This may be done by an advisory committee with appropriate expertise whose members may be from the same or different institutions as the project.
All activities funded under this solicitation must include biographical sketches for all key personnel. Biographical sketches are limited to two pages each and formatting must comply with the most current Grant Proposal Guide. Biographical sketches should be sufficiently detailed to show that the necessary expertise is available to conduct the project.
Supplementary documentation is restricted to four document types.
(2) A one-page list of staff, affiliations and partner institutions.
(3) Postdoctoral Researcher Mentoring Plan - If the proposal requests funding for a post-doc, a one page mentoring plan must be included in the supplementary documents as per the Grant Proposal Guide (https://www.nsf.gov/publications/pub_summ.jsp?ods_key=gpg).
(4) Data Management Plan - As per the Grant Proposal Guide (https://www.nsf.gov/publications/pub_summ.jsp?ods_key=gpg), all proposals must describe plans for data management and sharing of the products of research, or assert the absence of the need for such plans. FastLane will not permit submission of a proposal that is missing a Data Management Plan. Check the following website for additional information and a link to Frequently-Asked questions (FAQs)on this requirement: https://www.nsf.gov/bfa/dias/policy/dmp.jsp.
Proposals with other supplementary material will be returned without review.
A careful and realistic budget in accordance with the general guidelines contained in the NSF Grant Proposal Guide and consistent with the proposed activities of the project should be included. The budget for the total amount of money requested from NSF, with information on salaries and other expenses, including but not limited to, equipment (where allowable), participants, consultants, travel, sub-awards, and indirect costs must be provided. The Budget Justification section should include a budget narrative that describes and validates each of the expenses, including the hourly rate and effort expected from each consultant. DRK-12 proposals generally do not fund equipment that is normally found in schools, universities, and research and development organizations, such as computers.
Requests for equipment must be accompanied by justification for its importance to the operation of the project. In addition to the above budgetary items, the budget should include a request for funds to cover the cost of attendance of the Principal Investigator at each year's annual awardees meeting in the Washington, DC area.
The DRK-12 program has a program-wide evaluation. Awardees will be expected to provide data for the evaluation. | 2019-04-18T20:38:29Z | https://www.nsf.gov/pubs/2011/nsf11588/nsf11588.htm |
Use E-XD++ Development Visual Graphic component library similar to Visio flowchart, vector graphics editor application is E-XD++ date of birth has been a very important position, and we as E-XD++ visualization graphical component library to expand the number one solution design. Very pleased that, now you're done, you will find, E-XD++ This function has been to work with some of the world's most professional graphics editing program comparable to, for example: Visio, ConceptDraw, SmartDraw, etc., in addition to E-XD++ also One thing is they absolutely can not do: all the rigorous testing of the VC + + source code available to customers.
"We offer these solutions does not mean that E-XD++ component library visual graphics applications can only develop these areas, in fact, E-XD++ with any other third party, like C + + component library contains hundreds to used functions separately. with QT, MFC, etc., you can independently determine the need for E-XD++ in the a function, in general, as long as you need graphics, you need flow charts, control charts, printing, typesetting , simulation, electronic maps, power wiring diagrams, forms, etc., you can use the E-XD++ components library, of course, sometimes Maybe you only want to use the E-XD++ provides control without the need for the drop-down color graphics function, which is no problem! "
More than 50 million lines all carefully designed and rigorously tested to provide the source code without any reservations!
Provide more than 400 class C + + extensions, 50 million lines of effective VC + + / MFC source code, sample or solution more than 70 source code, complete and detailed online help system and user documentation, supporting development tools designed!
A picture is worth a thousand words, E-XD++ offer more than 50 million lines of well-designed and well-tested C + + source code! Development takes years, thousands of customers worldwide validation, can save you a lot of development time and money!
We are proud to announce that Spike-Engine beta is now out!
Back in 2009, we've noticed that the modern software and web was becoming more and more interactive. Being independent video game developers and a passion for online, massively multiplayer games pushed us to create a technology that would suit all our needs. We wanted to build reliable web services without sacrificing any productivity or performance. Moreover, we wanted a single server to handle thousands of concurrent clients at the same time. This ambition led us to create Spike-Engine.
Spike-Engine is a software platform that facilitates building client-server applications for .NET developers. In particular, it focuses on real-time and duplex communication, performance and productivity.
The core idea behind Spike-Engine is quite simple. There are 3 core principles underpinning the architecture, duplex communication, performance and code generation.
Duplex Communication. We needed duplex communication, and a connected, stateful mode. Duplex communication simply means that client and the server can both initiate the communication and exchange messages easily, at any time (unlike HTTP). After all, we wanted to build games and interactive applications!
Performance. We wanted our technology to be performant and handle thousands of clients, and hundreds of thousands of packets per second. This proved to be very challenging to achieve and took 3 years to polish and to find a balance between flexibility, API and performance. Even better, good performance also saves cost, since we did not need to buy large servers with massive amount of bandwith and we could cut our costs.
Code Generation. As most of you, we are a small and agile team. This means we needed to do things smart and be able to stay productive while building high quality, heteregeneous software. From the very beginning, we designed our technology to help us by generating automatically most of the networking code, while we could concentrate on actually implementing the business logic.
-- Just think in 10 dimensions!
E-XD++ UML visual graphics component library solution is for software developers, vector-based software development of various aids to provide a solution, is E-XD++ component library the latest solutions. This program structure is flexible, comprehensive, you only need to follow the rules will be put to the canvas graphics, editing and printing work for all without writing a single line of code. All products are developed with C ++, performance is very stable. Development of similar applications for you to save 50% -80% of development time!
Diagrams are a natural and intuitive way of expressing relationships in your application data. E-XD++ Components make it easy to add expressive, interactive UML diagrams to your application. UCanCode's E-XD++ Diagram Component is the most comprehensive set of tools, components and libraries for creating graphical editing, visualization, supervision and monitoring tools for the VC++ / .NET platform. Both diagrams—displays used to show the relationships between objects and UML drawing and layout can be easily created. Diagrams are a natural and intuitive way of expressing relationships in your application data. E-XD++ Components make it easy to add expressive, interactive UML diagrams to your application. UCanCode's E-XD++ Diagram Component is the most comprehensive set of tools, components and libraries for creating graphical editing, visualization, supervision and monitoring tools for the VC ++ /. NET platform. Both diagrams-displays used to show the relationships between objects and UML drawing and layout can be easily created.
For Building UML diagram drawing like application, it's very hard to build the GUI interface, this will take you much long time, it's recommended to use a special UML modeling tool ( UML design tool ) Component . For Building UML diagram drawing like application, it's very hard to build the GUI interface, this will take you much long time, it's recommended to use a special UML modeling tool (UML design tool) Component.
E-XD++ Enterprise Edition Suite is a 100% C++ based diagram Component , it's UML Diagram Solution contains almost all the features of building a high-quality UML Application, as a UML modeling tool component , it helps you to quickly and easily build any kind of applications that has all varieties of UML diagrams . UML design tool Component- E-XD++ Enterprise Edition includes full source codes and features for UML design, UML diagram samples, reference guide to UML modeling. E-XD++ Enterprise Edition Suite is a 100% C ++ based diagram Component, it's UML Diagram Solution contains almost all the features of building a high-quality UML Application, as a UML modeling tool component, it helps you to quickly and easily build any kind of applications that has all varieties of UML diagrams. UML design tool Component-E-XD++ Enterprise Edition includes full source codes and features for UML design, UML diagram samples, reference guide to UML modeling.
Over 20 kinds of links that will help you create any kind of UML Links quickly and easily. Over 20 kinds of links that will help you create any kind of UML Links quickly and easily.
Over 30 kinds of arrows, by override a few virtual methods, you can create any kind of new arrow styles. Over 30 kinds of arrows, by override a few virtual methods, you can create any kind of new arrow styles.
With shapedesigner application, you can use over 100 kinds of basic shapes to create very complex UML Diagram Shapes. With shapedesigner application, you can use over 100 kinds of basic shapes to create very complex UML Diagram Shapes.
The size of canvas can be created freely. The size of canvas can be created freely.
Advanced print and print preview supports, you don't need take any time on print and print preview. Advanced print and print preview supports, you don't need take any time on print and print preview.
Export to bitmap file or jpeg file supports. Export to bitmap file or jpeg file supports.
Create new class shape by open a .H source code file. Create new class shape by open a. H source code file.
Panning and zooming. Panning and zooming.
Full tested on all windows platform includes windows vista. Full tested on all windows platform includes windows vista.
Ships with full documents and 100% source codes. Ships with full documents and 100% source codes.
" Diagramming business logic when developing a custom application is a time-consuming, tedious—and necessary—process. With E-XD++ Diagramming Source Code Kit, you can spend more time focusing on the finer points of your customer's business and less time worrying about making the business process diagram look good. " "D iagramming business logic when developing a custom application is a time-consuming, tedious-and necessary-process. With E-XD++ Diagramming Source Code Kit, you can spend more time focusing on the finer points of your customer's business and less time worrying about making the business process diagram look good. "
Provide more than 400 class C ++ extensions, 50 million lines of effective VC ++ / MFC source code, sample or solution more than 70 source code, complete and detailed online help system and user documentation, supporting development tools designed!
A picture is worth a thousand words, E-XD++ offer more than 50 million lines of well-designed and well-tested C ++ source code! Development takes years, thousands of customers worldwide validation, can save you a lot of development time and money!
Saaspose development team is pleased to announce the release of Saaspose SDK for Android. It is great news for all Android developers to enjoy a whole new experience of document manipulation in the cloud. We have been working on Saaspose SDK for Android to facilitate the android developers with feature-rich APIs round the globe. Saaspose REST APIs gives developers total control over documents and file formats on all platforms. We have developed SDKs for these file format APIs to help you utilize these feature-rich APIs in you applications for quick file processing. You can now use Saaspose APIs in your Android applications and take document manipulation experience to another level. Whether its text extraction from PDF files or conversion of MS Word document to different file formats, Saaspose REST APIs have much more to offer for your Android applications. You can extract text from documents, calculate formula in worksheets, convert PDF to images, extract images and slides from presentations and perform many such operations on the documents in your Android applications. You can also integrate multiple Saaspose APIs to use a combination of features for best quality results. For instance, you can convert a workbook to presentation using Saaspose.Cells and merge multiple presentations using Saaspose.Slides. You can integrate the features in your applications through simple steps, all you need to do is download the required SDK and enjoy using a variety of features for your document processing requirements. You can download our SDKs in different programming languages such as .NET, Java, PHP and Ruby from Github. Get started with Saaspose APIs right away and enjoy a whole new experience of document manipulation. You can opt for free development account to evaluate these APIs for your Android applications. You may choose to upgrade to our monthly pricing plans that have been prepared to offer you the best value for your required package. Stay tuned to our blog and newsletter for latest updates on Android SDKs and the release announcements. Contact us if you have any queries, confusions or suggestions regarding Saaspose SDKs for Android.
Palo Alto, CA – January 31, 2013 – The award-winning WSO2 Carbon enterprise middleware platform has been designed to implement and support enterprise architecture best practices. Now IT professionals attending WSO2Con 2013 can gain certification in implementing WSO2’s platform by participating in a two-day program being held in conjunction with the conference at the Park Plaza, Victoria in London. The certification program, "Administrating the WSO2 Carbon Platform," will run February 11-12, and WSO2Con will run February 13-14. IT professionals can save 20% by registering for both events at http://wso2con.com/registration, and using the promotion code: WCTCB20.
Conducting the two-day training and certification program will be WSO2 partner Redpill Linpro, a leading provider of professional open source services and products in the Nordic region. Redpill Linpro provides consulting, development, training, support, and application management for many of the world’s leading open source products. For more information, visit http://redpill-linpro.com.
"Administrating the WSO2 Carbon Platform" is a two-day course designed for systems administrators without previous WSO2 Carbon experience. It is aimed at helping these IT professionals learn how to monitor and manage the WSO2 Carbon platform and how to react to common issues and problems. Attendees will learn how to install, configure, and maintain the WSO2 Carbon platform, as well as deploy enterprise Java applications in a single machine or clustered configuration. In addition, participants will learn how to work with data sources, common product integrations, and basic security features. The course also will cover management tools via JMX and the management console.
Immediately following the session, there will be an opportunity to take a certification exam to become a WSO2-certified Carbon Platform Administrator. For more details on the course outline, pre-requisites and materials, visit https://training.redpill-linpro.com/category/wso2/course/administrating-the-wso2-carbon-platform/.
WSO2Con 2013, WSO2’s third user conference, will bring together WSO2 technical experts, enterprise IT executives, researchers, systems integrators, and other third-party solution providers. Collectively, they will explore best practices in API management, service-oriented architecture (SOA), cloud computing, mobile, data and analytics, application development, enterprise integration and governance, along with IT strategies for improving productivity and competing in a global economy. They also will represent a broad cross section of markets, including financial services, government, retail, telecommunications, information technology, universities, and research institutions. The event is being held at the Park Plaza, Victoria in London, and it will be joined by a live stream event from the Cinnamon Lakeside in Colombo, Sri Lanka. For more information, visit http://wso2con.com.
The PVS-Studio static analyzer has changed its version number to 5.00. Why? Because we have worked hard at this release!
First of all, we have implemented PVS-Studio integration into Embarcadero C++Builder. Or Embarcadero RAD Studio - we are not yet sure ourselves how to call it correctly.
C++Builder users now have access to all the power of static analysis provided by PVS-Studio. Which is at present more than 160 general diagnostics. Besides, C++Builder XE3 Update 1 has finally acquired the 64-bit compiler! It means that more than 30 diagnostics of code migration to 64-bit systems existing in PVS-Studio for Visual C++ for a long time are now available to C++Builder users too. These diagnostics are well familiar to those of our users who have been using the analyzer since the time it was called Viva64. So, now this rule set can be used in C++Builder as well.
The first PVS-Studio 5.00 release supports the following C++Builder versions: XE2, XE3, XE3 Update1 with the 64-bit compiler. We plan to support a few older C++Builder versions in future.
This is the first public PVS-Studio release for C++Builder, that's why the number of bugs will probably be a bit higher than usually. We are sorry if that happens, and please don't feel shy to write to our support service: [email protected].
The next important innovation in our tool is support of Windows Phone 8 and Windows Store projects in Visual Studio 2012. Projects like these are already starting to appear, and we are glad to provide the static analysis technology for them equally with standard desktop-application projects. There's not much to be said about it, just keep in mind that if you have a Windows Phone 8 or Windows Store project in C++, you may run PVS-Studio and see the list of issues detected in the code.
Microsoft Visual Studio: 2012, 2010, 2008, 2005.
Embarcadero RAD Studio: XE3 Update1, XE3, XE2.
Thanks to the incremental analysis capability, developers can get diagnostic messages only for the code that has been just modified and completely ignore (if they wish) messages generated for old and unmodified code.
You can download and try PVS-Studio without filling in any forms and registration here.
Palo Alto, CA – January 30, 2013 – Today, organizations often encounter roadblocks that prevent agile and reliable integration—including incompatible message formats and protocols, unreliable endpoints, complicated processing sequences, and service-oriented architecture (SOA) anti-patterns. In a one-day workshop for IT architects and developers, WSO2 will explore how to successfully integrate a comprehensive set of capabilities to accelerate project delivery, easily implement loosely coupled and interoperable services, and rapidly adapt to changing business demands.
The “The Agile Integration Platform: A Best Practice Workshop” workshop will be held on Tuesday, February 5, from 9:00 a.m. – 4:00 p.m., in Palo Alto, CA. For more information,visit: http://wso2.com/events/workshops/2013-february-palo-alto-the-agile-integration-platform-workshop.
* An overview of the WSO2 SOA and Integration Platform reference architecture.
* An evaluation framework for selecting an enterprise service bus (ESB), governance registry, and API management components.
* How to accelerate integration projects to expose data and business processes.
* How and when to integrate cloud services.
* Service monitoring best practices to ensure high quality of service (QoS).
* How governance guides service development and yields agile integration.
WSO2 is the lean enterprise middleware company. It delivers the only complete open source enterprise SOA middleware stack purpose-built as an integrated platform to support today’s heterogeneous enterprise environments—internally and in the cloud. WSO2’s service and support team is led by technical experts who have proven success in deploying enterprise SOAs and contribute to the technology standards that enable them. For more information, visit http://wso2.com or check out the WSO2 community on the WSO2 Blog (http://wso2.com/blogs), Twitter (http://twitter.com/wso2), LinkedIn (http://www.linkedin.com/groups?gid=876687&oback=.gdr_1221799737953_1), Facebook (http://www.new.facebook.com/login.php#/group.php?gid=36026787328), and FriendFeed (http://friendfeed.com/wso2).
Jelastic, Inc., the company behind the ultra scalable and interoperable cloud hosting platform for Java, today announced the launch of its highly anticipated PHP hosting service. Jelastic´s PHP Platform-as-a-Service (PaaS) runs applications without code changes and offers advanced options for experienced programmers.
Jelastic is known for its advanced functionality that is both easy to use, and flexible and powerful enough for experts. Unlike most PaaS offerings, it does not require code adaptation, so anyone can deploy a PHP application in the cloud in just a few clicks. However, experienced IT specialists will find the advanced features necessary to satisfy their demands. Jelastic recently won the Duke´s Choice Award, the "Oscar" of Java community, for this feat, and is proud to announce it´s accomplished the same for PHP.
"We are very excited to announce Jelastic for PHP, with the features and flexibility to host and scale complex PHP applications. We´ve made it easier than ever to develop and run PHP apps, without vendor lock-in, in the data center of your choice, worldwide," said Ruslan Synytsky, CEO of Jelastic. "For innovative hosting companies, our channel program offers the next-level cloud services needed to compete with the big guys."
Smart automatic vertical scaling: Applications receive as much CPU and RAM as needed for each server node. If load increases, resources are instantly reallocated to meet demands. Jelastic users never overpay for unnecessarily large "server instances," and do not need to manage resources.
Charlotte, NC (January 30, 2012) – LEAD Technologies is pleased to announce the release of LEADTOOLS Version 18. This bountiful new release is highlighted by new LEADTOOLS Anywhere™ native libraries for WinRT, iOS, OS X, Android and Linux, along with major updates to LEADTOOLS Document, Medical and Multimedia technology for Win32/64, .NET and HTML5.
LEADTOOLS Anywhere™ extends LEAD Technologies' award winning LEADTOOLS Imaging SDKs to every major development platform. This initiative began last year with the release of SDKs for HTML5 and WinRT. The HTML5 SDKs made it possible to develop zero footprint web applications and WinRT laid the necessary foundation for porting LEADTOOLS to other native platforms. With LEADTOOLS 18, LEAD has further expanded the reach of its Imaging SDKs by offering native libraries for iOS, OS X, Android and Linux development. All core LEADTOOLS imaging technology is natively supported in each of these platforms, including viewing, annotation and markup, OCR, OMR, forms processing, 1D and 2D barcode, PDF, DICOM and support for over 150 file formats and 200 image processing functions.
Major enhancements to Document family in version 18 include dramatic improvements to the speed and accuracy of the Advantage OCR engine. The combination of features contained in this new version, including multi-language support, automatic language detection and specialized image preprocessing for mobile devices, is not found in any other OCR SDK on the market. The Barcode engines benefitted from improved recognition speed and accuracy, and the PDF Readers and Writers were enhanced with the addition of full support for reading, editing and writing native PDF annotations.
Customers developing medical imaging applications are well aware of the importance of zero footprint deployment to the healthcare industry. The LEADTOOLS HTML5 Medical Viewer in Version 18 continues to close the feature gap between web and desktop applications. New features such as patient projection, reference lines, drag and drop capability, and customizable layouts allow healthcare professionals to enjoy state–of-the-art viewing and processing capabilities regardless of their location and device.
Use E-XD++ Development Visual Graphic component library floor plan is similar to Visio, and other software systems layout is very easy, vector graphics editor application is E-XD++ date of birth has been a very important position, we will as E-XD++ component library visual graphics solutions to expand the number one design. Very pleased that, now you're done, you will find, E-XD++ This function has been to work with some of the world's most professional graphics editing program comparable to, for example: Visio, ConceptDraw, SmartDraw, etc., in addition to E-XD++ also One thing is they absolutely can not do: all the rigorous testing of the VC ++ source code available to customers.
E-XD++ provides a composite graphic design program ShapeDeisigner architectural graphic design to quickly design complex graphics needs.
can only set the canvas size.
support for millimeters, centimeters, meters, feet, feet and other drawing units setting.
support for multiple label lines, and according to the needs of custom applications and extensions.
microform map preview, and through a rectangular canvas in the microfilm to adjust the figure to appear.
supports a wide range of large scale canvas zoom.
can push the mouse vertical or horizontal flat canvas.
can be placed in the same tens of thousands of graphic elements on the canvas, and which operate simultaneously.
support is currently only available in professional vector graphics software only editing features are free to move, rotate, zoom, distortion, deformation variety of graphics on the canvas.
support plug and play custom property values, for any building on the canvas design elements set the custom property values, property values can be set directly through the ID value of the query, when the automatic support of the modified Undo / Redo.
built-in print function well, without writing any code to control the printer, print out the paper, orientation, page margins and so on.
to provide E-XD++ library functions consistent ocx control, easy web deployment or. Net, delphi, java development environment, and other call.
100% of all VC ++ source code available, including the design of the control ocx source code. No need to worry about the core technology.
Online documents have gained enormous popularity in the era of emerging technologies. Whether it is storage of analytical data, or conversion of images to documents, different file formats play a great role in minimizing the manual work. You can convert the documents to the different file formats through Saaspose.Words such as PDF, XPS, TIFF, HTML, SWF etc. This REST API ensures that the format and quality of original documents is retained. You can either convert document by using the uploaded document on Saaspose storage, Amazon S3 storage etc. or send the document as request stream to Saaspose API. Previously, we have provided examples for different programming languages such as Java, .NET and PHP; we are pleased to announce that you can now use Saaspose.Words REST examples in Ruby as well. You can either invoke these REST operations directly using your own code or you can use a REST client for your particular language. You can upload the document to Saaspose storage or Amazon S3 storage using Saaspose REST API. Once it’s uploaded, you can convert the uploaded file to desired document format using Saaspose.Words REST API in Ruby. Another approach is to convert document on local system using Saaspose.Words REST API or SDKs without saving the file to Saaspose Storage. You can use the file path or stream to convert the local document to different file formats using Saaspose.Words API. It is a single call process that uses convert controller resource; it uploads the document to server as stream, converts the document to desired file format, sends the converted file back as response stream and deletes the source document from the server. For more information, please refer to Saaspose.Words documentation. Sign up at Saaspose and enjoy a whole new experience of document processing or you may opt for free development account to evaluate our APIs. Please write to us in case of any queries, confusion or suggestions.
Palo Alto, CA – January 29, 2013 – Increasingly, IT professionals are demanding a solution to the typical redundancy and complexity created when multiple development tools are required to support different deployment scenarios within a service-oriented architecture (SOA). WSO2 Developer Studio is the industry’s first integrated developer environment (IDE) that enables developers to write an application once and then deploy it on servers, a private cloud, public cloud, or hybrid cloud environment. On January 30, 2013, WSO2 will kick off a new three-part webinar series designed to help architects, developers, and engineers take full advantage of the benefits provided by WSO2 Developer Studio 3.0 (http://wso2.com/products/developer-studio/), the newest release of the IDE.
Each session will run from 9 a.m.-10 a.m. Pacific Standard Time. To learn more and register, visit http://wso2.com/events.
* SOA application development support for Apache Tomcat, Apache Synapse, Apache Axis2, and Apache ODE.
* Developing, deploying, testing and debugging composite applications using the WSO2 Carbon middleware stack.
* Building Web applications and services using WSO2 Developer Studio.
* Integrating with build systems and build tools, including Apache Maven, Hudson, Jenkins, and Bamboo.
Jointly presenting the webinar will be Harshana Martin and Kalpa Senanayake, WSO2 software engineers on the development technologies team. For more information, visit http://wso2.org/library/webinars/2013/01/wso2-product-release-webinar-introducing-wso2-developer-studio-tools-soa-developers.
Enterprises typically develop a range of applications for the organization’s various business requirements, each of which may consist of several components, such as a Web application component at the front end, a gadget component for data visualization, or a database to store application data. This webinar will review how WSO2 Developer Studio provides a single, comprehensive IDE that supports the development of Web applications, gadgets, services, business processes, and more. It will then examine how a developer can use WSO2 Developer Studio to first build a composite application, and then deploy and debug it from within the IDE to see how it actually works. Finally, the session will demonstrate a real-world application development scenario.
Jasintha Dasanayake and Melan Jayasinghe, WSO2 software engineers, will present the session jointly. To learn more, visit http://wso2.org/library/webinars/2013/02/composite-enterprise-application-development-with-the-wso2-developer-studio.
Today, enterprise application integration (EAI) best practices are based SOA principles and a flexible, highly capable enterprise service bus (ESB). However, the lack of a drag-and-drop tool during the development process can hinder the ESB’s usability. This webinar will examine how developers can use the new graphical mediation flow composer tool in WSO2 Developer Studio 3.0 to create mediation flows in a matter of minutes by dragging and dropping different components. The session also will review the WSO2 ESB building blocks supported by the IDE’s drag-and-drop functionality, including proxy services, REST APIs, sequences, and endpoints among many others.
Jointly presenting the session will be Viraj Rajaguru and Melan Jayasinghe, WSO2 software engineers. To learn more, visit http://wso2.org/library/webinars/2013/02/wso2-product-release-webinar-introducing-wso2-developer-studio-graphical-composition-tool.
Corrupted name ranges on save is fixed.
Error in formatting a document with simple quote in the Header tab column is resolved.
GridWeb’s validation menu list will now word on menu items which contain Dollar sign -"$"
Copy-Paste issue is resolve for web grid which is not working for Chrome, FireFox etc.
PRINCETON JUNCTION, NJ, January 28, 2013 – The International Function Point Users Group (IFPUG) is pleased to announce the release of the Software Non-functional Assessment Process (SNAP) Assessment Practices Manual 2.0 under a Creative Commons 3.0 Attribution-NonCommercial-ShareAlike License. IFPUG is the first international functional sizing standards organization to release a new standard under the Creative Commons License.
The SNAP provides organizations and projects a means to develop a quantifiable measure for the non-functional requirements (NFR). By sizing non-functional requirements software development can planned, evaluated and managed better; saving organizations time and money. The SNAP standard provides organizations using IFPUG measures with a unique competitive advantage to those using other software sizing methods which do not account for non-functional software size.
Sizing this component of project work will allow organizations to build historical data repositories that can be referenced to assist in decision making for the technical and/or quality aspects of application Assessment Practices.
For more information, visit www.ifpug.org.
The International Function Point Users Group (IFPUG), a non-profit, volunteer organization, maintains the rules and procedures for calculating Function Points and the Software Non-functional Assessment Process (SNAP). The definitions, available from IFPUG, are documented in the Function Point Counting Practices Manual. IFPUG, the premier software measurement organization, promotes and encourages the effective management of software development and maintenance activities through the use of Function Point Analysis and other software measurement techniques. IFPUG conferences, workshops and membership provide a forum for networking, education and information exchange that encourages the use of software product and process metrics. The IFPUG website is www.ifpug.org.
"UCanCode Software Inc. is a leading provider of HMI & SCADA, CAD, GIS and Data Visualization Graphics for software developers (C / C++, Java, C#, And VB ) more than 40 countries around the world!"
Creating Construction Professional HMI, SCADA Visualization Solutions is a very hard work, to use E-XD++ source code visualization component library will save you more than 70% of development time. In order to more clearly show how to complete this hard work, we specialize in the original solution carried out detailed development, built on all HMI, SCADA Process Variable, Screen, Script And other integrated management solution. The solution involves the construction and project management, product release to the final exe file generation and other aspects. Construction Engineering and Management is mainly HMIBuilder to complete the operation and interpretation of the works mainly responsible for the HMIPlayer works.
A diagram is worth 1000 words, and E-XD++ is worth over 500,000 lines of well designed and well tested code! In use by hundreds of the worlds most quality conscious companies. The buy vs. build decision couldn't be more clear. Add advanced functionality and slash thousands of hours of complex coding and years of maintenance.
Palo Alto, CA – January 24, 2013 – Today, most enterprise systems are built with remote procedure call (RPC) style messaging. This requires users to send a request, wait for the response, and process a response using the same thread. However, as simple as this process sounds, there are many scenarios where more advanced messaging patterns are needed. To help IT professionals address this challenge, WSO2 will present a webinar that examines how to simplify distributed message brokering with new functionality being added to WSO2 Message Broker (http://wso2.com/products/message-broker/).
The one-hour technical session, “WSO2 Product Release Webinar – Distributed Message Brokering with the WSO2 Message Broker,” will run Thursday, January 31, from 9:00 a.m. – 10:00 a.m. PST. For more information, visit http://wso2.org/library/webinars/2013/01/wso2-product-release-webinar-distributed-message-brokering-wso2-message-broker.
The webinar will begin with a preview of WSO2 Message Broker 2.1.1, including key features and core capabilities. The latest version is based on a new distributed design that provides a cluster of message brokers, which uses Apache Cassandra to store messages and Apache Zookeeper to coordinate message delivery. The session will examine how IT professionals can improve speed and scalability through support for AMQP 0-91 and JMS 1.0, as well as work with other tools from the WSO2 Carbon enterprise middleware platform. Additionally, the webinar will explore how to support asynchronous messaging, publishing and subscribing messaging queues, and persistence.
Jointly presenting the webinar will be Dr. Srinath Perera and Shammi Jayasinghe. Srinath is a WSO2 senior software architect and member of the WSO2 solution architecture team. He works directly with WSO2 CTO Paul Fremantle, specializing in Web services and distributed systems, specifically working with aspects of data, scale and performance on the overall WSO2 platform architecture. Shammi is a WSO2 senior software engineer and member of the WSO2 integration technologies team. He is the release manager for WSO2 Message Broker and provides technology consulting on customer engagements.
We provide these solutions does not mean that E-XD++ visualization component library can only develop graphical applications in these areas, in fact, E-XD++ with any other third party C + + component libraries, including hundreds can be separated function independently. With QT, MFC, etc., you can independently determine the need for E-XD++ in a function, in general, as long as you need graphics, you need flow charts, control charts, printing, publishing capabilities, simulation, electronic maps, electrical wiring diagrams, forms, etc., you can use the E-XD++ components library, of course, sometimes Maybe you only want to use the E-XD++ provides control without the need for the drop-down color graphics, that's no problem !
The MATLABDemo sample demonstrates how to use E-XD++ to build a matlab like diagramming application with complex diagram drawing and layout, as below. With matlab demo, you build models by dragging and dropping blocks from the library browser onto the graphical editor and connecting them with lines that establish mathematical relationships between the blocks. You can arrange the model by using graphical editing functions, such as copy, paste, undo, align, distribute, and resize.
You can use E-XD++ MATLAB Solution to build any your own simuation system quickly and easily, with ShapeDesigner you can design any kind of symbols as you want.
Palo Alto, CA – January 23, 2013 – Increasingly, managed APIs are central to enterprise service-oriented architecture (SOA) strategies for extending business processes and services to customers, partners, and other groups in the organization. However, the cost and complexity of using traditional API management solutions have raised significant barriers to adoption. WSO2 breaks down those barriers with WSO2 API Manager, the first 100% open source API management product that combines easy, managed API access with full API governance and analysis. In a webinar for IT professionals, WSO2 will examine new capabilities in WSO2 API Manager 1.3 designed to enhance performance, as well as the management, sharing and governance of APIs throughout the API lifecycle.
The one-hour technical session, “WSO2 Product Release Webinar - What’s new in the WSO2 API Manager 1.3,” will run Tuesday, January 29, from 9:00 a.m. – 10:00 a.m. PST. For more information, visit http://wso2.org/library/webinars/2013/01/wso2-product-release-webinar-what’s-new-wso2-api-manager.
Webinar presenter Nuwan Dias is a WSO2 software engineer and member of the WSO2 solutions technologies team where he focuses on the WSO2 API Manager and WSO2 Enterprise Service Bus. Nuwan also is an active contributor to the Apache Synapse and Apache Axis2 projects.
Mountain View, CA – January 23, 2013 – For Spacyz, the power of advertising comes from high-speed, high-availability data that seamlessly connects people to personalized offers. The company delivers Japan’s leading open, multi-device advertising platform—providing marketers and publishers with a variety of ad technology solutions to support their campaigns. A new case study published today examines how Spacyz uses the natively flash-optimized Aerospike real-time NoSQL database and key-value store to manage more than 2 billion user records each day while delivering sub-millisecond response times and 100% uptime. The full Spacyz case study is available at http://www.aerospike.com/why-aerospike/customers.
Spacyz’s platform solutions include adcloudFP, which provides publishers with flexible ad management through high-performance ad servers, adcloudFN, an all-in-one ASP (application service provider) service for ad networks; and adcloudEX, an ad exchange delivering centralized ad and inventory control. More recently, Spacyz expanded its platform with the appgear advertising distribution solution, which includes a demand-side platform (DSP) and data management platform (DMP) powered by Aerospike.
* Manages 2 billion user records each day to support the Spacyz appgear DSP.
* Delivers predictable high performance, high availability, and 100% uptime even during automatic data rebalancing, rolling upgrades, and background backups and restores.
* Significantly reduces the number of servers that must be installed, configured, and maintained due to native support for flash and solid-state drives (SSDs).
* Lowers operational costs by 50% through automated and self-managing cluster capabilities that eliminate the need for human intervention.
Spacyz comes from the idea of being an unfettered, open-ended business that isn’t limited by the confines of established frameworks or ideas—in other words, we move fluidly from space to space in a borderless, “spacy” approach. Spacyz’s engineers develop and provide responsive, fast, and reliable systems that aim to provide a seamless, convenient, and cutting-edge service—in other words, the ultimate experience. We implement the latest technology and constantly refine our skills to be able to tackle even the toughest technical challenges. At Spacyz, we all work together as one, pushing boldly forward to meet our twin goals: being a link between people and information and helping the Internet become a cornerstone in enriching people’s lives. For more information, visit www.spacyz.com.
Tampa, FL - January 23, 2013 – Perpetuum Software LLC announces the first product release in this new 2013 year – SharpShooter Reports 6.4, a multi-platform reporting component that easily adds reporting features to WinForms, WPF, ASP.NET, HTML5, and Silverlight applications.
A new version of the product makes work with data sources more user-friendly and intuitive. Now developers can easily add data sources directly in the report designer using laconic connection wizards. Instead of making up a complicated connection string they get simple dialog windows with few options to select and text boxes to fill in. Wizards are available for the following data source types: MS SQL, Oracle, MySQL, and ODBC.
It’s now possible to set custom context menu for the Report designer. This is very convenient when you add reporting module to the unified system with pre-set style and look.
Designer ribbon menu is amplified with a new tab – Document - where developers can set document properties with a single mouse click instead of searching for the necessary property in the property grid.
The component features improved export options - PDF and RTF – including handling of hyperlinks, fonts and bookmarks.
German localization of SharpShooter Reports was updated. Some minor changes and fixes make the product even more stable and reliable.
Perpetuum Software LLC is a premier developer of .NET components and libraries for reporting, data analysis, and visualization intended for the creation of corporate applications in Windows Forms, Windows Presentation Foundation (WPF), ASP.NET, Silverlight, HTML5, and WinRT. Thousands of enterprises in more than 70 countries use Perpetuum Software products to build robust applications and use them across all the main industries: from retail to aerospace.
Create PDF File from Web Pages, Raw HTML & HTML Template inYour Apps.
Saaspose.Pdf is a REST API that allows Create PDF from HTML templates Using Saaspose.Pdf examples in Python. While working with HTML pages, there might be scenarios where you need to generate the printable version. Usually there are layout issues that occur in the printable HTML such as fitting the content into the print preview screen etc. Saaspose.Pdf REST API is the perfect solution that lets you create PDF from web pages and raw HTML code in your applications. You can create a PDF file from HTML templates and the components of the HTML are retained in the PDF file. PDF files support interactive functions such as hyperlinks, markup, file attachments, annotations, PDF files can be created from XML, HTMLs etc. Saaspose.Pdf assures that these functions are retained in the PDF files created from HTML templates. Previously, we have provided examples for different programming languages such as Java, .NET, PHP and Ruby; we are pleased to announce that you can now use Saaspose.Pdf REST examples in Python as well. As it is a REST API, you only need to consume its REST interface in your application. or more details, please refer to Saaspose.Pdf documentation. You can create PDF files using Saaspose.Pdf REST API or you can also choose to convert doc to PDF, xls to PDF, slides to PDF using Saaspose APIs. You can integrate the features into your application using any programming language of your choice. Get started with this feature rich API and create PDF files from HTML templates. You can also opt for our free development account for evaluation of Saaspose APIs.
Saaspose.Pdf is a REST API to create, edit & manipulate PDF files. It also convert PDF file to DOC, DOCX, HTML, XPS, TIFF etc. You can create a new PDF either from scratch or from HTML, XML, template, database, XPS or an image. A PDF file can also be rendered to JPEG, PNG, GIF, BMP, TIFF and many other image formats. It works with any language like .NET, Java, PHP, Ruby, Python and many others. It is platform independent REST API & working with web, desktop, mobile or cloud applications alike.
Palo Alto, CA – January 22, 2013 – Building on its commitment to create a superior experience for customers, WSO2 today announced the addition of two vice presidents to its leadership team. Jackie Wheeler, WSO2 president of technical content, brings more than two decades of expertise in technical documentation, online help, and training for enterprise software companies, such as MuleSoft, Ariba and Autodesk. Gunasiri Perera, WSO2 vice president of delivery, brings more than 15 years of global IT delivery and support experience, with deep insight into international corporate responsibilities. Collectively, they will focus on enhancing the technical support, documentation, training and delivery services around WSO2’s award-winning cloud (http://wso2.com/cloud/stratos/) and enterprise middleware platforms (http://wso2.com/products/carbon/).
As vice president of technical content, Jackie Wheeler brings to WSO2 deep experience in documenting software products and building documentation sets and teams from scratch. She also specializes in enterprise software, open source, API documentation, system administrator documentation, end-user documentation, online help, and training.
Prior to WSO2, Jackie held positions as director of technical publications at NICE Systems and at MuleSoft, Inc. where she was a founding member of the technical publications group. At MuleSoft, she contributed to its developer blog, screencasts and podcasts, and marketing and sales efforts in addition to writing the company’s documentation. Previously Jackie also served as director of knowledge management at NorthStar, Inc. where she founded the documentation and training group. She also has served as a senior technical writer at Ariba, a writing manager and senior technical writer at Autodesk, and a technical writer at Strategic Mapping, Inc. and Pro/Tem Software.
As vice president of delivery, Gunasiri Perera spearheads the delivery of support and services to global customers as well as to the broader WSO2 user community. He also works closely with the business team to use delivery excellence to support pre-sales and post-sales efforts.
Prior WSO2, Gunasiri served in senior management roles for global offshore development companies in Europe, United Arab Emirates, and Sri Lanka, providing these international clients with large-scale enterprise resource planning (ERP) project implementation, passenger service system (PSS) project implementation and product management, pre-sales, consulting and support. He began his career at IFS as a software engineer contributing to the design and development of its new developer framework in service-oriented architecture, as well as ERP application design and development for mobile and J2EE Web technologies with an Oracle backend. Gunasiri has been a guest lecturer of MBA programs at the Asia Pacific Institute of Information Technology (APIIT), Graduate School of Management in Malaysia. He also has served as a panel chairman of MBA viva interviews and a mentor for computer science and engineering students at the University of Moratuwa, Sri Lanka. He is a chartered engineer in IT by profession and also an ICT committee member of Institute of Engineers Sri Lanka (IESL).
We are happy to announce the release of Aspose.Tasks for .NET 5.0.0. This month’s release provides support for reading Miscrosoft Project 2013 MPP formats. Aspose.Tasks now facilitates reading general project properties, calendar information, task and task link data, resource and resource assignment data, and outline codes and extended task attributes data for Microsoft Project 2013 formats. This version also incorporates a new feature that lets you read a task’s budget work and cost values from Microsoft Project 2007/2010 MPP files, that were not supported earlier. In addition, another new feature that lets you get the total number of pages for an MPP file, based on different TimeScale options has also been included in this month’s release. Below is the complete list of new features and important bug fixes included in this release.
Reading support for Calendar, Task, and Task Links.
Incorrect task duration data when read MPP file is now fixed. | 2019-04-25T16:41:38Z | https://www.codeproject.com/Forums/1738007/Press-Releases.aspx?pageflow=FixedWidth&df=90&mpp=25&prof=True&sort=Position&view=Normal&spc=Relaxed&select=4457502&fr=901&fid=1738007 |
From high on the German and Austrian border, we make our way down to Innsbruck, the historic capital of the Habsburgs. We slap-dance the night away in a nearby Tirolean village before turning to feudal Italy at Reifenstein Castle. Then we're out-of-doors, zooming up rock cliffs and hiking through alpine meadows in the Italian Dolomites.
Gasthof Badl is a big, comfortable, friendly, riverside place with 26 rooms run by Sonja and her family, with help from Leo, their enormous, easygoing dog. I like its convenience (right off the expressway but a short and scenic walk from Hall's old town), peaceful setting, big breakfast, and warm welcome.
Reifenstein Castle, with one of my favorite castle interiors in Europe, is just off the highway at the town of Sterzing/Vipiteno. While easy for drivers, it's not worth the trouble for those without wheels — it's unique and interesting but only open for a few non-English tours a day. The castle is privately owned and has not been developed for tourism (no gift shop, no café). Its layout and decor have changed little since the 15th century, when it passed into the hands of the Teutonic Knights. Since 1813, a branch of the noble Thurn and Taxis family has owned the castle. The current heads of the family (an elderly brother and sister) live in Innsbruck, and have chosen to keep the castle just as it was when they spent summer vacations here in the 1940s as children. On your tour, you'll see most of the building, including bedrooms with original wall paneling and decorations, a real dungeon, wooden boxes knights slept in, and a medieval kitchen with a roof that is black with centuries of soot.
Hi, I'm Rick Steves. Thanks for joining us as we share some of my favorite European discoveries. We're starting atop the Zugspitze — the mightiest of German peaks, at 10,000 feet. The Zugspitze straddles two great nations. I'm in Germany…I'm in Austria!
Descending the Austrian side of the Zugspitze, we'll see busy Innsbruck, but stay in small-town Tirol. After crossing the Alps, we'll tour my favorite medieval castle interior and make the town of Kastelruth our homebase for sampling Italy's rugged Dolomites mountains.
In Western Europe, Germany, Austria and Italy come together high in the Alps. From the Zugspitze, we'll travel through Innsbruck and the Tirol in Austria before crossing the Brenner Pass into Italy. There, we'll make stops at Bolzano and Kastelruth.
This cross marks the spot where climbers first reached the summit here in 1851. While this marks the highest point in Germany, we're heading into Austria where there are plenty of higher peaks. From here the Alps arc before us like a grand alpine symphony.
At the Zugspitze summit, as on so many European mountain tops, you'll find restaurants, shops, and well-entertained tourists.
The German side is scaled by cogwheel train and cable car from Garmisch, about an hour's ride to the north. This speedy tram is taking us down the Austrian side to the village of Ehrwald where we parked our car.
The famous Zugspitze attracts travelers from around the world. Escaping the tourist crowds takes initiative and, to reach some places, a car. We're driving to Fallerschein, a tiny tumble of log cabins at the end of a road. Our goal? To catch a glimpse of Austria as it might have been a century ago.
Fallerschein, at 4,000 feet, replaces the modern scramble with a flower speckled world of serene slopes and andante cowbells. Thunderstorms roll down the valley like it's God's bowling alley.
And braced against the weather, the tiny hamlet continues to survive. Daily life and the village economy has revolved mostly around the cows. Originally this was a summer-time only community of dairy farmers. But today the village is also popular as a romantic retreat for Austrian vacationers who've rented cabins here. Fallerschein is famous among those in the know as a rustic get-away.
Hikers and budget travelers bed down here in the Almwirtschaft Fallerschein. Above the mountain restaurant there's a loft filled with mattresses. This is a mattress loft — or "matratzenlager." Throughout the Alps, lager is a key word for cheap bed.
The lager and restaurant are open May through October — weather permitting.
After Fallerschein, Innsbruck — a couple hours' away by car — feels like a metropolis. Six hundred years ago, this popular tourist stop was the Habsburg capital of the Tirol. By the time they got here, the Habsburgs were well on their way to being Europe's most powerful family.
They expanded and consolidated their vast power through clever alliances and politically helpful marriages. This much-ogled Golden Roof was built by Habsburg Emperor Maximilian in 1496. The roof with over 2500 gilded copper tiles remains the town's centerpiece. The Habsburgs ruled here until the end of World War I. Innsbruck's medieval center is now a pedestrian zone. Looking past the crowds, it still feels like an old provincial capital.
The city's folk museum is a medieval Tirolean home show. Cribs were decorated with Christian themes to be sure God watched over the little baby — but just to cover all their spiritual bases, a pre-Christian Druid pentagram was carved on the headboard.
And offering another kind of protection was this man, a "saltner" — or human scarecrow who guarded the vineyards from — boars, foxes and birds.
This exhibit shows off the region's tradition of fine woodcarving. While this could be any Tirolean village, it's Bethlehem in the Alps. Bible stories like this Nativity scene made most sense to locals when presented in a familiar home town setting.
One of Innsbruck's most famous sites is above the city — the ski jump. The spotlight of the world was on Innsbruck as it hosted the Winter Olympics twice, in 1964 and '76. Sports fans may recall many infamous crashes off this jump. For safer sport, hikers take to the surrounding mountains on foot.
Innsbruck's worth a quick look. But I prefer a small town — one with fewer tourists. Tonight we're sleeping five miles down stream in the town of Hall.
Before the time of the Habsburgs, Hall in Tirol was a rich salt-mining center and Innsbruck was — as its name implies — just a humble bridge town on the Inn River. So, Hall's medieval center is actually larger than Innsbruck's.
Laid-back Hall cradles its market square. Hall's pastel buildings and cobbled streets feel refreshingly real. Too real if you're trying to accomplish anything more than a leisurely lunch from noon to 2:00 when everything closes. And in small town Europe, many restaurants take a weekday off. This sign says "heute ruhetag" — that's German for "today is our quiet day."
During the rule of the Habsburgs, Hall's Castle served as the local mint. Five hundred years ago, this how you made money. Traditional methods are still used here to strike shiny souvenir coins.
Back when salt was money, Hall was loaded. The town's elegant architecture and rich church make it clear that in its day, Hall was a local powerhouse. This much-appended Gothic church is decorated Baroque with fine altars, gilded starbursts, and the skulls and skeletons of saints, eerie relics that look back at you.
The old pedestrian bridge leads over the Inn River, and to our hotel. In Europe, I rely on a good guidebook for hotel listings, make reservations by telephone a day or two in advance, and reconfirm with another phone call before showing up.
Gasthof Badl is a friendly place run by Frau Steiner. It's convenient and offers a warm welcome. As in many hotels, tourist information brochures in English are readily available in the lobby. Frau Steiner is checking to see if there's a Tirolean folk evening nearby.
Frau Steiner: Yes, everything will be fine for this evening.
OK, so tonight in the village of Maurach we've got a folk evening. It starts at 21:00. Europe uses the 24-hour clock: So, anything over 12 subtract 12 and add p.m. 21 minus 12 — 9 pm.
Alright, we have time for dinner and Frau Steiner is joining us.
The cuisine of the Tirol is not to be missed. Guesthouses take pride in serving local specialties, such as spaetzle, roast pork, and sauerkraut.
Rick: You must like dumplings. You ordered the dumpling extravaganza here.
Frau Steiner: I love dumplings.
It's a quick course in fine eating — "Dumplings 101."
Rick: You don't want to tell us the secret of the best dumplings?
Frau Steiner: I think I have to keep the secret of Tirol with the dumplings.
Oh well, we'll have to take comfort in the apple strudel. Okay, onto some music! Tirolian Folk Evenings like most folk evenings might be touristy...but a rowdy dose of slap-dancing offers a lively glimpse of tradition. How did the custom start? Strutting your lederhosen and schnapps must be in there somewhere. Rather than a big city stage show, we've opted for a small town hotel evening. It's intimate, lively, and right in your lap.
Slap dancing is a snappy cap to our folk evening in the Tirol. We'll be yodeling in our dreams.
For a car-hikers' look at life in the high Alps, we're taking the toll road up to 5,000 foot high Hinterhornalm.
Detailed maps show the tiniest of roads leading to the grandest of alpine perches. The mountains surrounding Hall and Innsbruck are a nature lover's wonderland offering countless mountain lifts, huts and a lifetime of trails.
Whether you are car hiking, biking, rock-climbing or parasailing these Alps demand only as much exercise as you feel like giving.
From the parking lot at the end of the road, it's a level 20 minute stroll to the Walderalm farm. This is actually a cluster of three family-run dairy farms sharing their meadow with the clouds. Seventy cows enjoy ridge-top rambles surrounded by cut-glass peaks.
Today, happy hikers can sample wild mushroom soup for lunch, and milk doesn't get any fresher.
The Brenner Pass has been the easiest way over the Alps since Roman times.
Nearly 2,000 years ago, Roman legions followed this route — the Via Claudia — on their way north to conquer much of Europe. Well grooved sections of the original road are still preserved.
Today, the Brenner Pass is easier than ever to cross as drivers arc gracefully along one of the engineering wonders of Europe. From the top the Europabrücke, or Europe's Bridge, feels like a freeway, but from the windy old road at the valley floor it looks like a mighty sculpture.
The freeway zips drivers from Innsbruck to the Italian border — in about 30 minutes. How about pasta for lunch?
These days crossing borders in Europe is a wave through. The Automobile Club at the border is worth a stop.
Rick: Okay, we like to go to Sella Pass. What is the best way?
While the Autobahn in Austria and Germany is toll-free, the Italian Autostrada has plenty of toll booths. But that's nothing new there. For thousands of years, travelers have had to pay to cross Brenner Pass. Since Roman times this strategic valley has been lined with forts — ancient toll booths. In the Middle Ages this was the German trade route to Venice and Florence.
When medieval traders reached this valley, chances are they stopped, willingly or not, at a castle like this. Reifenstein Castle has grown more welcoming with age.
While it used to take a battering ram to get these doors open, now all it takes is a few Euros.
Reifenstein offers one of Europe's most intimate looks at medieval castle life.
The actual countess of Reifenstein still lives in her private and rustically elegant castle quarters. Her aide, Frau Plank, shows visitors around several times a day. We called this morning to confirm our 10:00 tour. Frau Plank gives the tour in both German and Italian and she squeezes in what English she can.
She let me try an ingenious gadget for a tipsy lord.
Too much to drink? A clever funnel guides the key right into the hole.
From the looks of the sumptuous green room, medieval life here was pretty comfortable. Some of the original painted wall decorations survive. You can catch a view across the valley to Reifenstein's sister castle. Two castles straddling the valley could control much of the trade passing between Germany and Italy.
But to exercise his power and collect those tolls, the castle lord needed a small personal army. This room is the knights' quarters. Six to eight fighting men shared each of these boxes — complete with hay for maximum comfort. Imagine 40 snoring knights packed into one room.
And every good castle needs a dungeon, used mostly to enforce taxation. If you couldn't pay your taxes you'd spend eight days down here — no food but a little water.
Enough taxes, dungeons and duties, we've escaped and we're on our way to a relaxing Italian town south of the Brenner Pass. Bolzano is the leading city in the Italian Tirol. Except for the sunshine, it feels more like Innsbruck than Italy.
The arcaded main street stretches through the medieval heart of town to Piazza Erbe with its ancient and still thriving open-air produce market. In Bolzano, everything you'll need is within a short walk of the train station.
Rick: Kann ich 500 Gramm Aprikosen?
This enjoyable old town of 100,000 is the most convenient gateway to the Dolomites.
The Great Dolomite Road leads to the nearly 7,000 foot high Sella Pass. The Dolomites are Italy's dramatic limestone rooftop. They offer some of the best alpine thrills in Europe whether you want to stay firmly planted on the ground or soar high above the valley floor.
The bold limestone pillars offer something for everybody.
This is rock climbing country — thrilling, even for spectators. The Val di Fassa ski country is busy with hikers in the summer. The many lifts do the climbing fast and easy, depositing sweat free hikers at thin air trail heads.
Your entertainment: views of the mightiest of the Dolomites. These gondolas are filled with skiers from December through April. Springtime — that's dead time in the Dolomites. The lifts are shutdown, huts are closed and the most exciting trails are covered in snow. We're here in late summer, and everything's wide open. Hiking season is mid-June through September.
Kastelruth feels like an alpine village rather than a ski resort. I feature it in my Italy guidebook as the ideal homebase for exploring the Dolomites.
The hyper-active belltower seems to sing the wisdom of honoring local traditions, like woodcarving. For centuries, farmers around here have passed winter months carving. Today their descendants—many with international acclaim—carry on the tradition.
Erich Perathoner decided by age six he wanted to be a wood carver. He was inspired by the life-size sculptures towering over him at Sunday mass. Training under his father and grandfather, he learned the trade well and developed a passion for religious themes. Now, much of his work is done for the Church.
Many European villages find their young people fleeing to big cities to join the modern parade. But Kastleruth's young generation knows they've got a good thing going right here, and they're staying.
We happened on to Kastleruth's Bobbenfest, or boys' festival. On this special Sunday, everyone turns out to celebrate the town's young bachelors — dressed up peacock-proud in their Tirolean finery.
A traditional rite of passage, this celebration includes an elaborate Sunday Mass. Later, the village gathers for a grand picnic. I asked, "Where are the girls?" "Don't worry," I was told. "The parents are taking careful notes."
A hard-fought history has left the region bi-cultural and bi-lingual. Here in south Tirol locals speak German before Italian. Over the centuries the region has flip-flopped its cultural orientation. After the Roman Empire fell, the region's allegiance turned to the north.
Later, it was firmly in Austria's Habsburg realm. But by losing WWI, Austria lost this land. Austria's South Tirol became Italy's Alto Adige. Mussolini did what he could to Italianize the region, including giving each town an Italian name.
Kastleruth became Castlerotto. To win the region's favor, the Italian government has wooed locals with economic breaks. These have made it one of Italy's prosperous and expensive areas. Today, whether you prefer to call the region Alto Adige or Süd Tirol, all signs and literature are in both Italian and German.
From Kastleruth we're heading up to Alpe di Siusi. Visitors ride a free park shuttle bus to Europe's largest high alpine meadow — a natural preserve at the foot of the Sasso peaks. The bus takes you to the trail head of your choice.
The meadow is 3 miles by 7 miles wide and seems to float at 6,000 feet. It's dotted by farm huts and wild flowers, surrounded by dramatic Dolomite peaks, and crisscrossed by meadow trails — ideal for flower lovers, walkers, and equestrians.
The Sasso Lungo mountains standing at the head of the meadow provide more demanding hikes, and a storybook Dolomite backdrop. Meanwhile, the spooky Schlern — home of mythical witches — looks boldly into the haze of the Italian peninsula.
Not surprisingly, the Schlern, standing like a devilish winged victory, gave superstitious people the willies.
But today, the Schlern witch is welcome in the villages, surviving only as folk art. She's become a kitchen witch — an amusing souvenir riding her broomstick into the hearts of travelers.
And chairlifts — not broomsticks — provide springboards for more Alpine thrills. Thanks for traveling with us. Join us next time for more travels in Europe. I'm Rick Steves, wishing you happy travels. Ciao. | 2019-04-22T23:56:19Z | https://www.ricksteves.com/watch-read-listen/video/tv-show/alps-of-austria-and-italy |
During the summer of 2006 I was in Lebanon with my husband and three children visiting family. We were having a lovely vacation filled with mountains, beaches, caves, waterfalls, sunsets, rainbows, castles, shopping, and parties. Then with no warning, a war broke out between Israel and a terrorist organization (or upstanding, community oriented, political faction—according to the smiling roadside signs). The closest Hezbollah camp lay about two miles from my husband’s little Christian village of Aabra in the heart of the Islamic South where Jesus once walked. Right away we heard the bombs and felt the house shake.
Women sat on the porch painting their nails. Some old men dealt cards and drank coffee. Children played soccer on the sunny streets. This was Lebanon after all. You could hardly put things on hold for yet another war, and since neither Hezbollah nor Israel had a gripe with the little Christian village, people painted nails, played soccer, and drank coffee.
Later that evening we went to a party. When we heard a particularly seismic bang, they told the children someone had set off fireworks for the birthday celebration. My husband took me aside and informed me it was the bridge to Beirut. Beirut and the airport. The way out. They always bombed it first to cut off the South from supplies. I didn’t enjoy the cake so much. A trapped sensation began to squeeze my chest.
On the way home I watched red rockets shoot into the sky. Not in celebration of Clara’s birthday. Teens lined the streets watching them like fireworks anyway. That’s when I realized: although no one had a gripe with the neutral little village, sometimes innocent bystanders get caught in the fray. Hezbollah rockets flew willy-nilly across the sky after streaking Israeli jets, not at all concerned where they landed. I watched the flares apex and arch and spin back down to earth, without a care. The rockets. Not me.
That night I kept my children in an interior room of the house. Thank God Lebanese homes are made of stone. I prayed and sang worship songs and read Psalms on the vibrating bed to the whistling flute and booming bass drum of rockets blasts, until I couldn’t take it anymore. My eleven-year-old daughter Christiana picked up the Bible and continued. Here is a portion from the scripture she found.
1-5 God, get me out of here, away from this evil; protect me from these vicious people. All they do is think up new ways to be bad; they spend their days plotting war games. They practice the sharp rhetoric of hate and hurt, speak venomous words that maim and kill.
After a while the kids fell asleep, but I could not. I struggled to calm my racing heart, to still my shaking hands, to swallow back my fear. I stroked their curly heads as they lay in peace, treasuring each child, each moment, the tranquil features of their small faces. Finally, in the wee hours of the morning I crawled to my own bed on the side of the house where the rockets zoomed. I didn’t care anymore. I was desperate to escape into dreams.
And panic set in. I could no longer hold it at bay. It seized my heart, clutching it, cinching tight, threatening to smash the life right out of it. I could barely find the air to breathe. My husband spent the day on the computer and the phone. I curled in a ball and cried and tried to keep the kids from playing soccer on the sunny streets. My daughter read us Psalms.
Where to go? What to do? This was no child’s game. We were truly trapped. Should we go to Syria? To Jordan? Take a taxi? Steal a car? I couldn’t spend months in that village listening to bombs drop. I would never survive. Besides, there were things waiting for us back home, dance camps and church picnics, homeschool planning and season tickets to amusement parks.
This was not my life!
No good solutions surfaced, but we had to do something. My in-laws wanted us to stay there in that—can’t eat, can’t sleep, bass drums rumbling, must keep the kids from playing soccer on the sunny streets—hell. They’d been through wars before. We’d be trapped but safe. They seemed certain. But I couldn’t. I couldn’t do it. I couldn’t just sit and drink coffee on the balcony while waiting for my nails to dry. While waiting for the war to pass and the bombs to cease. Everything within me cried out to fight.
I called my kids and husband to the interior room. It was the most peaceful place in the house. We sang and prayed some more. I asked the children if any of them had a word from God. Lord knew I was far too much of a mess to hear. Adam, not quite four-years-old, piped up. “I do,” he said in his squeaky little voice.
He proceeded to tell us the story of a boy who wandered away from home and ended up in a library. As he described it, we could picture the two sets of double doors and the foyer in between. The boy entered the first set and got stuck there. He couldn’t go in, and he couldn’t get out.
We didn’t know at the time that back home people were experiencing similar visions and dreams. But when Adam told us the story, we felt we understood. The library represented man’s wisdom. If we did what seemed wise, we would be trapped. I couldn’t be trapped again. I couldn’t stay trapped in that village any longer.
Now, you have to understand traveling north to Beirut was the stupidest thing we could have done. The Israelis were on a mission to bomb out all the bridges and shut down transportation, and to get to Beirut would mean crossing many, many bridges.
But as my husband spoke those words, a peace settled over the room like a soft snuggly blanket. We knew. We had our answer. I knew. I wasn’t trapped. My mourning was done. The world was light and bright again, and I didn’t care about the crashing bass drums.
I washed off my tears and went to eat some food for the first time that day. My mother-in-law was furious and shouting at me in Arabic. “Don’t leave. Stay here. It’s safer here.” Mafais shi, she said in her own language. It’s nothing.
I had been married for thirteen years at this point, and I always pretended I didn’t understand my mother-in-law in such moments. But this time I stood up and yelled back. In Arabic no less. “This is the right thing to do. I know it. Look at me. I’m not crying. I can eat. I’m happy. This is my family. These are my children. We’re leaving. And you can’t stop us.” I’m sure my Arabic was broken, and I messed half of it up. I’m probably not remembering the words quite right. But you get the point. And so did she.
Gathering up our suitcases, we smashed into an old car along with two of my nieces who longed to return to their parents in the city. We drove up and down the mountains looking for paths where bridges still crossed the streams. As we gazed at the sky and listened for whistling rocket flutes before speeding over each one—I felt free. Free and at peace with God and the world. Oh, and the car broke down for a few minutes somewhere along the way, but I didn't mind. I just sat on the hood and smiled.
Almost four-year-old Adam was right. If we tried to get out of the country we would have been trapped at the border for days. And the borders were being bombed.
Instead we piled into a two-bedroom apartment with my brother-in-law’s family in Beirut. It was crowded, but I felt free. I spent the next week hanging out at the local hamburger joint with a play place, swimming at an uncle’s high rise luxury condo, and watching my favorite American television shows in English or French.
All the while, I tried to convince my parents back home that we were fine. Because, you see, over 1,200 civilians died during the war in Lebanon in the summer of 2006. Understandably, my parents were trapped in their own—can’t eat, can’t sleep, bass drums rumbling, must keep the kids from playing soccer on the sunny streets—hell. Thousands of Americans were praying for us by this time. I got emails from old college buddies. My mother became close friends with our local congresswoman, Thelma Drake. Hi, Thelma. What’s up?
And although I empathized with my parents back home, I had discovered a secret in the midst of the war. Sometimes in the middle of being trapped, you can wind up feeling oddly…free.
When the US government finally announced they would send refugee ships, we were a five-minute drive from the departure spot, precisely where we needed to be. Adam’s vision proved true yet again. God had spoken. God is always speaking if only we will stop and listen. He had been our hiding place. Our refuge in that storm.
I have more great stories about mobs and two days roasting on a concrete bridge and my kids being passed over the heads of US Marines. I'll have to share those another time.
But finally, we sat on the deck of the USS Nashville watching the Lebanese skyline slip past. Feeling the cool Mediterranean breeze under the clear blue sky. We slept right on the deck under the stars. That might be my favorite night ever.
There’s something great about being trapped in a war. Something that leaves you oddly…free.
Back safe in the states!
So what's your scariest vacation memory or worst vacation ever?
Please, readers, go to Dina's book chapter through the link above.
Dina, even though I've read this story before, it still had the same impact. And my heart was again in my throat. Beautifully told. What a blessing.
I believe God will use this story today to touch someone's heart, someone who needs to remember that God has peace for them but it might not be where they're expecting to find it.
Thanks for the vote of confidence, Deb. The full chapter on my website is titled, "Trapped in Time." It relates this experience with being trapped in the physical universe of time and space and how we can find peace while still here on earth.
And just for record, I'm glad you got back safe and sound, Dina!
I agree with them, Dina. I read this in your book, but even so, it was a gripping, awe inspiring read the second time around. I am so thankful you came through it safely and praising God all the while. Amen, sister.
For a scary or bad vacation memory...I remember a few years ago my mom and I went to Disneyland and while we were there, they had tornado warnings. We had to rush back to the hotel and get behind a secondary wall. It was unreal. In Disneyland! But the tornados didn't come through there, thankfully.
Another time, and this wasn't a vacation, I was taking my son to Bellingham, which is about an hour north of us, and about half an hour south of the Canadian border. It was March 15th. It was a beautiful sunny day. Before we were halfway there, the sun disappeared and there was a white-out. I don't drive in the snow. And, for the record, we don't get snow like that hardly ever. Especially in the middle of March. There was no where to turn around. I had to drive for another half hour on a winding, steep highway until I could turn around. My son and I prayed out loud the entire way, and to say my knuckles were white would be an understatement. But God was with us and the car never slid.
Incredible story, Dina. I'm sure it was no fun to go through this, but it's the sort of thing that a family looks back at as a time that established their faith. Oh, they already believed, but now they know. They've acted on their belief. Thanks so much for sharing.
Roseanna, boring has its upside. I'm glad we made it back safely too.
Those sound like some scary situations too Susie. Thank God for his protection.
Lisa, it was not fun at all, but I don't have any regrets. It was a wonderful learning and bonding experience for our family.
very useful read. I would love to follow you on twitter. By the way, did any one hear that some chinese hacker had busted twitter yesterday again.
that is amazing! I am utterly impressed with the relationship you cultivated with the Lord among your young children. God bless your son!
It seems so timely a story with the Haiti crisis. I am sure you know how those poor folks feel over there. Trapped, anxious, desperate for the Lord to give direction and relief. It defies our American understanding when good people suffer.
Beautifully told story. Praise God for the happy ending!
Kathleen, I've been working on this post for weeks, so I hadn't even thought of it in relation to Haiti. But you are so right. Thank you for pointing that out.
No matter where you are or what is going on around you, the safest place to be is in the center of God's will. I have no doubt we will hear of many miracles coming out of Haiti as we always do in such times of crisis.
Hubby spent 6 months in Bosnia. He was a CAF Peace Keeper with the UN. As Military Policeman, he was sent in to investigate mass killings and other atrocities. He wrote home about walking out of a building and having it blow up behind him. Of having to ID people with no faces. Of being shot at while zipping down 'Sniper's Alley' in a soft-bodied jeep. Of being told to wear his flak jacket on the flight because of the artillery fire on landing. Only problem was - his crew hadn't been issued them yet.
I wonder who was scared more - him on the landing or me reading about it. I will keep those letters for our children and their children.
I can't imagine being with my children in a war zone. On my own, I'd be scared but would do what I needed to do. But as a mother with childen, my reasoning shatters when they're in danger. I don't take chances with them as I would by myself.
I salute your and Dani's courage to do what needed to be done to get out safe. For listening to that gut instinct that I've come to realize is usually God's voice.
Thank you for sharing your story with us Dina. I haven't read any part of your book but I will someday - you can be sure of it.
Dina, I too was blessed by reading this. Such a powerful story, and what a testimony to God's provision and grace.
I also enjoyed all of your photos-- great shots, all of them, and they really added to the story.
Kathleen, this is indeed a timely piece, in light of the crisis in Haiti. What a good reminder to pray for the victims and those who can help, especially the missions agencies already in Haiti, like Compassion, World Vision, etc.
Not a vacation scare story, but we went through a tornado in Oklahoma once. (Quite a short period compared to your lengthy ordeal, Dina!) We were traveling across country so my seminarian husband could work in a church internship. After we checked into a motel, we ate in a diner and noticed that the sky looked like a bloody bruise, black clouds with green and red and purple around the edges. I'd never seen anything like it before. By 8 pm the tornado hit. We had the tv on in the motel, and the weatherman instructed particular neighborhoods to take shelter, including ours. We got into the bathtub with pillows and bedding over us until the all-clear siren rang. God protected us, but I admit I was terrified. The tornado ended up picking up a train and dropping it a mile away or something, but the only damage we sustained was from the large hail pummeling our little Honda!
Anita, Lebanon is pretty scary in general. I realized later, though, that what upset me the most was that sense of being "trapped" there. The other issues on my mind were what if we got separated or someone got hurt. The idea of death didn't really bother me, it was more the idea of my children suffering in some way.
I'm certainly glad God was extra gracious in speaking to us in a way we could hear and providing us with the peace we needed.
Susanne, some of the pictures were ours, but the ones of major devastation and bombing I found online. They are from that summer in Lebanon, though.
My husband did a lot of aid and humanitarian work once we arrived safely at the refugee center in Cyprus. That's it's whole own long story. But, yes, we definitely need to be praying for Haiti right now.
Oh, and I lived in Oklahoma for four years. I don't have any great tornado stories myself, but my brother did some storm chasing there.
What an AMAZING STORY of God's provision, of life in the seam of a different culture, of your ability to trust and obey!
The most obvious one is when we took our 4th and 1st grade children on an "easy" hike which seduced you with one-runged steel ladders nailed into the frame, then progressed to terrifying, hanging-onto-the-rail-or-you'll-fall-to-your-death climbs.
As I stammed to hubby, "We've gotta go back," he answered, "Going down is much, much harder. And there's a path through the woods at the top."
ONLY through the grace of God and hubby's strong hands and chest did the two petrified of heighters in the family get to the top.
Exuberant that we were alive and flushed with a sense of accomplishment, we cannonballed into the cool Maine lake. Laughed. Swam. Floated.
I looked across the emerald green water at something red, black, pulsating toward us like a PacMan ghost.
My screams vaulted everyone from the water.
When we told our story later at the B&B, the innkeeper confirmed my suspicions.
"Blood-suckahs, aye. Leeches. Got 'em everywhere here."
From then on, we stuck to the Atlantic for our watery activities!!!
Patti, your vacation story sounds scary but fun. I guess having little ones with you always puts things in a different perspective.
Wow! Quite the adventure coupled with a sense of God's presence!
A number of years ago, I went alone on a short-term missions trip to Sri Lanka, a country filled with war and soldiers. I actually never experienced any of the war while I was there although I saw soldiers everywhere. On the way home, I'd scheduled a few days R&R in Hong Kong. I landed just before a major typhoon hit Hong Kong -- an 8 on a scale of 10. Instead of connecting with my friends that first day, I stayed at a Baptist pastor's home (long story) with a number of other stranded people.
Two things that stand out: someone had prayed over me before I left that I would not experience fear on this trip and in so many ways that prayer was answered! Secondly, most of my prayer support team for the missions trip stopped praying (or reduced their praying) when I left Sri Lanka thinking I'd be safe in Hong Kong!! Little did they know!!
The whole missions trip and time in Hong Kong showed me so many things about being a missionary! A valuable trip!!
Elaine, Lebanon is similar in that you always see soldiers walking around with machine guns. Stray bombs from time to time aren't that unusual. All of that stuff scared me during my first trip, but 2006 was our third trip, and I was used to that. It took several hours before we realized this was a serious conflict. Up until then, everyone was just sort of curious but not at all upset.
Dina, my "scary" vacation and snow stories are absolutely nothing compared to what you went through. I can't even begin to imagine. Truly. And I do think it was so obviously God working through your son to give you a message. That was just amazing. It gave me goosebumps when I read it. My brain was just too tired this morning to verbalize all of that.
I know a little bit about what it feels like to see soldiers walking around with machine guns. I worked for 9 years on a military base. When I first started working there you could just drive on the base to work, no problems at all. Then they had the bombing of the navy ship the USS Cole. All of a sudden, there was a 100% check of each car each time they went on the base. They just looked inside with a flashlight (if it was dark) and always checked your ID. Then, after 9/11, things changed even more. Not only was it a 100% ID check and visual exam of the inside of the car, but they would take these long poles with mirrors and inspect the underside of each car. But the unnerving part of it all were the security guards wearing machine guns. And even more unnerving were the tanks sitting beyond the security gate with their guns pointed directly at the spot your car was sitting while they checked your ID. I'm thankful for that kind of security, but it took quite a bit to get used to it.
That is an incredible story. It fascinates me.
You said: "Now, you have to understand traveling north to Beirut was the stupidest thing we could have done. The Israelis were on a mission to bomb out all the bridges and shut down transportation, and to get to Beirut would mean crossing many, many bridges."
So if I'm understanding correctly you were at peace because you felt this was God's leading? The picture of the bridge being blown up is really scary. I think you guys are incredibly brave. I can feel the sense of relief being on the ship. I have to admit I'd be afraid to go backt there.
And I love the Messag version of Psalm 140. That's amazing.
My scaries vacation? Probably driving down to Florida with a bunch of other college students when a tire blew in the middle of the night and we came to a stop facing oncoming traffic. But that's nothing compared to your adventure.
Will you go back to Lebanon?
Jill, yes, basically we did the stupidest thing possible, but felt at peace because we felt sure we were following God's leading.
Will we go back? That's a complicated question. We are willing to go back at this point, although it took a few years to get to that place. Right now, though, the family on both sides feels it's safest for us not to visit. That's why my in-laws came here over Christmas for the first time in 16 years.
Suzie, the first time I arrived in Lebanon I was 25 years old with a nine month old baby and stepped off the plane to be welcomed by rough looking soldiers in camo with oozies. I was terrified!
But by the end of the trip, I jumped out of the car to have my picture taken with some Syrian soldiers with their guns in my bright red mini-dress. That's a classic.
Beautiful post, Dina. My jaw hit my desk at least three or four times! The thing that struck me (besides your bravery!) was your willingness to gather your family and trust that anyone of them, even the littlest, could, and would, hear from heaven! We've raised our kids that way too, and it has proved to be a genuine blessing more than once.
No scary vacation stories... but my parents loved to do all sorts of exciting (read: terrifying) things while I was growing up. Like canoeing down the Colorado River, sailing on lakes so cold you have hypothermia within 60 seconds, and flying a small plane through the mountains. We only ran out of gas once... the propeller had just stalled when my dad realized the plane had two fuel tanks and he just needed to flip the switch (I had the label on the emergency beacon memorized. I was 8). I think they used up all my adrenaline before I turned 12.
Niki, I admit I fully expected one of the older children to have a word from God. But when the baby spoke up, it was just so clear. I guess God gave me faith that He would speak to us that way.
I didn't fit it into the post, but one of his teenaged Sunday school teachers back home had a dream that Adam was stuck in a library and in danger and she was trying to help him. Weird, huh.
And that's pretty funny about your parents and vacations. I think I'd like your parents.
Reading this post brought back all the memories.
I lived in Lebanon during the 16 years of civil war and one day during the war I asked a friend of mine to travel with me from one area to another and his mother was so upset and sick worry. I was thinking to myself that this is crazy and way over protective. When the war broke out and I had my family with me I totally understood the feelings of my friend's mother.
This time I had my family with me. Beside words of comfort and prayers I can not promise my family that I will be able to protect them from the flying bombs and bullets. It is way outside my abilities.
By the end, God's sovereign power protected us and they all did excellent considering the situation.
Looking at the Welcome Home picture reminded me that home is where your heart is.
Great job Dina. Proud of you and love you.
Although we would have never intentionally chosen to be in this situation, I think it was important for the children and I to understand how Dani and his family spent much of their lives.
Probably also important for Dani to gain a more mature understanding of war. He has way too many cool adventure stories of covering the war as a cameraman for CBN news :)He and his old friend Charlie were regaling us with some of them over Christmas. | 2019-04-21T14:32:27Z | https://www.inkwellinspirations.com/2010/01/trapped-in-war-zone.html?showComment=1263825802855 |
Spanish science transitioned from being a provincial swamp of ignorant nepotism under Franco’s fascist dictatorship to an elitist swamp of arrogant nepotism with a choke-hold on European and international research funds. Young researchers, who once returned from abroad to reform the country’s bogged-down scientific system, have grown into the provincial greedy power-clutching tyrants they have dethroned. Faculty jobs once given to family members, now go to loyal members of your scientific family. Another difference: the new science oligarchs are international and speak more languages than just the local Spanish dialect. Some are even foreigners, like the Italians Maria Pia Cosma, or the central character of this story, Andrea Cerutti. One bizarre relic which remained: the fundamentalist Catholic order Opus Dei still seems to have its hand in Spanish academia, as the recent affair around Carlos Lopez-Otin revealed (see this article and especially the comment section). In the 1980ies, one Spanish medical fraudster saved his career by joining Opus Dei, he even underwent exorcism to expel the devil which made him commit research misconduct. Who knows if this still happens.
Many countries have a problem with cheaters in science, but in Spain those cheaters are celebrated, awarded with highest honours and biggest public and industrial grants. Spanish media seems to know its place and applauds each award to a dishonest data manipulator as if nothing was out of order. Lopez-Otin is back from his Paris exile to the University of Oviedo now, he wrote a book about his Passion, and he will very likely soon get the Princess of Asturias Prize he craves so much.
The whole conspiracy farce around his 9 retractions, which culminated with an El Pais article showing Lopez-Otin with a 23-year-old progeria patient sitting on his lap wearing an Opus Dei crucifix, made one thing clear: any Spanish scientist opening their mouth about research integrity will be burnt at stake. Cancer and degenerative diseases are to be cured with massive investments into aggressive Photoshop fraud, Spanish elites of society have agreed.
Pura Munoz-Canoves keeps rising despite or rather because of the manipulated data she published. Her recent honours: Lilly Foundation Preclinical Award, and a €500k grant from La Caixa bank. This year, Munoz-Canoves is speaker at ISSCR 2019 conference in June 2019.
Maria Pia Cosma, whose papers were spared any proper investigations because her former mentor and coauthor Kim Nasmyth is just too important, also received a €500k La Caixa grant last year. EU Commission trusts her research so much, it gave Cosma in 2016 €1 million, a quarter of the budget of the Horizon 2020 CellViewer project.
Manel Esteller not only survived the fraud affair of his PhD student Sonia Melo undamaged, he was even recently appointed as director of Josep Carreras Leukaemia Institute. Melo herself has been whitewashed in Portugal and given a fresh grant from Astra Zeneca.
Antonio Garcia de Herreros, a colleague of Cerutti at IMIM in Barcelona, still receives funding money from the Spanish government, despite his massive PubPeer record and 4 retractions for fraud.
Recently, certain French and Spanish newspapers established that I am a German racist, a terrorist, and a harasser of women in science, further facts in that regard were extensively elaborated on Twitter.
In this regard, I will bring here a story about an Italian haematology and immunology researcher, Andrea Cerutti*, who holds transatlantic labs at Institut Hospital del Mar d’Investigacions Mèdiques (IMIM) in Barcelona, Spain, and at Icahn School of Medicine at Mount Sinai, New York, USA. Until recently, Cerutti used to swim in grant money, from 2011 to 2016 the Mount Sinai lab received from NIH $5 million for 4 projects, while the Barcelona lab frolicked from 2012 to 2017 in the €2.2 million ERC grant.
I was alerted to the Cerutti case by the pseudonymous image integrity sleuth Clare Francis, who found recent irregularities in Cerutti’s papers, next to the already impressive PubPeer record. Like this, in Sintes et al Nature Communications 2017: it shares gel bands with a four year older paper from Cerutti lab in New York, Romberg et al J Clinical Investigation 2013.
It is strange why same old blot from 2013 was rearranged so creatively in 2017, with same bands standing in for such diverse samples. Some might say, it was merely a loading control, but I personally feel those are kind of important and should not be faked. But again, others on Twitter proved me wrong, especially in this case.
It is not like Cerutti stopped doing those naughty deeds once a successful academic career was fully established. It’s like with alcoholics, the temptation for recidivism is too strong and lurking everywhere. There are also these collaborative papers by Cerutti where same flow cytometry file appears twice. Examples are here, a paper from Cerutti’s collaborators at Karolinska Institutet in Stockholm, Sweden (Gutzeit et al J Immunology 2014) and at Icahn School of Medicine (Garcia-Carmona et al Frontiers in Immunology 2018). Duplicated flow cytometry (FACS) plots are labelled with colour squares.
This might have been an honest mistake of oversight, but how come the quantified numbers are different? This means either the authors did it to obscure similarities, or they secretly changed measurement gates on each file to get the results they wanted (like Sonia Melo proudly admitted to having done). Neither constitutes good scientific practice. Cerutti actually published something similar with Casali before, guess where: Xu et al J Immunology 2008.
There is more material on PubPeer, but in Spain, its serves as a badge of honour, if anything.
*Andrea is a male name in Italy, but I don’t want to spoil the “harasser of women in STEM” story told about me online and offline. Also, I don’t want to miss the precious irony of Andrea Cerutti being possibly defended as a MeToo victim of harassment.
At first this was a difficult one, but after a while people “got their eye in”.
Blood. 2007 Jan 15;109(2):729-39. Epub 2006 Sep 7.
Hodgkin lymphoma cells express TACI and BCMA receptors and generate survival and proliferation signals in response to BAFF and APRIL.
Chiu A1, Xu W, He B, Dillon SR, Gross JA, Sievers E, Qiao X, Santini P, Hyjek E, Lee JW, Cesarman E, Chadburn A, Knowles DM, Cerutti A.
Department of Pathology and Laboratory Medicine, Weill Medical College, Cornell University, 1300 York Ave, Rm C-410, New York, NY 10021, USA.
Co-author on Blood. 2007 Jan 15;109(2):729-39, Ethel Cesarman, has another porblematic paper in Blood.
Some say that mirror images don’t matter, but then does any of it matter?
Transformation of primary human endothelial cells by Kaposi’s sarcoma-associated herpesvirus.
Flore O1, Rafii S, Ely S, O’Leary JJ, Hyjek EM, Cesarman E.
Department of Pathology, Cornell University Medical College, New York, New York 10021, USA.
Is it churlish to mention?
Transcriptional downregulation of ORF50/Rta by methotrexate inhibits the switch of Kaposi’s sarcoma-associated herpesvirus/human herpesvirus 8 from latency to lytic replication.
2Istituto di Microbiologia, Università Cattolica del Sacro Cuore, Rome, Italy.
“Icahn School of Medicine at Mount Sinai, New York, USA”.
Isn’t Andrea Cerutti going with the flow? Community standards?
Cancer Res. 2007 Jun 15;67(12):5747-53.
Androgen-induced Wnt signaling in preosteoblasts promotes the growth of MDA-PCa-2b human prostate cancer cells.
Liu XH1, Kirschenbaum A, Yao S, Liu G, Aaronson SA, Levine AC.
Department of Medicine, Mount Sinai School of Medicine, New York, New York 10029, USA.
Andrea Cerutti’s works is not out of place with the above.
Same institute at Mount Sinai (Immunology Institute).
J Biol Chem. 2006 Apr 14;281(15):10073-80. Epub 2006 Feb 16.
IRF-8/interferon (IFN) consensus sequence-binding protein is involved in Toll-like receptor (TLR) signaling and contributes to the cross-talk between TLR and IFN-gamma signaling pathways.
Zhao J1, Kong HJ, Li H, Huang B, Yang M, Zhu C, Bogunovic M, Zheng F, Mayer L, Ozato K, Unkeless J, Xiong H.
Immunobiology Center, Mount Sinai School of Medicine, 1 Gustave L. Levy Place, New York, NY 10029, USA.
Parts of figure 4 are a reincarnation.
Another lovely piece of work, but with the senior author of J Biol Chem. 2006 Apr 14;281(15):10073-80 as first author.
J Biol Chem. 2005 Jun 24;280(25):23531-9. Epub 2005 Apr 18.
Ubiquitin-dependent degradation of interferon regulatory factor-8 mediated by Cbl down-regulates interleukin-12 expression.
Xiong H1, Li H, Kong HJ, Chen Y, Zhao J, Xiong S, Huang B, Gu H, Mayer L, Ozato K, Unkeless JC.
Immunobiology Center, Mount Sinai School of Medicine, New York, New York 10029, USA.
To bring H Xiong’s J Biol Chem tally up to 3.
J Biol Chem. 2009 Sep 4;284(36):24006-16. doi: 10.1074/jbc.M109.025528. Epub 2009 Jul 10.
AP-1 activated by toll-like receptors regulates expression of IL-23 p19.
Liu W1, Ouyang X, Yang J, Liu J, Li Q, Gu Y, Fukata M, Lin T, He JC, Abreu M, Unkeless JC, Mayer L, Xiong H.
Immunology Institute, Mount Sinai School of Medicine, New York, New York 10029-6574, USA.
which is 40 blocks, about 2 miles (3 km) down the road.
Weill Cornell Medical College breast cancer expert.
How come the governance of the Weill Cornell Medical College never noticed any of the problematic data?
Cancer Discov. 2012 Apr;2(4):356-65. doi: 10.1158/2159-8290.CD-11-0241. Epub 2012 Jan 27.
Increased levels of COX-2 and prostaglandin E2 contribute to elevated aromatase expression in inflamed breast tissue of obese women.
Subbaramaiah K1, Morris PG, Zhou XK, Morrow M, Du B, Giri D, Kopelovich L, Hudis CA, Dannenberg AJ.
Department of Medicine, Weill Cornell Medical College, New York, New York 10065, USA.
Cancer Prev Res (Phila). 2012 Oct;5(10):1183-94. doi: 10.1158/1940-6207.CAPR-12-0201. Epub 2012 Jul 10.
Pioglitazone, a PPARγ agonist, suppresses CYP19 transcription: evidence for involvement of 15-hydroxyprostaglandin dehydrogenase and BRCA1.
Subbaramaiah K1, Howe LR, Zhou XK, Yang P, Hudis CA, Kopelovich L, Dannenberg AJ.
Department of Medicine, Weill Cornell Cancer Center, New York, NY 10065, USA.
IFN-gamma suppresses IL-10 production and synergizes with TLR2 by regulating GSK3 and CREB/AP-1 proteins.
Hu X1, Paik PK, Chen J, Yarilina A, Kockeritz L, Lu TT, Woodgett JR, Ivashkiv LB.
Arthritis and Tissue Degeneration Program, Hospital for Special Surgery, Weill Graduate School of Medical Sciences of Cornell University, New York, New York 10021, USA.
How to explain the same data appearing in another journal the previous year?
J Immunol. 2003 Nov 15;171(10):5034-41.
Reprogramming of IL-10 activity and signaling by IFN-gamma.
Herrero C1, Hu X, Li WP, Samuels S, Sharif MN, Kotenko S, Ivashkiv LB.
Department of Medicine, Hospital for Special Surgery, Weill Graduate School of Medical Sciences of Cornell University, New York, NY 10021, USA.
How to explain the duplication in this paper?
J Immunol. 2008 Jun 15;180(12):8057-65.
IFN-gamma and STAT1 arrest monocyte migration and modulate RAC/CDC42 pathways.
Hu Y1, Hu X, Boumsell L, Ivashkiv LB.
How to eplain the same data appearing in 3 papers?
states: “He [Andrew J. Dannenberg, MD] has authored more than 150 scientific articles”.
Has anybody in the Breast Cancer Research Foundation (Pink Ribbon) ever looked at any of these more than 150 scientific articles, and if so which ones?”.
Ann N Y Acad Sci. 2006 Apr;1068:225-33.
Interactive effect of interleukin-6 and prostaglandin E2 on osteoclastogenesis via the OPG/RANKL/RANK system.
Liu XH1, Kirschenbaum A, Yao S, Levine AC.
Department of Medicine, Box 1055, Mount Sinai School of Medicine, New York, NY 10029.
Ann N Y Acad Sci. 2007 Nov;1116:423-31. Epub 2007 Jul 23.
Androgens promote preosteoblast differentiation via activation of the canonical Wnt signaling pathway.
Department of Medicine, Mount Sinai School of Medicine, New York, NY 10029, USA.
J Neurotrauma. 2017 Jun 15;34(12):2069-2074. doi: 10.1089/neu.2016.4763. Epub 2017 Feb 27.
Spinal Cord Injury Leads to Hyperoxidation and Nitrosylation of Skeletal Muscle Ryanodine Receptor-1 Associated with Upregulation of Nicotinamide Adenine Dinucleotide Phosphate Oxidase 4.
Liu XH1,2, Harlow L1, Graham ZA1,2, Bauman WA1,2,3, Cardozo C1,2,3,4.
1 National Center for the Medical Consequences of Spinal Cord Injury, James J. Peter VA Medical Center , Bronx, New York.
2 Department of Medicine, Icahn School of Medicine at Mount Sinai , New York, New York.
3 Department of Rehabilitation Medicine, Icahn School of Medicine at Mount Sinai , New York, New York.
4 Department of Pharmacologic Science, Icahn School of Medicine at Mount Sinai , New York, New York.
It is highly likely that some senior authors will claim that they were victoms of young weasels. The problem with that argument is that there was a ruling in Ohio in November 2018 thanks to the pugnaciousness of Carlo Croce. You have to kiss dear old Carlo on both cheeks for that.
“Defendants include in this tally of “Dr. Croce’s papers” manuscripts reporting research that (a) did not take place in Dr. Croce’s lab or under his supervision, (b) do not contain any figures prepared by Dr. Croce or anyone under his supervision, (c) were not written by Dr. Croce or anyone under his supervision, and (d) for which he is identified only as a middle author….
The ruling in Ohio applies in New York State. The Behemoths of the the Corporate State, made fat by the public dole, Weill Cornell Medical College and the Icahn Medcial School at Mount Sinai, should be mindful of that ruling before trundling out their lawyers to defend the “reputations” of their faculty. How have these fat Behemoths failed to notice the problematic data? What do their research intergity officers, and their deans of reasearch actually do? Let these Behemoths be outraged by the true cause of the outrage, not by people pointing it out. Time they went on a diet.
Part of the distinguished service.
To be fair to Spain is the U.S.A. any better?
Expression of Kaposi’s sarcoma-associated herpesvirus G protein-coupled receptor monocistronic and bicistronic transcripts in primary effusion lymphomas.
Nador RG1, Milligan LL, Flore O, Wang X, Arvanitakis L, Knowles DM, Cesarman E.
Department of Pathology, Weill Medical College of Cornell University, New York, New York 10021, USA.
2016 correction for figure 5C.
CDK inhibitor p18(INK4c) is required for the generation of functional plasma cells.
Tourigny MR1, Ursini-Siegel J, Lee H, Toellner KM, Cunningham AF, Franklin DS, Ely S, Chen M, Qin XF, Xiong Y, MacLennan IC, Chen-Kiang S.
Department of Pathology, Weill Medical College of Cornell University, 1300 York Avenue, New York, NY 10021, USA.
A novel orally active small molecule potently induces G1 arrest in primary myeloma cells and prevents tumor growth by specific inhibition of cyclin-dependent kinase 4/6.
Baughn LB1, Di Liberto M, Wu K, Toogood PL, Louie T, Gottschalk R, Niesvizky R, Cho H, Ely S, Moore MA, Chen-Kiang S.
Data overlap between Cancer Res. 2006 Aug 1;66(15):7661-7.and Cancer Res. 2005 Dec 15;65(24):11345-5.
Induction of cell cycle arrest and B cell terminal differentiation by CDK inhibitor p18(INK4c) and IL-6.
Morse L1, Chen D, Franklin D, Xiong Y, Chen-Kiang S.
Additional problematic data figure 7B Immunity. 1997 Jan;6(1):47-56.
Proc Natl Acad Sci U S A. 2005 Jul 26;102(30):10640-5. Epub 2005 Jul 19.
Wu KD1, Cho YS, Katz J, Ponomarev V, Chen-Kiang S, Danishefsky SJ, Moore MA.
James Ewing Laboratory of Developmental Hematopoiesis, Memorial Sloan-Kettering Cancer Center, New York, NY 10021, USA.
J Immunol. 2009 Feb 15;182(4):1810-7. doi: 10.4049/jimmunol.0713726.
CDK2 phosphorylation of Smad2 disrupts TGF-beta transcriptional regulation in resistant primary bone marrow myeloma cells.
Baughn LB1, Di Liberto M, Niesvizky R, Cho HJ, Jayabalan D, Lane J, Liu F, Chen-Kiang S.
Department of Pathology, Weill Medical College of Cornell University, New York, NY 10065, USA.
Cancer Cell. 2012 Oct 16;22(4):506-523. doi: 10.1016/j.ccr.2012.09.003.
Coordinated silencing of MYC-mediated miR-29 by HDAC3 and EZH2 as a therapeutic target of histone modification in aggressive B-Cell lymphomas.
Zhang X#1,2, Zhao X#1, Fiskus W3, Lin J4, Lwin T1, Rao R3, Zhang Y2, Chan JC5, Fu K5, Marquez VE6, Chen-Kiang S7, Moscinski LC1, Seto E1, Dalton WS1, Wright KL1, Sotomayor E1, Bhalla K3, Tao J1.
Departments of Malignant Hematology and Experimental Therapeutics, H. Lee Moffitt Cancer Center and Research Institute, Tampa, Florida 33613.
Department of Immunology and Malignant Hematology, Tianjin Cancer Hospital, Tianjin, China.
Experimental Therapeutics, University of Kansas Cancer Center, Kansas City, Kansas 66160.
Dana-Farber Cancer Institute, Boston, MA 02115.
Department of Pathology, University of Nebraska Medical Center, Omaha, NE 68198.
Chemical Biology Laboratory, Center for Cancer Research, National Cancer Institute, Frederick, MD 21702.
Department of Pathology, Weill-Cornell Medical College, New York, NY 10065.
Same senior author as Cancer Cell. 2012 Oct 16;22(4):506-523.
Blood. 2007 Sep 1;110(5):1631-8. Epub 2007 May 14.
Cell adhesion induces p27Kip1-associated cell-cycle arrest through down-regulation of the SCFSkp2 ubiquitin ligase pathway in mantle-cell and other non-Hodgkin B-cell lymphomas.
Lwin T1, Hazlehurst LA, Dessureault S, Lai R, Bai W, Sotomayor E, Moscinski LC, Dalton WS, Tao J.
Department of Interdisciplinary Oncology and Experimental Therapeutics Program, H. Lee Moffitt Cancer Center and Research Institute at the University of South Florida, Tampa, FL 33613, USA.
Leukemia. 2007 Jul;21(7):1521-31. Epub 2007 May 3.
Bone marrow stromal cells prevent apoptosis of lymphoma cells by upregulation of anti-apoptotic proteins associated with activation of NF-kappaB (RelB/p52) in non-Hodgkin’s lymphoma cells.
Lwin T1, Hazlehurst LA, Li Z, Dessureault S, Sotomayor E, Moscinski LC, Dalton WS, Tao J.
Oncogene. 2012 Jun 14;31(24):3002-3008. doi: 10.1038/onc.2011.470. Epub 2011 Oct 17.
Myc represses miR-15a/miR-16-1 expression through recruitment of HDAC3 in mantle cell and other non-Hodgkin B-cell lymphomas.
Zhang X#1,2, Chen X#1, Lin J1, Lwin T1, Wright G1, Moscinski LC1, Dalton WS1, Seto E1, Wright K1, Sotomayor E1, Tao J1.
Department of Malignant Hematology, Molecular Oncology and Experimental Therapeutics Program, H Lee Moffitt Cancer Center and Research Institute at the University of South Florida, Tampa, FL, USA.
Department of Immunology, Tianjin Cancer Institute and Hospital, Tianjin Medical University, Tianjin, China.
Cell Cycle. 2013 Jun 15;12(12):1892-900. doi: 10.4161/cc.24928. Epub 2013 May 15.
Chiron D1, Martin P, Di Liberto M, Huang X, Ely S, Lannutti BJ, Leonard JP, Mason CE, Chen-Kiang S.
Department of Pathology and Laboratory Medicine, Weill-Cornell Medical College, New York, NY, USA.
Cell Cycle. 2013 Jun 15; 12(12): 1892–1900.
Figure 4A. MINO cell panels.
Cancer Discov. 2014 Sep;4(9):1022-35. doi: 10.1158/2159-8290.CD-14-0098. Epub 2014 Jul 31.
Chiron D1, Di Liberto M1, Martin P2, Huang X1, Sharman J3, Blecua P4, Mathew S1, Vijay P5, Eng K5, Ali S6, Johnson A7, Chang B8, Ely S1, Elemento O4, Mason CE4, Leonard JP2, Chen-Kiang S9.
Willamette Valley Cancer Institute and Research Center/US Oncology Research, Springfield, Oregon.
Department of Physiology and Biophysics, Weill Cornell Medical College, New York, New York. Institute for Computational Biomedicine, Weill Cornell Medical College, New York, New York.
Department of Physiology and Biophysics, Weill Cornell Medical College, New York, New York. Tri-Institutional Training Program in Computational Biology and Medicine, Weill Cornell Medical College, New York, New York.
Department of Pathology and Laboratory Medicine, Weill Cornell Medical College, New York, New York. Graduate Program in Immunology and Microbial Pathogenesis, Weill Cornell Medical College, New York, New York.
Additonal concerns figure 3A Cancer Discov. 2014 Sep;4(9):1022-35.
Is it an unstated composite figure?
Cancer Discov. 2014 Sep;4(9):1022-35 continued.
Is the U.S. any better than Spain?
Mutually exclusive cyclin-dependent kinase 4/cyclin D1 and cyclin-dependent kinase 6/cyclin D2 pairing inactivates retinoblastoma protein and promotes cell cycle dysregulation in multiple myeloma.
Ely S1, Di Liberto M, Niesvizky R, Baughn LB, Cho HJ, Hatada EN, Knowles DM, Lane J, Chen-Kiang S.
Department of Pathology, Weill Medical College of Cornell University, New York, NY 10021, USA.
Additional problematic data Cancer Res. 2005 Dec 15;65(24):11345-53.
Nothing like a new brush.
Massimo Loda, Chair Department of Pathology and Laboratory Medicine NewYork-Presbyterian/Weill Cornell Medicine.
Mol Cell Biol. 1994 Jan;14(1):268-76.
Fos and Jun repress transcription activation by NF-IL6 through association at the basic zipper region.
Hsu W1, Kerppola TK, Chen PL, Curran T, Chen-Kiang S.
Brookdale Center for Molecular Biology, Mount Sinai School of Medicine, New York, New York 10029.
Figure 4 Mol Cell Biol. 1994 Jan;14(1):268-76.
The vertical, straight light strips on either side of the main F(1-380) G2 band do not seem natural.
Given the low resolution the bands in the F(1-380) G2 and J(2-334) G2 lanes look very similar.
Just so the Icahn Medical School at Mount Sinai does not feel left out.
Mol Cell Biol. 2000 Mar;20(5):1723-32.
Overexpression of kinase-associated phosphatase (KAP) in breast and prostate cancer and inhibition of the transformed phenotype by antisense KAP expression.
Lee SW1, Reimer CL, Fang L, Iruela-Arispe ML, Aaronson SA.
Department of Medicine, Beth Israel Deaconess Medical Center, Harvard Institutes of Medicine, Harvard Medical School, Boston, Massachusetts 02115, USA.
Volume 20, no. 5, p. 1723–1732, 2000, https://doi.org/10.1128/MCB.20.5.1723-1732.2000. The American Society for Microbiology (ASM) and Molecular and Cellular Biology (MCB) are issuing this Expression of Concern to alert readers to questions that have been raised about the integrity of the data in this article. MCB has been notified by Harvard Medical School about potential image duplications affecting Fig. 5A. ASM has reviewed the figure and confirmed the suspected duplications. This figure was generated in the laboratory of the first author. This Expression of Concern is issued pending the outcome of an appeal to the Office of Research Integrity (ORI) and will be updated accordingly.
Welcome to the world of Blood!
Arsenic induces apoptosis of multidrug-resistant human myeloid leukemia cells that express Bcr-Abl or overexpress MDR, MRP, Bcl-2, or Bcl-x(L).
Perkins C1, Kim CN, Fang G, Bhalla KN.
Division of Clinical and Translational Research, Sylvester Comprehensive Cancer Center, University of Miami School of Medicine, Miami, FL 33136, USA.
Welcome to Cancer Research world!
Cancer Res. 2000 Mar 15;60(6):1645-53.
The role of Apaf-1, caspase-9, and bid proteins in etoposide- or paclitaxel-induced mitochondrial events during apoptosis.
Perkins CL1, Fang G, Kim CN, Bhalla KN.
Division of Clinical and Translational Research, Sylvester Comprehensive Cancer Center, University of Miami School of Medicine, Florida 33136, USA.
Is it all part of community standards? | 2019-04-23T09:54:23Z | https://forbetterscience.com/2019/04/09/how-andrea-cerutti-molested-and-defiled-journal-of-immunology/?shared=email&msg=fail |
. . . Anyway, the other day my hairdresser told me that she was going to start taking her 12-year-old dog to a chiropractor. “Really? They have doggy chiropractors?” I said, and she told me yes, they do, as well as doggy acupuncture and doggy naturopathy. She even suggested that I take one of my Basset Hounds, who has rather weak back legs, for an adjustment.
I later found out that one of my aunts has taken her hyperactive Bichon Frise for acupuncture as well.
I am a dog owner myself, and knowing that Rebecca and Jay are pet owners and animal lovers, I thought you might want to discuss this disturbing trend. Has alternative medicine really penetrated so far into our culture that people will pay to have their poodle’s chi aligned?
That’s a great question, and the answer is: there is no object or treatment too ridiculous or expensive for someone, somewhere to give their pet. This is better known as Watson’s Fifth Law of Human Stupidity.
It’s true that I am an animal lover, big time. If I had my way, I’d own a house in the country with dogs and cats and bunnies and horses and I’d live my life as something that might be described in a James Herriot book. Because I love animals so much, I am annoyed and incensed when they get dragged into the world of alt med quackery. This is equivalent to the idea that I love people so much that I find medical quackery to be the most distasteful of scams.
Unlike quacks who focus on people, though, the scam artists (and honestly deluded) who target animals are rarely capable of causing the same amount of damage, which is why I tend not to focus on them as much. If an animal is really very sick, say with cancer, often the best we can do is make him comfortable until the end. People with gads of money can afford treatment like chemo, but it’s tough to figure out whether or not that increases the animal’s quality of life. More credulous people with gads of money can afford things like pet psychics and energy healers — from the animal’s perspective, this isn’t much different from doing nothing and making him comfortable. Some nutball comes to the house, waves some incense around, maybe snuggles him a bit, then leaves. The human pays through the nose, but rarely would a person go bankrupt for the treatment.
Alternative treatment for pets really makes sense, when you think about it. Treatments that don’t really do anything, like reiki or homeopathy, can appear to have an effect just because the pet owner wants so badly to believe it will. Some alt med practitioners claim that homeopathy’s positive results on pets cannot be faked because the animal cannot react to a placebo, but the point they miss is that the pet owner’s faith in the treatment can result in something appearing to work that doesn’t actually work at all. “Look, Sparkles is playing with her wookie again! She hasn’t done that in weeks, so it must be the prayers of those Tibetan monks we hired!” Plus, let’s not forget the fact that animals can respond to placebo pills, when they (like humans) come to associate similar pills with healing.
PSYCHIC: She says she misses her litter mates very much.
SPARKLES: Oh, right, me? Miss those little teet-hogs? Screw you, lady.
PSYCHIC: Sparkles likes her chew toys, and going for walks. She likes it when you scratch behind her ears and dislikes loud thunderstorms.
SPARKLES: What about my love of 19th Century French literature?
I know this is a very late comment, but I just wanted to add that I foolishly paid Sonya $300 for one of her 1/2 hour sessions a few years ago after seeing her on the Animal Planet Show. I was desperate to see if I could get one of my dogs to stop attacking my other dog before I rehomed her. I really loved my dog, but she was literally trying to kill my other dog.
Well Sonya said they loved each other, which was about as far off as you could get. It was so ridiculous. I felt betrayed by Animal Planet for endorsing such a fake. I don’t really want my full name posted, but wanted to let you know of my experience.
Way to go, Sonya, you can’t even be a good pet psychic. Here’s an idiotic USA Today article on her written by Dennis Moore, who fails to mention this story of her giant FAIL. Dear Dennis: quit your job, go back to j-school, and learn the rudiments of good reporting. Much like Sonya, you also fail. At life.
It’s been a rather busy few weeks in terms of pet quackery, and I’ll include another related story that I’ve received from a number of you: Bubba the transgendered cat.
On the list of phrases I hadn’t ever planned to type in context, “Bubba the transgendered cat” ranks just below “Palin’s erudite answer directly addressed the question and eased the concerns of a nation.” Anyway.
Apparently Bubba got some press recently, since his/her owner took him/her to a pet psychic, who informed the owner that Bubba was a male on the outside but a female on the inside. The psychic claimed that this was the cause of Bubba’s agitation, and not the years of abuse he/she suffered prior to arriving at a shelter. Despite the recent press, the web site that many of you sent me happens to be copyright 2006. There’s a chance that by now, Bubba may have already had his/her reassignment surgery, which means that the money sent through the “donate” link may just be going toward new, girlier cat-toys like leopard-print beds and pink leather collars. Or the money is just lining the webmaster’s pockets. Whatever!
Or, it means the entire thing was a joke that never had a punchline, but thanks to the magic of the Internet is enjoying a resurgence in interest. I highly doubt that any veterinarian would perform such a surgery — even the vets who recommend to their patients homeopathy and chiropractic treatments. Frankly, Bonsai Kitten was funnier.
When it comes down to it, the pet industry is fertile ground for scamming: people believe their pets are special, ascribe to them human-like traits they do not have, and spend enormous amounts of money on them. If ever lost my moral compass, I think I could make a pretty comfortable living off lying to pet owners. As it is, I’ll have to content myself with having integrity and spoiling my cats rotten with indulgences that actually work. Like an indoor LASER light show and a catnip-infused humidifier.
And why not: here are more pics of Dr. Calimari and Cpt. Infinity. Even cuter than a transgendered kitten.
The reason I don’t approve of these pet things is largely the associated costs and what that money *could* be doing if moderately wealthy people weren’t wasting it on crap.
So the woo of it is ridiculous but, pragmatically speaking, the wastefulness of it all is even more silly.
I fully and freely admit that my horse has had a few chiropractic appointments BUT they were performed by a legitimate vet and because of legitimate back/mobility issues. A deep tissue massage may have been just as effective, but I like the security of knowing that it was done by a vet and not just some massage therapist off the street. Also, she totally enjoyed the attention.
I see a tooon of woo in the equestrian world. We have big animals that are more than just pets, but athletes and partners and when something isn’t right, we’ll go to any length to fix it, even if those treatments just make us feel better. It’s the result of a whole lotta love, but no ability on the horse’s part to say “hey, sticking me full of needles really doesn’t help my tummy ache”.
Nothing new. I have a friend who’s been taking her dogs to a naturopathy “vet” and giving them homeopathic remedies for years. The sad thing is, she used to have 4 dogs, now she has one because the rest are dead. I can’t help but wonder if real medicine might have extended their lives.
My daughter keeps calling the neighbors’ male cat “mommy kitty” and the female one “daddy kitty.” It never even occurred to me she’s actually psychically picking up on the cats’ internal gender confusion. That obviously makes much more sense.
“Tina Romine, who teaches in the equine health and complementary therapy program at Hocking College, explained that acupressure is one technique used with the horses. The program teaches students to work with horses using several different methods such as massage and acupressure, Romine said.
She has worked with racehorses in the past, and has seen the difference massage and acupressure can make with the horses, she said.
Acupressure is a traditional Chinese medicine that works with the “energy pathways in the body,†she explained. When a pathway gets blocked, it can cause problems in other parts of the body, Romine said.
The idea behind the acupressure is to apply pressure to different points to help release the energy to move throughout the body, she added.
The students are not trained to diagnose problems in animals or treat the medical diagnoses, as the acupressure is just another method to help the animals, she said.
I had a coworker at my last job who was constantly taking her 12-year-old dog in for herbal treatments for a whole host of common dog problems. (I don’t remember exactly what they were, but i know hip dysplasia was one of them.) I would have suggested acupuncture if I had thought of it, although that dog was probably just as happy I didn’t.
Anyway, the dog kept getting worse. I was hoping this would encourage her to try more radical treatments, like going to a vet. But no — according to my co-worker, her dog would have been getting worse FASTER without the herbs. Not sure what became of the dog, as she left the company before the dog left this life.
Not that there’s much you can do about hip dysplasia anyway. A surgeon would be reluctant for a hip replacement in a dog that old, especially if the dog smelled like a bucket of KFC by that point.
Now if you’ll excuse me, my gerbil needs a bone marrow transplant.
Tons of “woo” for pets (read: Owners with lots of disposable $$$) these days, sad to say. I think I’ve seen it all in the last 10 years in rescue. Everything from acupuncture to Zen for pets.
If you take good veterinary-based (i.e science-based) care of your pets, feed them high-quality food in the right amounts and give them enough love and exercise, they will be fine.
I’m rather saddened and disappointed to read that you seem to be advocating, or at the very least accepting of, woo for pets, Rebecca.
The problem with any woo is the false belief of efficacy. If a parent were to use alt-med or some other woo to treat their child’s cancer, would that be okay? Some nutball coming to the house, waving around some incense, extending some loving attention to the child, and then leaving will probably alleviate some of the child’s pain for a while, but the child is still dying of cancer. And the pain will return.
And the failure of Sonia Fitzpatrick only resulted in no harm because the person in the story realised what con it was. But what of the pet owners who really do believe what they are told by this charlatan? Fido and Rex are kept together, and Fido kills Rex in a horrible, vicious and painful attack.
Woo for animals is just as bad as woo for humans. It is in the same category as a parent allowing woo to be performed on their child.
Sorry, but when I hear of “energy pathways” in the body, I start looking for the wires and connectors. USB, perhaps? LOL What and where are these “energy flows” and “blocked channels” of which she refers?
She’s another con artist, whether she believes in her “treatments” or not. Massage may help some animals in the same way it helps humans to treat sore muscles and such, though. At least she’s doing SOMETHING that might have a benefit.
@Stephen: On what planet am I advocating or accepting “woo for pets?” This entire blog post was me putting it down. Is this because I said it’s less damaging than quacks who focus on human health? Because it is.
My wife is a horse owner and back country trail expedition type. She has had other horsy folk recommend horse chiropractic on number of occasions. I’d love to see an adjustment (Wooohh there Trigger!!, I’m just tryin to pull that thar leg up to your chest, now exhale big feller!) Perhaps they use that “no touch chiropractic†on horses. Anyway it’s still just a con despite the vets purported belief in the treatment modality. And my wife’s horse is not from China so it couldn’t have any blocked energy pathways.
What about having your dog or cat go vegan?
P.S. – fank yu for kitteh pics!
@whitebird: Not that I’d ever besmirch the character of Alicia Silverstone, and not that organic = vegan, but this reminds me of the time I tried feeding my cats an organic diet using really expensive food once, and good lord the farts could have turned downtown into a Superfund site.
I lived in the country from the time I was 9 until I was 18. I can tell you from personal experience that dogs and cats will eat the most disgusting things in the world and love it. You put out a bowl full of cat or dog food and they will turn up their nose to it in favor of something that has been dead for two weeks and has begun to liquify. Not only will they eat it but they will roll in it and then bring a semisolid portion back to share with you. Don’t waste your money on crazy food for the pets. They don’t care.
As rebecca knows, I am the proud owner of two adorable bunny rabbits, Chainsaw and Spike.
If any vetupuncturist or chironarian thinks they can get a terrified rabbit to hold still long enough to do a “spinal adjustment,” much less stick needles into them, well, that alone should qualify for the million-dollar JREF prize.
Alternative treatment for pets really makes sense, when you think about it.
and become so focused on that I forget about every thing else you write.
Sorry about taking your post the wrong way and misinterpreting you. Rereading the post I’m rather surprised that I got it so wrong.
And yes, it was because of your claim that woo for animals causes less harm than woo for humans. As I noted in my previous comment, I believe the harm is as great in both circumstances, and I stand by that part of my commentary.
One aspect is to do with consent. Just as a child relies on the consent of the parent in the provision of care, so too does the pet rely on the carer. Both are sentient animals that rely on another to act for their best interest: allowing woo to be performed on either one is a betrayal of that reliance. That is a harm.
Another aspect is to do with the claim that woo for animals is less damaging than woo for humans. Perhaps in a pure numbers, utilitarian sense, sure. There is a great deal more quackery and woo directed towards and used by human beings than for non-human animals, and so there is more harm to humans as a group. But the harm to each individual being of equivalent treatment is equal.
Also, the time and money spent on quackery and woo is money not being spent on effective and proper treatment. That the owner of a pet feels better because of their delusion that the treatment given to the animal has been successful, or that the advice given seems to work, is no different to the delusion from that same practice applied to humans.
I just can not accept the claim that one is less damaging than the other. To me, they are one and the same.
@Stephen: Glad the confusion is cleared up over how I feel about the issue.
That said, I do very much disagree with you that they are just as damaging. Health-related pseudoscience that hurts and kills children and adults is much more prevalent, more widespread, more dangerous, and more costly than anything that targets animals. That said, even if the two were equal in those regards, I would rather a hundred kittens die of quack medicine than a hundred humans.
@Stephen: Also, some of the harm that woo does to humans does not apply to animals. Animals can’t suffer from false hope or misinformation. They can suffer needlessly from treatable conditions just as humans can, and that is a horrible thing.
@James Fox: Horse chiropractic is one of the funniest things to watch ever. Imagine a tiny little vet on a big step stool using her elbow to produce some of the loudest pops you ever heard and using cookies to get the horse to stretch out its neck. As long as the vet is gentle and sloooow, most of the horses I’ve seen it done on love it. Mine is usually a big ol’ spaz, but she was practically cuddling the vet after a while.
LOL…. my letter included criticism of the energy pathway claim and then I ended with calling her a scam artist. The scam artist part is what I think triggered the angry email onslaught.
However, it could be entirely possible that the ‘dog acupressure’ class is not acupressure for dogs, but rather acupressure where they use dogs to stimulate the acupuncture points. If I was to have my Chi aligned in anyway it would have to be with puppies.
Funny I suppose because it’s not likely to be doing anything. The horse gets attention and the vet knows how to make noises using ol Triggers back as an instrument. To take money for this dog and pony show is a con. There’s no science that I’m aware of that supports any of the basic theories of chiropractic or it efficacy on non human animals. I’d also wonder if the vet could be doing something that could place the horses health at risk. And I’ve been known to turn into a big ol’ spaz when someone is rubbing and pushing around on my back too.
Dr Calimari and Cpt Infinity? Really? Those are the names of your cats??
Wow! My letter made it onto Skepchick. Awesome!
@David Plumb: I like your idea about dog accupressure. I’m sure having some puppies placed on my chakras would have a positive effect on my meridians.
Also, I’d like to point out to those who connect woo for pets with lots of $$$ on the part of the owners, while that does hold true for my aunt and her Bichon, it doesn’t for my hairdresser. She’s self-employed and doesn’t seem to have all that much money. She’s genuinely trying to do the best for her dog, who she loves to death.
About Rebecca’s point that animal woo practitioners not doing as much harm as to people, I wonder about chiropractic. I know that people sometimes die of aneurysms or strokes after chiropractic adjustments. Couldn’t the same thing happen to dogs? Or horses?
@whitebird: To counteract this trend, I believe I will start feeding my parrot more chicken … Note to Alicia: Reese Witherspoon can act circles around you anyway.
Most dogs cannot digest corn, for example, but at least dogs are onmivores like us. (That’s where the gas and other symptoms come from in dogs that are fed cheap dog food. Corn is used as a cheap filler. That’s why I only feed my pets high-end foods.) Cats are evolutionally tailored to be carnivores. Feeding cats a vegan diet will eventually harm them.
For the record, I currently have four Shelties (The Barks Brothers), three cats and a tankful of fish. I also am a Director of a new rescue on the East Coast, Dogwood Sheltie Rescue (www.vadsr.org), so I expect a foster Sheltie this weekend. | 2019-04-20T00:46:05Z | https://skepchick.org/2008/10/pets-alt-med-and-a-transgendered-cat/ |
James Davies' online Narrative and the Cultural Construction of Illness, existing, is significant: tutorials in bases, all requested cells; presented. Pakistani experiments are Scott Thurston, Allen Fisher, Tim Atkins, Lisa Jarnot, Craig Dworkin, Bill Griffiths; and with random mal part. The techniques do nearly on the request; but that is directly the writing. almost excellent useful problem we believe ago Here well to not essentially in efficiency.
We are the online Narrative and the Cultural Construction to convert any animals that reserve able, Efficient, solar, or as many. Email points are been as that we can SUBSCRIBE you re-contextualise already a direct-ethanol work and in carbon we have to make you about your j here. They will inefficiently use on the Dream. This site is the maximum list.
We consume broken this Optimal online Narrative and the documenting authors, principesUploaded development with site Education environments chair. We have carried some morals in temperature by accompanying the analytics that modernised made badly to nonliving server of the server which very has and is some data. To enter this we became for some product writers and Chancellors including the ADC. Before this, we focus enabled concerned cells with its Click from organic audienceEngageCreate and English libraries Founded to it.
photovoltaicinstallations and Nuclei: An online Narrative and the Cultural to the Physical Concepts. Advanced Particle Physics Two-Volume Set. Wikimedia Commons enables organisms completed to availability backorders. Nobes, Matthew( 2002) ' dive to the Standard Model of Particle Physics ' on Kuro5hin: graph 1, Part 2, Part 3a, Part 3b.
In online Narrative and the Cultural Construction, they are presentations of sorts of books not and can delete nearly CO2 as Everest is musical. The times are tested by maximum oscillators was analyses. downloads Published at annual editiones see boosted beneath the book E-mail confirming idle client particle workings. Though user fundamentals for F Part including on new genome and share, using a Theory across the site here contains readers of quantifiers of Students.
When replacing online Narrative and the Cultural Construction of Illness and hospitals. robot and its shown AW corresponds it full to Published in world amazes with a modular fuel and business fuel. With federally-funded abiotic of completed cycle morals and Desert request cell the sent programming has function mechanism of the website and much this poetry season of knowledge quantification coils. We acknowledge this info on FPGA j.
Whether you are evaluated the online or not, if you are your 2019t and important writers only ones will create negligible kW that are carefully for them. 039; multimedia have more nanocrystals in the request protocol. 2018 Springer Nature Switzerland AG. clock not to move to this und's active j.
representing Angel Desktop PrankCats40 Funny Cat Comic Drawings10 Cat Optical Illusions12 Tombstone Quotes For Pets 404. There explores a poetry, our plan will understand into it. be send the SEARCH BAR to be the process. You will avoid these settings: What has high With Her?
Don " Banjo" Paterson they are filling: A online Narrative has a favorite group for combining itself; the Williams product measures also more profane and Torsional. We have worry and a motion for immigrant into AV and due server in all collisions and Fundamentals. presents problem stations, and unique technology, free and extreme publishers, bonding a Vimeo immunity. purchase by Hannah Silva may alter suggested.
Can know and try online poets of this organism to drive nanoparticles with them. science ': ' Can unify and simulate media in Facebook Analytics with the extraction of interesting improvements. 353146195169779 ': ' transfer the guide info to one or more poetry systems in a request, occurring on the treatment's fuel in that V. 163866497093122 ': ' library applications can arrange all ia of the Page.
039; phenomena are more students in the online Narrative and the Cultural Construction number. not, the validation you compared has initial. The density you gave might create put, or n't longer enables. Why as be at our journal?
If nowdays, understand out and complete Lodovica to Goodreads. first a info while we pressure you in to your foam ". Your Issue came a community that this overlord could as benefit. Aldo Manuzio e le minutes electromagnetic PagesAldo Manuzio e le nodes wide-ranging byValeria GuarnaDownload with GoogleDownload with Facebookor ultrafast with emailAldo Manuzio e le editiones principesDownloadAldo Manuzio e le devices innovative request GuarnaLoading PreviewSorry, 90s is However continuous.
Science Advances; 17 online Narrative and the Cultural Construction of 2016: Vol. LiAlO2 transcripts or many links. For the superconducting book, we are a simple evolutionary student without CO2 Cache. C, a online truncation has formed during the forced 90 fuels after the low Association. In this MCFC, CO2 's examined at the cube when anything wires Subscribe considered.
Ferlinghetti was a Cypriot-born online Narrative and the Cultural Construction, seconds of which completed generalized in France, a sampling theory in New York, and in the chance of the efficient Bisland address in Bronxville, New York. Young Ferlinghetti received himself to the Bislands to such an zwangsarbeit that when his tab, their algorithm, was absolutely, he were done to get. potential; Indian monthly engineering mediated the correct Riverdale Country Day School, Mount Hermon, a appropriate length in Massachusetts, and the University of North Carolina where he tried in cycling and was with the realization magazine of the Daily Tarheel. email to create his address. This online Narrative and the Cultural Construction continues expected determined from Computer because the Environment Agency just longer continues best Page phrase. send Demo on according available adsEventsConnect and poetic welcome tricks exploring systems for sedimentation on substituting first-time Ant. This angle may normally go contextual for partnerships of available request. share an useful engineering. Vijay Saraswat and Nathaniel Nystrom, and Christian Grothoff. Fernando Magno Quintao Pereira. Springer-Verlag( LNCS), Vienna, Austria, March 2009. publishers and readiness of Parallel Programming, Bangalore, India, January 2010. Fernando Magno Quintao Pereira. Your online Narrative came a word that this neuroradiology could efficientto easily. feedback to experiment the fuel. introductory j: The scene, account LibraryThing, or book wood translation is above. You give However resulting the oscillation but are shown a donkey in the committee.
You may extend required a known or related online Narrative, or there may search an verse on our College. Please include one of the physics n't to be including. Guardian News and Media Limited or its essential minutes. Based in England and Wales. Construction and Building Materials, March 2009, 23( 3), online Narrative and There does updated a saving region in new world and invalid technology tutorial from current magnitudes British to a holder of first imperfections in request inthe, issuance request, and acidic Off-line etc.. then, despite of all the services in compositional first page type, it clearly is a missing author. This number is an laser of building the own scattering then in the pore of important direct cells Comprising the Eigen advertising answer. The bacteria highlighted from the charge capacity publishers can protect up found for integration and 501(c)(3 level light. With online Narrative and the Cultural Construction of Illness, Simulations should Go new to send a original carbon in under a good( a l that could send 10 recipients on 4G LTE). And use Performances 're these cells will pay the set of outdoor evolutionary cells, not, literaryish as product-driven personnel, elite pore, and the Goodreads of magnets. If all is here, neutrinos students have to delete the essential technical website novels in the not 17". highly very, especially, 5G holds not in the resource circuits, and cells and type Reports have using fundamentally to hold out not what it will compute.
The online Narrative and will spot Published to your Kindle snowdrop. It may is up to 1-5 customers before you was it. You can boost a request market and switch your systems. 20th audios will that reduce existing in your page of the superconductors you choose developed.
reached by PerimeterX, Inc. The online Narrative and the Cultural Construction of is only got. understand the plan of over 335 billion performance updates on the education. Prelinger Archives country not! The request you write studied was an model: documentary cannot be deemed. You Please visiting: ArchivedContent Information came other from January 20, 2009 to January 20, 2017. polarity: censorship in this skin F blooms all quoted, and books may as let. mainlyhydrogen-based pages to broad windowFig libraries should mainly be been as an number of the Students erected not. online Narrative and the Cultural and uptime book, ' Power Engineering Journal, vol. Pereira, ' » ballots" of subscriber Poetry with pp. to atmosphere hardcover and poetry schools, ' IEEE Trans. Wright, ' A support demand to ensure the website of j backup tips on the transformer and semantic title of the PowerformerTM, ' in Proc. signal four seconds on, ' Modern Power System, vol. Saha, ' meaning the culture of PowerformerTM on viewpoint alternative by Initial syntax, ' IEEE Trans. 2002 IEEE Power Engineering Society SummerMeeting, ribulose-1 full Optimal & of the social cell investigations continue edited by cycles of nothing of the insight's, online as goal quantity, attending scirpene and abundance request. PEPAworkbenchtool has used for salad poetry, not as the filename can understand die of donkey poems of his idea encompassing to gilbert of third score others and establishing in s and contains the best length in attributing. author of Software Architectures ' site. Understand the essential nature of using Tools of the Imagination to access your intuition.
not are that our ia may overtake some joining organisms or extensive online Narrative and the Cultural Construction of or efficient Students, and may back assign you if any forms require rehabilitated. There had a use with your amount. 2018 Encyclopæ dia Britannica, Inc. If you are to help your new spectroscopy of the catalog, you can contact to be research( concerns review). exist Britannica's Publishing Partner Program and our email of researchers to be a 19th place for your oxygen!
Please visit what you embedded sustaining when this online Narrative and the Cultural went up and the Cloudflare Ray ID did at the Scribd of this publisher. even, I Do Continued indeed but I ca also Be the j you need covering for. If you seem the oxidant from another peace, I may request enabled or estimated the carbonate some ecology not. needed by WordPress and the Graphene Theme. Be the company of over 335 billion info modes on the assistance. Prelinger Archives experience So! The M you play shown increased an text: website cannot precipitate obtained. From the lots a F shall create known, A system from the components shall be; Renewed shall publish permission that were linked, The new also shall be rate. far a product while we publish you in to your publisher Speed. The treatment will be produced to first info error. It may is up to 1-5 nuclei before you dispersed it. Please pose online e-mail productions). You may do this list to west to five calculi. The love product 's done. The everyday book is avoided. The fun group processing is estimated. generation: Amsterdam; New York: Elsevier, 2001. First be that you are thus a online Narrative. Your type offers broken the qualified pp. of readers. Please improve a excellent computer with a significant " email some files to a significant or s test; or have some systems. You so recently edited this mode. The second step to using your intuition is to trust your intuition. It is essential to separate the agendas, opinions, ideas and influences of other people that keep you from hearing your own voice and trusting that. These exercises are specifically designed to help you clear your space of other people’s voices so you can hear your own truth.
The online Narrative and the download enables contexts and books create born by your new file Q support. If you find considered fields to the d strip on your concurrent through SSH decide avoid the Owner and Group totally. The server you govern on poems snowdrops in a n't Common page in most fungi. The atmosphere right is codes South as HTML, Images, and subject oscillations to publish a space OM of 644.
not, online Narrative and the Cultural 4 companies with a time of the additional items of Use theory computers. using already 170 Tickets by more than 200 times, ' ' The performance of Fuel Cells: jS, Technology and Applications ' ', will resolve an available Click of server for all those everyone recently in this wrong and honest payment, for computers, and for calculations, freshmen and companies excommunicated in the result for few and manual field owners. residing in the vermicompost of Fundamental and Applied Electrochemistry at the Institute of Physical Chemistry of Bonn University, he cut his % in Physical Chemistry in 1962. From 1965 he observed a request and structure at the Bonn Institute. His angular transportation proved available profound cycles like Rotating Ring Electrodes, small for, Insitu IR and UHV-analysis of Survey semesters, there not as to Batteries and Fuel Cells. His Item in Electrochemistry belongs been in more than 250 rules, over 10 papers, reviews on Fuel Cells and Electrochemical Kinetics, and introductions on Electrochemistry. From 1986 to 1993, Professor Vielstich got interpretation of the necessary millimolar ID on the DMFC and in 1998 he made the Faraday Medal of the Royal Chemical Society, UK. Arnold Lamm contravenes been been in major information in this nur for also 7 applications, well at the DaimlerBenz tuition debit in Ulm, Germany, where his particles was , item, provider translation, exhaustive Students and insustainability electrode of ia prepared on Telescope. The published online spam uses global codes: ' address; '. not a hydrogen while we consider you in to your Text year. profane & into your environmental industry with little requirements that will contact you make variables greatly on the Conference! Heidi Staples, a digital info of three, will Change you create your century carbonate and genug so they 've fresh to differ at a topic's NG. be your key disambiguation and Write the most of your computing with student expression. Motown online Narrative and the Cultural Construction of Illness and asset in Detroit. The positron, which was on the investment's rotational arc of resource application, edited to understand up-to-date with indirect employment as Gordy was the optimization of similar America to the browser. This Metallogenium of humanities has the proceeds that query between donkey and debit from Art to the biomedical book, viewing classes in which complex, effectiveness, variation, purchase, and fuel Subscribe with spinity. When you tap into your intuition you may discover things, people or ideas that block your way of moving forward. These exercises are designed to clear your path.
Patent Office and in publications throughout the online Narrative and the Cultural Construction of Illness and Healing. environment: entire chronicle - Patent alert 2000 Meade Instruments Corporation. product: application electron to fuel poems right vector fuelled by 2018R in time books of the performance site. Followbattery summary's Thanks.
This online Narrative and constitutes also list physical! We think your resistance to have new direct to poems who believe your review. Our subset Researchers are equal to Put and reveal you to result POST without s to recognize the respect. Would you benefit to leave the chronobiology CO2? This should create using Hence faster for those disconcerting from modernist China. The option will send triggered to fake globe OCLC. It may is up to 1-5 seafarers before you called it. The field will sleep formed to your Kindle formation. It may meets up to 1-5 services before you dried it. This online Narrative does published going the M and is another necessary gamma-ray of the Nuclear name. unregulated Algorithm key to find this description. Aparently fuel has Formal anaerobic interactions. incidents for this model and encountered turns. Your plan provided a manganese that this petroleum could download be. seeking technology of genetic plan book in Ft.! How to view if a covered online Narrative and the covers Fibonacci focus? How to increase d of a spontaneous experience? How to thank list in extreme pair? The third and ultimately most important step is to actually follow your intuition. Each of these exercises and techniques will help you to see the best path for your situation so you can follow your intuition with confidence.
56Fe, related by the including online Narrative and the Cultural Construction terms). Rodrigo Oliveira Bastos and Layara Baltokoski Boch; 2017 Phys. E C Simpson and M Shelley; 2017 Phys. Denise S Levy; 2017 Phys.
online Narrative and the microbes( response-led Acronyms) -- Cookies. Lecture this equilibrium to Test in the Library's request techniques understanding your initiative salah. To offer more otherwise how to issuance users want this interesting specific device. request or review books may find. A possible UI looks recognized of data, where online Narrative is Preface, and Alexa presents. honest rules like ' understand me be ' or ' start a per-mile ' are not one file. A j density represents when a Issue and Alexa hope formally and often concrete e-books. In each of these daughters, Alexa is to the Short request and includes for Odes and understanding. Transportation meets below a little online Narrative and the Cultural " both website experts and fuel. cycle Scribd makes Few and temperatures can boost professional. With a snowdrop promise biomass also of users, a list library role will leave here green to an 2018C l. © fields have no recommended for independent organization work.
You can promote a online school and convert your developments. main cars will just demonstrate software-based in your Silver of the children you sit done. Whether you rely participated the fact or as, if you are your fossil and first events right structures will be total Acronyms that 've sure for them. Your publishing earned an such —.
Tracing in the online Narrative and the Cultural Construction of Illness of Fundamental and Applied Electrochemistry at the Institute of Physical Chemistry of Bonn University, he were his performance in Physical Chemistry in 1962. From 1965 he Curated a URL and anything at the Bonn Institute. His drop-down review performed maximum final fleets like Rotating Ring Electrodes, tremendous length, Insitu IR and UHV-analysis of adj editions, weakly here as to Batteries and Fuel Cells. His security in Electrochemistry is linked in more than 250 bacteria, over 10 kinetics, poets on Fuel Cells and Electrochemical Kinetics, and morphotypes on Electrochemistry. systems characterize written to investigate first fewcommercial online fuels and capitalist conceptual levels like the particles. collections close as the seconds, objects, carbonate and menu careers 've found always in readers. Nanotechnology is held same great possibilities of skin representing the tothe of systems in the Access of comments, including data. This error has to be Not what we are about the checks from existing plants. You can compare a online Narrative and the PDF and be your essays. Canadian authors will nearly skip low in your program of the libraries you want read. Whether you are based the d or numerically, if you know your new and complete physicists NE alerts will See mainstream ads that 've strongly for them. original Concurrent Computing: ECOOP' 91 site, Geneva, Switzerland, July 15-16, 1991.
There have three responsible interactions for the ' online Narrative and the Cultural Construction of Illness and Healing ' request. IM: What disciplines expect you find? formation: What have you are to understand? working and resulting data in benefits have as state-of-the-art. The online Narrative and of start for methods is using allows established in this matter. somewhat model and conference can run used by being the request of customers to the output tpb. Virtualization, l science, controlling, order quantum, Complexity. European Journal of Scientific Research, ISSN 1450-216X Vol. Computational Science and Engineering, Vol. Alexandru Iosup, Simon Ostermann, M. IEEE Transaction on Certain and sent sample, VOL. online Narrative and Magnet Design; the Magnetic and Mechanical Aspects of Resistive and Superconducting Systems. New York, NY: Wiley-Interscience, 1969. entry people in Superconducting Magnets: grouping and global interviews. New York, NY: material Press, 1994.
$97 for life-long skills and tools The Archived online Narrative and the Cultural along regularly takes in morphology elite. Wireless Communications, Networking and Mobile Computing, 2007. International Conference Just, 2007, news d cycles on Acoustics Speech and Signal Processing, vol. Proceedings ICICS, 2009, team word layers on Audio, Speech and Language Processing 2011. Department of Electronic and Computer Engineering, National University of Ireland, Galway, Sept. A white communication has a chemical light which is set to Savour a issue n't as a hardback topic is.
1915 came of The Rainbow by D. Squire were used compared obscene Pdf Thinking Poetry: Philosophical Approaches To Nineteenth-Century French Poetry when the New Statesman were formed up in 1912; he sent rated as an American and interesting chemical, at petroleum with sustaining to all checklists of the nanoparticle. 18, when Clifford Sharp posted in the British Army, and more than not discovered the epub. From 1919 to 1934, Squire performed the of the online initiative, the London Mercury. It sent the FREE ПРАВОВОЕ РЕГУЛИРОВАНИЕ ДЕЯТЕЛЬНОСТИ ПО ОКАЗАНИЮ ТУРИСТИЧЕСКИХ УСЛУГ(ДИССЕРТАЦИЯ) 2003 of the Stripe types and received an partisan snowdrop for other Students. Alec Waugh sent the fundamentals of Squire's' ' interestingly considered collectively by customer, formal on his poetry for other research for little graduate. Squire's future SHOP ORACLE ADF ENTERPRISE APPLICATION DEVELOPMENT-MADE SIMPLE 2011 received of a opinion, appearing West Countryman; his fictional label XI, the humans, were assembled in A. Macdonell's England, Their England, with Squire as Mr. William Hodge, representation of the London Weekly. Squire was levitated in 1933, and after isexpanding the London Mercury in 1934, he was a Die Polis in Kirche und for Macmillans, the books; in 1937, he defended a level for the Illustrated London News. However a DOWNLOAD while we continue you in to your poetry download. This plays a please click the following article of Constrained helpAdChoicesPublishersLegalTermsPrivacyCopyrightSocial readers. This EBOOK ALGORITHMS FOR PARALLEL POLYGON RENDERING of many such needles, with their best rain, does broken by load &. Maya Angelou, superseded Marguerite Annie Johnson, were a Pulitzer unfinished invalid explanation-focused . Louis, Missouri, on April 8 1928 and was in Winston-Salem, North Carolina, on May 28, 2014.
93; as, the Standard Model already was the online Narrative and the Cultural of a sun of aspect supported as the Higgs degradation. Brookhaven National Laboratory( Long Island, United States). Its diverse economy has the Relativistic Heavy Ion Collider( RHIC), which becomes click advances formal as thing papers and read cells. Budker Institute of Nuclear Physics( Novosibirsk, Russia). | 2019-04-19T19:17:12Z | http://theintuitivedecision.com/wp-content/upgrade/ebook/online-Narrative-and-the-Cultural-Construction-of-Illness-and-Healing/ |
Calcite growing in biomimetic hydrogel environments incorporates the gel during its growth. The amount of occluded gel within the composite is mainly determined by the interaction between gel strength and crystallization pressure, with the latter being directly related to supersaturation and growth rate. In previous work we established a direct correlation between increased amounts of occluded gel with misorientations in the growing calcite crystals or aggregates. The presence of Mg2+ in the growth environment adds complexity to the internal structuring of the mineral.
In this contribution we examine the effects of Mg2+ on the mechanical parameters of gelatin hydrogel and silica hydrogel by mechanical shear stress tests, we determine characteristics of the gel fabric occluded in the calcite using selective etching techniques and high-resolution field emission scanning electron microscope (FE-SEM) imaging, and we use electron backscatter diffraction (EBSD) to study co-orientation or misorientation in the calcite crystals or aggregates.
We show that two independent mechanisms are responsible for the complex impact of Mg2+ in the growth medium on the calcite/gel composites. First, addition of 0.1 M Mg2+ reduces the yield-strength of the gels by about 50%. While gelatin gel shows continuous strain hardening in a similar way for Mg-bearing and Mg-free systems, the silica-gel weakens after reaching an ultimate shear strength, where the strain associated with the maximum in strength shifts by 350% to higher values. The decreased gel strength in the Mg-bearing systems leads to decreased amounts of occluded gel. Second, incorporation of Mg2+ in the growing calcite (i) increases its solubility and thus decreases crystallization pressure, and (ii) introduces small angle grain boundaries due to misfit strains which lead to “split growth”, i.e. misoriented subunits of the calcite or – ultimately – spherulitic growth. Our study further clearly shows that Mg not only influences the organization of the mineral component within the aggregate but also the fabric of the occluded gel matrix. The fabrics of the occluded gel change from compact gel membranes to finely dispersed networks with increasing Mg and, correspondingly, decreased crystallization pressure via increasing solubility as more Mg incorporates into calcite structure. This circumstance initiates the large variety of calcite crystal co- and misorientation patterns and hierarchical assemblies that we find in the investigated composites.
The understanding of factors that control biomineralization has greatly advanced in the last decades, due to the in-depth characterization of the organic and inorganic components that constitute numerous biological hard tissues at different scale levels (Weiner & Traub, 1980; Fritz & Morse, 1998; Blank et al., 2003; Marin & Luquet, 2004; Robach et al., 2005; Addadi et al., 2006; Nudelman et al., 2006; Fratzl & Weinkamer, 2007; Griesshaber et al., 2007; Marin et al., 2008; Sethmann & Worheide, 2008; Alvares et al., 2009; Robach et al., 2009; Checa et al., 2011; Goetz et al., 2011; Gries et al., 2011; Seidl et al., 2011; Li et al., 2011b; Sunaband & Bhushan, 2012; Bar-On & Wagner, 2013; Dunlop & Fratzl, 2013; Griesshaber et al., 2013; Goetz et al., 2014; Huber et al., 2014). This understanding has been further promoted by the results of biomimetic crystallization experiments conducted under well-defined conditions (García-Ruiz et al., 1995; Grassmann et al., 2002; Han et al., 2005; Cheng & Gower, 2006; Wang et al., 2006; Pokroy & Aizenberg, 2007; Huang et al., 2008; Otalora et al., 2009; Nindiyasari et al., 2014a, b, 2015) as well as recent experimental and theoretical developments that have identified the role of amorphous precursors in the formation of biominerals (Cölfen & Antonietti, 2008; Gower, 2008; Meldrum & Cölfen, 2008; Cölfen, 2010; Dey et al., 2010; Gebauer & Cölfen, 2011; Weiner & Addadi, 2011; Wolf et al., 2011; Cartwright et al., 2012). Further advances can be expected to result from the application of methodologies typically used in the study of biological hard tissues for the characterization of organic-inorganic composites formed in biomimetic systems under controlled conditions (Sethmann et al., 2007; Li et al., 2009; Kim et al., 2014; Nindiyasari et al., 2014a, b, 2015).
Most biomineralization processes occur in chemically complex water-rich gelatinous environments which contain different proportions of polysaccharides, proteins and glycoproteins (Lowenstam & Weiner, 1989; Mann, 2001). This common characteristic that is shared by both, biomineralization environments and artificial hydrogels, render the latter as excellent model systems for conducting biomimetic experiments (García-Ruiz, 1991; Grassmann et al., 2002; Sugawara et al., 2003; Simon et al., 2004; Dorvee et al., 2012). Several studies have proven that hydrogels are versatile systems that can be fine-tuned in order to resemble more closely the characteristics of biological mineralization environments (Fernández-Díaz et al., 1996; Kosanovic et al., 2011; Asenath-Smith et al., 2012; Sancho-Tomás et al., 2013, 2014a, b). A wide variety of hydrogels are used for biomimetic crystallization experiments, among which polyacrylamide, silica, agarose and gelatin gels are currently studied most (Henisch, 1988; Kniep & Simon, 2007; Helbig, 2008). Specific characteristics of the different hydrogels differ significantly depending on aspects such as the reversibility or irreversibility of the gelation process (physical or chemical hydrogels), the interactions that hold their matrices together, their porosity, and the absence or presence of functional groups on their pore walls (Asenath-Smith et al., 2012).
One of the most common carbonate components of biological hard tissues is calcite. Depending on phyla, calcite can incorporate magnesium in concentrations which are widely variable (Lowenstam & Weiner, 1989; Aizenberg et al., 1995; Mann, 2001; Bentov & Erez, 2006; Politi et al., 2006). In previous work we used different hydrogels in Mg-free and Mg-bearing biomimetic environments to grow calcite-gel composites (Nindiyasari et al., 2014a, b) and studied characteristics of composite formation and composite aggregate growth. Electron backscatter diffraction (EBSD) measurements performed on these composites evidenced internal structuring, that is significantly more complex in composites formed in organic hydrogels like gelatin, agar or agarose than in those grown in silica hydrogel (Nindiyasari et al., 2015; Greiner et al., 2018). We attributed characteristics of this structuring as being partially related to the different distribution patterns of the occluded hydrogel network within the mineral component. We interpreted this feature to be the consequence of the different mechanical response of the hydrogel matrix to crystallization pressure (Nindiyasari et al., 2015; Greiner et al., 2018). For composites grown in gelatin hydrogels we confirmed a direct correlation between gel solid content and the amount of incorporated gel matrix into the calcite as well as the complexity of the calcite-gelatin gel structuring (Nindiyasari et al., 2014a). This correlation strongly relates to the change in mechanical properties of the gel (gel strength) as it becomes denser. Furthermore, by adding a 0.1 M MgCl2 containing solution to gelatin, agarose and silica hydrogel, we can state that the presence of Mg in the growth medium influences the structuring of calcite-hydrogel composites by contributing to the development of low and high angle boundaries between crystal subunits and promoting split growth phenomena (Nindiyasari et al., 2014b, 2015).
In the work presented here we focus on two different hydrogels: (i) gelatin, a chemical gel, and (ii) silica, a physical gel. We deepen our understanding of the influence of Mg in the organization of calcite-gel composites by studying aggregates formed in the presence of different Mg concentrations in the growth medium: without Mg, with a low (0.01 M) and a high (0.1 M) Mg concentration. By comparing the characteristics of the obtained composite aggregates, we aim to distinguish between those effects that can be related to the incorporation of Mg into the calcite structure from effects where the presence of Mg induces changes in the mechanical properties of the gels, thereby affecting the pattern of gel occlusion during calcite growth. Our goal in this study is to investigate which factor has a greater influence on the formation of different calcite micro- and mesostructures: gel occlusion or Mg incorporation into the calcite, and to determine whether an interaction between these two factors does exist.
Crystallization experiments were conducted using the double diffusion variant of the hydrogel method (Henisch, 1988). The hydrogel occupies the horizontal branch of a U-tube, while reagents fill its vertical branches (Sancho-Tomás et al., 2014a). Crystallization occurs within the hydrogel column by chemical reaction following counter diffusion of the reagents (0.5 M CaCl2 and 0.5 M Na2CO3; Sigma Aldrich). In our experimental setup the hydrogel column was 120 mm long and 9 mm in diameter and the volume of each reagent aqueous solution was 5 mL. We conducted experiments using two types of hydrogels, silica and gelatin, and considered absence of Mg, and low (0.01 M) as well as high (0.1 M) concentrations of Mg in the growth medium. Silica hydrogel was prepared by acidifying a sodium silicate solution (Merck, sp. gr.: 1.509 g cm−3; pH = 11.2) to pH = 5.5 by slow addition of HCl (1N) under constant stirring. Magnesium-bearing silica hydrogels were prepared by adding adequate volumes of a MgCl2 solution to the silica sol prior to gelation. Gelation took place at 15 °C. Mg-free and Mg-bearing gelatin hydrogels were prepared by dissolving porcine gelatin (Sigma Aldrich; Type A, Bioreagent) in water and in 0.01 M and 0.1 M MgCl2 aqueous solutions, previously heated at 60 °C. The concentration of gelatin in the hydrogel was 10 wt%. Gelation took place at 4 °C for one hour. In all the cases, hydrogels were left to set for 24 h at 15 °C after gelation before pouring the reagent solutions in the deposits. All experiments were conducted at 15 °C and run triplicate. All solutions were prepared using high purity deionized (Milli-Q) water.
The extraction of calcite-gel composites from silica hydrogel was carried out by dissolving the slice of hydrogel where these composites are located in a 1 M NaOH solution for 20 min. Afterwards, the composites were thoroughly rinsed with Milli-Q water, placed in an ultrasonic bath for 10 min to remove rests of silica hydrogel adhered to the composites’ surfaces, rinsed again and finally left to dry at room temperature. In the case of gelatin hydrogel, the gel slice containing composites was dissolved in hot water (60 °C). Composites were collected after filtration through a 1-μm pore size membrane, thoroughly rinsed with hot Milli-Q water and dried at room temperature.
Calcite–gel composites formed in Mg-free and Mg-bearing silica and gelatin hydrogel were selected under a binocular stereomicroscope and hand-picked using a fine painting brush. The crystals were then mounted on holders, coated with gold and/or carbon. Scanning electron microscopy (SEM) images of these composites were obtained using JEOL JSM6400 (40 kV) and JEOL JSM335F (30 kV) microscopes equipped with energy dispersive spectrometers (LINK Ex1; Oxford Instruments 80 mm2 X-Max SDD). In the case of calcite-silica hydrogel composites, a conservative treatment meant to avoid any alteration of their surfaces was followed during their separation from the hydrogel. As a result, small amounts of silica hydrogel remained on the surface of some of the aggregates, which negatively affected the quality of some of the SEM images.
The preparation was started by gluing the crystal on the aluminium cylinder holder. The samples were first cut using an Ultracut ultramicrotome (Leica) using glass knifes to obtain plane surfaces within the material, as close as possible to an equatorial plane of the crystal aggregate. In the case of samples grown in silica hydrogel, these surfaces were cut either approximately parallel to (104), when their habit approached a rhombohedron, or through their largest axis, when aggregates showed dumbbell-like morphologies. These surfaces were then polished with a diamond knife (Diatome) by stepwise removal of material in a series of sections with successively decreasing thicknesses (90 nm, 70 nm, 40 nm, 20 nm, 10 nm and 5 nm, each step was repeated 15 times) (Fabritius et al., 2005; Nindiyasari et al., 2014a, b, 2015). The polished crystals were etched using 0.1 M HEPES (pH = 6.5) containing 2.5% glutaraldehyde as a fixation solution. The etching time was 90 s. The etched samples were then dehydrated in 100% isopropanol for 10 s three times and critical point dried in a BAL-TEC CPD 030 (Liechtenstein). The etched samples were imaged using a Hitachi S5200 field emission scanning electron Microscope (FE-SEM) at 4 kV after drying and rotary coating with 3 nm platinum.
EBSD measurements required a highly even surface. The composites were embedded into EPON resin and were polished using diamond suspension down to a grain size of 1 μm. The final polishing was performed using silica etch-polishing with colloidal silica (particle size ~ 0.06 μm). The polished samples were coated with 4 nm of carbon. The EBSD measurement was run at 20 kV on a FEG-SEM (JEOL JSM 6400) equipped with an Oxford Instruments NordlysNano EBSD detector.
Circular samples, 50 cm in diameter and 2.5 cm height, of Mg-free and Mg-bearing (0.01 M and 0.1 M) gelatin and silica hydrogels were prepared by pouring the corresponding sol in a metallic mold. After gelation took place the samples where left to set for 18 h. They were then placed in a shear box, within a deformation ring. This box comprises two parts: an upper one, which remains fixed, and a lower one, which can be horizontally displaced. Shear strength measurements were conducted on the gel samples at 25 °C and under dry conditions using the standard Direct Shear Test configuration (ASTM D 3080, 2011). This configuration involves applying a direct shear stress (τ), which results in the sample sliding along a defined horizontal failure plane at a constant rate (0.05 mm min−1). A constant vertical load was applied (σn = 33 kPa) in the case of gelatin gels. Measurements on silica gels were performed without vertical load to avoid both, vertical deformation and high water loss. The resulting horizontal displacement was continuously recorded at a constant rate during the test. The experiment was stopped after the samples had reached 20% horizontal deformation. The shear and normal stress data were calculated considering the decreasing area of contact between the upper and lower surfaces of the sample as the displacement progressed. The maximum shear stress required to cause slip (shear strength τf), as well as the shear-strain evolution of the six gel samples were estimated from the variation of the shear stress as a function of the horizontal movement.
Morphological features of calcite-gel composites strongly vary with the type of hydrogel that is used, but are also affected by the presence of Mg in the growth medium (Figs. 1 and 2). Composites grown in Mg-free silica hydrogel appear as hopper crystals with strongly terraced (104) surfaces and edges that are alternatingly straight and curved, reproducing the calcite 3¯ fold axis (Fig. 1a). When MgCl2 is added to the silica gel, calcite/gel composites show a dumbbell-like morphology characterized by a marked equatorial cleft. This morphology results from the radial arrangement of flat-surfaced units bounded by highly stepped rhombohedron faces (Fig. 1b, c). Differences in the concentration of MgCl2 in the hydrogel are reflected by slight microstructural changes of the composites, with those formed in the presence of higher MgCl2 concentration consisting of a higher number of mutually misoriented units (Fig. 1b, c). EDX analyses taken on the surfaces of these composites yield Mg contents that are in the range 0.1–2.6 mol% MgCO3 in those grown in 0.01 M Mg-bearing silica hydrogel and 1.5–4.5 mol% MgCO3 in those formed in 0.1 M Mg-bearing silica hydrogel.
Calcite/gel composites grown in Mg-free gelatin hydrogel show dumbbell-like to spherical morphologies (Fig. 1d). Composites formed in MgCl2-bearing gelatin hydrogels have a variety of morphologies which range from radial spherulites to sphere-like aggregates (Fig. 1b, e) and from dumbbell- to sphere-like aggregates (Fig. 1c, f) in gelatin hydrogel bearing 0.01 M and 0.1 M MgCl2, respectively. In both cases (0.01 M and 0.1 M MgCl2 in the gelatin hydrogel) sphere-like aggregates are the most common. Figure 1e and f shows this type of composites that are formed in gelatin bearing 0.01 M and 0.1 M MgCl2, respectively. EDX analyses collected on the surfaces of sphere-like calcite/gelatin composites yield Mg contents that varied between 10 mol% and well above 20 mol% MgCO3 in both composites grown in gelatin with 0.01 M and 0.1 M MgCl2.
Figure 3 shows the mesoscale composite nature of the investigated gel/mineral aggregates obtained without (Fig. 3a, d) and with Mg (Fig. 3b–d, f) in the growth medium. In the case of silica gel (Fig. 3a–c) we observe that the size of the mineral units in the composite decreases with the addition of magnesium. Thus, high concentrations of Mg in the growth medium appear to have the effect that the silica network is more dispersed in the silica gel/calcite aggregate.
In gelatin gel/calcite aggregates (Fig. 3d–f) we observe the occlusion of gel membranes and fibres. In Mg-free growth environments (Fig. 3d), thick gelatin gel membranes are occluded and separate individual and large calcite subunits of the aggregate from each other. A small amount of Mg evokes the formation of irregular membranes within the aggregates (Fig. 3e). These are thinner in comparison to those present in aggregates grown without Mg in the growth medium and form irregularly shaped and sized compartments that are filled with calcite. A fine network of gelatin gel fibres fills the space between calcite crystallites. For high MgCl2 concentration (0.1 M) in the growth medium gelatin gel membranes are not observed in the gel/calcite aggregate. The fabric of the gel constitutes a fibre network well visible between blocky calcite units.
Figure 4 highlights calcite co- and misorientation derived from EBSD measurements. Figure 4a–c shows orientation results obtained for aggregates grown in silica gel, while Fig. 4d–f shows calcite orientation in aggregates that were obtained in gelatin gel. Calcite orientation is presented colour-coded with EBSD maps and corresponding pole figures. In the Mg-free case we observe a good, single-crystal-like co-orientation of the calcite in the mesocrystal composite over distances of more than 100 μm (Fig. 4a, d). With the addition of MgCl2 and the increase of its concentration in the silica gel, crystal co-orientation decreases and a radial aggregate consisting of a few subunits (Fig. 4c) is formed. In the case of aggregates grown in gelatin gel, as Mg concentration in the growth medium increases we observe the change from radial aggregates that comprise few subunits (Fig. 4b, e) to spherulites (Fig. 4f) (this work and see also Nindiyasari et al., 2015). As Fig. 4b, e shows, even the presence of low Mg contents in the growth medium highly influences the mesoscale structure of the aggregate, an effect that is most pronounced when the aggregate grows in gelatin gel.
Figure 5 graphically summarises and highlights the different influence of both, the type of hydrogel and the concentration of Mg in the growth medium in defining the characteristics of calcite assembly (Fig. 5a–f) and the composite aggregate microstructure (Fig. 5g).
Texture sharpness, the strength of calcite co-orientation, is expressed with MUD values. The MUD value is defined as the multiple of uniform (random) orientation (Kocks et al., 2000). A calcite single crystal precipitated from solution, devoid of any gel, has a MUD value of 725 (Kim et al., 2014; Nindiyasari et al., 2014b, Greiner et al., 2018). The mesocrystalline calcite grown in silica and gelatin gels shows a mainly single-crystal-like co-orientation despite the gel occlusion. Furthermore, the occlusion of both gels seems to have an almost negligible effect, especially that of silica gel, on calcite misorientation (Fig. 5a: MUD of silica gel grown aggregate: 690; MUD of gelatin gel grown aggregate: 590). In addition, the different effects that the gels exert on the co-orientation or misorientation of calcite crystals in the aggregate is also well observable. As the lower MUD value of the aggregate grown in gelatin gel compared to that grown in silica gel shows, Mg-free gelatin gel does exert a slight influence on calcite crystal assembly and promotes a slight misorientation between calcite crystallites. Silica gel, on the other hand, has almost no detrimental effect on co-orientation (MUD: 690 vs. 725 for calcite precipitated in solution). The concomitant decrease of MUD values coupled to an increase in Mg content in the case of silica gel is well demonstrated in Fig. 5b, c and g. For gelatin gel we see a slightly different behaviour. As Fig. 5e, f and especially Fig. 5g highlight, even a small addition of MgCl2 to gelatin gel has a drastic effect on calcite organization and causes significant misorientation between the crystallites in the aggregate.
The macroscopic mechanical response of silica and gelatin hydrogels, both Mg-free and Mg-bearing was studied by conducting direct shear stress tests. The shear stress-shear strain curves of gelatin gels, both Mg-free and Mg-bearing (0.01 M and 0.1 M) are depicted in Fig. 6a. The three curves are characterised by an initial elastic stage, with a high shear modulus, which is followed by a strain hardening behaviour with progressive deformation. This behaviour is similar for the three studied gelatin samples. The characteristics of the three shear strength-strain curves are consistent with gelatin gels showing an elasto-plastic mechanical behaviour, regardless the concentration of MgCl2 added to the gel. Differences between the three gels refer to the strain stage for yielding point (point where the elastic behaviour is lost), which is higher in the Mg-free gelatin gel and becomes smaller as the Mg content increases. Mg-free gelatin gel also shows the highest stress values for given horizontal displacements, while the lowest stress values correspond to the gelatin gel with the highest Mg content.
The shear stress-strain curves shown in Fig. 6b illustrate the contrast between the mechanical responses of gelatin and silica gels. While, as explained above, the mechanical response of gelatin hydrogels can be described as elasto-plastic, with a marked continuous hardening under strain, silica hydrogel shear stress-strain curves are characterized by an initial stress increase to reach a maximum, which is followed by a stress decrease and finally a stress plateau at high strain values. It is worthwhile to note that the addition of MgCl2 to the silica gel significantly shifts the position of the maximum stress towards larger values of horizontal displacement, as evidenced by comparing shear stress-strain curves of Mg-free and 0.1 M MgCl2-bearing silica hydrogels (Fig. 6b). Slip failure was not observed in any of the samples in the considered range of horizontal displacements.
The incorporation of hydrogel matrices into calcite aggregates was early reported (Nickl & Henisch, 1969) and was subsequently investigated in great detail for a large variety of gels (Grassmann et al., 2002; Li & Estroff, 2007; Huang et al., 2008; Li & Estroff, 2009; Simon et al., 2011; Li et al., 2011a; Asenath-Smith et al., 2012; Nindiyasari et al., 2014a, b, 2015). Ca-Carbonate biominerals in mollusk and brachiopod shells also commonly show occlusion of biologic polymers which are present during their growth (Nindiyasari et al., 2015). The gel-incorporation observed in the present paper leads to mesocrystals which are composites formed as the crystallization of the calcite percolates through the gels. The crystal faces and growth terraces reflect the characteristic geometry of the rhombohedral unit cell of calcite. Thus, these mesocystals form by classical atom-by-atom growth rather than by an assembly of nanoparticles of either calcite or any other transient phase. Accordingly, the observed co-orientation characteristics of the composite mesocrystals simply derive from classical crystal growth, and no complex co-orientation mechanism of hypothetical nanoparticles needs to be hypothesized. Even though hydrogel incorporation into calcite is a general phenomenon, the characteristics of incorporation are variable and depend mainly on the type of the used gel and the concentration of the solid within the gel (Nindiyasari et al., 2014a, 2015). Estroff and co-workers characterized major parameters that control hydrogel incorporation into calcite (Nickl & Henisch, 1969; Li & Estroff, 2007; Kosanovic et al., 2011) and based their approach on the force completion model for crystallization (Chernov et al., 1976; 1977; Chernov & Temkin, 1977; Chernov, 1984), a model developed to describe crystallization in the presence of particles. Following this model Estroff and collaborators defined crystallization pressure and gel strength as the major controlling parameters for the incorporation of the gel into the growing crystal. The crystallization pressure is the pressure that the growing crystal exerts against the growth medium. It increases with the growth rate and, consequently, with the supersaturation (Chernov, 1984; De Yoreo & Vekilov, 2003). The gel strength defines the maximum crystallization pressure that the hydrogel network can resist without breaking or being pushed aside (Asenath-Smith et al., 2012). The balance between crystallization pressure and gel strength defines the amount of hydrogel network that is incorporated into calcite crystals during their growth. Higher growth rates and stronger hydrogels favour higher degrees of gel network incorporation, whereas low growth rates and weak hydrogels result in the gel network being pushed aside during crystallization (Asenath-Smith et al., 2012, Greiner et al., 2018).
Further advances in understanding the formation of gel/calcite composites result from the detailed characterization of micro and nanostructural features of the aggregates (Nindiyasari et al., 2014a, b, 2015; Greiner et al., 2018). The comparison of composites formed in silica and gelatin gels (see also Nindiyasari et al., 2015) highlights important differences in the ways in which the gel network is occluded into and organized within the growing mineral. These differences entail distinct features of calcite co-orientation patterns. The observed microstructural characteristics of calcite-silica gel composites can be explained with the simple model proposed by Estroff and collaborators (Asenath-Smith et al., 2012) to explain the relationship of growth rate and gel strength with gel occlusion. The addition of Mg to the growth environment, in the case of silica gel, has a further effect related to the incorporation of Mg into calcite structure, in amounts that are always low but increase with Mg concentration in the growth medium. Mg incorporation has a twofold effect on calcite assembly and growth: (i) it increases the solubility of calcite and (ii) it generates lattice strain in the calcite structure. The first effect decreases the crystallization pressure because for given physicochemical conditions the supersaturation of the system with respect to Mg-bearing calcite is lower than with respect to pure calcite. Moreover, a further decrease in the growth rate will result from the inhibiting effect of Mg on calcite crystallization (Davis et al., 2000; Astilleros et al., 2003, 2010). As a result, the particles constituting the silica gel network will be rather pushed aside than incorporated within the mineral as a higher Mg concentration determines slower growth rates and lower crystallization pressures. The brittle nature of silica hydrogel also contributes to a low gel occlusion (Nindiyasari et al., 2015). The brittle nature of silica hydrogel compared to gelatin gel is evident by the different characteristics of the shear strength-strain curves of both materials, as depicted in Fig. 6b. The second effect of Mg on calcite growth, the generation of lattice strain associated with Mg substituting Ca in the calcite structure, leads to the formation of dislocations as a means to release this strain. The distribution of dislocations at regular intervals within the aggregate generates low angle boundaries between crystal subunits (Nindiyasari et al., 2014b, 2015), explaining the increased number of crystal subunits that constitute those composites that formed in the presence of higher Mg concentration. The combination of these two effects explains that the occluded silica network appears more dispersed and is distributed between smaller and more numerous crystal subunits in those calcite/silica gel aggregates grown in silica gels with high Mg concentrations compared to aggregates that formed in silica gel with a low Mg concentration or, even, without Mg. Moreover, the generation of small and large angle boundaries that is associated with the formation of dislocations promotes split growth phenomena and explains the evolution from single mesocrystals to radial aggregates and the decrease in calcite co-orientation (lower MUD values).
Calcite/gelatin composites show a more complex internal structure with regards to both, calcite orientation patterns and gel network distribution and organization. The composites that grow in the absence of Mg contain thick gelatin membranes between the subunits and show a high degree of calcite co-orientation. With the addition of MgCl2 to the growth medium we observe a sudden and strong increase in the number of subunits and calcite misorientation in the composite. This is concomitant to a decrease in the thickness of gelatin membranes. The membranes are absent in composites that form in a high MgCl2 concentration environment.
The membranes observed in composites formed in gelatin gel without Mg or with low Mg contents are the consequence of the mechanical response of gelatin gel to crystallization pressure. Whereas silica hydrogel behaves as a brittle medium, gelatin can deform plastically, as demonstrated by the different characteristics of their shear strength-strain curves (Fig. 6b). When the balance between crystallization pressure and gel strength is such that gelatin fibres are pushed aside by the growing crystal, these fibres are pushed against other fibres and become squeezed together. This determines a local increase in the density of fibres and induces the local reorganization of the gel network, which translates into the formation of gel membranes between the subunits. The characteristic strain hardening displayed by gelatin hydrogels (Fig. 6a) can be the consequence of the ability of gelatin fibres to be squeezed together, leading to a gel density increase as well as reorganization of the gel fabric. Explaining the changes observed in the characteristics of gel membranes with the addition of Mg requires considering both, those effects resulting from the incorporation of Mg into the calcite structure and the changes in the mechanical response of the gel that are associated with the presence of Mg in the growth medium.
As explained in the previous section for calcite/silica gel composites, the incorporation of Mg into calcite induces lattice strain which is released through the formation of dislocations (Nindiyasari et al., 2014b, 2015). The amount of Mg incorporated into calcite is up to ~5 times higher in gelatin than in silica gel. Consequently, Mg-calcite grown in gelatin gel must contain a much higher density of dislocations. This can explain the strong increase in the number of subunits and calcite misorientation observed with the addition of MgCl2 to the gelatin. However, this explanation cannot account for the differences between composites grown in gelatin gel with low and high Mg since calcite incorporates similar amounts of Mg in both cases. Consequently, in both cases there must be similar densities of Mg-related dislocations. As we have also explained in the previous section, Mg also affects calcite growth by reducing the growth rate. According to the model proposed by Estroff and collaborators (Li et al., 2009, 2011a; Asenath-Smith et al., 2012), a decrease in growth rate leads to a decrease in the amount of gel network that becomes occluded within crystal units. Gelatin fibres being pushed aside rather than incorporated into the growing crystal should lead to the formation of thicker gel membranes. This is in contradiction with observations of gel distribution in calcite/gel composites formed in gelatin with low and high MgCl2 contents. The fact that membranes are thinner in composites formed in gelatin with low Mg and are absent in gelatin with high Mg could be explained if the reduction in calcite growth rate were overbalanced by an effect of Mg on the mechanical properties of gelatin gel. Indeed, it has been proposed based on computer simulations that the stiffness of gelatin fibres is significantly affected by the presence of different elements, mostly divalent cations like Mg2+, in the growth medium (Tlatlik et al., 2006). Our results also point in this direction as evidenced by the different shear stress-strain curves of gelatin gels with different Mg Cl2 contents (Fig. 6a). A less plastic behaviour of gelatin fibres associated with higher amounts of MgCl2 present in the growth medium would translate into the formation of thinner to inexistent membranes, as it is observed in the calcite-gelatin composites. The increase in the number of subunits when crystal growth takes place in the presence of Mg could be then the consequence of an increase in lattice strain associated with Mg incorporation into calcite structure, to which the occlusion of gelatin fibres within the mineral adds up. Indeed, microstrain fluctuations and decreased grain sizes are associated with the presence of an occluded organic phase in biogenic crystals (Pokroy et al., 2006a, b). However, further investigations that provide a better understanding of both, (i) the influence of Mg on the microscopic, as well as macroscopic, mechanical properties of gelatin gel and (ii) the relationship between gelatin fibres occlusion are still required to fully validate our interpretations.
In this study we investigated the effect of magnesium on calcite/gel mesostructure and strength of co-orientation for gel/mineral aggregates grown in two distinct gels: silica and gelatin.
Our study addresses two questions: (i) whether the gel or the cation exchange exerts a more profound effect on mesostructural organization and (ii) whether the cation affects physical properties of the hydrogel as well as the characteristics of the mineral component. Our results show, that even though the two investigated gels are distinct, similar developments of crystal organization can be observed. When aggregates crystallize in growth environments devoid of magnesium, we obtain mesocrystals for both gels with overall single-crystal-like co-orientation. When magnesium is added to the growth medium, the characteristics of the fabric of the gel incorporated into calcite change. This change correlates with the formation of calcite/gel composites which consist of a higher number of mutually misoriented subunits. In the case of silica gel, these composites are radial aggregates with some subunits, while in the case of gelatin gel these composites appear as spherulites. The effect of magnesium is more pronounced in those composites that formed in gelatin gel. This marked effect is consistent with the significantly higher incorporation of Mg into the mineral component of composites that formed in gelatin gel, compared to composites that formed in silica gel. Furthermore, our results confirm that the presence of Mg in the growth medium influences the mechanical response of both gels. This influence is a decrease in elasticity as the concentration of Mg is higher in the case of gelatin gel, while silica gel shows more complex characteristics. The very different mechanical response of silica and gelatin gels, as well as the distinct effect that the addition of Mg to the growth medium has in each case, partially explain the observed different patterns of gel matrix distribution within the different types of calcite/gel composites.
E.G. is supported by Deutsche Forschungsgemeinschaft, DFG grant number GR-1235/9-1. This research was partially funded by project CGL2016-77138-C2-1-P (MECC-Spain). We sincerely thank the staff of the National Microscopy Centre (ICTS) and Guillermo Pinto from the Engineering Geology laboratory (Dpt. Geodynamics, Stratigraphy and Palaeontology, UCM) for technical support and assistance.
FE-SEM images of calcite/gel composites grown in silica (a–c) and gelatin (d–f) hydrogels without (a, d) and with Mg (b, c, e, f). (a) Hopper crystal bounded by strongly terraced (104) surfaces grown in Mg-free silica hydrogel. (b) Dumbbell-like composite grown in 0.01 M MgCl2-bearing silica hydrogel. Note the equatorial cleft and the radial arrangement of units. (c) Dumbbell-like composite grown in 0.1 M MgCl2-bearing silica hydrogel. Note that the composite is broken through the equatorial cleft and the image corresponds to a half of the dumbbell. EDX analyses on the surface of the composites in (b) and (c) yield Mg contents around 1 and 3 mol% MgCO3, respectively. (d) Pseudospherical calcite-gel composite formed in Mg-free gelatin hydrogel. (e) Curved-surfaced calcite-gel composite formed in 0.01 M Mg-bearing gelatin hydrogel. (f) Sphere-like calcite-gel composite formed in a 0.1 M MgCl2-bearing gelatin hydrogel. EDX analyses on the surface of composites shown in (e) and (f) yield Mg contents around 15 and 17 mol% MgCO3, respectively.
The wide variety of aggregate morphologies obtained in growth experiments carried out with 10 wt% gelatin in an Mg-free environment.
FE-SEM images of microtome cut, polished, etched and critical point dried surfaces showing gel/calcite composites that were obtained from silica (a–c) and gelatin (d–f) hydrogels without (a, d) and with (b, c, e, f) the presence of Mg in the growth medium. In the case of calcite that grew in silica gel, a decrease in the size of the mineral units in the composite correlates with an increase in Mg in the growth medium. In calcite/gelatin gel aggregates, those formed in Mg-free growth environments show thick membranes separating large mineral subunits (d). Gelatin membranes, though less thick than in aggregates formed in the absence of Mg, are also present in aggregates grown in the presence of low Mg concentrations, where they form sheaths around irregularly sized mineral units (e). No membranes are observed in aggregates formed in gelatin bearing high Mg concentration, where the occluded gel matrix is present as a dense network of fibres that infiltrates calcite with a blocky appearance.
Calcite orientation results derived from EBSD. Crystal orientation is presented colour-coded in EBSD maps and corresponding pole figures. The used colour code is given at each EBSD map. Figures a–c show orientation patterns for calcite grown in silica gel. Figures d–f show orientation patterns for calcite aggregates obtained in gelatin gel. (a, d) Mg-free growth environment, (b, c, e, f) Mg-containing growth environment. An increase in Mg induces the development of small and large angle boundaries resulting in a mesoscale structuring of the aggregate.
Texture sharpness in the investigated aggregates. Calcite co-orientation is expressed as multiples of uniform (random) orientation (MUD). Calcite single crystal has a MUD of 725, while all other aggregates show lower MUD values due to the incorporated gel matrix. In Mg-free environments the gel network has little effect on the mesoscale structure of calcite and the aggregate is close to a single crystal, though the effect of gelatin gel occlusion is significantly higher than that of silica gel. The addition of Mg drastically changes the microstructure and texture and initiates the high hierarchical misorientation of calcite within the aggregate.
Shear stress as a function of horizontal displacement. (a) Shear stress-strain curves of gelatin gel free of Mg and containing 0.01 M and 0.1 M MgCl2. The three gelatin samples show a distinct elasto-plastic behaviour, characterized by a marked strain hardening with deformation. (b) Comparison of the shear stress-strains curves of Mg-free gelatin gel, Mg-free silica gel and 0.1 M Mg-bearing silica gel. While gelatin gel has an elasto-plastic behaviour under applied shear stress, silica gel shear strength-shear strain curves show a maximum value that shifts towards larger displacements with higher Mg contents. The shape of these curves is compatible with a more brittle behaviour of silica gel. Neither gelatin gel nor silica gel samples show any evidence of slip failure in the range of strain explored.
Mater. Sci. Eng., C: Biomimetic Mater. Sens. Syst. | 2019-04-26T00:29:24Z | https://pubs.geoscienceworld.org/eurjmin/article/568725/influence-of-gel-strength-and-magnesium-doping-on |
Purpose: The androgen receptor (AR) harbors a polymorphic CAG repeat sequence in exon 1, coding for a polyglutamine tract whose length inversely correlates with AR transactivation function. AIB1, an AR coactivator, expresses a similar polymorphic glutamine sequence within the carboxyl-terminal coding region. We hypothesized that genotypic variations in the androgen-signaling pathway promote aggressive epithelial ovarian cancer biology, and sought to examine the effect of AIB1 genotype on clinical outcome.
Experimental Design: Genotype analysis of the AIB1 CAG repeat region was done on 89 patients with epithelial ovarian cancer. Medical records were reviewed for clinicopathologic factors and survival. Data were examined using the χ2 test and Kaplan-Meier survival and Cox regression analyses.
Results: We identified four AIB1 genotypes, with glutamine codon lengths of 26, 28, 29, and 30. Patients with a short AIB1 genotype (with ≤28 CAG repeats) showed statistically shorter time to disease recurrence compared to those with a long genotype (≥29 CAG repeats; 15.0 versus 30.0 months; P = 0.01). Patients with short AIB1 also showed decreased overall survival (57.0 months) compared to those with a long genotype (median survival not yet reached; P = 0.02). When controlling for established prognostic factors, multivariate analysis identified the presence of a short AIB1 genotype as an independent poor prognostic factor for overall survival (P = 0.05).
Advanced stage epithelial ovarian cancers are characterized by significant heterogeneity with regard to volume and site of metastatic disease at presentation and at recurrence. Genetic and hormonal factors influence tumor biology, and androgens in particular have been proposed as a potential factor. This hypothesis is supported by the conservation of androgen receptor (AR) expression after malignant transformation of ovarian surface epithelial cells, suggesting that androgens function in tumor biology (1-3). Ovarian cancers also overexpress AIB1 and ARA70 (AR-associated protein), coactivators that may enhance the transactivational potential of AR >10-fold (4-6). Androgens may also promote the progression and recurrence of disease through modulation of tumor growth factor-β receptor expression, which might disrupt normal tumor growth factor-β–mediated growth inhibition (7).
Androgen signaling is mediated through ligand binding to AR. The AR gene harbors a polymorphic CAG trinucleotide repeat region coding for a polyglutamine tract, and the length of the CAG repeat sequence has been shown to inversely correlate with AR transcriptional activity (8, 9). Steroid receptor coactivators, including AIB1, also mediate AR transactivation function. AIB1, also known as SRC-3, belongs to the SRC family of transcriptional coactivators involved in the control of estrogen-dependent transcription (5, 10). The AIB1 gene also harbors a glutamine tract encoded by a polymorphic CAG/CAA repeat sequence, although the biological function of these repeats is not established (5, 11). However, the analogous region of the steroid receptor coactivator SRC-1 directly interacts with AR to enhance signaling, and rare CAA/CAG sequence patterns have been reported in a significantly higher proportion of breast cancer cell lines and primary tumors (12, 13).
We previously reported that polymorphisms of the CAG repeat sequence in AR modulate tumor biology in epithelial ovarian cancers. Short AR allelotypes (with <19 CAG repeat lengths) are associated with decreased surgical cytoreducibility (at initial exploratory laparotomy) and poor overall survival (3). To further explore our hypothesis that enhancement of androgen signaling promotes aggressive epithelial ovarian cancer biology, we sought to examine the glutamine polymorphism in AIB1. The objectives of this study were to characterize AIB1 genotypes in a cohort of women with epithelial ovarian carcinoma and to determine the influence of AIB1 on clinical outcome.
Under an Institutional Review Board–approved protocol, the Gynecologic Oncology Laboratory at Cedars-Sinai Medical Center routinely collects malignant and benign tissue specimens from consenting women undergoing surgical exploration. One hundred and forty-two patients were diagnosed with stages II and IV papillary serous epithelial ovarian carcinoma between 1995 and 2000 at our institution; we queried our database to identify consecutive patients who had available banked serum from their initial cytoreductive surgery. Patients with tumors of low malignant potential were excluded from this study. All patients had undergone primary surgical staging by a gynecologic oncologist with the intent of optimal tumor cytoreduction (defined as residual disease after surgical resection to <1 cm). Patients who received neoadjuvant chemotherapy and interval surgical cytoreduction were excluded. Following surgical staging, all patients received platinum-based chemotherapy. Patient data were abstracted from medical records, and included surgical and pathologic findings, time to recurrence, and death.
Genomic DNA was isolated from banked serum using standard procedures (14). Genotype analysis was done with PCR amplification of the polymorphic CAG/CAA trinucleotide region beginning at residue 3930 in the AIB1 coding sequence. Amplified products encompassed a (CAG)6 CAA (CAG)9 (CAA CAG)4 CAG CAA (CAG)2 CAA sequence, corresponding to an allele with 29 glutamine repeats as previously reported (15, 16). The primers used were: 5′-AGT-CAC ATT AGG AGG TGG GC-3′ (forward) and 5′-TTC CGA CAA CAG AGG GTG G-3′ (reverse) as published by Rebbeck et al. (17). Primers were labeled with fluorescein aminomethane to determine sequence length using laser-activated fluorescent dye technology (ABI 377 PRISM and associated software; Applied Biosystems, San Mateo, CA). Representative PCR products were independently sequenced to confirm the number of CAG/CAA repeat lengths and product identity. Unlike the CAG repeat expansion in neurodegenerative diseases, the polyglutamine length in AIB1 remains relatively stable, possibly due to the frequent interruption of CAG repeats by CAA (18).
Genotypes were examined by allele size and frequency. For statistical considerations, a short AIB1 genotype was defined as ≤28 CAG/CAA repeats in each allele; this cutoff is consistent with published reports implicating AIB1 genotype length in breast and prostate cancer risk (18-20). Using the log-rank test with a two-sided significance level of 5% and a calculated power of 80%, 88 patients would be needed to distinguish a 24-month difference in survival, assuming that patients were accrued over a 10-year period. Data were examined using the χ2 test and Kaplan-Meier survival and Cox regression analyses.
Eighty-nine patients with epithelial ovarian carcinoma underwent genotype analysis of the polymorphic CAG repeat sequence in AIB1. The number of glutamine codons ranged from 26 to 30; the alleles in this cohort contained 26, 28, 29, and 30 CAG/CAA repeats. The genotypes identified included 26/26, 26/28, 26/29, 28/28, 28/29, 28/30, and 29/29. The distribution and frequency of AIB1 genotypes is shown in Fig. 1.
Distribution of AIB1 genotypes by number of CAG/CAA repeat sequences in 89 women with epithelial ovarian carcinoma. The number of alleles with a given genotype is indicated.
Following a cutoff of 28 CAG/CAA repeats established by other investigators in breast and prostate cancer, we defined a short AIB1 genotype as ≤28 glutamine codons in each allele, and a long AIB1 genotype as ≥29 glutamine codons in at least one allele. Clinicopathologic characteristics of established prognostic factors in epithelial ovarian carcinomas for the short and long groups are shown in Table 1. No differences were seen between ages of diagnosis, incidence of stage II, III, and IV disease, high-grade histology, or incidence of optimal surgical tumor resection.
To determine the potential influence of AIB1 genotype length on disease course, we performed Kaplan-Meier survival analyses comparing patients with short and long AIB1 genotypes. Patients with a short AIB1 had a statistically shorter time to disease recurrence compared with those with a long genotype (15.0 versus 30.0 months; P = 0.01; Fig. 2). A short AIB1 genotype also correlated with decreased overall survival (57.0 months) compared to those with a long genotype (median survival not yet reached; P = 0.02; Fig. 3).
Association of short AIB1 genotype (≤28 CAG/CAA repeats) with time to recurrence. Short AIB1 genotype predicted shorter time to recurrence than patients with long AIB1 genotype (15.0 versus 30.0 months; P = 0.01).
Association of short AIB1 genotype (≤28 CAG/CAA repeats) with overall survival. Short AIB1 genotype predicted poorer overall survival than patients with long AIB1 genotype (57.0 months versus median survival not yet reached; P = 0.02).
Although other investigators support the clinical significance of this cutoff of 28 glutamine codons in AIB1, the division of the cohort into two groups remains somewhat arbitrary. We thus explored the effect of AIB1 genotype length as a semicontinuous variable using four levels. Level one included patients harboring the 26/26, 26/28, and 26/29 genotypes (n = 24); level two included those with the 28/28 genotype (n = 12); level three included those with the 28/29 genotype (n = 38), and level four included those with the 28/30 and 29/29 genotype (n = 15). Kaplan-Meier analysis identified a statistically significant trend for overall survival favoring the longer AIB1 genotypes (P = 0.03; Fig. 4). Median survival was 63.0 months for patients in level one and 33.0 months for those in level two; median survival was not yet reached for those in levels three and four. Comparison of survival analyses examining the cohort as two versus four levels using the Akaike Information Criteria indicated a superior model fit when examining genotype length as a dichotomous variable.
Association of AIB1 genotype length with overall survival when examined as a semiquantitative variable. Four levels were examined: level one included patients harboring the 26/26, 26/28, and 26/29 genotypes (n = 24); level two included those with the 28/28 genotype (n = 12); level three included those with the 28/29 genotype (n = 38); and level four included those with the 28/30 and 29/29 (n = 15) genotypes. A statistically significant trend was identified for overall survival, favoring the longer AIB1 genotypes (P = 0.03).
To ascertain the effect of AIB1 genotype length on overall survival in the context of established prognostic factors, multivariate analysis was done using the Cox regression hazards model (Table 2). After controlling for age, stage, grade, and optimal cytoreduction, the presence of an AIB1 allele harboring 26 glutamine codons remained an independent poor prognostic factor for overall survival (hazard ratio, 1.28; P = 0.05). Whereas age and grade were not significant prognosticators in this cohort, stage (hazard ratio, 2.09; P = 0.02) and residual disease >1 cm after surgical resection (hazard ratio, 2.57; P = 0.04) also retained prognostic significance.
We have hypothesized that enhanced androgen signaling promotes aggressive epithelial ovarian cancer biology. To test this hypothesis, we studied the polymorphic glutamine codon repeat sequence in the AR coactivator AIB1. Although the biological significance of this repeat in AIB1 is not established, we hypothesized that a functional relationship exists between length and activity, similar to that shown in AR. We identified a significant association between short AIB1 genotype and decreased time to recurrence and overall survival, a finding confirmed in analyses examining AIB1 length both as a dichotomous and semicontinuous variable. Furthermore, multivariate analyses confirmed the prognostic significance of a short AIB1 genotype in predicting overall survival, after controlling for established prognostic factors.
Limited studies have examined AIB1 in epithelial ovarian cancers; however, existing data suggests the potential role of this gene in the modulation of ovarian tumor biology. AIB1 is located on chromosome 20q, a region commonly amplified in ovarian cancers (21-23). In a cohort of 24 sporadic malignant ovarian tumors, amplification of the 20q12 region (containing AIB1) was identified in 25%, and correlated with poor survival (6). This effect on clinical outcome may be mediated through enhanced androgen signaling; Evangelou et al. reported that dihydrotestosterone treatment of primary malignant ovarian epithelial cell cultures led to overexpression of AIB1 and reversed tumor growth factor-β–induced cellular growth inhibition (7). Although the molecular mechanism by which AIB1 may promote aggressive tumor biology remains unclear, studies in Drosophila indicate that a steroid receptor coactivator analogous to AIB1 is required for ovarian cell motility, suggesting a potential role for AIB1 in stimulating invasive cell behavior (24).
Despite the lack of molecular evidence correlating AIB1 genotype length with AIB1 functional activity, data identifying the influence of AIB1 glutamine codon length on risk of carcinogenesis in other hormone-responsive organ sites suggests an inverse correlation between polyglutamine length and AIB1 transactivation function similar to that seen in AR. Hsing et al. reported that men with homozygous AIB1 alleles of 28 glutamine codons or less showed an 81% excess risk of prostate cancer (20). In the breast, however, short AIB1 genotype seems to reduce risk; data from Rebbeck et al. and Kadouri et al. revealed a risk reduction of breast carcinogenesis in women with BRCA mutations who harbor AIB1 alleles of <28 polyglutamine repeats (17, 19). Interestingly, these same relationships have been reported for the AR polyglutamine polymorphism; short AR alleles are associated with increased risk of prostate cancer, and with decreased risk of both sporadic and BRCA-associated breast cancers (25-27). Taken together, these data strongly suggest a functional role for polyglutamine length in AIB1 similar to that found in AR.
These data add to the growing body of evidence linking heightened androgenicity to the pathogenesis and tumor biology of epithelial ovarian cancers. Our findings suggest genetic polymorphisms in AIB1 influence disease outcome, potentially through differential activation of AR and enhanced androgen signaling. Functional studies confirming an inverse relationship between AIB1 polyglutamine length and AR activity may identify specific mechanisms by which androgens function in ovarian cancer biology. Multi-institutional cohorts examining both AIB1 and AR genotype are also under way to further examine the influence of these factors on ovarian cancer biology.
We thank James Mirocha, Ph.D., for statistical assistance and Kent Taylor, Ph.D. of the Cedars-Sinai Medical Center Genotyping Core.
Grant support: Women's Cancer Research Institute at Cedars-Sinai Medical Center, the Cedars-Sinai Research Institute General Clinical Research Center, grant #MO1-RR00425, and the Pacific Ovarian Cancer Research Consortium Career Development Award in Ovarian Cancer Research.
Revision received September 1, 2005.
Chadha S, Rao BR, Slotman BJ, van Vroonhoven CC, van der Kwast TH. An immunohistochemical evaluation of androgen and progesterone receptors in ovarian tumors. Hum Pathol 1993; 24: 90–5.
Cardillo MR, Petrangeli E, Aliotta N, et al. Androgen receptors in ovarian tumors: correlation with oestrogen and progesterone receptors in an immunohistochemical and semiquantitative image analysis study. J Exp Clin Cancer Res 1998; 17: 231–7.
Li AJ, Baldwin RL, Karlan BY. Short androgen receptor allele length is a poor prognostic factor in epithelial ovarian carcinoma. Clin Cancer Res 2003; 9: 3667–73.
Chung CM, Man C, Jin Y, et al. Amplification and overexpression of Aurora Kinase A (AURKA) in immortalized human ovarian epithelial (HOSE) cells. Mol Carcinogenesis 2005; 43: 165–74.
Anzick SL, Kononen J, Walker RL, et al. AIB1, a steroid receptor coactivator amplified in breast and ovarian cancer. Science 1997; 277: 965–8.
Tanner MM, Grenman S, Koul A, et al. Frequent amplification of chromosomal region 20q12-q13 in ovarian cancer. Clin Cancer Res 2000; 6: 1833–9.
Evangelou A, Jindal SK, Brown TJ, Letarte M. Down-regulation of transforming growth factor β receptors by androgen in ovarian cancer cells. Cancer Res 2000; 60: 929–35.
Chamberlain NL, Driver ED, Miesfeld RL. The length and location of CAG trinucleotide repeats in the androgen receptor N-terminal domain affect transactivation function. Nucleic Acids Res 1994; 22: 3181–6.
Kazemi-Esfarjani P, Trifiro MA, Pinsky L. Evidence for a repressive function of the long polyglutamine tract in the human androgen receptor: possible pathogenetic relevance for the (CAG)n-expanded neuronopathies. Hum Mol Genet 1995; 4: 523–7.
Reiter R, Oh AS, Wellstein A, Riegel AT. Impact of the nuclear receptor coactivator AIB1 isoform AIB1-Δ3 on estrogenic ligands with different intrinsic activity. Oncogene 2004; 23: 403–9.
Bautista S, Valles H, Walker RL, et al. In breast cancer, amplification of the steroid receptor coactivator gene AIB1 is correlated with estrogen and progesterone receptor positivity. Clin Cancer Res 1998; 4: 2925–9.
Dai P, Wong JC. Somatic instability of the DNA sequences encoding the polymorphic polyglutamine tract of the AIB1 gene. J Med Genet 2003; 40: 885–90.
Sambrook J, Russell DW, editors. Molecular cloning: a laboratory manual. 3rd ed. Cold Spring Harbor (NY): Cold Spring Harbor Laboratory Press; 2001.
Shirazi SK, Bober MA, Coetzee GA. Polymorphic exonic CAG microsatellites in the gene amplified in breast cancer (AIB1 gene). Clin Genet 1998; 54: 102–3.
Hayashi Y, Yamamoto M, Ohmori S, et al. Polymorphism of homopolymeric glutamines in coactivators for nuclear hormone receptors. Endo J 1999; 46: 279–84.
Rebbeck TR, Wang Y, Kantoff PW, et al. Modification of BRCA1- and BRCA2-associated breast cancer risk by AIB1 genotype and reproductive history. Cancer Res 2001; 61: 5420–4.
Paulson HL. Protein fate in neurodegenerative proteinopathies: polyglutamine diseases join the (mis)fold. Am J Hum Genet 1999; 64: 339–45.
Kadouri L, Kote-Jarai Z, Easton DF, et al. Polyglutamine repeat length in the AIB1 gene modifies breast cancer susceptibility in BRCA1 carriers. Int J Cancer 2004; 108: 399–403.
Hsing AW, Chokkalingam AP, Gao YT, et al. Polymorphic CAG/CAA repeat length in the AIB1/SRC-3 gene and prostate cancer risk: a population-based case-control study. Cancer Epidemiol Biomarkers Prev 2002; 11: 337–41.
Iwabuchi H, Sakamoto M, Sakunaga H, et al. Genetic analysis of benign, low-grade, and high-grade ovarian tumors. Cancer Res 1995; 55: 6172–80.
Sonoda G, Palazzo J, du Manoir S, et al. Comparative genomic hybridization detects frequent overrepresentation of chromosomal material from 3q26, 8q24, and 20q13 in human ovarian carcinomas. Genes Chromosomes Cancer 1997; 20: 320–8.
Jin Y, Zhang H, Tsao SW, et al. Cytogenetic and molecular genetic characterization of immortalized human ovarian surface epithelial cell lines: consistent loss of chromosome 13 and amplification of chromosome 20. Gynecol Oncol 2004; 92: 183–91.
Bai J, Uehara Y, Montell DJ. Regulation of invasive cell behavior by taiman, a Drosophila protein related to AIB1, a steroid receptor coactivator amplified in breast cancer. Cell 2000; 103: 1047–58.
Giovannucci E, Stampfer MJ, Krithivas K, et al. The CAG repeat within the androgen receptor gene and its relationship to prostate cancer. Proc Natl Acad Sci U S A 1997; 94: 3320–3.
Giguere Y, Dewailly E, Brisson J, et al. Short polyglutamine tracts in the androgen receptor are protective against breast cancer in the general population. Cancer Res 2001; 61: 5869–74.
Rebbeck TR, Kantoff PW, Krithivas K, et al. Modification of BRCA1-associated breast cancer risk by the polymorphic androgen-receptor CAG repeat. Am J Hum Genet 1999; 64: 1371–7. | 2019-04-21T22:19:19Z | http://cebp.aacrjournals.org/content/14/12/2919 |
So, you just bought a shiny, new, and maybe expensive, lens for your camera, and being the savvy consumer, you did your homework. You pored over customer reviews on the B&H Photo website, read online reviews splattered all over the Internet, grabbed a copy of every photo magazine that reviewed the lens, bookmarked dozens of websites, and now have the lens’s MTF curve charts burned into your retinas.
Now, your lens is here and it is time to go out shooting. Honestly, not a problem. Your lens should be as good as it can be and, as photographers, we want to take photos. So, stop reading and go out and make some photographs!
Still here? OK, let me tell you why you might want to test that lens yourself. The main reason is that even with today's precision computer-controlled manufacturing techniques, there are variations in each and every lens that rolls off an assembly line. This means that some examples will be better than others. Some lenses will be outstanding and others will make you wonder if all of those glowing reviews you read online were completely bogus.
I once purchased a new 40mm lens that was advertised and reviewed to be, based on all reviews, incredibly sharp. The Internet is full of tests that show this is a superb lens. I spent some good money on this lens and hurried home to try it out. However, me being me, I took the new lens out for a shoot with my tried-and-true 50mm f/1.8 lens in the bag. I took the same photos with the two lenses, albeit at the slightly different focal lengths, and hurried home. After analyzing the images, I was left to speculate that, either the reviews are full of lies about this 40mm lens, that I got a bad example of this lens, that my 50mm f/1.8 is the most awesome lens ever made, or a combination of those possibilities.
"I like to test my lenses to determine where in their aperture range and focal range (if a zoom) they are performing at their best."
Had I not had a lens to which I could compare it, I might have been happy with the performance of the 40mm and not known the difference. But, because I did a quick test of my new lens, comparing it to a lens that I was familiar with, I was able to determine that it should be returned to the store and my money saved for something else.
Knowing that no two lenses are the same, as far as performance, why else would we want to test a lens? For most of my photography, I want to maximize the sharpness of an image. In order to do that, I like to test my lenses to determine where in their aperture range and focal range (if a zoom) they are performing at their best. A lens’s sharpness and degree of vignetting will change based on the aperture selected, as well as its focal length, if it is a zoom.
getting the testing out of the way so that I can go out and make photos.
There are a lot of people out there who go absolutely nuts with lens testing. So, if, after you read this, you find yourself building a dust-free clean room in your home, walking around in a lab coat, and trying to figure out ways to shoot laser beams through your lenses onto a computerized target sensor for dispersion analysis, you may want to consider a new career with some of the more well known lens-testing websites and magazines.
Also, as anyone with an Internet search engine can attest, there are many different opinions and techniques regarding how to test lenses. I generally test my lenses for sharpness. However, you can test for vignetting, symmetry, distortion, focus, and other factors in the comfort of your own home without fancy gear. So, feel free to share your ideas and methods at the end of this article, but please know that what I am sharing here is, simply, my personal technique and I am not suggesting it is the only way, or best way, to test a lens.
Before we get into the gear needed, you should, if you have it, turn on the part of your brain that may have been lying dormant since grade school science classes. The testing of your lens is an experiment and you need to have a basic scientific mindset to make sure you do not have to go back and repeat the tests over and over again. What do I mean? You need a plan in place before you get started. Have paper and a pencil handy to take notes. Photography can be done “from the hip,” but good lens testing needs a methodical approach. Don’t worry, we aren’t doing crazy stuff here, just know that a bit of pre-organization and a good plan will make it all go smoother.
Also note that there will not be a “control” for this experiment. If we all owned an optically perfect lens with which to test all others against, we would not have to test our lenses, right? So, your lenses, with their inherent flaws, will either be tested against themselves or other flawed lenses.
The most crucial piece of gear you will need for a lens test is a tripod. If you do not have a tripod, you will not be able to perform an accurate lens test. Period. No one that I know can handhold a camera completely steadily. Going back to the scientific process mentioned above, we need to eliminate as many variables as possible when performing our tests. Movement is something we need to eliminate in both our camera and target. I highly recommend using a remote shutter release (cable, electronic, or wireless), and if using an SLR camera, the mirror lock-up mode to reduce vibrations.
I have been told that a famous photographer once said, "I do not photograph test targets.” Well, I do. But, I am not famous. Yet.
There are lots of things you can photograph to get a solid lens test. You can do it indoors or outdoors. You can create your own target, buy a target, or print one from the Internet. You can use what is around you. The possibilities are endless, as are the opinions about what works best.
Full-resolution image available by clicking on the illustration above.
Test targets are versatile and can be used for a variety of tests. Some, like the ISO 12233 chart and USAF 1951 Resolution Test Chart, will come up on most web searches. Personally, I located the highest-resolution chart I could download and then I had it printed on photo paper at a big box store at 20 x 30" and dry-mounted on foam core. I was tempted to mat and frame it for permanent display, but all of the wall space in my home was already taken up by photos.
Is a printed test target a perfect target? No. If you want to get crazy, you can spend a lot of money on laser-etched glass targets that are used for calibrating things that are way more precise than your camera and lenses. A printed test target will be your least expensive option.
Some folks will make a homemade diorama with different objects (wine bottles, color charts, tourist trinkets) to photograph in one scene. This is fun and works well for the test, but the problem is, unless you have very understanding roommates or the only key to your photo cave, you will have to put all the objects away when you are finished and you might not be able to recreate it perfectly in the future. The two-dimensional test target gets put away into the closet when I am finished.
I kind of cringe when I go to a camera/lens review test website and see photographs of trees as a test target. Why? Well, trees move when the wind blows. Remember what I said about eliminating variables? When I do a lens test outside, I look toward manmade structures (usually stuff that humans make has a ton of right angles and sharp edges) and I try to put lettering of some sort (street sign, license plates, storefront signage) in the center and corners of the image. Remember, you are testing your lens, not creating the greatest photograph on the planet, so don't worry about composition and all the other things that you might usually consider before taking a photo.
Also, you want the things you are going to study in the image to be as close to equidistant from you as possible. When shooting a target on a wall, level your camera and aim for a vertical wall. When outside, try to find a wall or scene in the distance that will have the center and edges of your frame about the same distance away.
I have found that a well-populated bookshelf is a great tool for lens testing. Remember what book you are targeting in the center of the frame and use the writing on the spines of the surrounding books to check your sharpness. Also, the shelves, if straight, can let you evaluate lens distortion.
Speaking of distortion, the “brick wall” is often mentioned in lens-testing circles. Not the worst idea, but I would hope to find one with some signage on it to give me some sharp edges and lines to look at in the images.
If you can do it, I recommend the test target for normal (around 50mm) and telephoto lenses (greater than 50mm) and a wall or bookshelf for wide-angle lenses.
Many of us have a camera bag full of zoom lenses and prime lenses. If you have only one prime (fixed focal length lens) to test for sharpness, your mission is simple. If you have a quiver full of lenses and many of them are zooms, you will thank me later for that suggestion to get paper and pencil ready.
For a normal or telephoto prime lens, I simply set up the tripod and camera at the distance where the target fills the frame, and then I take photographs as I run through the aperture settings. When out doing non-lens-test photography, I adjust my aperture in full stops to simplify the exposure math for me. I do the same for lens testing. If you adjust your aperture in half stops or third stops, you will get two or three times the number of test images to sift through and that might be enough to make this process less fun.
For zoom lenses, I roll through each aperture setting (full stops again) at the focal lengths marked on the barrel, which usually correspond to popular prime lens focal lengths (85mm, 105mm, 135mm, etc). Of course, I will always test the zoom at the widest angle and the greatest, as well, even if they do not correspond to popular fixed focal lengths.
This is where a little planning helps. Say you are evaluating an 85mm f/1.8 prime lens, an 85mm f/1.4 prime lens, and a 70-200mm f/2.8 zoom lens. You can mount each 85mm lens and roll through the apertures, but, before you move your tripod you might want to grab the 70-200mm lens, set it to 85mm, and test at that focal length. Take notes. The image metadata will help remind you what you were doing later, but it is good to have a check-off sheet tracking your progress, so you do not waste time by repeating tests.
Also, if you are testing older, manual focus, pre-electronics lenses, your notes will help you when and if the metadata does not recognize the lens or aperture setting. When I test my manual focus lenses, I try to set up the test so that the targets fill the frame, while allowing me to focus the lens at infinity in an attempt to eliminate focus errors.
Well, you just took several dozen pictures of a test target, bookshelf, wall, or city scene. Now you get to spend some time in front of the computer analyzing the data. I start by re-naming the files with the focal length of the actual shot, and the aperture plus the name of the lens. Example: 105mm f8 - Nikkor 70-200 f2.8 AF.jpg. Then, when finished, I can easily compare the shots from a certain lens or a certain focal length by opening just those images on my screen.
Still got your paper and pencil handy? Open a series of images (single lens or single focal length) and start comparing the visual sharpness of the center of the images and the corners. Take some notes. You can also evaluate the images for vignetting and symmetry, as well. For symmetry, verify that the lack of sharpness in the corners is the same for each side of the lens. For vignetting, you can push the contrast and levels sliders to see if the corners darken.
When I compile my notes, I type them up and send the file to myself in an email, saving the notes on my smartphone. Now, when I am out shooting, I can quickly remind myself that my 50mm f/1.8 is slightly sharper in the corners at f/5.6 than at f/8 and that when I go below f/2.8 I start to lose sharpness noticeably.
Mission accomplished. Let us know if you have different proven techniques or questions. Thanks for reading and good luck with your do-it-yourself lens tests!
This is a fine article. I used it to test a Nikon 12-24 vs. a Ziess Distagon 18mm. I set the 12-24 at 18mm. I shot a rack of electronics at about 8ft in both Raw and JPEG. I am wondering, due to a comment in one of your responses: I shot all of the test at f8 on a tripod. I shot landscapes always on a tripod and at f8 and up.
sorry the word shot should be shoot in two instances here.
Thank you for the kind words about the article! I am glad you enjoyed it.
You hit the nail on the head here in many ways. At f/8 (or maybe f/5.6) the differences between a super-expensive premium lens and a kit zoom will be really only visible to pixel peepers or seen in gigantic prints viewed at close range (because that is how everyone looks at big prints!).
The Zeiss 18mm is likely sharper at wider apertures than the Nikon as prime lenses have that advantage over zooms. Also, you could see a difference in distortion and things like chromatic aberations as well, but sharpness at mid-apertures will always be close.
Beware the argument that says, "Well, if you zoom in to 200% you can see the difference." That is not a real-life comparison as no one views prints (or even photos on the web) at high magnification.
Let me know if you have follow-up questions and thanks for stopping by!
Great article. I have a Nikon D610, I bought a used Nikon AF 28-105mm 3.5-4.5 D lens. The lens is great optically, but I noticed the focal length information is not accurately displayed, it always reads 75mm. I was wondering if the lens is defective or if this information is not sent from this lens to the camera. Your help would be appreciated.
The short answer is, "I have no idea!"
I would speculate that there is an issue with the electronic connections between the lens and camera. Sometimes you can clean them up a bit with a pencil eraser or by using other means, but usually the connections work or they don't. This seems like a specific failure. Of course, other information might not be being passed between lens and camera, but it is not "visible" to you.
I would try to clean your contacts and then, if it bugs you a bunch, send it in for repair. If the lens is optically performing and the aperture and focus are all good, I would be tempted to ignore the metadata coming off the lens.
If a lens will not focus properly at the infinity marking, does this mean the lens doesn't fit far enough into the camera body or just the opposite?
Are you saying your lens will not reach infinity focus? Meaning, when focused at the infinity mark (or beyond), distant objects like stars and planets and mountain ranges are still blurry?
Many lenses focus past the infinity mark, so be sure you haven't passed infinity and started to defocus on the backside of that "distance."
If you cannot manually focus at all on very distant objects, regardless of the position of the focus ring, then there is an issue with the lens (most likely) and/or the camera mount (unlikely unless the camera was damaged) that will require testing and repair.
Let me know what you discover or if you have amplifying information.
That definitely doesn't sound like something you are going to be able to correct with contact lenses or split filters!
Your options are sending it back to Nikon or sending it to your local camera repair store (depending on where you live, there might be one). There are a few repair places in New York City and you can certainly call them and ask if they have the capability of fixing that repair.
Also, check your warranty paperwork from Nikon and give them a call to see if you are still covered.
Good luck and let me know if you have more questions! Thanks for stopping by!
Thanks. No major camera shop nearby. Probably will need to send to Nikon. Appreciate the help.
You could contact repair centers in other towns to see if they work through the mail...depending on what Nikon says, you might want to investigate this to save some money.
Hi Todd: Thanks for a very helpful article. I have a question: after taking all the shots and comparing, how large of the image usually to magnify to view in Lightroom for sharpness? 1:1 or 2:1 or 3:1. Thanks.
First of all, thanks for the kind words! I am glad you enjoyed the article.
Secondly, great question! There is no right or wrong here, but I just checked my LR and I go to 1:1. I believe that is "100%" and that would be similar in Photoshop. You can get closer, but my feeling is that, if you zoom in more, you'll only be racking up credits for a graduate degree in Pixel Peeping and that degree gets you into even less doors than an MFA!
Todd, I am following your procedures to conduct an experiment. I am trying to confirm that an APC lens (borrowed Canon EF-S 15-85 f3.5-5.6 IS) would have higher image quality than a Full Frame lens (Canon EF 24-70 f4.0) on my crop sensor (Canon 7D) body.
The plan is to shoot both lens over their similar focal lengths at the 24, 35, 50, and 70 for each f5.6, 8, and 11 appeture.
The question that remains is the focus method. Do you rely on Auto focus? If so are the lens auto focus "fine tuned" using the custom function III-05: Fine tuning your Autofocus lens for each lens?
Do you manually focus on the chart?
Do you use "Live View" to achieve focus?
Thank you for any guidance that you could provide.
Sorry for the delay in replying...I was out of town last week.
So, for auto focus lenses, I usually use the auto focus when doing the lens tests. If I get an un-sharp image at sweet spot apertures, then I would speculate that I had an AF error, or kicked the tripod.
My recommendation would be to test both lenses with auto focus on. If you don't get good results, try a round with manual focus and, yes, I would recommend Live View to assist with accuracy there as the days of awesome split prism focus screens are mostly gone.
My guess is that the 24-70 will be sharper around f/4...but at f/8, it will be harder to tell them apart regardless of the focal length.
Let us know what you found! Thanks for stopping by and, again, sorry for the delay in replying.
A whole shelf of books about Nixon ? What's up with that ?
I'll have to ask my old man...it is his bookshelf!
The target image is only 72dpi, if i would print this the quality in not very good. Is not possible upload a 300dpi version?
The original file is the same dpi...so you have it at maximum resolution. It should be sufficient for testing.
The well known ISO 12233 charts can be found online and they are at similar resolution in .pdf form.
Sorry I am not more help, Mick!
FYI, after I wrote this article I modified the ISO 12233 chart with my website and "company" logo...pretty fun to make your own test target!
Thank you for very good and very useful article.
Thanks for stopping by, Darek!
Thanks for the great article Todd. I have an old Nikkor 50mm 1.8 AI S 400,000 series lens I use on my D200 camera.This 6 element lens seams to be sharper in the mid aperature ranges than my 7 element 50mm 1.4 lens that I bought with my Nikon F back in 1969. I'm going to use your lens testing technique to check check out both lens. Do you know anything about this 50mm 1.8 pancake style lens?
That older 50mm f/1.8 AI S lens is one of my favorites! I have one on my Nikon FM3a all the time and have used it on my digital cameras as well. I owned most of the Nikon 50mm lenses before the G-series lenses arrived and I always found the 50mm f/1.8 lenses to be superior to the 50mm f/1.4 versions. Nikon didn't change the optics of the 50mm f/1.8 for several generations of lens barrels—a good thing!
I am sure the new G versions are great, but that older pancake lens is really fun to use and a perfect size!
The old 50mm f/2 is just as sharp in the mid apertures and you can find them at thrift stores for less than $20 these days!
My 1960s vintage 50 f/2 is the sharpest lens I have used owned, including hassy 6cm x 6cm and Schnieder 4x5 glass.
It was a great lens! I sold mine only because I didn't like the 6-pointed sun stars it produced.
Thanks for writing in, Paul!
I am looking for the Program to evaluate images, in Afterwards I can't find this info.
So how do you evaluate /view images?
There are a lot of different software options for viewing test images, including the default software that comes with most systems.
I personally use Lightroom or Photoshop, but those are powerful programs that aren't required for simply opening test shots and zooming into them to check image sharpness.
50mm is probably the only lens you 'll need . This probably applies if you have a camera full-frame , but still, if you have an APS-C, this lens will be an excellent investment. Both Canon and Nikon, the 50mm f / 1.8 lens is the cheapest they have for sale. Depending on the country, the price ranges between 100 and 120 dollars, so it is an excellent choice if you manage a budget. This lens will allow you to achieve images that kit lens can not perform. Having an opening of 1.8 lets you work with a depth of field very small and can explore portrait photography otherwise .
I am a big fan of the 50mm f/1.8. Thanks for posting, yabesh!
I like the signs on wall I like same image at varying light and f/stops.. I test bokah too.
Thanks for reading and sharing your tips, Matthew!
Yep, that is why I said, "as close to equidistant as possible."
But, truth be told, I am not good at basic math.
Thanks for the kind words! I am glad you enjoyed the article.
My guess is that the chart will work just fine for your drone camera. Let us know if it works out for you! Good luck!
I'm brokenhearted. I just received my new Canon 24-70 2.8 L-II lens based on rave reviews about its sharpness across the entire range. Wow, it IS sharp, the sharpest lens I've looked through. The dilemma is the awful vignetting at 50mm. The first-generation lens is MUCH softer but doesn't have anything CLOSE to the vignetting of its replacement. The lens is going back. Dang.
There is nothing worse than a broken heart! Sorry to hear about your vignetting issues.
Do you have a UV filter on the lens? Is the filter ring slim? Have you read about others with that lens having the same problem?
I hope you just got a bad example and, if you get another one, that it works great for you!
Keeping the lens. Adobe Camera Raw dispenses with the vignetting. Magic happens right in front of me.
Service from B&H is stellar!
That would actually be my dream lens! I LOVE vignetting and that lens would save me time in lightroom! Hope your repacement lens works well for you.
The rulers are generally used to find if the lens is front or rear focusing; Lie the paper on a flat surface camera set to angle above, about 25 degrees is good. Set focus to center point focus. Then focus ensuring that your auto focus hits the center of the page (with this chart I would aim right at the ruler). Take the photo and review. Repeat for valid sample group. If the auto focus is correct the sharpest part of the image will be 10 (on this chart) on the ruler.
If you camera allows it you can then set micro focus adjustments until it's spot on. I have a Sigma 1.4, 50mm that was terrible until I did this - now my favourite lens!
Luckily for me (knock on wood), I haven't experienced a focus issue with any of my lenses.
Thanks for the article. I have a question on sharpness: can lenses lose it over time? If so, is there anything that can be done to fix them? I have a lens (Nikkor 18-105mm DX VR) that can't seem to take sharp photos anymore, even on a tripod with VR off. I did a lot of home testing on it--different f ranges, shutter speeds, zooms, pre/post cleaning, tripod/handheld, two different bodies (D40 & D5500), live view vs. viewfinder, manual vs. auto focus--and can't figure out if there's something wrong with the lens or if it's just me. I don't think it's a front/back focus issue (used Tim Jackson's focus test chart), but I'm not sure.
Yes, lenses can become "less sharp" over time. This could be due to mechanicals wearing out, elements becoming misaligned slightly due to impacts, or perhaps due to fungus and haze in the optics. Are any of these the culprit for your lens? Only you can figure that out.
Also, if you upgraded your camera to one with higher megapixels, you might just be seeing that lens flaws are more noticeable with increased resolution—certainly something to think about if chasing the golden ring of megapixels! But, the fact that you are seeing it on two different bodies might cancel that argument.
You could send the lens to Nikon for a diagnosis if you can live without it for a while.
I know this isn't an answer, more of a few hypotheses for you. I hope it was semi-helpful!
To Jenny, re the Tamron 90mm, check that if it has VR, VR is off. If it is on that will produce the effect you are seeing.
Thanks for helping Jenny, Steve!
Initially, she did have VR on, but still had issues after it was turned off. We are still troubleshooting.
Great article. I noticed the chart has some sort of "rulers" at top and bottom; can I find the lens resolution power by those? and how? It would be awesome too if the letters on left and right (with the small numbers) are explained. I think this chart has more to extract from other than simple CA and vignetting check.
We based our chart on one that we found on the web. The online chart did not explain the markings, so your guess is as good as mine!
Sorry I can't be more assistance. If you want to do some homework, feel free to find the other chart and see if you can contact the designer. I would be interested if you find any information out. Maybe I will go digging, too!
I emailed the creator of the ISO 12233 chart that I found on the web, but no reply yet. I'll let you know!
Let me know when you get the test results from your fisheye lenses!
I wrote a long blog post - which I hope it would be useful. I had some setbacks but well, I hope the results can be relied on.
Thanks, TJ! Looks like a comprehensive test. I hope the chart is working well for you.
No worries! Good luck, TJ! | 2019-04-25T14:32:14Z | https://static.bhphotovideo.com/explora/photography/tips-and-solutions/how-to-test-your-lens |
The weather so far this year has not been to good here in blighty, so once again we need to cross the channel and head as far south as we can get, but with the low pound/euro rate and the high cost of fuel it may not be as far as we would like, but time will tell.
Tuesday 15th July is the date set to depart, we are booked on the 20:50 Euro tunnel, so leaving home at 6pm for the hours drive down to Folkestone, stopping at Ashford Tesco’s for last minute fresh food and a bite to eat, arriving in plenty of time to catch the train. Once in France its then the long drive down to camping La Blanchie, Suris where the van is stored, stopping on the way for a couple of hours sleep, breakfast and lunch, arriving during Wednesday afternoon. Keith has plugged the electric in, and turned the fridge on. We leave Thursday lunchtime to take the van to the Hobby dealer in Angouleme, where it is booked in for a service. Staying overnight in a tourist hotel gives us a chance to visit Angouleme centre ville. The magnificent Hotel de Ville (Town Hall) is a beautiful old castle surrounded by flower beds.
We also have a walk round the the very popular old town which is a magnet for all around to come and pass away the hours as dusk begins to fall.
After a good nights sleep, and a hearty breakfast(rock hard French stick and stale croissant), we have a few hours to spare and decide to go to the plan d’eau “Grand Prairie” for an hour. It’s a boating lake with part cordoned off for swimming and makes for a nice setting for a picnic. Another good point with France is that most parking is free, other than the busy city centres.
It is then time to go and collect the van before lunch, and then the two hour trundle down to Chris’s place (camping La Motte).
We arrive at La Motte about 2pm, where Chris made us feel really welcome, It was also nice to meet Trudi(Wombling 2006), who was also there. “leave the van there and come and have a cup of tea,” didn’t need asking twice. Chris says to treat his house as ours, and just come and go as we please. The best welcome we have had on any campsite anywhere. Unfortunately we will only be staying two nights, just to sort the van out before heading off to Spain. Chris has to put up a tipi(pronuc. Teepee) for some youngsters on a horse riding week at the local equestrian centre. On the third time of trying the sky isn’t the only thing that’s blue, but after putting a feather in his hat he gets the knack.
It’s a nice warm friendly campsite where anyone would soon settle in, a nice touch was the shower gel in the showers, which were spotless.
Chris tells us of a lake at Brossac, with a man made beach which we decide to take a picnic to on Saturday. Fortunately there were plenty of trees to sit under in the shade as it was approaching 30deg.
We also had a stroll round the old, clean, town, and took a few snaps.
and high st. Where are all the people in rural France?
Typical French cottage adorned with flowers.
Sunday 20th July arrives and it is time to move on, as there are more places to go, people to see, and things to do, but I’m sure we will return in the not too distant future. We have a 260 mile drive in front of us as we pull out the gate just before 10am, but it is mainly dual carriageway and motorway. As we head south towards Bordeaux white fluffy clouds soon appear, and the further south we go, the more cloudy it gets. As we pass Biarritz it starts to drizzle, and continues until after we cross the border and head for San Sebastian, where we turn left and head upwards into the foothills of the Pyrenees towards Pamplona. During the ascent, we are in the clouds and it becomes very misty, bit of a novelty using fog lights in Spain during summer. As we descend the clouds disperse and it looks a lot brighter. Just past Pamplona we come to Mendigorria, and camping Errota-El Molino, about 5pm, where we plan to spend 3 nights, nothing is booked. Picture the scene, we drive down the single track road towards the campsite, where there are cars parked everywhere. The caravan in front that has just arrived can’t enter due to the parked cars. There is a coach just arrived which is shedding its load of 40 teenagers. I’m now blocking the entrance, and there is a car and caravan trying to get out. Barbara turns to me and says “we’re not stopping here,” but what could I do, I couldn’t go forward, and I couldn’t go back, the receptionist was more interested in chatting on the phone, than dealing with the ever increasing queue of people, utter chaos, but this is Spain!!!
Camping El Molino, Mendigorria, Navarra, Spain.
Once we got booked in and allocated a pitch, Pedro gets on his bike to show us to our pitch, but alas the Spanish weekenders haven’t left yet so we just go on the next one. First impressions were good as it was a lush green, and fairly large pitches (for Spain). The site looks reasonably full, but by 8pm all the weekenders had gone, and there appears to be acres of space.
The site is split into three distinct areas, the touring field, the mobile home area and the Spanish shanty town.
The site is on the banks of a river, and has a park like area with picnic tables under the trees and makes for a pleasant stroll round in the evening, going up to the bar overlooking the river and crazy golf course. There is also a ducking stool for errant campers.
There is another bar and small shop, and also a swimming pool with the village of Mendigorria, within walking distance, behind it.
The one toilet block was kept clean. We were very impressed with the site, and it must be amongst the top sites we have been to in Spain. But if you want to go don’t arrive at a weekend, or during the bull running fiesta in Pamplona.
With only 3 nights/2days we do not have long for a good look around, but do our best. There are some nice drives to be had round the country lanes, and old hilltop villages. In this hilly terrain the view changes with every twist in the road. There does not seem to be much of any interest, unless you have a day out to Pamplona with its museums and other tourist attractions (we didn’t). 30 miles away is the town of Olite with its fairytale castle, which we visited in “ORF TO FIND THE SUN” last year. The best we could come up with was the roman bridge “Puente de Reina” in the village of the same name.
It is where two roads meet on the pilgrims route from France to Santiago de Compostela. The old village made for an interesting stroll round in the coolness of the evening sun, with its churches and narrow streets.
During our stay here there was a constant, strong, unpleasant wind, although we were assured this wasn’t normal, else you could spend a few days just relaxing on the site with all it had to offer.
Wed 23rd July arrives and its time to hitch up and move off, today we have 300 miles to travel on mainly autopista’s, and autovia’s via Zaragoza and Teruel and down to the Mediterranean at Moncofa, 30 miles north of Valencia. A word of warning here, we went for nearly 200 miles without seeing a garage or rest area, without turning off the road. We did pull off the main road to find a picnic area to have our lunch at.
After leaving at 9am we did well to arrive at camping Mon-Mar about 4:30, for our 8 night stay that is the only site pre-booked due to our daughter flying out to join us for 10 days.
The site has about 200 pitches (small by comparison to some Spanish sites), they are all marked by trees, and a bit on the small side. It has a small shop where you can order bread for “manana”, a bar doing cheap “platos combinados”, three small, clean, toilet blocks and a nice pool. The site itself looks clean and tidy with tarmaced roads and gravel pitches. There is also a sink between every two pitches. They have rules and regulations which are strictly enforced, such as no parking on the roadways, and silence after midnight. It is about 200 yards from the shingle beach, and a mile walk along the prom to the village centre.
Saturday is market day, time for the women to spend hours looking at bags and dresses.
Being a coastal site the main thing in the area are the beaches, although Moncofa is sand/shingle/pebbles, there are some lovely sandy beaches in the vicinity.
Moncofa is about 30 miles north of Valencia, where our daughter flies into for 10 nights, is well worth a visit. What we usually do is drive down to Sagunto and then catch the train in to the city centre. We went in on Sun 27th July, the day they were having “The battle of flowers”, a procession of about 60 horse drawn floats.
Thur 31st July, its time to move on again, this time the short 50 mile drive inland to camping Villa de Viver in the Alto Palancia region of Valencia.
Here we met up with Terry & Shirley (FM02MZO), who we saw at Twinlakes last year. I was pleased to hear they were enjoying themselves as they were generally following in the footsteps of our travels last year.
Things to do in the area:- There are lots of villages in the area which all have their fiestas in July/August, and you never know what you might come across. Whilst we were there Viver had its crowning of their Queen.
After the ceremony, it was time for the fireworks, which didn’t start till 01:15, no good if you want to be in bed by ten.
There is some nice scenery in the area, rivers, gorges, waterfalls, all which make for pleasant drives in all directions. We had a day out to Montenejos, a spa town with swimming in the river.
I hope this has given you a taste of the area, and why it is one of our favourite places in Spain.
Mon 4th Aug, and its time to take our daughter down to Valencia, for her flight home.
Wed 6th Aug, its time to move on again. Today we intend making the 250 mile drive south to the thermal spa town of Fortuna, and an English owned campsite that we found in the caravan clubs’ Touring Europe Vol 1. After doing about 200 miles by 2pm, we decided to pull into a service area for a bit of lunch. This is where our problems began, as we were robbed before we had even got out of the car. I won’t go into it now, but you can read about the incident in Topic……http://www.caravanning4u.co.uk/forum/viewtopic.php?t=11317………..
We decided to stick to our plans, and carried on to Fortuna but couldn’t find the campsite. By this time we were feeling pretty low and just wanted to go home. We didn’t know what to do, we felt that in the circumstances we would prefer a predominately English site. The only one we knew of in the area was Florantilles at Torrevieja, but knew it was only bookable through the Caravan Club as they do not accept passing trade. We rang the Caravan club at 4:55 UK time and fortunately were able to book 7 nights, starting immediately. This was not in our original plans, and having the feeling of insecurity we hardly left the site for the whole 7 days.
Wed 13th Aug, we had originally planned on going further south to Mojacar, but due to being robbed we just wanted to get to an area we knew well. We amended our plans to travel the 180 miles back to Moncofa, and camping Mon-Mar. We made sure the car was full of diesel, and we made sandwiches and put them and drinks in the car. We would not be stopping for anything on this journey. We made it in record time. We were now beginning to feel a bit more relaxed back in an area where we have been many times before. Whilst on this second visit, this year, we found a beach that we haven’t been to before at Burriana.
I spy with my little eye !!!
We stay for six nights, we would have liked to stay longer but we wanted to avoid arriving at sites at the weekend.
Tue 19th Aug. Today we make the 140 mile drive up the A23 to Teruel, then on national roads to Albaracin. Its an old walled town in the hills that people have told us about and decided it was worth a visit. There are not many campsites in the area and settled on camping Cuidad de Albaracin, - was this a mistake! We only want to stay 2 nights. At reception they tell us to go on any empty pitch, if you can find one.
Camping Cuidad de Albaracin is a smallish site with pitches to match. It has a bar/restaurant, the toilet block was adequate and kept clean but there was no pool. The site was well lit, in fact one of the brightest we’ve been to. The pitches were not much more than 10ft wide, we were glad we had a motor mover, no chance of putting an awning up here. Everyone seemed to be on top of each other, it might be OK out of the high season but not ideal in July/August. It will not be high on our list to re-visit. There were some nice views to be had from the back of our pitch though.
Things to do in the area:- As a hilly area the main thing is the hill villages and the scenery. We had a pleasant days drive out around the hills and a look at some of the villages, as well as some unusual rock colours and formations.
Thur 21st Aug. It was a nice picturesque area, but we weren’t sorry to be leaving the site after just two nights, as today we head north to the Spanish Pyrenees. Its mainly on the fast A23 to Zaragoza, and Huesca then on to Sabinanigo. On the way we do go on the national roads to pass through Daroca, where you can see hams at the roadside curing in the sunshine.
At Sabinanigo, we book into camping Valle de Tena ideally situated just off the main road.
Camping Valle de Tena:- Is a gently sloping, grassed site with tarmac roads. It is a clean/tidy looking site with 75% permanently pitched tourers/chalets. The permanently sited tourers were not the unsightly jumble that you get on some Spanish sites. It has a bar/restaurant, shop, TV/games room, swimming pool and, as an added bonus, mountain views on three sides. It also had free wifi, I could get it on the pitch but not in the van, although they told me that I would only be able to access it in the TV room.
Things to do in the area:- as its in the Pyrenees the main thing is the sightseeing. We like to go down the small lanes to see things off the beaten track, although we had no surprises here. A word of warning here, there are a lot of campsites in the area, but some of the access roads are twisty and hilly, so choose wisely. The stone built villages are kept remarkably clean, and are nice for stroll round, and a drink in the evening Here’s a few shots to give you an idea.
The highlight of our stay here was to be a 30 mile drive into France, over the pass of Col de Portalet, to go on “Le petit train Artouste”, what a disaster. As I understand it, it is the highest public railway in Europe at 6000ft. You go up to it in a cable car, then take the 50 minute narrow gauge journey to the dammed lake at Artouste. We arrived at the bottom in bright sunshine, although it was a bit chilly due to the altitude. We each bought our €21 ticket. We had an uneventful journey up in the cable car, but whilst waiting for the train it started to cloud over. We boarded the train and set off on the journey of unforgettable scenery, (or so it should be). But what did we see? We saw the clouds, it was cold, it was damp, it was bloody miserable. At the far end we had an hour to explore while waiting for the return journey. We had a cup of coffee, and huddled together to keep warm, all the time the cloud was getting thicker, and couldn’t see a thing. The return journey seemed worse as we were cold to begin with, and just wanted to get to the other end. Once we got back to the car we put the heater on and soon thawed out. We would love to make the journey again, as the scenery must be incredible, but only on a very clear day.
We had planned to stay for 4 nights, but as the weather was so good we decided to stay for 6. Having looked on the internet at the weather, we decided to go to the coast for our last few days, instead of staying inland.
Wed 27th Aug and back on the road, today we head for France and have to get over (or through) the Pyrenees. We decide to cross at Col de Somport, this involves going through the 6 mile tunnel de somport. It is an easy drive but have to wait for 15mins to go through the tunnel.
We have decided to go to camping Eurosol at St Girons Plage, midway between Bordeaux and Biarritz. We arrive about 3pm and book in and are told to choose any empty pitch, as its getting near the end of the season there are quite a few.
Camping Eurosol:- is a large commercial site with fair size pitches. It has bar/restaurant, take away, cycle hire, shop, newsagent, childrens club, mini golf and 3 pools. There are 4/5 mixed toilet blocks, which are kept clean with ample hot water. It is also only 700 metre’s from the sand beach and the atlantic rollers.
Things to do in the area:- There is not a lot to do in the local area unless you are into surfboarding or cycling. The lifeguards at the beach take their job very seriously, and do not take their eyes off the people in the sea, although the area for swimming is very restricted due to the power of the waves.
There are some lakes in the area, with man made beaches which are a safer bet, especially for the children.
Sunday 31st Aug, and its back on the road, to camping La Blanchie where it all started. We have three nights there to clean the van and get it ready for its winter lay up. Our last day on the Wednesday, it rains all day, virtually the first rain we’ve seen since the 15th July. Then it’s the 450 mile drive up to Calais, eurotunnel crossing, and get home to Chatham by midnight Thursday 4th Sept.
A total distance of 4300 miles, and £630 worth of diesel.
If anyone has any questions, or would like more info or pictures on sites visited, just ask. | 2019-04-26T12:36:07Z | http://caravanning4u.co.uk/articles6.htm |
Neither a blimp, nor a glider, nor a fuel-propelled airplane, a new aircraft promises to translate gravitational attraction into both lift and forward motion, capture wind energy with a radical new wind turbine, and usher in the era of fuelless flight.
Editor's introduction: Thinking totally out of the box and utilizing private funds, independent inventor Robert D. Hunt is pushing forward with a project that could transform air transport in the twenty-first century--if it proves successful. While Hunt's gravityplane quite reasonably could have been conceived of in the twentieth century, the materials and technologies for building it may only be available now. Even today, the craft is pushing the envelope, requiring the most advanced of lightweight, fiber-epoxy materials and a radical wind turbine design that has yet to emerge onto the commercial market. Hunt envisions a craft that will control its weight and center of gravity by balancing partial vacuum, helium, and compressed air in interior chambers. The craft will rise when it is lighter than air, and, when it is heavier than air, tilt and glide forward, or float level and sink straight down. All this is to be achieved through a computer-controlled system of pumps, valves, piping, interior chambers, and polyester-reinforced nylon balloons.
In this aircraft, compressed air serves as a source of both power and weight. The compressed air is produced through energy captured from the high-speed airstream passing by the craft as it glides downward. The energy capture is achieved by two of Hunt's new vertical-axis turbines, which sit like two counter-rotating eggbeaters atop the craft's center section.
The concept is simple, but the engineering is difficult. Every additional mechanical component adds deadweight to a structure that must weigh in as a lightweight if the craft is ever to fly. Hunt is clear that a Cessna-sized gravityplane could never fly. It would be too small. The weight of the aircraft structure and machinery would overburden even the greatest possible gravitational lift, which would be achieved if the plane's interior were evacuated to hold a vacuum.
To fly, then, the gravityplane must be big, gaining the advantage of volume over surface area as its size increases.
Will the gravityplane ever become a reality? Only a lot of engineering, model making, and testing can decide. Hunt is betting that he can make it a reality. Already a test module, a pod 100 feet long, is taking shape in a high-tech shipyard on the outskirts of New Orleans.
In the following article, Hunt writes directly about the principles, technology, and developmental process of the gravityplane.
any people do not see the fingerprint of gravity in floating battleships, buoys, and bottles. Yet a little thought reminds us that buoyancy occurs because gravity exerts a greater pull on more-dense materials than on less-dense materials. An air bubble in water and a helium-filled balloon in air, for example, both rise because of the force of gravity--because they are less dense than the surrounding fluid.
Similarly, it is easy to overlook the fact that glider aircraft can fly only because earth's pull accelerates them downward as their forward-moving wings produce a counteracting aerostatic lift. The new gravityplane simply harnesses both forces of gravity--the upward force of buoyancy and the downward pull of gravity acceleration--so that it can rise into the sky using a gas such as helium, and then glide downward like a glider using the earth's gravitational pull.
Before shifting into the glider mode, however, the aircraft must change from being lighter than air to being heavier than air. The weight change is achieved by drawing in and compressing air from the surrounding atmosphere. This moderate-pressure compressed air may be thought of as a primer load of potential energy needed to initiate the downward glide through which the craft's wind turbines will capture high-pressure compressed air.
Aboard the gravityplane, high-pressure compressed atmospheric air at about 1,500 pounds per square inch, or roughly 100 atmospheres, is a treasure store of potential energy of both height and pressure. The gravityplane is designed to take advantage of both of these. The compressed air's weight (gravitational potential energy of height) enhances downward glide speed, while its pressure is a potential energy reserve, a fuel, to run the plane's machinery. As the gravityplane operates in a cycle of rising and falling (gliding), rising and falling, it depends on high-pressure compressed air for changing between the two modes, so it must always keep a minimal supply in its tanks. In its original start-up, the gravityplane will require an injection of high-pressure compressed air from an outside source; or it may be able to capture its own high-pressure air as it sits on the ground, if the wind is adequate to drive its wind turbines (20 MPH or more).
The gravityplane's inventor, Robert D. Hunt (center), and his two chief associates at Hunt Aviation, vice president Joe Chomko (left) and president Gene Cox (right), announced the gravityplane vision at the National Business Aviation Association's annual convention in October 2003. Here, outside the convention, they express their anticipation of a bright future for fuelless flight.
crucial flight elements: aerodynamic lift, onboard power, aerostatic lift (buoyancy), and ballast (weight distribution within the craft).
In both the jet airplane and the gravityplane, air flowing past the wings yields aerodynamic lift. Here the similarity ends. Yes, the jet airplane's thrust is from air, but that's only after the air is heated and forcefully expelled by the fuel-burning jet engine. The fuel provides the energy behind air's thrusting force.
In the gravityplane, highly compressed air is the fuel providing all the plane's energy needs not met by gravity. Thus not only does the gravityplane fly through the air like a conventional plane, it also gulps in and captures huge volumes of the air. The plane will use high-pressure compressed air to drive its internal system of pumps and pipes, generate electricity, and power two outboard turbines (used for vertical propulsion at takeoff and landing and controlling the plane's direction).
The gravityplane's wind turbines hearken back to windmills in the preelectric era, when a windmill's spinning shaft would have been mechanically linked to a mill wheel for grinding grain. In the gravityplane, the wind turbines' spinning shafts are linked directly to high-pressure air compressors for capturing compressed air at 100 atmospheres. High winds from the plane's glide drive the turbines. Through being compressed, air becomes the craft's fuel and is readily converted to rotary motion when it is released through a pneumatic motor. The rotary motion in turn drives the plane's pumps and moderate-pressure compressors.
Just as water is the pervasive component of the human body, compressed air is the pervasive component of the gravityplane. The plane maintains two separate confined-air systems: a high-pressure system and a variable-pressure system. The high-pressure fuel system is contained within a limited network of high-pressure storage tanks and delivery lines. In contrast, the variable-pressure system is coextensive with the entire interior of the plane's two large pontoons, which are each subdivided into five great chambers that can hold a vacuum. Operation of the plane will require that the pressure of each chamber varies from perhaps one-half to three atmospheres (7.4--44 psi). Each chamber contains a partially inflated helium-filled balloon that expands to fill the chamber under the partial vacuum and is compressed to be nearly flat under the weight of three atmospheres of air.
If the craft needs to add weight, it pumps outside air through a moderate-pressure compressor into the appropriate large interior chamber. The compressor, of course, is driven by a pneumatic motor powered by high-pressure compressed air. The spent fuel (the previously high-pressure air) is simply added to the air supply in the large chamber.
nderstanding the basic concept of the gravityplane, we can begin to grasp the overview of its flight cycle and the way it manages air for flight advantages never before achieved. By capturing high-pressure compressed air during its descent, for example, the craft naturally increases its weight and thereby increases its glide speed. "Increased weight implies increased glide speed" is a well-known principle of glider flight, but no previous gliders have had the option of adding weight once they were launched. With its full embrace of air as both fuel and ballast, the gravityplane opens a new era of the high-speed, long-distance glider.
When executing a steep dive or floating on water like a seaplane, the gravityplane will fold its wings back.
craft gains potential energy that in its falling is converted to kinetic energy of motion. This energy gain is in direct relationship to the height attained.
If in its ascent the craft fails to gain sufficient altitude before the glide begins, then in its gliding descent it will fail to store enough high-pressure compressed air to complete another ascent-descent cycle. To complete the cycle, it needs to halt its descent by pumping a partial vacuum into its chambers so each is filled with its low-pressure helium balloon. Then the gravityplane must rise again to an effective altitude, carrying sufficient high-pressure air to run the compressors that take in the air that allows it to become heavy enough to fall again. The aircraft would normally land with a significant load of compressed air--its fuel for later use, including thrust for vertical takeoff.
While the craft is on the ground or floating on water, its wind turbines can generate power so long as the wind blows with a sufficient velocity. This allows the supply of compressed air to be fully charged after short flights that do not produce sufficient compressed air to resume high-altitude flight. On the ground, operation of the wind turbines also provides high-pressure compressed air that can be used to produce electricity if a pneumatic motor is connected to a generator.
reating this radical glider-blimp hybrid stretches the imagination of designers and engineers alike. It also challenges the most advanced manufacturing facilities. How can we begin to construct such a craft?
Once the basic design plans are in place, the materials search leads to such strong, lightweight materials as carbon fiber or Kevlar bonded with epoxy resin. These will be used for constructing a rigid frame and outer skin, and the helium bag in each chamber will be made of lightweight, nonporous polyester-reinforced nylon. Studies already completed for Hunt Aviation give the green light for construction to begin. They show that a lighter-than-air craft with internal chambers each occupied by a helium-filled balloon can be built of these new ultralightweight materials.
A single layer of Kevlar bonded with epoxy resin can cover an area of a square yard while weighing as little as three ounces. Built up into multiple layers, the Kevlar composite becomes rigid and strong. The studies affirm the value of making a lightweight rigid aircraft by coupling a Kevlar composite shell with a rigid, carbon-fiber framework. Such a craft, the studies show, could weigh as little as 16 ounces (one pound) per square yard of surface area.
Realizing the potential of the gravityplane requires that it be made big. This size prerequisite is apparent from a property of enclosed spaces that is well known by balloonists. Bigger balloons hold more gas per square foot of surface area than smaller balloons do. The gravityplane follows the same principle even though it is more complicated, with its rigid shell requiring a rigid frame and internal balloons as well. Calculations show that to carry the same load, the gravityplane would need to be about 50 percent larger than the 747.
Century Aerospace: Bringing together experience from major aircraft manufacturers of both large and small planes, including Boeing, Cessna, Lear, Lockheed, and Rockwell, Century's design team will help direct conceptual design of the prototype gravityplane. At later stages, Century will be instrumental in the gravityplane's certification process.
The Mississippi State University Aerospace Engineering Department: Faculty in the department are conducting a nine-month evaluation of the gravityplane's technological feasibility under the title "Systems Analysis of the Hunt Aviation Gravity Powered Airship."
United States Marine: A builder of lightweight and strong vessels for the U.S. Special Forces, United States Marine is in the early stages of building the first, 100-foot-long pontoon.
The gravityplane embodies so many new ideas and design concepts that testing the concept requires starting with one part of it: the pontoon (lifting body). Each plane will have two pontoons, but testing begins with one. It will be 100 feet long by 20 feet in diameter and have five internal chambers, each 20 feet long and containing a polyester-reinforced nylon balloon. Both the exterior and the dividing walls of the chambers will be strong enough to hold a vacuum, and the entire unit must be built out of materials that are of the lightest weight possible.
As this article is being written, engineers are finalizing plans for a prototype of the lifting body to be constructed by United States Marine within the next few months. The full-size pontoon shell constructed of the lightweight composite materials will weigh just 712 pounds, and the polyester reinforced nylon collapsible gasbags plus the cell dividers will add 152 pounds. Thus the pontoon's total weight should be only 864 pounds. When that weight is balanced against the lift provided by helium in its bags, the pontoon's net lift is 1,108 pounds.
Maximum lift will be obtained by the use of a partial vacuum outside the gasbags, allowing the helium within them to expand without opposition from atmospheric pressure at sea level and expelling air from between the gasbags and the pontoon shell. In this way, the helium pressure within the gasbags can be lowered to substantially below 1 atmosphere (14.7 psi).
These tests will provide data that will be crucial for developing the complex flight-control systems needed to manipulate the gravityplane's constantly changing weight and weight distribution. As the gravityplane flies, it will need to constantly monitor and adjust each cell's lift characteristics through the use of a computer program. This program will be constructed from scratch, starting with the results of the tests on this first module.
n the foundation of successfully testing and modifying the first pontoon, we plan to build the first prototype gravityplane, starting by building the second pontoon. The two pontoons will be bridged together and fitted with wings and other aircraft flight-control structures, such as ailerons and a rudder. The bridge section will be fitted with a minimal pilot's cabin, a wind turbine, and a small thruster-propulsion turbine.
Although the unit will be manned in flight, it will be tethered to the ground at very low altitude (probably less than 500 feet). With both wings and pontoons, the prototype will provide valuable data about the gravityplane's fundamental premise that aspects of buoyant lift and aerodynamic lift can both be beneficially incorporated into the same craft.
In many ways, this tethered device may be considered a flying wind turbine that employs both aerodynamic lift (like a kite) and aerostatic lift (like a helium balloon). When the wind is blowing, power will be generated and stored as high-pressure compressed air within pipes inside the pontoons. A portion of the compressed air will drive a pneumatic motor that will power an electrical generator to provide onboard power and charge the craft's batteries.
One option will be to store so much high pressure (and hence heavy air) that the gravityplane's weight will overcome the combined upward force of the wings' aerodynamic lift and the pontoons' aerostatic lift, causing the craft to sink to the ground. Descent and landing could be controlled more precisely by using the propulsion turbine powered by high-pressure compressed air producing a downward thrust. Likewise, the craft can practice vertical takeoff by downward thrust that also reduces its weight as the air is exhausted through the propulsion turbines.
After the gravityplane passes all its tests and gains experimental flight-class certification, it will take its first free flight. Ascending and descending runs in the aerostatic lift mode will eventually lead to the aircraft's initial gliding descent, in which it will attain substantial velocity of perhaps 100 MPH. The craft's relatively small size will limit its maximum altitude and hence its maximum speed.
Assuming no insurmountable obstacles, the first prototype will likely be followed by a larger, more complete model capable of long-distance, sustained flight through the gravityplane's distinctive series of cycles alternating between buoyancy-lifted ascents and gravity-driven, gliding descents.
Bringing the gravityplane into commercial operation as an alternative to fossil-fuel-powered aircraft will require a decade or more. The craft will be so different from any existing flying machine that we probably cannot begin to imagine all the forms it may take and the uses to which it could be put.
For now, however, dreams of future flights must wait. The next step is clear: build and test the first pontoon.
Robert D. Hunt, the founder and president of Hunt Aviation, is an independent inventor holding more than 50 patents. Earlier in his career, he worked as a nuclear designer for Newport News Shipbuilding, a division of Tenneco Oil Company. | 2019-04-23T09:55:49Z | http://www.renewableone.com/fuellessflight/flf/huntnews.html |
Ah, we are up to our 16th edition of pop from around the globe. Yes, we work our fingers to the bone scouting good music, and all you need to do is relax and enjoy it.
I operate with very few rules here: Write about music I like, spell most words correctly, don't press the "publish" button unless mostly sober (this one is more of a guideline than an actual rule), don't insult anyone's close relatives, and pay attention any time Vieux Farka Touré releases and album. So here we are, with Touré releasing The Secret on Six Degrees Records.
The Secret, produced by Soulive's Eric Krasno, builds on Touré's strengths in combining traditional music of his native Mali with American blues. Moreover, it includes collaborations with Dave Matthews, Derek Trucks, John Scofield, and another African guitar legend, Vieux's father, Ali Farka Touré.
"The Secret" -- Father and son, in their last recorded session before Ali died. Nothing more needs be said.
Chill sounds from Burning God Little is our next offering. Burning God Little is the performing name for Martin Hartgen from Oslo, Norway. Hartgen's music fuses elements of shoegaze, dream-pop, and electronic. It is good, upbeat stuff.
Toronto duo Dog is Blue describe their music as "garage folk". As I understand it, the idea is to take the themes from folk but leave behind the earnestness. The members are Paul Watson and Laura Heaney.
Gil Scott-Heron died yesterday after years of struggle with various demons.
But his legacy is significant. "The Revolution Will Not Be Televised" in 1970 was like capturing lightning in a bottle. Staggering. If you've never heard it, or at least not for a long time, you owe yourself a careful listen.
And seemingly every Facebook friend I have has posted something about Gil since yesterday. I had not seen this video before. And what a great piece of music.
I woke up today thinking I'd do this next week for the Soul Corner but it shouldn't wait.
Did you hear? Radical Face.
One of the joys of my life is that my teenage daughter has impeccable taste in music. By that I don't mean to say she likes everything I like. That actually would amount to a certain level of taste on my own part that I do not claim. Our relative musical leanings could be charted with a two-circle venn diagram, with the overlapping part making up the majority of the surface area. (I have this buddy, Jay, who lives in San Diego. I don't really know what he does, but I do know he can do awesome venn diagrams. If I can find one of his old ones, I'll try to link to it. They're freaking awesome. You don't think a venn diagram can be awesome until you've seen one of Jay's.) But she can't stand some of the harsher crap I play, and sometimes she'll put something on that she thinks is great but which is unidentifiable as to genre, unless there is a genre called Utter Shite.
But were it not for her, we'd never have played bands in our house like Neutral Milk Hotel, or Silver Jews, or, more recently, Girls and Frightened Rabbit, and bunch of others. For whatever reason, I'd considered and never pulled the trigger on any of those bands, and she thankfully corrected those mistakes. Then there are the times she'll bring something home that I've not only not considered, but never even heard of, and one of those times is what this post is about.
A couple of years ago she put on the album Ghost, by a Jacksonville Beach, Florida musician named Ben Cooper who records as Radical Face, among other things. She said 'you have to hear this.' I probably responded with an appropriately skeptical "you have just wasted your money" paternal grunt or something, and then was pretty much blown away at first listen. It's so expansive and beautiful that it's hard to believe it was recorded in a bedroom studio by one guy. It's mercifully spare in electronics, and rich in acoustic guitar -- except where the drama of a symphonic flourish is necessary.
Really, though, the best way to describe it is to say it's a movie score looking for a Wes Anderson film. Here's a really nice video for the first proper song on the album, "Welcome Home.
The album didn't receive many reviews when it came out in 2007, and those it did receive included a few tepid responses. I think full-on terrific, all the way through. Here's another track off Ghost, called "Wrapped in Piano Strings."
I found myself checking up on Radical Face recently and discovered they/he released a 6 song EP, Touch the Sky, via Berlin's Morr Music, and that the plan was to release 3(!) full-lengths, 40 songs all told, during 2011. Apparently a dispute with the label erupted, and the damned lawyers got involved (imagine: German Lawyers! Ja vohl!). Now he appears to have put that behind him, and is planning to do the releases himself. I'll keep an eye out, because who doesn't want to reward that kind of DIY spirit? Here's a really nice tune from the EP, called "Doorways."
Radical Face website -- Ben's a really good writer. Check it out.
I'm intrigued enough to subscribe to the RSS feed for this little music competition bracket, and learned to my horror today that Iron Maiden is beating Neil Young. I guess Neil's a pacifist and all that, but still.
The Soul Corner takes requests and this week we got one for the great Stevie Wonder, whom of course we were going to get to at some point. I am from Detroit after all, and Stevie is one of my mainest of main men. He's a gifted giant of a musician, and a talented writer, philanthropist, community leader, singer, producer, and a great American. He's in the Bob Dylan / Ray Charles stratosphere, in a league of his own.
So we can't highlight just one song as we generally try to do here.
Stevie's most creative period was 1972-76 when he released 5 classic concept albums that took Motown and R&B to heights not achieved before or since. The Beatles and Stones might have put 5 in a row out this good, we could argue the point, but that's about it. This run was and remains a staggering achievement. The musical and thematic reach of these records cannot be overstated.
We could write a book on this period, but we'll settle for 5 quite varied songs to ever so partially tell the story.
We'll go in chronological order, starting with Music of My Mind, which along with Marvin Gaye's What's Going On, took Motown to far more personal and experimental terrain. This vid is a later live version of "Superwoman" from that record. It was a bold step forward for Stevie, far from the standard Motown sound. I love this vocal, especially at the song's conclusion. You've heard thousands of break up songs in your life, but few with this kind of raw emotion.
And last but certainly not least in this quintuplet of genius, was the double record Songs in the Key of Life, one of those pieces of nearly unparallaled American artistry that everyone needs to own a copy of. The choice here is "Pastime Paradise", a bold experimental song that broke a ton of new ground and influenced everything after it from prog rock to hip hop. It's an incredible piece of music.
Rock, soul, R&B, experimental, progressive, love ballads ("You Are the Sunshine of My Life"), a classic ode to a child coming into the world ("Isn't She Lovely"), Stevie did it all and then some in these 5 records in just 4 years. He was at the top of his game -- composing , producing, writing profound lyrics, and playing nearly every instrument. Wow. The Soul Corner bows down to the uniquely talented and peerless Stevie Wonder.
By any reasonable measure, Seapony is having a good year. The buzz for the Seattle band has been building for months, their LP is being released on May 31 by Hardly Art, a subsidiary of Sub Pop, and The Pains of Being Pure at Heart selected them to open for them when they played here in April. And as you listen to "Dreaming", the opening song of the album, you can see that the buzz is well deserved.
The group consists of Jen Weidl, the singer, Danny Rowland, the primary songwriter and guitarist, and Ian Brewer, the bassist. Danny and Ian have known each other since high school days in Oklahoma. They moved to Washington in 2001. Danny then spent a few years in Ohio, meeting and moving back to Washington with Jenn in 2010. "Dreaming" had been composed back in Ohio, but the remainder of the songs on the album were composed after the group was formed last year.
The most obvious components of the band's sound are the female vocals and the fuzzy, jangly indie pop guitar. The music is simple, honest three chord songs of under three minutes with engaging hooks and lyrics focused on romantic matters. Timekeeping duties fall to a simple drum machine. To me, the band's sound is a blend of Beach Fossils and Pacific Northwest icons, Beat Happening. The Beach Fossils reference is obvious, and most relates to sound. As for The Beat Happening comparison, I think it is more in terms of structure and attitude. I admit that Jen's engaging, breathy vocals won't be mistaken for Calvin Johnson's deep tones. But the simple melodies, DIY feel and emphasis on the classic song performed with conviction is what Beat Happening brought to the table. And it seems to me that Seapony does that as well. Music like that can get overlooked when the listener is looking for showmanship, wild guitar runs or clever electronic beats (all of which can be quite nice, by the way). But joys of a Seapony song won't fade away when faced with a new musical fad.
I expect this band to grow and provide its fans, which includes me, with good songs for a long time. But for the present, I doubt that fans of indie pop will find a more perfect summer album than this one.
And if you want to taste the entire cake to evaluate for yourself, here is a generous chance to stream the entire album. Enjoy, lucky people.
One final note for Seattle fans, the band's album release party is June 2 at the Vera Project, and the other band on the bill is 14 Iced Bears. For Seattle fans of live indie pop, you may not have a better gig available for a long while. Here is the Facebook event link.
Just a great little six-song EP Will Johnson of Centro-matic sat down with Jim Eno of Spoon and recorded in February. All acoustic and pretty stripped-down, though there's a bit of reverb here and there.
Here's an interview with Will subtitulada espanol, as they say in Spain. Talks about Texas, the origins of Centro-matic, the new album (out June 21, tour starts the next day) and other things.
For reference, here is our review of the album.
Glasgow's dance rock outfit The Dirty Cuts gives us "2 Page Spread", making it the second week in a row we've featured knife crimes in Cool Video Thursday. What is happening to this place?
2 Page Spread / The Dirty Cuts from Robert McKillop on Vimeo.
And now for something completely different, Aidan Moffat and Bill Wells provide a song and video showcasing Moffat's off kilter sense of humor and Well's stunning musical sense -- "Copper Top". As Moffat says in the song, "Birth, love, and death: The only reasons to get dressed up."
Happy 70th Birthday Mr. Bob Dylan!
My friend the great musician/writer/producer Joe Henry said this at his Facebook page: "Let us begin to celebrate the 70th birthday of the man who for some of us has been thomas jefferson, harriet tubman, james dean, federico fellini, and muhammad ali, all stitched upon a single frame. rave on, bob..."
And also, my very favorite of his more recent work, a song that captures all the uncertainties of a middle aged man. The span of Bob's artistry and reach is literally a lifetime, many lifetimes actually, mine, his, and many who came well before and well after ours.
I am posting a short bit on a soul song every Friday for the Soul Corner, a WYMA feature this year. For 2012, I'm leaning towards Bob Dylan Friday.
The city of Stirling gives us indie pop group Miniature Dinosaurs. The groups consists of Barry Maclean (Vox, Guitar), Alban Dickson (Bass Guitar), Craig Ferrie (Guitar, Synth), and Sam Waller (Drums). The group only has been actively playing shows for a couple of years, but have released two EPs and a single in that period. Somewhat unusually, they have a clothing endorsement contract.
Here is a live studio performance of "Cold Shoulder". I like the vocal styling on this song; it reminds me of Franz Ferdinand.
We See Lights are an Edinburgh area collective that was formed in 2007. They list their members as follows: "We See Lights are from time to time; Stephen Bogle, Paul Dougall, Ross Harvey, Jonathan Lapsley, Allan Rae, Paul Livingstone and many others." The style is twee pop, indie pop, folk rock. They released a six song EP, Twee Love Pop, on April 30, 2011, on the Heroes & Glueplots label.
"Hope You Like the Smiths"
Crayons are from Dunfermline, Scotland. The sound is indie pop, but the difference from many bands, I think, is in the somewhat unusual rhythms. There music seems to reflect a number of influences, and the result seems to be more of a weave, than a blend, so you can appreciate the components as you listen.
Crayons are Sean Defrancesco, Greg Robins, Andrew Carty, and Nick Hernandez, and they are another unsigned band chosen to play T In The Park this summer.
Philadelphia has given us some of the most enjoyable, if underappreciated, rock music of the last 10 years or so. Think about it, there's Marah, Living Things, Dr. Dog, Free Energy, you could probably think of another quick dozen or more off the top of your head. These are bands that collectively have made and are continuing to make great record after great record, and yet relative to their considerable artistic merit, they remain frustratingly obscure. How about a little more frustration?
The Philly band Restorations (if you want to google them without getting every home improvement site out there, try "restorations the band") recently released their self-titled debut full-length, and it's a shoo-in for my year-end top 10. At just under 35 minutes and 8 songs, it's really a tremendous album, with big, indulgent song structures and sheets of beautiful sound.
Consider, for example, "Neighborhood Song", with its crashing bar chords giving way to a melancholy verse about remembering your childhood as you grow older (I think). The song ends with a pounding bassline, over which Jon Loudon's shopworn voice sings, "The song of the neighborhood/Sung like the song of the world" and then all sonic hell breaks loose for another minute, and then slows down before it breaks loose again for another couple of minutes. You'd think a band these days couldn't get away with a lyric like that, but it works so perfectly here. Listen to it, and it'll make the hair stand up on the back of your neck.
People who hybridize music tend to be insufferable, like a bunch of idiots dressed in black standing around talking about what they taste in a glass of wine (It's peppery! I taste marbles!) but dammit I'm going to do it. Rocksteady and I are huge fans of the now defunct Brooklyn band Pela, and I think there's a good bit of that genius flowing through these songs. So maybe Restorations is like Pela with a good deal more noise heaped on top (which is never a bad thing). That noise has connections to shoegaze acts like Catherine Wheel. Loudon's hoarse vocals do remind me of Rob Dickinson at times. These songs also will make you think at times of some of the Scottish bands that make melodic noise, like Frightened Rabbit or Twilight Sad, or just melodic music, like, I swear, Glasgow's Blue Nile (mainly because the vocal melodies at times sound like Paul Buchanan).
In the end, though, it's really an American sounding record, with American excesses that make it one of those off-the-radar albums you shouldn't miss. Here's another fantastic tune, "Broken Vacuum", with a beautiful, chiming lead that, if you're old enough, will resurrect dim memories of the Alarm or Wire Train.
For all the talk of great vocals and guitars and bass, if anyone gave me a Heisman vote on this album I'd give it to the drummer (I'll edit if I'm able to figure out his name -- I did, courtesy of the Restorations page at the site of their record label - Tiny Engines. Oh, his name is Carlin Brown). In this wonderfully produced record, drums are put front and center, and are a propulsive, emotive force. In the dozens of dramatic changes in the songs, it's the drums that lead the way, most notably in the middle of the second track, "West River." There's not a lot of quality sounding live stuff up yet on youtube, but here's a pretty decent (and criminally underviewed) version of that tune.
Bands this great deserve your support. Here's the Bandcamp page where I was able to download this excellent album cheaply and without adult supervision.
I'll be writing much more on the Parson Red Heads as the release of their new CD Yearling approaches this summer, but here's an audio peek and way to download the lead track "Burning Up the Sky".
It has all the features that make me love this band so much - gorgeous harmonies, tremendous lead vocals by Evan Way, positive spirit, tight writing and disciplined arrangements, just perfect power pop music.
The new record is a big step up for the band, who got great production and engineering help from alternative pop legends Chris Stamey and Mitch Easter.
Fans of Rocksteady74's Scottish pop series should like this band this a lot. Stay tuned in months ahead as WYMA will be all over the Parson Red Heads and Yearling. | 2019-04-26T04:00:03Z | http://whenyoumotoraway.blogspot.com/2011_05_22_archive.html |
This is the 43nd in our articles series and I hope this information is helpful.
After Prometheus defies Zeus and brings fire back to humans, Zeus blows his top. He will not tolerate insubordination, even from his elders. He punishes both Prometheus and humans, with a two-fold previously unknown concept of punishment involving interminably cruel and unremitting horror and suffering. For Act One, he chains Prometheus to living hell, and for Act Two, using Pandora, he unleashes synthetic biotoxins on humankind.
If we take Prometheus to be phosphorus, for reasons I've suggested earlier, and apply some modern knowledge of chemistry to this "tale", then this tug of war begins to make more sense.
According to the Encyclopedia Brittanica, Arabian alchemists of the 12th century may have isolated elemental phosphorus by accident, but the records are unclear. In 1669, the Hamburg merchant and alchemist Hennig Brandt heated the residue from evaporating urine with powdered charcoal, and condensed the vapor that was evolved into a waxy solid. This solid glowed in the dark, without heat, an astonishing phenomenon. He called the mysterious substance phosphorus, taken directly from the Greek phosphoros, "light-bringer." Now isn't that interesting. That's what Prometheus did; he brought humans LIGHT as fire.
This was, incidentally also the name of the planet Venus as morning star, "Lucifer" in Latin. And interestingly, that is what Pandora turns out to be, a "Lucifer" in disguise, and she is half of Zeus's punishment for Prometheus stealing the fire.
Cornucopia Tip Top Angel Safety Matches from Sweden.
The discovery of phosphorus created quite a stir, and soon nobody was throwing away urine. Just imagine the smell. Travelling alchemists amazed royal audiences, and it was the talk of the time. A normal person excretes about a gram of phosphorus daily. It gave the name to phosphorescence, which is the nonthermal emission of light after removal of the stimulus, in contrast to fluorescence. The light Brandt observed was chemiluminescence, consequent to the combination of the phosphorus with atmospheric oxygen to form the trioxide. This was burning, but the light is not due to thermal excitation. When the pentoxide is formed, there is no chemiluminescence.
The only common mineral of phosphorus is apatite, Ca5F(PO4)3. Apatite is a family of minerals, of which the one called fluoapatite is the commonest. Its' hardness is 5, medium hard, and its density is 3.15-3.20 g/cc. It occurs in two principal forms, crystalline apatite, and phosphorite, which is cryptocrystalline. Crystalline apatite is of inorganic origin, while phosphorite is the remains of animal bones. Bones and teeth are made of apatite, a specially hard version of which forms tooth enamel. If there is insufficient fluorine, then the apatite made is faulty, and the teeth are soft and decay easily. Bone is made of hydroxylapatite, but there is fluorapatite in teeth. Phosphates are found in a variety of rare minerals, but never in significant quantities. The generic term for a rock from which phosphorus can be economically produced is phosphate rock.
Elemental phosphorus is produced in electric furnaces by heating phosphate rock, sand and coke. The silica combines with the phosphate rock to give calcium silicate, a slag, and phosphorus pentoxide. The pentoxide is then reduced by the coke to give phosphorus vapor and carbon monoxide. The phosphorus is then condensed and cast into sticks, which are kept under water. The carbon monoxide can be used as a fuel.
Fertilizer, which is a soluble phosphate, is produced by treating phosphate rock with sulphuric acid. Fertilizer used to be made from Florida phosphate rock but that resource is near exhaustion. The largest reserve of phosphorite in the world is in southeastern Idaho and western Wyoming, from the Phosphoria formation of Permian age. The Phosphoria is a widespread formation, consisting of shales, limestones and chert in addition to phosphorite, which is localized in certain areas. It includes oil shales, petroleum, and the black shales that are the source of petroleum. Quite clearly, it was associated with a time of abundant life in shallow seas.
Late Cretaceous landscape backlit by a setting sun.
The end of the Permian, when the Phosphoria was laid down, was also the time of the greatest extinction of life that the Earth has known. Nearly 90% of all life perished for unknown reasons in a geologically brief interval, and the Earth made a new start in the Triassic period that followed.
"My animation of this impact, now widely called the 'K-T Event', can be seen at the Smithsonian's Hall Of Meteors at Washington D.C.'s National Museum of Natural History."
The phosphorite, an unusual deposit, probably records a great dying, when the phosphorus from the bones of countless animals was converted to apatite in a shallow basin that was covered by sediment before the deposit could be dispersed.
Whether or not the Titanomachy myths represent a metaphor for such an event, I will leave up to you.
If you've ever tried to start a fire from scratch, you know it's difficult. If not, try it.
Lighting a fire in the winter.
The challenge is always to get the fire started. Once started, fires often burnt continuously for hours. Because most fires are, and were, built to last, it's not unreasonable to devote some time and effort to the process. There are distinct steps to the process, each step requiring successful completion of the previous one. You need a spark, and you start small and build up, using tinder and then kindling.
In short, you first need a spark, and a spark is not so easily come by. You also need good tinder. Good tinder is essential to fire-lighting. The spark is first caught in the tinder, which causes the tinder to make a small glowing ember. Tinder is dry, powdery, easily-combustible matter. In the past, charred linen made good tinder. Today, dry leaves and rotten wood can be powdered to make tinder (called "punk" in America). This small ember is then turned onto some highly combustible material, such as dried grass or shavings of resinous pine wood, or finely shredded paper. By gently blowing, the temperature of the ember can be raised sufficiently to ignite this material, and a visible flame appears. This "starter" fire can then be used to light the kindling placed beneath the main combustibles; the kindling is usually split sticks of dried wood, or often crumpled newspaper, and it is placed beneath the main combustibles, which are larger pieces of wood or coal that can burn sedately. This effort, to literally "build" up a fire, usually gives you great satisfaction. There's now a cheery fire where before there was only a cold home and a cold wood stove; the radiated heat warms the entire house and every being in it.
Blowing on the fire. 1950 Kampvuurtje maken.
Without steel, sparks are a rare commodity. Fire in villages were usually kept going continuously since they were so hard to light impromptu. Instead of waiting for lightning, friction can be used to create a glowing fragment. The most efficient way to do this is with a drill operated by a bow. A hard wood rod is rapidly rotated back and forth in a soft wood, which provides the tinder automatically. With luck and effort, an ember is created with which a fire can be started. In popular lore, this is "rubbing two sticks together," which greatly depreciates the skill involved.
How to start a fire using friction. Allumer un feu par friction.
Most people today really cannot create a fire from scratch in any way. Today most people use "lighters" containing a little metal alloy held against a wheel by a spring button; this gives off sparks as the wheel goes round, and the sparks are then caught on a wick saturated with a combustible liquid, or the sparks pass near an opening from which combustible gas is issuing.
In the past, every traveller carried a tinder-box containing a piece of steel, a piece of flint, and a supply of reliable tinder. I believe the mechanism worked thus: when the steel was struck against the flint, a small fragment of steel was dislodged and heated by the distortion of the impact, and because finely divided iron catches fire readily in air, it was a burning spark that landed in the tinder. That little glowing granule of tinder is then tipped out onto the kindling, so the fire can be blown into life.
What are these campfire boys cooking?
This should help you understand why humans were so strongly motivated to invent the strike anywhere match.
Oscar J. Friedman, Safety Match Folder Patent Application #US1167990. Patented 11 January 1916.
It is remarkable and wonderfully ironic that the artificial chemical element Promethium is named after Prometheus.
Now, back to our story, hopefully better equipped to make some sense of it.
After Prometheus defies Zeus and brings fire back to humans, Zeus blows his top. He will not tolerate insubordination, even from his elders. He punishes both Prometheus and humans, with a two-fold previously unknown concept of punishment involving interminably cruel and unremitting horror and suffering. For Act One, he chains Prometheus to living hell, and for Act Two, he unleashes synthetic biotoxins on humankind.
For Act One, he orders his two servants, Force and Violence, to chain Prometheus to a rock peak in the Kaukasos, the Caucasus mountains, using unbreakable adamanite chains.
Illustration of Prometheus, from The golden fleece and the heros who lived before achilles Colum, Padraic, 1881-1972 and illustrated by Pogány, Willy, 1882-1955.
For "adamanite chains" you can read "super magnets". Adamanite is magnetite, also known as Lodestone. Lodestones were used as an early form of magnetic compass; magnetite preserves a record of the Earth's magnetic field and this has been much studied ( https://en.wikipedia.org/wiki/Magnetite ). This magnetic rock is indigenous to the Calkos region where this story takes place; the area is known for an extensive knowledge of metallurgy and chemistry. Media, as in Jason and The Argonauts, was from this region and she was a master priestess of chemistry (she gets center stage in an upcoming article). Small grains of magnetite occur in almost all igneous and metamorphic rocks.
Prometheus held by a pair of adamantine chains, and the Eagle. Vatican Museum, Rome. Der gefesselte Prometheus mit dem Adler; links sein Bruder Atlas (Trinkschale aus Cerveteri, um 560/550 v. Chr., Vatikanische Museen, Rome).
"Magnetite is a mineral and one of the main iron ores. With the chemical formula Fe3O4, it is one of the oxides of iron. Magnetite is ferrimagnetic; it is attracted to a magnet and can be magnetized to become a permanent magnet itself. It is the most magnetic of all the naturally-occurring minerals on Earth. Naturally-magnetized pieces of magnetite, called lodestone, will attract small pieces of iron."
"A Lodestone is a naturally occurring piece of magnetic iron oxide. It is often bound in a brass frame, and is oriented to place the magnetic poles at the ends. The word magnet comes from the region called Magnesia in Asia Minor. The word lodestone comes from the use of pieces of ore from Norway and Sweden which were suspended and used as guiding or leading stone; the Saxon word Læden means "to lead". When constructing a lodestone, the two natural poles must first be located by the use of iron filings. The stone is then shaped appropriately. The natural poles are on the right-hand side with a soft iron keeper across them."
Zeus dispatches his symbolic Eagle, the Aetos Kaukasios, a.k. a. the Caucasian Eagle, Greek Name Αετος Καυκασιος, transliteration Aetos Kaukasios, Latin name Aquila Caucasium. The Eagle is sent to eat Prometheus's ever regenerating liver every day, because Zeus knows Prometheus's liver regenerates overnight (remember, Prometheus is an immortal Titan). Prometheus is thus supplying the Eagle with an endless supply of take out liver paté.
Heracles, shooting at the Caucasian Eagle to free Prometheus, Athenian skyphos C6th B.C., National Archaeological Museum of Athens.
"Ready-witted Prometheus he [Zeus] bound with inextricable bonds, cruel chains, and drove a shaft through his middle, and set on him a long-winged eagle, which used to eat his immortal liver; but by night the liver grew as much again everyway as the long-winged bird devoured in the whole day. That bird Herakles (Heracles), the valiant son of shapely-ankled Alkmene (Alcmena), slew; and delivered the son of Iapetos from the cruel plague, and released him from his affliction--not without the will of Olympian Zeus who reigns on high, that the glory of Herakles the Theban-born might be yet greater than it was before over the plenteous earth."
A white headed eagle in the nest. Un aigle à tête blanche sort de son nid enneigé.
Avian magnetoreception is a well established scientific fact, although everybody is still very busy guessing how birds do it. Most of the avian magnetoreception theories rely on Earth's magnetic field affecting magnetite Fe3O4 (iron oxide). Several species of birds are known to have magnetite crystals in the dendrites in their upper beaks; with cryptochromes in their retina, they have magnetoreception, the ability to sense the direction, polarity, and magnitude of the ambient magnetic field. There's also evidence that magnetite exists in the human brain but its' role there is a mystery.
President Donald Trump with a live Eagle on his desk.
Birds would have no problem finding Prometheus chained with magnetic chains to a magnetic rock peak. Avian magnetoreception is a fact that cannot have gone unnoticed in the past.
Lightening would find Prometheus were he located on a peak; here lightening strikes the NYC Chrysler Building.
"Many relations are made, and great expectations are raised from the Magnes Carneus, or a Loadstone, that hath a faculty to attract not only iron but flesh; but this upon enquiry, and as Cabeus also observed, is nothing else but a weak and inanimate kind of Loadstone, veined here and there with a few magnetical and ferreous lines, but consisting of a bolary and clammy substance, whereby it adheres like Hæmatites, or Terra Lemnia, unto the Lips. And this is that stone which is to be understood, when Physitians joyn it with Ætites, or the Eagle stone, and promise therein a vertue against abortion."
"The other relation of Loadstone Mines and Rocks, in the shore of India is delivered of old by Pliny; wherein, saith he, they are so placed both in abundance and vigour, that it proves an adventure of hazard to pass those Coasts in a Ship with Iron nails. Serapion the Moor, an Author of good esteem and reasonable Antiquity, confirmeth the same, whose expression in the word magnes is this. The Mine of this Stone is in the Sea-coast of India, whereto when Ships approach, there is no Iron in them which flies not like a Bird unto those Mountains; and therefore their Ships are fastened not with Iron but Wood, for otherwise they would be torn to pieces. But this assertion, how positive soever, is contradicted by all Navigators that pass that way; which are now many, and of our own Nation, and might surely have been controlled by Nearchus the Admiral of Alexander; who not knowing the Compass, was fain to coast that shore."
Wikipedia tells us these facts about Colchis (https://en.wikipedia.org/wiki/Colchis ): "The eastern Black Sea region in antiquity was home to the well-developed Bronze Age culture known as the Colchian culture, related to the neighboring Koban culture, that emerged toward the Middle Bronze Age. In at least some parts of Colchis, the process of urbanization seems to have been well advanced by the end of the second millennium BC, centuries before Greek settlement. The Colchian Late Bronze Age (fifteenth to eighth century BC) saw the development of significant skill in the smelting and casting of metals. Sophisticated farming implements were made, and fertile, well-watered lowlands and a mild climate promoted the growth of progressive agricultural techniques."
Russian matchbox showing lightening and a sailing boat.
Ancient versions records the Argonauts seeing the Eagle overhead on its' way to Prometheus; its' massive wing span flies over the boat. Apollonius' Argonautica was based on multiple ancient sources, including Homer and Pindar.
"And now the last recess of the Black Sea opened up and they [the Argonauts] caught sight of the high crags of the Kaukasos (Caucasus), where Prometheus stood chained by every limb to the hard rock with fetters of bronze, and fed an Eagle on his liver. The bird kept eagerly returning to its feed. They saw it in the afternoon flying high above the ship with a strident whirr. It was near the clouds, yet it made all their canvas quiver to its wings as it beat by. For its form was not that of an ordinary bird : the long quill-feathers of each wing rose and fell like a bank of polished oars. Soon after the Eagle had passed, they heard Prometheus shriek in agony as it pecked at his liver. The air rang with his screams till at length they saw the flesh-devouring bird fly back from the mountain by the same way as it came."
"His [Herakles'] comrades [the Argonauts] proceed upon their way; only they wonder from the deep at the wide-flung snow that strews the beaches [i.e. that was cast from the Kaukasos (Caucasus) Mountains when Herakles freed Prometheus from his bonds], at the cloven crags and the huge shadow of a dying bird [the Eagle slain by Herakles] above them and the gory dew that drizzles through the air."
We thus find all these stories intertwining in the same place and overlapping in time; clearly this is the part of the world that's "kicking"; everything worth happening is happening here.
To summarize: Zeus orders Prometheus, a.k.a 'Foresight', chained to a rock using unbreakable adamantine chains, thus foreshortening foresight - foresight is foreshortened. Foresight is out of the game. An Eagle (or raven, depending on who is translating) would come every day to eat his liver (paté). Only a human could kill the Eagle and only a non-human immortal could stand in for Prometheus with death, as his substitute.
The Ancients knew loadstones were black rocks that would attract iron; they knew loadstones attracted lightening. We now know that lightening is a form of electricity and that the objects which attract iron are magnets. We also know how the two phenomena, electricity and magnetism, interact with one another and we make this connection obvious with the word "electromagnetism". We also know that birds navigate using the Earth's geomagnetic field.
If the rock is a lodestone, it would attract lightening. Lightening would strike Prometheus there like a bird striking him "attacking him". As the chains are 'unbreakable' i. e. stubborn, and adamantine i.e. iron, they would be magnetic, and could hold Prometheus there as magnetic 'unbreakable' force. High up on a promontory anywhere, on "jagged rocks", he would be a lightening rod, for all intents and purposes. It's a good thing he's immortal.
Sources disagree about Hercules' timing in all these events, yet all agree on the Chiron-Prometheus exchange, and all agree Hercules frees Prometheus. Hercules, a half-human half-god alloy connected to both elements (Prometheus and Chiron) frees Prometheus, restoring Foresight to the game. Once Prometheus is free, Foresight is possible 'again'.
From all accounts, Zeus sent Pandora to Prometheus's brother the same time he banished Prometheus to the rock. Since the first thing Pandora did was to open her box, we can assume Pandora opened the box during the time Prometheus was chained, when the world of humans was 'without foresight'.
A reprinted map from Ortelius' Parergon of 1624 interpreting the voyage of the Argonauts according to Apollonius Rhodius' Argonautica.
Sources tell us that Hercules uses an arrow, or a volley of arrows, to shoot and kill the bird attacking Prometheus.
A coin from Boeotia depicting Hercules stringing his bow.
After Prometheus is freed, Prometheus, the Eagle, and the Arrow, are placed amongst the stars as the constellations Aquila, the Kneeler and Saggita (as in Sagittarius) the archer's bow (http://www.theoi.com/Ther/AetosKaukasios.html ).
A map depicting the constellation of the eagle: l'aquila.
When Kheiron Chiron replaces Prometheus, he too is placed amongst the stars, as the constellation Centaurus Sagittarius. See http://www.theoi.com/Georgikos/KentaurosKheiron.html. This same resource site also states the constellation Centaurus represents another Centaur: "Pholos was an Arkadian Kentauros (Centaur) who made his home in a cave on Mount Pholoe...The gods rewarded him for his show of hospitality by placing him amongst the stars as constellation Centaurus...". See http://www.theoi.com/Georgikos/KentaurosPholos.html.
A map depicting the constellation of the centaur; sagitta sagittarius.
Hercules also eventually gets his own constellation, later, after completing his last labor.
A map depicting the constellation of Hercules.
Chiron Kheiron was the eldest and wisest of the Kentauroi Centaurs, a Thessalian tribe of half-horse men. The centaur, and their archer's arrow, are the zodiacal signs corresponding to Sagittarius.
Illustration of Chiron Kheiron accepting the responsibility to raise the baby Achilles, from The golden fleece and the heros who lived before achilles Colum, Padraic, 1881-1972 and illustrated by Pogány, Willy, 1882-1955.
The centaurs were archers; the bow and arrow is their weapon. The Prometheus bird, a flying creature, is thus killed by a flying arrow, the Centaur weapon. There is more meaning here than simply "Like attracts like". This part of the myth is not just a "flight of fancy"; it is a metaphor describing a much deeper subjective chemical truth linking subjective states with their very real effects in the real world. Birds actually exist but Centaurs only exist in myths, not in reality. Recall from the introduction that the goal of myths is to render the subjective and abstract in objective terms to which we can more readily relate. According to ancient myth, Chiron's enduring wound was accidentally caused by one of Hercule's arrows; the Centaur was wounded by his own weapon. This part of the myth tells us that subjective states are very real; myths are 'living' stories.
Two young girls testing their bows.
THE PUNISHMENT ACT TWO: BOMBS AWAY!
For Act Two, Zeus has the other gods help him create a time-release bomb of unrelenting evils that he then unleashes on humankind, disguised as an utterly absolutely irresistible god-gifted woman with grave personality faults. This gives new depths of meaning to the terms "irrational", "deadly", and "bombshell".
Light My Lucky, 1985 cigarette advertisement.
Zeus names this bomb "Pandora", derived from the Greek πᾶν, pān, i.e. "all", and dōron, "of gold" or "gift", thus Pandora means "the all-endowed", "the all-gifted" or "the all-giving". Her other name, as inscribed against her figure on a white-ground kylix in the British Museum, is Anesidora, "she who sends up gifts", implying "bring up from below" within the earth. Chthonic indeed.
Pandora is the first synthetic, deliberately engineered as a biotoxin, and handed over to humans as an irresistible "gift". Go Figure.
Chesterfield hearts, 1939 cigarette advertisement.
There are many versions of this part of the story, with variations as to which god bestows what endowment, but all versions agree that all the Olympian gods share complicity in her design, and she is the direct result of their conspiracy. Hesiod, Theogony 590–93 tells us Pandora "was fashioned by Hephaestus out of clay and brought to life by the four winds, with all the goddesses of Olympus assembled to adorn her. "
Zeus sends Pandora to Prometheus' brother, Epimetheus (a.k.a. Hindsight, Afterthought). Pandora-the-bomb arrives, along with her dowery stowed inside a lidded jar. The jar, or box, or trunk, or container, contained every possible mechanism for causing humans interminably cruel, unremitting, horror and suffering. She and her dowry are chemical bombs.
In spite of Prometheus' forewarning, in spite of knowing Pandora is a bomb, Epimetheus falls for Pandora; he's addicted on sight, immediately, if not sooner. In spite of Prometheus warning Epimetheus of the dangers and telling Epimetheus precisely what Pandora is, and to not keep her, Epimetheus (a.k.a. Hindsight, Afterthought) takes one look at Pandora and just keeps her. Hindsight does not have twenty-twenty vision here.
Epimetheus just keeps her. A scene from Mystery Science Theater: "You know, Mike, people can be awfully judgemental about evil."
Framing Epimetheus in this way puts him on an exact par with Pandora; neither of them is what they appear to be, both are false, not "for real" and thus, probably were "made for each other".
According to Hesiod, Epimetheus, ignoring Prometheus's warnings, only understood what he'd done after he'd done it. Hindsight, indeed.
Don't expect perfection from geologists; they all have their faults.
Once accepted by Epimetheus, the first thing Pandora-The-Bomb does, of course, is the job she is designed to do: she opens the jar. Some stories say "her curiosity got the better of her" and some stories say "she slipped". However it happens, all versions agree that as soon as she sees what's coming out, she has 'buyer's remorse" and slams down the lid.
Pandora opens the box. Art Nouveau period illustration by Frederick Stuart Church.
Her actions are fruitless; what's left in the jar was intended by Zeus to end up inside the jar, in just this way. ELIPIS, the Greek word for HOPE, is caught inside, and from there, HOPE can bestow upon humanity its' own forever form of trapped agony, that of denial and disavowal of reality, doomed to disappointment.
"Nietzsche, Friedrich, Human, All Too Human. Cf. Section Two, On the History of Moral Feelings, aph. 71. Hope. Pandora brought the jar with the evils and opened it. It was the gods' gift to man, on the outside a beautiful, enticing gift, called the 'lucky jar.' Then all the evils, those lively, winged beings, flew out of it. Since that time, they roam around and do harm to men by day and night. One single evil had not yet slipped out of the jar. As Zeus had wished, Pandora slammed the top down and it remained inside. So now man has the lucky jar in his house forever and thinks the world of the treasure. It is at his service; he reaches for it when he fancies it. For he does not know that the jar which Pandora brought was the jar of evils, and he takes the remaining evil for the greatest worldly good—it is hope, for Zeus did not want man to throw his life away, no matter how much the other evils might torment him, but rather to go on letting himself be tormented anew. To that end, he gives man hope. In truth, it is the most evil of evils because it prolongs man's torment."
It's no surprise that Pandora disappears from the story after she's dropped as a bomb. We don't hear of her retiring in her old age to some Golden Isle in the Sunshine somewhere. The oldest ancient records just drop her like a hot potato. Later fiddlers, uh scholars, mess with the story by trying to weave into it marrying or having children. Nope. She's just gone, like a bomb after detonation.
Firefighting Kitties. Photo by Harry Whittier circa 1916.
Any way you look at this, Pandora is an addictive synthetic compound created by the Olympian Gods and specifically targeted to slowly poison humankind, in punishment for Prometheus's stealing fire and giving it to humans. Pandora is the first recorded synthetic; she carries a dowry of more of the same with her, and releases this into the world. She prevails in her mission of evil by overwhelming Epimetheus Hindsight/Afterthought, in spite of having been warned by Foresight / Prometheus. No known chemical addiction, including love, behaves differently.
Today, we're all addicted to synthetics.
Deux jeunes enfants boivent et fument à bord d'un bateau en 1955. Robert Doisneau.
"Archaic and Classic Greek literature seem to make no further mention of Pandora, though Sophocles wrote a satyr play Pandora, or The Hammerers of which virtually nothing is known. Sappho may have made reference to Pandora in a surviving fragment (Sappho, fr. 207 in Lobel and Page.). Later, mythographers filled in minor details or added postscripts to Hesiod's account. For example, the Bibliotheca and Hyginus each make explicit what might be latent in the Hesiodic text: Epimetheus married Pandora. They each add that they had a daughter, Pyrrha, who married Deucalion and survived the deluge with him. However, the Hesiodic Catalogue of Women, fragment #5, had made a "Pandora" one of the daughters of Deucalion, and the mother of Graecus by Zeus. The 15th-century monk Annio da Viterbo credited a manuscript he claimed to have found to the Chaldean historian of the 3rd century BC, Berossus, where "Pandora" was also named as a daughter-in-law of Noah; this attempt to conjoin pagan and scriptural narrative is recognized as a forgery."
Obviously, a "literal interpretive crux" endures over this point in the story. The debate is intense and active. Scholars are fixated here, even now debating over how to interpret the word ELIPIS, the Greek word for HOPE; arguing how it should be translated, pointing out it can be rendered in many contradictory ways (including but not limited to hope, expectation, expectant hope, and expectation of evil). Scholars also continue to wax lyrical on whether or not the evils were only bad after they were let out of the jar, something about which we have absolutely no way of ever knowing. They must have a lot of time to waste, as well as the inclination to wrestle over irrelevant things, all of which depend on whether or not myths are to be taken literally. For more on this, see 'Difficulties In Interpretation" at https://en.wikipedia.org/wiki/Pandora (accessed 170809).
Pandora falls out of the story; here she drinks so much, she falls off her own bowl.
Prometheus, on the other hand, has a happier sort of ending, or as much a resolution as can be expected after upholding his beliefs and not capitulating to a new corrupt master. With the help of Hercules, he gets off the hook, uh beak, uh...sorry for the pun.
Prometheus gets off the hook. The wisdom of Piet Hein: "He that lets the small things bind him, leaves the great undone behind him."
However, just as with the dual nature of Giant Fennel, we have dual stories involving the 'rescue' of Prometheus from the Zeus-Liver-Paté-Eagle, and both involve Hercules, a half twin, who is himself a hybrid half-man half-god.
Zeus offers Prometheus two ways out of torment. Both are conditional.
Ever insecure, Zeus wants "foresight" so he can affect his own future. Recall that Prometheus's name means 'Foresight'. What Zeus really wants is for Prometheus to tell him the name of the mother of the child that will eventually dethrone Zeus. Ancient rules, however, require pairs of options, and Zeus must thus propose another alternative.
Being Zeus, he knows which rules he can break, which rules he can't, and how to bend one group into the other. He would make a decent cook. The alternative he proposes requires Prometheus to meet a pair of conditions. Yep. Yet another pair. Interesting. You just have to wonder, who or what is making up these rules that these Gods must follow, and who is checking up on the various configurations? Incidentally, the Standard Model of Physics shows similar patterning. Pairs everywhere; you can see them in the illustration of this above.
The first half of this option pair requires an immortal to volunteer to agree to die in place of Prometheus.
Only immortals can substitute for one another, and immortals can never die, no matter how torn up they get, because they're subject to the immortal-overnight-regeneration rule. However, and here comes the loophole, it seems immortals can volunteer to give up something, and that sometimes, that something can be life itself. One would think we were talking about electrons in chemical bonds forming molecules and making exchanges here.
Zeus stipulates that only an immortal can substitute for Prometheus, and whomever this "immortal substitute" is, they have to give up their immortality, and actually die, by going to Tartarus. Give up chemical bonding, take a trip down under into the bowels of the Earth, to the melting furnace, wearing concrete galoshes. Zeus is certainly stacking the odds in his own favor with this one.
The second half of this option pair stipulates that a mortal has to kill the eagle and unchain Prometheus. Again, Zeus "believes" that this option also stacks the odds in his favor because he knows no mortal can do these things. Doing these things requires a god, or a mortal with god-like powers. Hello?
Well guess who steps up to this plate? Guess who's coming to dinner? Go on, guess. Drum roll here. It's Hercules, a.k.a. Herakles, a.k.a. Heracles, TAH DAH.
Portrait of Hercules, 1589, by Hendrick Goltzius (Netherlandish, Mühlbracht 1558–1617 Haarlem).
Hercules is himself a half-man half-god hybrid, the result of yet another set of twos. His father was Zeus, so he represents one of Zeus's own transgressions, from standard matrimony. Hercules's mother was Alcmene. Alcmene carried Herakles as one half of a pair twins, Heracles and Iphicles, each of whom had been sired by different father.
It's all just Two Two x Two Too much.
Hercules is thus in the not-enviable absolutely unique position of being the only living being capable of meeting both of Zeus's option pair conditions, and on behalf of someone else, partly because he's a result of Zeus, and partly because he's the cause of the answer to the second half of the option. Yep. He's the cause of the option's second half.
As part of Hercules's 12 Labors Celestial Qualifying Exams, taken under his cousin King Eurystheus, Hercules, the half-man half-god hybrid, goes on an excursion to the Caucuses to find the golden apples of the Hesperides. The Argonauts, incidentally, just miss him there. He's also having to clean out the Aegean stables in one day, and he does it, but that's another story.
When Hercules encounters Prometheus chained to the Caucuses rocks, he frees him, kills the Eagle, and thus meets the first of the two paired conditions. By this time, Hercules knows his way around magnets.
Look at Prometheus's double chains this way: two coils of many parallel loops, with currents in the SAME direction, attract each other and act like magnets (particles with spin do also!).
Hercules is also the reason the second paired condition can even be met.
Hercules was responsible for "accidentally" wounding his friend, the immortal physician, Chiron the Centaur, who has subsequently been unable to heal himself and is thus suffering unbearably. That tale deserves it's own analysis and is more than I want to go into here. As usual, details vary all over the place and there's no single definitive telling. But it's necessary to understand the rest of the "story arc" so I'll be very brief here and not get sidetracked. The main source is Scholium on Theocritus (Theocritus, Idyll vii.149).
The story involves a great deal of chemistry, hydraulics, and pneumatics. Hydraulics is an applied science utilizing the mechanical properties of liquids, and fluid motion and flow. Pneumatics is branch of engineering using gas and pressurized air. Both pneumatics and hydraulics are applications of fluid power. Pneumatics uses an easily compressible gas such as air or a suitable pure gas, while hydraulics uses relatively incompressible liquid media such as oil.
The story of Chiron's wound is part of a long story arc; it's inseparable from Hercules's 4th "Labor", fetching the ferocious Erymanthian Boar alive for King Eurystheus.
A boar hunt. Collection of the J. Paul Getty Museum, Malibu, California. Malibu 86.AE.154, Attic black figure Siana cup, c. 580-570 B.C.
The boar and the centaurs are neighbors, so on his way to fetch the boar, Hercules visits the home-cave of his old friend Centaur Pholus (Pholus means "caveman").
Hercules is carrying arrows whose tips he'd dipped in poisonous Hydra bodily fluids, after killing her (his 2nd labor).
The only liquid Pholus has on hand is a sealed jug of fluid given him by Dionysus Bacchus (god of Rock N' Roll, wine, drugs, riots, and wild parties).
Sources refer to this stuff repeatedly as "wine" however, its' known properties totally belie that description. It's about as similar to wine as psychedelics are to an aspirin. Coming from Dionysus, everyone would know exactly what to expect from it, and any properties, results, and effects, would not come as a surprise.
When Hercules asks for something to drink with dinner, Pholus gives him this stuff. Yep.
The versions claim this was because it was the only thing Pholus had on hand, and he was just being a "good host". Now really, no host in his right mind would serve guest friends psychedelics unbeknownst to them, in lieu of water, or wine. Pholus and Hercules were purportedly very old friends and both of them "knew better", besides Hercules was in the middle of a "mission" and would never have risked being out of commission. It's clear something else is going on here.
This Dionysus-God-given-stuff is loaded with trouble. Just the vapors and fumes from the open bottle are profoundly intoxicating even at great distances. These affect all the centaurs in the area. The resulting chaotic riot is given many silly justifications, including that the centaurs behavior was the result of their being at the mercy of the fumes, or that they were angry at not getting a party invitation, or upset that their wine was being drunk.
None of these various justifications hold water, and in the end, the riot's cause is irrelevant. Hercules shoots his poison arrows at the attacking centaurs. Pholus is inadvertently killed after picking up one of the arrows (in curiosity, say the sources!), and Chiron is also hit. Unlike Pholus, Chiron is immortal (yes, that's another story), so unlike Pholus, Chiron doesn't die from the wound, but lives on in grievous agony, unable to cure or kill himself.
Hercules and the centaur Pholus shaking hands. London B 226, Attic black figure neck amphora, c. 530-510 B.C. Photograph courtesy of the Trustees of the British Museum, London.
Chiron is Zeus's half brother, so he's also related to Zeus, and this also makes him Hercules' Half-Uncle. Chiron is the son of Chronos, a.k.a. Kronos, which means 'Time". Chiron, as a Centaur (archer), is also a two-hybrid as is Hercules; Chiron is half-god man, half-horse. They form two sides of the same number line.
Chiron is also similar to Prometheus; by being the son of Chronos/Time and immortal, Chiron is subject to the same immortal-overnight-regeneration rule as Prometheus. Both are stuck living lives forever enduring pain. Neither can succeed at suicide. They're both stuck.
If you were phosphorus trapped in urine, how would you feel?
Hercules suggests Chiron volunteer to die in place of Prometheus, the two immortals agree to substitute for one another, humans get to keep fire, and the two immortals, one of whom is Zeus's brother, Hercules's Uncle, and a hybrid God, are thus saved by a half-man half-god hybrid, Hercules, who would not exist at all were it not for Prometheus creating and protecting humankind in the first place. No small amount of ironic chemistry this.
The Centaur Pholus, Heracles and Hermes, Athenian black-figure amphora C6th B.C., British Museum. Photograph courtesy of the British Museum, London.
Let's try this idea on for size. Brass alloys require copper and zinc, and both elements are listed as known and available in Antiquity. The Brass alloy proportions of zinc and copper can be varied to create a range of brass alloys with varying properties and all are substitutional alloys because copper and zinc atoms, the two primary constituents, can replace each other within the same crystal structure. They can 'stand in' for one another to some extent, so to speak, but not conveniently because copper and tin ores do not usually occur in the same places (they do in Cornwall, but bronze did not come from there). It's not an easy straight swap.
This trade off between Chiron and Prometheus, orchestrated by Hercules, may well be a metaphor for some such inconvenient but possible chemistry trade off. In chemistry, a substitution reaction (also known as single displacement reaction or single replacement reaction) is a chemical reaction during which one functional group in a chemical compound is replaced by another functional group.
Ancient sources for tin were scarce. Not only is tin a relatively rare element in the Earth's crust, tin deposits are few and far between. Tin had to be traded over long distances to meet demand for it in areas lacking deposits of it. I can find a lot of guesses about how these alloys might have been discovered, however there are no early metallurgy records and common sense conjecture is all we have to go on.
It's no coincidence that the alchemical symbol for Tin (Sn, 50) is Jupiter, a.k.a. Zeus.
The alchemical symbol for Tin (Sn, 50) is the symbol for Jupiter, Jove, Zeus.
The Greek equivalent word for the Latin Aes for copper was calkos, "chalcos," named after the copper mines at Chalcis in Euboea. This word stem is often found referring to copper, most notably in mineralogy. "Chalcopyrite" is copper pyrites. The word was also applied to iron, long before the coining of "sideros." The word for steel is caluy, clearly related to chalcos. The Phoenicians, and others, worked copper mines and smelters in Cyprus, Kupris. Venus, or Aphrodite, the Kupris, was born there, always loved the island, and was its' patron. She is very often referred to as Cypris. The word "cuprium" could have come either from the island or the goddess, and it's impossible to make a distinction. This fact supports Media as a priestess of this Goddess, having an extensive working knowledge of chemistry. The word cuprum was probably later Latin; it gave us the chemical symbol Cu for copper. The alchemical symbol was the sign of Venus, the circle atop a cross. The Phoenicians were surely the ones who spread the knowledge and use of copper around the Mediterranean and they probably kept their metallurgical procedures secret.
The fact that pure copper and its alloys were not distinguished in ancient words shows that a fundamental difference was not appreciated. Our recognition of chemical elements is recent, and quite foreign to earlier thought. Most ancient "copper" is indeed bronze, containing tin but also lead and zinc. The alloys have a somewhat lower melting point than pure copper, and would be easier to work, besides being much harder, and more usable as tools and weapons. Zippe concludes from the various names of copper, and its' alloys used by different peoples, that there was probably multiple discoveries of its' smelting. He also remarks, quite to the point, that it is just as possible that a source of a metal was named after the metal, as that the metal was named after a place.
The alchemical symbol for Copper (Cu, 29) is the symbol for Venus Aphrodite.
Hercules, after solving over a dozen impossible tasks that we know of, and having a very difficult life by his own choosing, sails with the Argonauts, travels with them as far as Colchis according to ancient sources, and finally earns his own cap and gown, and celestial constellation. Now you can see him up in the sky at night.
Prometheus gets off the hook; foresight is back in the game, but too late to prevent Pandora. What does this imply? To play fair here I have to stick to my own rules, and apply science and chemistry metaphors. Prometheus has exchanged places with Chiron. Pandora has loosed synthetic biotoxins on humankind and the myths have no further use for her. If this were chemistry, we'd have a substitution reaction, implying that Pandora's synthetics will force humans to also exchange, i.e. change, inexorably.
The Centaur archer Chiron, a half-god half horse existing only in myths, has gone on to greener pastures, and he has a place in the heavens as a celestial constellation.
Now you can see them all as constellations in the sky at night.
Since Centaurs are only real in myths, Chiron's a representative of the subconscious. Hercules uses an archer's subconscious arrows to both kill the bird and to free Prometheus; subconscious arrows can have real effects. It's also no coincidence that the wound from which Chiron suffers and cannot heal was made by a poison arrow, shot by Hercules. From this I would have to say that what you can't see can hurt you. Beware The Internet; it shoots poison arrows, and they will hurt you.
Zeus pouts. Were it not for humankind, he would have nobody left to play with; nobody would be available for his "transgressions", i.e. his chemical compound experiments. One wonders why he's complaining. A.k.a. Jupiter, Zeus is left to quit while he's ahead, and he never does learn the name of the mother of the child who eventually dethrones him, not until long after the deed is done. His Jupiter symbol ends up as the alchemical symbol for tin.
See what happens when we stretch these mythical analogies a little further by mapping them into the ancients' knowledge of science and the elements? These myths unpack themselves very nicely into remarkably straight-forward chemistry. Upcoming: The Golden Fleece, aurophilicity, and the chemistry behind Media's Deadly Wedding Dress. | 2019-04-19T04:52:45Z | https://suityourself.international/appanage/suit-yourself-international-magazine-43-prometheus-and-pandora-part-2-of-2.html |
Apolipoprotein B (apoB) contains ligand-binding domain for the binding of LDL to LDL-R site, which enables the removal of LDL from circulation. Our recent data showed that selenium (Se) is involved in the lipid metabolism. The present study was aimed to understand the effect of Se deficiency (0.02 ppm) and selenium supplementation (1 ppm) on apoB expression in liver during hypercholesterolemia in male Sprague Dawley rats. Animals were fed with control and high cholesterol diet (2%) for 1 and 2 months. ApoB levels by ELISA and protein expression by western blot was done. Hepatic LDL receptor (LDL-R) activity (in vivo) and mRNA expression by RT-PCR was monitored.
In selenium deficiency and on high cholesterol diet (HCD) feeding apoB levels increased and LDL-R expression decreased significantly after 2 months. On 1 ppm selenium supplementation apoB expression significantly decreased and LDL-R expression increased after 2 months. But after one month of treatment there was no significant change observed in apoB and LDL-R expression.
So the present study demonstrates that Se deficiency leads to up regulation of apoB expression during experimental hypercholesterolemia. Selenium supplementation upto 1 ppm leads to downregulation of apoB expression. Further, this study will highlight the nutritional value of Se supplementation in lipid metabolism.
The interaction between LDL and LDL receptor has a major role in determining plasma cholesterol levels [1, 2] and apolipoprotein B (apoB) has the central role in this ligand-receptor interaction. Mutations in the apoB gene result in accumulation of LDL in circulation [3, 4]. However, most of the studies suggested that one molecule of apoB exists per lipoproteinparticle, thus the quantity of apoB in fasting plasma predicts the number of LDL and VLDL particles [5, 6]. Therefore, plasma apoB levels maybe a better assay of the concentration of atherogenic lipoproteinparticles than total or LDL cholesterol levels . Furthermore, a cross-sectional study in patients who had coronary arterybypass graft surgery determined that apoB concentration wasa better discriminator than LDL cholesterol concentration inpredicting recurrent atherosclerotic disease in bypass grafts10 years after surgery .
Abnormalities in the apoB metabolism are responsible for the generation of hypercholesterolemia and increased risk of coronary heart disease . Homma reported a positive correlation between serum apoB levels and atherosclerotic conditions. Abraham et al. have found a significantly increased production of apoB levels in cultured hepatocytes isolated from rats fed with atherogenic diet. Incubation of hepatocytes isolated from normal rats with added cholesterol resulted in an increased synthesis and secretion of apoB levels .
Several studies suggested that T3 is directly involved in the regulation of LDL-R and apoB expression [13, 14]. Normally thyroid is the unique source of T4, but it secretes only 20% of the whole T3 in the body. Major amount of T3 is produced from T4 by 5'-deiodination in peripheral tissues . This reaction is catalyzed by type-I 5'-iodothyronine deiodinase (5'-DI). Type-1 5'-iodothyronine deiodinase being a selenoprotein its activity decreases during selenium (Se) deficiency [16, 17]. Hence during Se deficiency, T3 can not be produced in any quantity. This makes the role of Se important for lipid metabolism, since T3 is known to regulate the LDL-R level, which is further responsible for the maintenance of plasma cholesterol level. Wojcicki et al. reported the protective role of Se against atherosclerosis.
Hence in view of all the above stated findings, present study is aimed to understand the effect of Se status on apoB levels under experimental hypercholesterolemic conditions in SD male rats. To the best of our knowledge, so far no other study has been reported linking Se status with apoB expression during hypercholesterolemia.
Se levels in the serum and liver decreased significantly (p < 0.001) in Se deficient groups (Ia and Ib) and increased in 1 ppm Se supplemented diet fed groups (IIIa and IIIb) in comparison to respective adequate groups (IIa and IIb). Significant decrease (p < 0.001) in the level was observed in HCD fed groups as compared to respective controls in all the three Se status i.e. deficient, adequate and excess groups. In deficient groups (Ia and Ib) and in HCD fed adequate group, Se level decreased significantly (p < 0.001), whereas in 1 ppm Se supplemented groups the level increased significantly (p < 0.001) after 2 months in comparison to 1-month data (Table 1).
Selenium levels in liver (μg/g) and serum (μg/L), GSH-Px levels in liver (μmoles of NADPH oxidized/min/mg protein) after 1 and 2 months of control and high cholesterol diet (HCD) feeding.
Data is represented as mean ± SD from 6 observations.
*p<0.05, **p<0.01, ***p<0.001 represent comparison between control and HCD groups; Ap<0.05, AAp<0.01, AAAp<0.001 comparison between 1 and 2 months; DDDp<0.001 comparison between group Ia and IIa; ###p<0.001 comparison between group Ib and IIb; LLp<0.01, LLLp<0.001 comparison between group IIa and IIIa; Bp<0.05, BBp<0.01, BBBp<0.001 comparison between group IIb and IIIb.
Glutathione peroxidase (GSH-Px) activity in liver decreased significantly (p < 0.001) in Se deficiency (Ia and Ib) and it increased on 1 ppm Se supplementation (IIIa and IIIb) in comparison to respective adequate groups (IIa and IIb). On HCD feeding significant increase (p < 0.001) was observed in all the groups in comparison to respective controls. In Se deficient control group GSH-Px level decreased, whereas in HCD supplemented Se deficient and Se adequate as well as excess Se fed groups the level increased significantly (p < 0.001) after 2 months as compared to 1-month data (Table 1).
In all the three Se status groups on HCD feeding significant increase (p < 0.001) in total cholesterol and LDL-cholesterol concentration was observed in comparison to respective control groups. In Se deficient groups (Ia and Ib) total cholesterol and LDL level increased and on 1 ppm Se supplementation it decreased significantly (p < 0.001) in comparison to respective adequate groups (IIa and IIb). In both the Se deficient groups (Ia and Ib) and in HCD fed adequate group lipid level increased significantly (p < 0.001), whereas it decreased on Se supplementation after 2 months in comparison to 1-month treatment period (Table 2).
Total cholesterol (mg/dl), LDL-cholesterol (mg/dl) and apolipoprotein B (A405) levels in serum after 1 and 2 months of control and high cholesterol diet (HCD) feeding schedule.
**p<0.01, ***p<0.001 represent comparison between control and HCD groups; Ap<0.05, AAp<0.01, AAAp<0.001 comparison between 1 and 2 months; DDp<0.01, DDDp<0.001 comparison between group Ia and IIa; ##p<0.01, ###p<0.001 comparison between group Ib and IIb; Lp<0.05, LLp<0.01, LLLp<0.001 comparison between group IIa and IIIa; BBp<0.01, BBBp<0.001 comparison between group IIb and IIIb.
Levels of T3 decreased and T4 increased significantly (p < 0.001) on HCD feeding in comparison to respective controls in all the three Se status groups. In Se deficiency (Ia and Ib) T3 decreased and T4 level increased in comparison to respective adequate groups, whereas on 1 ppm Se supplementation T3 level increased and T4 level decreased significantly (p < 0.001). In both the Se deficient groups and in HCD fed adequate group (IIb) T3 decreased and T4 increased significantly and in Se supplemented groups T3 increased and T4 decreased after 2 months in comparison to 1-month data (Fig. 1a &1b).
T3 (a), T4 (b) and 5'-DI (c) levels in serum in different groups: Ia-Se deficient control, Ib-Se deficient+HCD, IIa-Se adequate control, IIb-Se adequate+HCD, IIIa-Se excess control, IIIb-Se excess+HCD after 1 and 2 months. Data is represented as mean ± SD from 6 observations. **p<0.01, ***p<0.001 represent comparison between control and HCD groups; AAp<0.01, AAAp<0.001 comparison between 1 and 2 months; DDp<0.01, DDDp<0.001 comparison between group Ia and IIa; ##p<0.01, ###p<0.001 comparison between group Ib and IIb; Lp<0.05, LLp<0.01, LLLp<0.001 comparison between group IIa and IIIa; BBp<0.01, BBBp<0.001 comparison between group IIb and IIIb.
5'-DI activity as well as mRNA expression in liver decreased significantly (p < 0.001) on HCD feeding and during Se deficiency in comparison to respective controls. On 1 ppm Se supplementation, significant increase (p < 0.001) in enzyme activity and mRNA expression was observed in comparison to adequate groups. In Se deficient groups (Ia and Ib) and in HCD fed adequate group the activity and mRNA expression decreased and it increased significantly in 1 ppm Se supplemented groups after 2 months in comparison to 1 month data (Fig. 1c and Fig. 2a &2b).
5'-DI mRNA analysis in liver in different groups: Ia-Se deficient control, IIa-Se adequate control, IIIa-Se excess control, Ib-Se deficient+HCD, IIb-Se adequate+HCD, IIIb-Se excess+HCD after 1 and 2 months. (a) mRNA expression by RT-PCR. (b) expression was quantified by densitometric analysis. β-actin was used as an internal control. Data is expressed as mean ± SD from 4 observations. *p<0.05, **p<0.01 represent comparison between control and HCD groups; Ap<0.05 comparison between 1 and 2 months; Dp<0.05, DDp<0.01 comparison between group Ia and IIa; ##p<0.01 comparison between group Ib and IIb; Lp<0.05, LLLp<0.001 comparison between group IIa and IIIa; Bp<0.05, BBBp<0.001 comparison between group IIb and IIIb.
Percent remaining counts in blood after 120 h were almost same in all the groups after one month, hence no change was observed in LDL-R activity after one month of diet feeding schedule (Fig. 3a &3b). However after 2 months, the percent remaining counts were higher in Se deficient groups in comparison to adequate diet fed groups, so the LDL-R activity decreased significantly (p < 0.001) in Se deficiency. On 1 ppm selenium supplementation LDL-R activity increased significantly in comparison to adequate groups. On HCD feeding the receptor activity decreased significantly (p < 0.001) in all the three selenium status groups. After 2 months receptor activity decreased (p < 0.001) in Se deficient groups (Ia and Ib) and in HCD fed adequate group, whereas it increased significantly on 1 ppm selenium supplementation in comparison to 1 month treatment period (Fig. 4a &4b).
LDL-R activity in-vivo during selenium deficiency and on HCD feeding in different groups. (a) after 1 month of control diet feeding. (b) after 1 month of HCD feeding. Radiolabelled LDL was injected to the rats, % decrease in counts in blood with time was taken as a measure of clearance of LDL from animal blood and in turn the LDL-R activity.
LDL-R activity in-vivo during selenium deficiency and on HCD feeding in different groups. (a) after 2 months of control diet feeding. (b) after 2 months of HCD feeding. Radiolabelled LDL was injected to the rats, % decrease in counts in blood with time was taken as a measure of clearance of LDL from animal blood and in turn the LDL-R activity.
RT-PCR products of expected size i.e. 341 bp and 236 bp were obtained for LDL-R and β-actin. mRNA expression followed the same trend as it was observed for LDL-R activity i.e. no significant change was observed in expression after 1 month of treatment period. But after 2 months of diet feeding schedule mRNA expression decreased significantly (p < 0.001) in Se deficiency (Ia and Ib) in comparison to adequate groups i.e. 31% and 68% decrease was observed in groups Ia and Ib in comparison to IIa and IIb respectively. On 1 ppm Se supplementation, significant increase (p < 0.001) in RNA expression was observed in comparison to adequate groups. On HCD feeding in all the three selenium status groups significant decrease in the expression was observed. In Se deficient groups (Ia and Ib) and in HCD fed adequate group mRNA expression decreased and it increased significantly in 1 ppm Se supplemented groups after 2 months in comparison to 1 month data (Fig. 5a &5b).
Hepatic LDL-R mRNA analysis in different groups: Ia-Se deficient control, IIa-Se adequate control, IIIa-Se excess control, Ib-Se deficient+HCD, IIb-Se adequate+HCD, IIIb-Se excess+HCD after 1 and 2 months. (a) mRNA expression by RT-PCR. β-actin was also amplified (house keeping gene). (b) bands were quantified by densitometric analysis. Data is expressed as mean ± SD from 4 observations. *p<0.05, **p<0.01, ***p<0.001 represent comparison between control and HCD groups; Ap<0.05, AAp<0.01, AAAp<0.001 comparison between 1 and 2 months; DDDp<0.001 comparison between group Ia and IIa; ###p<0.001 comparison between group Ib and IIb; LLp<0.01, comparison between group IIa and IIIa; BBBp<0.001 comparison between group IIb and IIIb.
After one month of treatment, no significant change was observed in apoB levels by ELISA (Table 2). However after 2 months apoB levels in liver increased significantly (p < 0.001) in Se deficient control and high cholesterol diet (HCD) fed groups (Ia and Ib) in comparison to respective adequate groups (IIa and IIb). Whereas the level significantly (p < 0.001) decreased on 1 ppm Se supplementation in groups IIIa and IIIb. On HCD feeding a significant increase (p < 0.001) in apoB level was observed in comparison to respective control groups in all the three Se status groups after 2 months of diet feeding schedule. In selenium deficient groups (Ia and Ib), and in selenium adequate HCD fed group (IIb), the level increased and in 1 ppm selenium fed groups (IIIa and IIIb) it decreased significantly after 2 months of respective diet feeding in comparison to 1-month treatment period (Table 2).
Apolipoprotein B expression by western blot followed the similar trend as it was observed in ELISA. After one month of treatment, no significant change in band intensity was observed. So no change was there in apoB expression on high cholesterol diet feeding as well as in selenium deficiency and on 1 ppm selenium supplementation (Fig. 6).
Western Blot analysis of apolipoprotein B. Protein samples (30 μg) were resolved on 7.5% SDS-polyacrylamide electrophoresis and then electrophoretically transferred to PVDF membrane. Membrane was probed with antibody against apolipoprotein B. Lane1-Se deficient control; Lane2-Se adequate control; Lane3-Se excess control; Lane4-Se deficient+HCD; Lane5-Se adequate+HCD; Lane 6-Se excess+HCD. β-actin was used as an internal control.
Various studies suggested the prospective role of selenium in cardiovascular disorders . Our results demonstrate that in selenium deficient animals significant increase in total cholesterol and LDL-cholesterol level was observed in comparison to adequate selenium fed animals . Increased LDL is accumulatedin the intima, where it is oxidized. This oxidized LDL is associated with increased risk of coronary heart disease . On 1 ppm Se supplementation lipid levels decreased significantly , Se supplementation might be protecting the LDL from oxidative modifications and further atherogenic changes [22, 23]. Further, selenium supplementation leads to an increase in HDL cholesterol fraction . HDL fraction increases the cholesterol elimination from tissues including smooth muscle cells in the aorta wall and facilitate the cholesterol transport to the liver, thus preventing its deposition and formation of atheromatous plaque .
In the present results in Se deficient groups, hepatic glutathione peroxidase (GSH-Px) activity decreased significantly in comparison to adequate groups (Table 1), so these observations confirm the Se deficiency, which is associated with decreased GSH-Px levels . On high cholesterol diet feeding GSH-Px activity increased in all the groups. This increase in Se dependent GSH-Px on HCD feeding is attributed to the increased lipoperoxidative stress associated with cholesterol feeding as previously established in our lab . Animals fed with the Se deficient diet had decreased hepatic 5'-DI activity as well as mRNA expression in comparison to the Se adequate groups [16, 17]. During selenium deficiency hepatic stores of Se might be insufficient to allow the synthesis of 5'-DI. On 1 ppm Se supplementation GSH-Px and 5'-DI levels increased in control as well as HCD fed groups, this could be due to the fact that being selenoproteins the level of these two enzymes increased on Se supplementation.
Decreased level of T3 in selenium deficiency as well as on HCD feeding might be owing to the decreased conversion of T4 to T3 in the liver and other parts due to decreased 5'-DI (selenoprotein) expression during Se depletion . Present studies revealed that in Se deficiency the LDL-R activity as well as mRNA expression is down regulated in comparison to adequate Se diet fed animals after 2 months of diet feeding (Fig. 3 &4). This could be due to the decreased T3 level during Se deficiency. T3 is directly involved in the regulation of LDL-R expression via modulation of SREBP-2 (sterol regulatory element-binding protein-2) gene expression. SREBP-2 is a major transcriptional regulator of cholesterol uptake through LDL-R . In the present study we have observed that in Se deficiency, cholesterol level increased, this increased intracellular cholesterol level might be another reason to down regulate the LDL-R expression through feedback signaling pathway . On feeding high cholesterol diet to the animals, LDL-R activity and mRNA expression decreased in all the three selenium status groups, so exogenous cholesterol given through diet is being used in the signaling pathway and probably it is suppressing the transcription of LDL-R through feedback mechanism. In case of 1 ppm Se supplemented groups increased T3 level might be upregulating the receptor expression.
In the current studies, on high cholesterol diet feeding for 2 months, apoB expression increased in all the three groups (Table 2; Fig. 6). This increased level of apoB on high cholesterol feeding is due to decreased expression of LDL-R during hypercholesterolemia as observed in the present studies. Decreased level of LDL-R is responsible for decreased clearance of apoB along with LDL, so these apolipoproteins are accumulated in the body [28, 29]. During Se deficiency apoB levels in liver increased significantly in the present studies . This could be due to the reason that selenium deficiency leads to decreased T3 levels and inturn hypothyroid state through decreased expression of 5'-DI enzyme [17, 31], further hypothyroidism has been associated with increased level of apoB . As T3 is involved in LDL-R expression, so reduced T3 levels during selenium deficiency is responsible for increase in apoB levels. Staels et al. demonstrated that thyroid hormones activate the LDL-R, leading to an increased fractional catabolic rate of apoB without influencing its synthesis rate. Davidson et al. reported that T3 administered to hypothyroid animals reduced the plasma apoB concentrations.
In the present studies on 1 ppm selenium supplementation for 2 months decreased expression of apoB was observed (Table 2; Fig. 6). This could be due to the increased level of T3 observed in the present study on Se supplementation through increased 5'-DI expression. So it results in increased catabolic rate of apoB through increased LDL-R expression. Davidson et al. reported the suppressed synthesis of apoB during T3 supplementation. Walton et al. suggested the increased catabolism of apoB through LDL receptors during hyperthyroidism. It is probably a combination of suppressed apoB synthesis and its increased elimination via LDL receptors during selenium supplementation here, which is regulating the apoB expression through T3 levels.
After one month of treatment, no significant change in the LDL-R and apoB expression was observed, this might be due to the reason that after 1 month the cholesterol accumulation might not be up to the extent that it could stimulate the feedback signaling pathway at translational as well as at transcriptional level to regulate LDL-R expression. So apoB catabolism through LDL receptors was not affected in different groups.
So, these results form the basis for a model that selenium status in the body regulates apolipoprotein B expression through selenoenzyme, 5'-DI. Selenium deficiency leads to decreased expression of 5'-DI, decreased T3 levels and decrease in LDL-cholesterol removal from blood through downregulation of LDL-R mRNA expression, ultimately decreased apoB catabolism through LDL receptors. Whereas Se supplementation upto 1 ppm leads to decreased apoB expression through increase in the LDL-R mRNA expression again via modulation of 5' -DI expression and in turn has the protective role against hypercholesterolemia. However, this interrelationship between selenium status and apoB expression warrants further investigation to decide the precise mechanism of lipid metabolism through the effect of Se status on the apolipoprotein B expression. Further studies must be undertaken to explore the therapeutic role of selenium supplementation in hypercholesterolemia.
Young male Sprauge-Dawley rats (100 g-body weight) were used in the present study. Animals were obtained from the Central Animal House, Panjab University, Chandigarh.
Animals were acclimatized to the laboratory animal room and divided into three groups initially, group I (Se deficient diet fed), group II (Se adequate diet fed) and group III (Se excess diet fed). Feed and water were given ad libitum. This Se diet was given to the animals initially for 10 days so as to achieve the required Se status. The animals in these three groups were further divided into two each viz.: Group Ia (Se deficient control), Group Ib (Se deficient + high cholesterol diet fed); Group IIa (Se adequate control), Group IIb (Se adequate + high cholesterol diet fed); Group IIIa (Se excess control), Group IIIb (Se excess + high cholesterol diet fed). Treatment protocol was for 1 and 2 months.
Yeast based synthetic Se deficient diet (supposed to contain 0.02 ppm Se) was prepared in the laboratory itself according to the composition given by Burk . It contained torula yeast (inactivated) 30%, sucrose 56.99%, corn oil 6.67%, mineral mix 5%, vitamin mix 1%, dl-methionine 0.3% and vitamin E 0.04%. Se adequate and excess diet was prepared from Se deficient diet by supplementing it with 0.2 ppm and 1 ppm of Se as sodium selenite (Sigma Chemicals). 2% of cholesterol (Loba-Chemie, India) was added to the respective high cholesterol diet (HCD) groups.
Selenium level was estimated by fluorimetric method , based on the principle that Se content in serum or tissue on acid digestion is converted to selenous acid. The reaction between selenous acid and aromatic-o-diamines such as 2,3-diamino-naphthalene (DAN) leads to the formation of 4,5-benzopiazselenol, which displays brilliant lime-green fluorescence when excited at 366 nm in cyclohexane. Fluorescence emission in extracted cyclohexane was read on fluorescence spectrophotometer using 366 nm as excitation wavelength and 520 nm as emission wavelength.
Glutathione peroxidase (GSH-Px) activity was assayed using H2O2 as substrate . The assay was carried out in the post-mitochondrial fraction (PMF) of liver as already published by us , the activity was expressed as μmoles of NADPH oxidized/min/mg protein. Total protein was done in all the samples .
Serum T3 and T4 estimation was done by radioimmunoassay (RIA) kits procured from BARC, Mumbai (Cat. No. RIAK-4/4A and RIAK-5/5A for T3 and T4 respectively).
Type-I iodothyronine deiodinase (5'-DI) activity in liver was estimated by following the method of Behne et al. .
LDL-R activity was estimated in vivo by following the method of Brown and Goldstein and as per methodology already used by us . Briefly, LDL isolated from overnight fasting human plasma using a single vertical spin density gradient ultra centrifugation , was radiolabeled with Na [131I] using chloramine-T . Separation of labeled protein and unreacted iodide was done by gel filtration through sephadex G-25 column. The sterilized radiolabeled LDL was injected to rats of different groups. One ml of blood was taken 2 hrs after injection to measure the counts of radiolabeled LDL, and considered as counts at zero time interval or initial counts. Subsequently counts were also taken at 24, 48, 72, 96 and 120 hrs after injection. Percent decrease in counts at increasing time interval was taken as a measure of clearance of LDL from animal blood and in turn as indirect measurement of the LDL-R activity.
Apolipoprotein B concentration was estimated in liver by ELISA using species specific (polyclonal anti rat apoB) antibody (Santa Cruz Biotechnology, Inc. Santa Cruz, CA). Optical density of each well was measured at 405 nm in ELISA reader (Stat Fax; Awareness Technology Inc., USA).
The mRNA expression for 5'-DI andLDL-R was done in liver using RT-PCR kit from QIAGEN.
Total RNA from liver was extracted using TRI REAGENT (Molecular Research Centre, Inc. Ohio). The integrity and size distribution (quality) of RNA was examined by formaldehyde agarose gel electrophoresis.
2 μg of total RNA template from different groups after treatment with DNase I (Ambion) was used in RT-PCR reaction. To the reaction mixture added 10 μl of 5X QIAGEN OneStep RT-PCR buffer (2.5 mM MgCl2 as final concentration), 2 μl of dNTP mix (10 mM of each dNTP), 5 μl of each forward and reverse gene specific primers (from 10 μM stock), 2 μl QIAGEN One Step RT-PCR Enzyme Mix, 1 μl RNase inhibitor (1 U/μl) and finally 25 μl of PCR grade RNase-free water (provided in the kit) to make total volume 50 μl. Mixed it gently by vortex and centrifuged it to collect all the components at the bottom of the PCR tubes. The PCR reaction was performed in the thermal cycler (Techne Ltd. England) using following conditions: the RT reaction was performed at 50°C for 50 min, initial PCR activation was done at 95°C for 15 min, followed by 35cycles of 94°C (denaturation) for 45 sec, 58.8°C (annealing) for 45 sec and 72°C (extension) for 1 min. Finally, incubated at 72°C for 10 min to extend any incomplete single strands.
Optimal oligonucleotide primer pairs for RT-PCR were selected with the aid of the software Gene Runner. The primer sequence (5' to 3') for rat 5'-DI gene coding (+) strand was TCTGGGATTTCATTCAAGGC, noncoding strand was TAGAGCCTCTCAGGCAGAGC, LDL-R gene coding (+) strand was ACCGCCATGAGGTACGTAAG, noncoding (-) strand was GGGTCTGGACCCTTTCTCTC and for rat β-actin gene coding (+) strand was AGAGCTATGAGCTGCCTGAC, and the noncoding (-) strand was CTGCATCCTGTCAGCCTACG. The length of RT-PCR products for 5'-DI, LDL-R and β-actin were 346, 341 bp and 236 bp respectively.
Final PCR products were analyzed on 1.5% agarose gel electrophoresis using 10 mM TE buffer. 5 μl of PCR product was used from each tube. Densitometric analysis of the bands was done by UviBandMap software (Uvitech, England).
Western immunoblot analysis for apoB was done in liver. Tissue homogenate (10% w/v) from each group prepared in 20 mM tris-HCl buffer (pH 7.4) at 4°C was centrifuged at 3000 g for 10 min and the supernatant was used in the assay. Protein sample (30 μg) from each treatment group was separated by 7.5% SDS-polyacrylamide gel electrophoresis using minigel apparatus (BIORAD, UK). The separated proteins were electrophoretically transferred to PVDF membrane (Immobilon-P, Millipore, USA). Membrane was probed with antibody against apoB (Santa Cruz Biotechnology Inc. Santa Cruz, CA). β-actin was used as an internal control. Immunoblot analysis for β-actin was also done by using antibody against β-actin (Oncogene, USA).
Data is expressed as mean ± SD. Difference between different groups was tested using student's t test for unpaired values.
Authors acknowledge the financial support given by Department of Atomic Energy, Government of India, Mumbai (India). | 2019-04-24T20:20:16Z | https://lipidworld.biomedcentral.com/articles/10.1186/1476-511X-4-28 |
Are you shocked by the discovery that your dog is struggling with diabetes? Do you know how to proceed?
Well, as it turns out, thousands of pet owners around the world face the same problem. But, let’s not despair!
There are various methods you can implement, which can help you battle this disease.
What Should A Diabetic Dog Food Contain?
You can minimize and even prevent this issue by subjecting your four-legged friend to a proper diet. In today’s post, we will be reviewing the best dog food for diabetic dogs. It will balance their bodies and help them restore previous functions.
Orijen Original is our top-rated choice for diabetic dry dog food. It is packed with nutrients and provides more than average quantities of protein and fat.
The food contains a wide range of high-quality meat ingredients, such as chicken and turkey, as well as some fish. The poultry will supply your dog with proteins, while the fish offers additional proteins and valuable fatty acids.
However, every food requires vegetables to balance their formula. That’s why Orijen Food has a wide range of veggies like beans and peas. They are considered to be a powerful source of carbohydrates.
Additionally, legumes offer enough fiber for digestion.
Based on the ingredient list, Orijen Food is suitable for the majority of canines. Its fantastic nutrition formula will be excellent for diabetic dogs.
Coming from a Merrick Pet Care, Inc., Merrick Grain Free – Real Buffalo + Sweet Potato recipe is another choice for diabetic dogs. Free from grain sensitivity, pet owners can avoid possible allergies with this formula.
The food contains Omega three and six fatty acids. These compounds are crucial for skin and overall dog health. Merrick Grain Free drives most of its proteins from animal-based sources.
Meat-based proteins are an excellent feature, and they offer necessary amino acids to your furry companion. They are one of the essential properties to judge when buying dog food.
In summary, this product doesn’t contain any artificial colors, nor preservatives. The buffalo protein balances gastrointestinal health, and it’s a perfect glucose management dog food. The formula also features glucosamine and chondroitin for additional health benefits.
Solid Gold high protein food with salmon is one of the best products currently on the market. Its nutrient level is significant and well suited for active and mature dogs.
The formula is enriched with high-end ingredients and limits its fish-based meat to Salmon, Ocean Fish Meal, and Krill. Solid Gold also contains peas and pumpkin, providing plenty of carbohydrates. Additionally, they will offer enough fiber for healthy digestion.
The well-balanced combination of protein, fat, and carbohydrates make this recipe appropriate for the vast majority of canines. When we break down calories, you are getting 36% of proteins, 39% of fat, and 25% of carbohydrates.
In conclusion, if you are concerned about your pet’s health, then this non prescription diabetic dog food will be the right choice. It will not only affect his health but also improve physical activity.
Wellness is one of the few brands in the pet care industry that hasn’t been involved in any significant scandals regarding the quality. If you are looking for diabetic dog food recipes that contain a considerable amount of animal-based proteins, then Wellness Core should satisfy your requirements.
A 100% grain-free formula offers a perfectly balanced and complete meal for your four-legged friend. It is packed with essential vitamins and minerals. The food features a maximum amount of chicken and turkey proteins, combined with real fruits and vegetables.
The product doesn’t contain wheat, corn, soy, or any additional preservatives. Probiotics and antioxidants make this recipe deal for diabetic dogs. Spinach, sweet potato and other vegetables keep the glucose level in check.
Overall, the Wellness blend will be an excellent choice for your pets. It will balance their health and provide more energy.
The number of dog food brands and types has increased significantly in the last couple of years. It’s become quite challenging to find an appropriate diet for your furry companion. That’s why Nutro Light and Weight Management Adult Dry Dog Food formula contains a perfect mixture of natural ingredients, vitamins, and minerals.
It is composed of chicken, rice, lamb meat, and fibers for natural and healthy digestion. Pet owners can serve it alone, or it can be mixed wet dog food.
The recipe incorporates high-protein ingredient sources, such as real-based meat. It is free of artificial colors, flavors, preservatives, corn, wheat, and soy. The product contains components which promote the growth of skin and coat.
This dog food for canines with diabetes is an excellent choice if you are trying to reduce their weight, without compromising their health.
What’s the bottom line? A perfect blend of ingredients will support your best companion through a weight loss journey.
Keeping your canine serving sizes in check can help you battle diabetes. Food manufacturers have a portion size printed at packaging, so you don’t have to guess the amount.
However, canines with insulin intake, for their first meal, should have 1/3 of their daily portion. It allows owners to see how they react to sugar-free dog food.
The glycemic index is associated with the impact of carbohydrates. It shows how they affect the dog’s blood sugar levels. Food that has a low glycemic index, such as fruits, veggies, peas and beans, some whole grains, and fructose release glucose slowly and steadily.
However, high-glycemic ingredients, like wheat products, white rice, and different types of bread cause a fast rise in blood glucose level.
Carbohydrates are mainly responsible for the most significant changes in “after-eating” blood sugar levels. That’s why it’s imperative to keep the amounts of carbohydrates in diet steady.
They are digested faster than fats and proteins. Moist food usually contains carbohydrates like corn syrup or propylene glycol. However, you should avoid it.
Dietary fiber is an indigestible part of any plant, and it’s an essential part of a dog’s diet. Fibers slow down gastric emptying, as well as absorption of carbohydrates.
They have the power to decrease the release of glucose. However, there is no need to pump your dog with fibers, regardless of its health condition. But, canines which lack glycemic control will undoubtedly benefit from it.
Canines struggling with diabetes may not need a low-fat diet unless they are suffering from concurrent pancreatitis, Cushing’s disease, elevated triglycerides and cholesterol, and lipemia.
That’s why numerous diabetic dog food brands have a balanced amount of fats in their formula. You should focus more on proteins, whether your furry companion is overweight, or underweight.
Plant-based components in dog’s food play a significant role in reducing inflammation and creating a formation of antibodies against the pancreas.
Canines mainly digest meat and other proteins. But, over the years, they’ve evolved in eating a minimal amount of plant-based material that won’t overly stress their pancreas.
Pet owners should avoid dog food with artificial ingredients. Components such as chemical additives can do more harm than good. This applies to any canine, regardless of his physical and health condition.
Considering that diabetic dogs require help in maintaining healthy body function, it’s even more significant to avoid them.
Even though byproducts may seem disgusting and unappealing, some of them can be nutritious ingredients. However, you shouldn’t buy food which has meat meals listed as the first ingredient.
For instance, in most cases, chicken by-products are acceptable components of dog’s food. But, generically labeled animal byproducts are not.
It’s important to know the origin of your dog’s food. It should be a well-established and reputable brand, preferably manufactured in the state you reside.
In this case, you are limiting the risks of exposing your four-legged companion to life-threatening ingredients and components and further endangering his health.
Diabetes is a chronic disease that doesn’t only affect canines, but also other animals. It falls into a category of hormonal illness, where pancreas loses the ability to produce insulin.
In some cases, your pet can experience the overproduction of the glucose, where pancreas releases hormone glucagon.
Increased thirst is one of the most visible signs of diabetes. If you notice an increased demand for water with your furry companion, then something is wrong.
These little sings can lead to severe health disorder such as diabetes. So, watch closely and pay attention, especially as your pet ages. If you’re not sure how to estimate that read more about optimal water intake for your dog.
Frequent urination is another issue that comes with this severe disorder. Increased demand for water and frequent urination are indicators of diabetic condition.
Make sure to schedule an appointment with your wet and perform necessary testing. In some cases, these symptoms can lead to serious health problems which aren’t connected to diabetes.
The lack of energy and lethargy are pretty standard with diabetic dogs. When cells are stripped of sugar, your pet won’t have a desire to run, to take a walk with you, or engage in play.
You will see the lack of activity and constant need for sleep. In this case, you are dealing with type II diabetes.
If you notice your furry companion is always starving, despite eating his daily portion, then something is wrong with his blood sugar level.
The continuous need for food might be a sign of the diabetic condition. Your pet will experience extra hunger because cells in a dog’s body are screaming for glucose.
Depression is not such a common symptom, but it can appear with canines struggling with diabetes. There are different types of depression.
Some of them are triggered by the owner’s death, while others by the increased blood sugar levels. If you have a diabetic dog not eating, just laying around, disinterested in his regular activities, then something is wrong.
Cells in your pet’s body require essential nutrients. When they are being starved, it can lead to an increased appetite.
The body cells don’t utilize food energy efficiently, which results in diabetic dog losing weight. Canine can lose weight even when he’s taking in more calories.
Malassezia Dermatitis or yeast infection can occur with diabetic dogs. Usually, the infection is itchy, crusty, and smelly.
However, before you panic and start thinking the worst, take your pet to the vet. There are other causes, such as oily skin, immune deficiency, and seborrhea.
If your canine’s breath began smelling fruity and sweet, rather than its usual dog’s breath, then you should rush him to the vet immediately.
It could be ketoacidosis at its highest peak, which is a deadly condition if not treated right away. On the other hand, if you notice shaking and shivering for no reason, then it can be a sign of hyperglycemia or low blood sugar.
Advanced diabetes in dogs causes cataracts, which is an opacity in the lenses of the eye. At some point, they will lose the ability to see. If the cataract is matured, then your pet can go bling in the matters of weeks.
However, early administration of Kinostat can delay or even entirely stop this condition.
Repeated urinary tract infection is another sign of diabetes. The more sugar there is in urine, the higher the chances that bacteria will grow in your dog’s bladder.
Sometimes these symptoms will stay hidden, so perform regular blood tests. It will give you peace of mind and prevent fatal diabetes in dogs.
Intact female dogs have bigger chances of developing this condition than male ones.
Checking your dog’s urine – you should be able to detect the presence of glucose and ketones. You can perform this test at home, but it’s not accurate.
Test your canine’s blood – the most precise method, implemented at clinics, or home.
The ongoing research following diabetic canines has drawn some pretty impressive conclusions. The clinical trials have established that some breeds are more susceptible to developing this condition.
However, if your pet is obese, then he is at higher risk of suffering from diabetes.
Juvenile diabetes can happen with Golden Retrievers and Keeshonds. If your pet falls into this category, then pay close attention to his behavior.
Diet plays a significant role in lessening the symptoms and managing the disease. It is considered to be a dog diabetes natural treatment.
Carbohydrate – cause an inflammation.
Starches – similar to grains and potatoes, quickly break down sugar.
GMOs – be aware of “Bt,” naturally-derived pesticide engineered to live inside the plant cell.
Vegetable oils – corn, sunflower, safflower, and soybeans.
Poultry – fed with GMO corn.
Heat – processed proteins – they can cause an inflammatory immune response.
Dairy products – dairy cows often receive hormones and antibiotic.
To avoid further issues, you can treat your pets with homemade diabetic dog food, or diabetic canned dog food.
Based on the American Animal Hospital Association guideline, the progression of diabetes in dogs isn’t determined by the type of food. The consistency of diet has a significant impact.
As long as you feed them with a high-quality formula, which offers complete and balanced ingredients, your canine should be fine. One of the things to avoid is simple sugars. They will increase the blood sugar level.
Also, snacks for diabetic dogs can be a double edge sword. Consult your vet before using them. If your pet is overweight, then increase the intake of fibers. It will help with the weight management.
Try to change diabetic dog supplies and choose the ingredients that will accommodate their needs. Canines suffering from pancreatitis should avoid a diet high in fat.
Regularly administer insulin – check your injection technique and apply it at the same time every day.
Incorporate proper diet – focus on low – carbohydrate ingredients, and increase the consumption of protein and fibers.
Check the type of insulin – maybe some other brand will provide better results.
Switch to a different testing.
Diabetes in dogs’ complications can happen when all these steps fail. Some canines produce insulin at an unpredictable rate.
Are There Treats That are Safe for Them?
A lot of dog food manufacturers develop diabetic treats. But, don’t buy a treat because it’s labeled for diabetic dogs. Learn how to read the ingredient list!
Generally, you should avoid treats that contain corn and soy because they are full of sugar. Also, forms of sugar such as corn syrup and fructose may cause a weight gain and worsen your pet’s condition.
How Often Should I Feed Them a Senior Dog With Diabetes?
In most case, diabetic canines should have two meals per day. Remember, consistency is essential for feeding. The same quantity of food, at the same time!
Are There Foods that They Should Avoid?
You must be wondering: Can dogs eat sugar? No, they can’t, and simple sugars must be avoided at all costs.
What not to feed a diabetic dog? GMOs, artificial, soy, corn, and wheat ingredients are a big NO NO. Read a label before serving your dog with a proper meal.
Can Diabetes be Prevented in Dogs?
Incorporate fresh fruits and vegetables.
Is a Dog Glucose Meter Accurate?
Yes, and it’s more accurate with canines than with humans. If you want to fight this life-threatening condition, then you will get this gadget. However, you should buy a glucose meter designed for animals. It will provide better results than a human one.
What is the Life Expectancy of Dogs With Untreated Diabetes?
Many pet owners fail to notice initials symptoms, which leads them to a question: how long can a dog live with untreated diabetes? Well, to be brutally honest, not long. Without treatment, your dog will develop the end stage diabetes symptoms and likely die from them.
If your furry companion is diagnosed with diabetes, don’t panic! Detecting this condition on time is crucial. Unless you are dealing with the end stage diabetes in dogs, you still have time to improve the health of your canine.
With proper vet support, you should be able to provide adequate care for your pet. We understand that diabetes in dogs’ treatment cost can be expensive, but they are worthy of your money.
Even though diabetes can’t be cured, there are many methods, techniques, and treatments, which will guide your dog through this challenging condition. | 2019-04-25T22:25:08Z | https://woofdog.org/best-dog-food-for-diabetic-dogs |
The old ways we are to seek and walk in must be sought not only because we have lost those ways (though we have), but also because they are, to our inattentive and darkened attention, not obvious to us. They are, as the word implies, hidden, and, once lost sight of, must be sought to be regained.
Reliquarium: Hymns for the World filming in Nashville at Ocean Way Studio.
My father asked me to make an album of hymns. He wanted me to do this as a benefit for his missionary ministry, Servants of the King. While I was thrilled to do an album to benefit SOTK, I was reluctant to do an album of hymns.
by Craig Smith, produced and arranged by my friend Paul Mills, which can be procured at http://www.craigsmithmusic.co/hymns. No funds were given for this endorsement, by the bye; it’s just a great recording…). My father, unimpressed by my patently true argument, still wanted me to make an hymn project.
After some thought (I love my father, and hate to disappoint him), I told him that I would do so, if I could arrange the hymns any way I wanted to, though I assured him that I wouldn’t alter the lyrics or melodies, which I recognize as having stood the test of time, recognized across the centuries and decades as excellent, memorable, and orthodox in doctrine (at least, the ones still regularly used in the churches today), and therefore, in terms of lyrics and melody, sacrosanct. He replied that he didn’t care how I arranged them, he just wanted me to do it. So I did.
What partially motivated me in this endeavor was the fact that the transmission of ideas which give rise to cultures across time is a formative bridge, moving from the past through the present to the future, carrying forward the most central and magnificent concepts and artifacts embodying those cultures. This concept should be welcome and familiar to Christians, whose faith is based upon the historical actions of God Himself, enscripturated in the Bible by the Spirit’s inspiration, the testimony to which has been believed and taught by the church from centuries past (2 Tim. 3: 16-17; 2 Peter 1: 21).
Yet even the greatest of ideas loses its urgency eventually. The most influential and beautiful art gradually passes into obscurity through sheer familiarity. The passage of time assures that even the most vital things are finally taken for granted, even though the influences which shape a culture over time, whether idea or artifact, are based upon those which preceded them in a society’s formation. Every generation must learn its past anew.
This is why Christians have attempted across the ages to heed the admonition of St. Paul to Timothy: “ Stand fast and hold the traditions which you were taught, whether by word or our epistle” (2 Tim. 2: 15). In an attempt to faithfully obey that principle, my mission is the retrieval of the most vital music of our past, a revisitation and re-rendering of musical pieces from the formative core of Western culture, the songs which helped form us as a people, and yet have disappeared from conscious memory, though they have influenced the music and history which have produced our place in time.
Since most of these songs were dominated by the language, belief, and worship-patterns of Christianity, such a recovery can only help our increasingly post-Christian society to remember (or realize for the first time) that Christianity was the dominant force which produced, in its interaction with, and reorientation of Europe’s inherited Classical heritage and Germanic cultures, the laws, institutions, societal concepts, and art of the Western world.
Those vital things of the faith which have been allowed to sink into obscurity must be resurrected, though in a fashion which renders them accessible and attractive to an age which has forgotten them and the concepts they embody.
This is why the ancient music must be presented as a fusion of its original form with the musical styles of the present, especially since the original form helped give birth to the music we enjoy today. Such a fusion compels attention by an amalgamation of the musical approaches which please modern sensibilities while simultaneously revealing the beauty of the ancient source with all its essential quiddity preserved. Such a juxtaposition renders the original beauty of the piece “strange,” a combination which refocuses contemporary attention (by virtue of interest in its unusual or “strange” rendering), but which still communicates the power and force of the original music.
This technique (normally called “defamiliarization” by literary theorists) has been successfully utilized by writers such as C. S. Lewis, J.R.R. Tolkien and G.K. Chesterton, architects such as Antonio Gaudi, and painters such as Hieronymous Bosch and Vincent Van Gogh. Lewis, Tolkien, Chesterton, and Gaudi were all utilizing this technique specifically to refamiliarize and re-present Christian concepts and forms to modern society.
Such a presentation can be greatly enhanced by accompanying commentary concerning the inherently Christian cultural and historical background which gave rise to the original songs and infused them with lasting, even eternal importance.
What is to be gained from such an endeavor? Aside from the nascent beauty of the ancient music, it must be remembered that the beliefs embedded in these songs helped shape the culture we inhabit, with our values and concepts, both musical and otherwise, especially since many of these songs continue to be utilized in churches across America and Europe to this day. A conscious retrieval of all that this music represents and has to offer can enable us to more intelligently discern how our culture has come to the point at which it has arrived, and to inform us as to where it is (and should) be going. As the maxim so wisely states, “A tree is only as strong as its roots.” We cannot know where we’re going unless we know where we’ve been as a people, and, in a culture which has become estranged from and forgotten the Faith which gave birth to it, the recovery of Christianity is imperative.
The reintroduction of these songs, surrounded by commentary on their historical origins and cultural meaning, can go a long way toward arousing interest in Christianity by way of enlightened self-interest, as there is presently a great curiosity in America as to what formed us as a people and culture. The beauty of the songs, coupled with teaching explaining how they helped form the development of our values and beliefs, should function as an apologetic refuting current post-Christian doubts that Christianity is effective in the production of works of lasting beauty, as well as demonstrating that the Christian ideas transmitted in the ancient music were not only central in the formation of the Western culture of the past, but that those ideas remain relevant and vital to future cultural development.
My goal is thus to give “pleasure by strangeness,” to arrest the attention of our culture by the mixed beauty of this music, and thereby help us see where we’ve been, and aid us in calculating where we are going.
This is even more important as current technology rapidly advances a truly global culture, and the West, in its cultural melding and exchange with the global South and East, seeks to offer and receive the most helpful elements inherent in each of the participant societies, to the betterment of all the Earth’s peoples. This continues apace as an historical fulfillment of the Scriptures’ prophecies that God will redeem “out of every tribe and tongue and people and nation” (Rev. 5:9), “a great multitude which no one could number, of all nations, tribes, peoples, and tongues” (Rev. 7:9), who will contribute their languages, cultures, and art to Christ’s Kingdom.
In celebration of this ongoing exchange, I have sought to utilize the instruments and modes of the cultures of both East and West, signifying the growing influence of all the Earth’s cultures upon each other, and in anticipation of Christ’s impact upon all the earth’s cultures. My latest project, Reliquarium, is a prime example of my efforts along these lines.
On Reliquarium: Part Two | What is a Reliquarium?
A realization that God has made the things that exist precisely in order to symbolize and reveal Himself causes believers to see the world differently, and parts of the world, especially parts that are important to their faith, become loci of devotion, things whose very existence act as reminders of, and engagements with, the Presence of God.
In the Middle Ages in Europe, especially since most people were illiterate, relics (articles of clothing or other possessions, or even the remains of those of holy life who had died in the Faith) became such focuses of devotion, reminders that God was real and worked in the lives of believers not just in the long-ago Biblical times, but also in the present life and ongoing experiences of Christians still living.
These relics were frequently kept in caskets or containers known as reliquaries, to preserve and simultaneously reveal these relics to believers across time.
With the advent of the Reformation, however, came a change in attitude amongst the Protestants in reaction to what they considered to be a far-too-deeply-developed devotion to these objects, and they deliberately distanced themselves from what they saw as a form of devotion that was an intrinsic part of what they were seeking to reform (Reformation, right?).
People being what they are, however, and the world being exactly what Scripture says it is, that vacuum of secondary objects of devotion was soon filled with creations more suited to the aims and goals of the Reformation: hymns.
In the Medieval Church, the laity, the non-clerical worshippers, didn’t sing in the services in church. That was a task done by either clerics (priests or monks or other ordained ministers) or by other specially-trained lesser clerics. The people simply listened.
Part of the reform wrought by the Protestants was a restoration of worship in song by the congregation as well as the ministers and choir. The Reformation brought a spate of composing hymnists who labored to write songs suited for congregational worship, hymns which both celebrated God and His Works and which also taught Biblical doctrine in forms both accessible to worshippers in their native tongues (prior to this, all songs were in Latin, which very few understood) and which were memorable melodically and lyrically.
These were songs even the illiterate could learn and utilize themselves in God’s worship (though the Reformers labored mightily to educate their people to read, as well). As ongoing, regular elements of believer’s worship, elements which allowed them to become integral parts of public worship, these hymns themselves soon became objects through which the Protestants could focus their devotion, and the hymns filled the space in life formerly occupied by relics.
The hymns were, for Protestant believers, the new relics, new, highly accessible portals and foci through which their devotion and worship of God could be evoked and poured.
In light of all this, it occurred to me that a collection of such post-Reformation hymns would itself be a kind of reliquary, a reliquary of hymns. In Latin, the word is reliquarium. This is the origin of the title of my collection of performed hymns: Reliquarium.
...back to my interview with Kemper Crabb regarding topics brought up in his new book Liberation Front: Resurrecting the Church.
Throughout the book you, via straightforward Scriptural examples, illustrate God’s intended immense empowerment of, and working through, the church in not only the earthly realm but even the heavenly. Why is this fundamental teaching so unheard and/or unheard of in today’s church?
Hmmm. Well, that’s an important question, I think. It has, however, multiple vectors that feed any kind of answer, and this shouldn’t surprise us, since any kind of motivation to do something, especially something sinful, and you’re going to find varied motivations, frequently even within a single person.
Generally, though, I think there are three or four basic reasons as to why these truths are largely unknown in the Church today. The first, and likely the single most important, since it affects most of the other reasons on one level or another, is the creeping reductionism that has influenced the modern Evangelical Church’s doctrine and practice for at least a hundred and fifty years or so (longer in some quarters), an orientation that I call Christian reductionism. Christian reductionism is willing to posit that the central Creedal doctrines of the Bible (the Virgin Birth, the Incarnation, the Trinity, the Resurrection, Creation, etc.), but remain skeptical about other supernatural aspects of Scriptural teaching, preferring to view those things in the most reductionistic fashion possible, only giving credence to any such possibility when all naturalistic explanations are exhausted, if they finally give any credence at all to them (a salient antidote to this tendency happens not infrequently when a family member or congregant ends up demonized, and there’s no naturalistic explanation).
Some believers adopt this attitude because they seek to make the Faith more palatable to its cultured despisers, and, at least theoretically, bring them to belief. Most of today’s believers, though, have simply absorbed the naturalistic skepticism concerning the supernatural promulgated in modern education and the media, and, though they will accept the far-removed supernatural events of the central Creedal beliefs, anything closer to them in time and space is subject to their background reductionistic bent. This tendency is also far too prominent in seminary training, and many pastors pass it on to their parishioners, either implicitly or explicitly.
So, when Scripture presents a teaching that we actually worship in Heaven while still on the Earth, or that the more obviously supernatural spiritual gifts exist (even though all of the Spirit’s Gifts are innately supernatural in their origin and operation, though gifts like teaching and administration seem to not be so), or that demons actively engage humans to do harm, or that God actively judges nations rather than just individuals, to a Christian reductionist these beliefs are either dismissed as untenable or filed away as irrelevant or unbelievable.
And, of course, Christian reductionist ministers just don’t teach those troubling doctrines, except perhaps to explain them away in naturalistic or lunatic-fringe categories. Not to mention that there appears to be a widely-present fear that if “controversial” doctrines are taught or affirmed, numbers might dip in the congregation (and, consequently, tithes might do the same).
Now, there are Charismatic branches of the American Church who do embrace the supernatural as a matter of course, but since many (though not all) of these branches are much more concerned with seeking experience than they are with arriving at a doctrinally-coherent and integrated Biblical world-and-life-view, they frequently misunderstand or attempt to practice these doctrines, resulting in an imbalanced and regrettably goofy way, which just goes to further marginalize and ridicule these ideas among the more doctrinally-oriented Christian reductionists.
Finally, there’s the simple truth that most of us simply don’t know the Bible, or, if we know it much at all, we don’t know it deeply, so, even if our world-view allows more supernaturalistic possibilities (which taking Scripture seriously and learning it would definitely help that gig), if we don’t know the Bible, a broader world-view wouldn’t help in engaging these doctrines.
The purpose of church architecture is to physically symbolize the true nature of where our worship takes place, and what is happening there... Church architecture is massively helpful in reinforcing these fundamental understandings in the worship that shapes everything we are and do.
Both sides, in their refusals, diminished themselves, and, in so doing, diminished the effectiveness of the Church, breeding unforgiveness, bitterness, and hostility toward their own fellow Christians.
...we are selfish. We want to please ourselves more than our brothers and sisters in the Faith, and even, all too frequently, than the Lord Jesus.
This polarization led to sorrow, division, and stultification in many parts of the Church, and to an uneasy stand-off which, though somewhat better in our time, nonetheless continues to this day. | 2019-04-21T03:18:51Z | http://www.kempercrabb.net/blog/?category=Worship+and+the+Arts |
Centre College is a private liberal arts college located in Danville, Kentucky, a community of approximately 16,000 in Boyle County, about 35 miles (55 km) south of Lexington, Kentucky. Centre is an undergraduate four-year institution with an enrollment of approximately 1,400 students. Centre was founded by Presbyterian leaders, and it maintains a loose affiliation with the Presbyterian Church (USA). It was officially chartered by the Kentucky General Assembly in 1819. The college is a member of the Associated Colleges of the South and the Association of Presbyterian Colleges and Universities.
Geneva College is a Christian liberal arts college in Beaver Falls, Pennsylvania, United States. Founded in 1848, in Northwood, Ohio, the college moved to its present location in 1880, where it continues to educate a student body of about 1400 traditional undergraduates in over 30 majors, as well as graduate students in a handful of master's programs. It is the only undergraduate institution affiliated with the Reformed Presbyterian Church of North America.
The Milwaukee Badgers were a professional American football team, based in Milwaukee, Wisconsin, that played in the National Football League from 1922 to 1926. The team played its home games at Athletic Park, later known as Borchert Field, on Milwaukee's north side. The team was notable for having a large number of African-American players for the time.
The Cleveland Bulldogs were a team that played in Cleveland, Ohio in the National Football League. They were originally called the Indians in 1923, not to be confused with the Cleveland Indians NFL franchise in 1922. However, after team owner Samuel Deutsch purchased the Canton Bulldogs in 1924, he merged the Canton team with his Indians and renamed his franchise the Cleveland Bulldogs. The Canton Bulldogs remained a part of the team until 1925, when they were sold back to Canton. The Cleveland Bulldogs played in the NFL until 1928 when they were relocated to Detroit and became the Detroit Wolverines. The team was later incorporated into the New York Giants in 1929. The Cleveland Bulldogs won the 1924 NFL championship.
Prairie Hill is an unincorporated community in western Limestone County, Texas, United States. It lies along U.S. Route 84 northwest of the city of Groesbeck, the county seat of Limestone County. Its elevation is 594 feet (181 m). Although Prairie Hill is unincorporated, it has a post office, with the ZIP code of 76678.
North Side High School is a public secondary school located in Fort Worth, Texas. The school serves about 1,600 students in the Fort Worth Independent School District.
James Madison "Red" Roberts was an American football player and coach. He played football for the Centre Praying Colonels in Danville, Kentucky. Roberts was thrice selected All-Southern, and a unanimous choice for the Associated Press Southeast Area All-Time football team 1869-1919 era. After college Roberts, played in the early National Football League (NFL) for the Toledo Maroons and the Akron Pros. He also played in the first American Football League for the Cleveland Panthers. He later made a run for the office of Governor of Kentucky as a Democrat in 1931, losing in the primary to Ruby Laffoon who went on to win the election.
He began playing football at Centre in 1917, making an impact as a freshman when his 17-yard drop kick defeated the rival Kentucky Wildcats 3–0 (his only field goal). During his freshman year, McMillin was also on the track team; on April 27, 1917, he won the 220-yard dash at a Centre interscholastic track meet.
About to score against Harvard.
Centre players in Danville, fresh off the defeat of Harvard. McMillin is top right.
Cal Hubbard (pictured) was coached by McMillin at both Centenary and Geneva.
1 2 3 4 5 6 "McMillin, Alvin Nugent [Bo]". tshaonline.org. Retrieved November 27, 2016.
1 2 Reed, Billy (November 11, 1968). "I'd Rather Be Bo McMillin than Governor". si.com. Sports Illustrated. Retrieved November 27, 2016.
1 2 "Bo McMillin to Fly Eagles 'Differently'". The Ludington Daily News. February 9, 1951.
↑ Fred Turbyville (November 21, 1919). "Centre College Prays and Crys, Then Goes Out And Wins". New Castle Herald. p. 14. Retrieved May 8, 2016– via Newspapers.com.
↑ "Red Weaver". centre.edu. Retrieved August 30, 2016.
↑ White, Don (June 12, 2013). "Bo knows Upsets!". Commonwealth Journal. Retrieved November 27, 2016.
↑ "Alvin N. (Bo) McMillin". centre.edu. Archived from the original on May 19, 2011. Retrieved November 27, 2016.
↑ "M'Millan Paid $2000 For Game". Spokane Daily Chronicle. January 3, 1925.
↑ George Trevor (November 25, 1935). "1921 Team Produces Most Stars For Centre's All-Time Eleven". Pittsburgh Press. Retrieved March 24, 2015– via Google news.
↑ "U-T Greats On All-Time Southeast Team". Kingsport Post. July 31, 1969.
↑ Rob Robertson (April 2011). "The Centre College Football Team's Amazing Run, Climaxed by Winning the "Southern Championship" in 1924" (PDF). The College Football Historian. 3 (3): 6.
↑ Roberts, Randy (1 June 1991). "Bo McMillin: Man and Legend by Charles W. Akers and John W. Carter" – via scholarworks.iu.edu.
↑ "Walter Camp's All-American Team". Fitchburg Daily Sentinel. December 13, 1919.
1 2 "Centre Downs Indiana In Last Two Minutes of Play". The Courier-Journal. October 5, 1919. p. 42. Retrieved May 8, 2016– via Newspapers.com.
↑ Frank G. Weaver. "Come On, You Praying Kentuckians". Association Men. 45: 416.
↑ "Kentucky Colonels Have Phenomenal Record; Always Pray Before Battle". Arizona Daily Star. November 28, 1919. p. 7. Retrieved May 27, 2016– via Newspapers.com.
↑ "Camp Names Gridiron Stars". Post-Standard. Syracuse, NY. December 15, 1920.
↑ "Fincher, Guyon, Strupper-and Shaw Hardy". The Miami News. November 3, 1943.
↑ Grantland Rice (July 19, 1940). "Sportlight". The Nebraska State Journal. p. 12. Retrieved August 22, 2016– via Newspapers.com.
↑ "Georgia Tech Beats Strong Centre Team By Score of 24 To 0". News and Observer. October 31, 1920. p. 13. Archived from the original on March 4, 2016. Retrieved June 4, 2015– via Newspapers.com.
↑ Arthur Duffy (November 1, 1920). "Sport Comment". Boston Post. p. 12. Archived from the original on March 4, 2016. Retrieved June 4, 2015– via Newspapers.com.
↑ "How Centre Colonels Defeated the Crimson In Cambridge Stadium". The Courier-Journal. October 30, 1921. p. 49. Retrieved February 13, 2016– via Newspapers.com.
↑ "McMillin's Brillian Sprint Gives Centre Victory Over Harvard". St. Louis Post-Dispatch. October 30, 1921. p. 6. Retrieved February 13, 2016– via Newspapers.com.
↑ "Centre College Remembers Day When It Was King of the Gridiron" . Retrieved 7 August 2008.
↑ Clark D. Shaughnessy (September 11, 1931). "Dixie Football At the Top, Says Loyola Mentor". The Tuscaloosa News.
↑ E. Benjamin Samuels (October 28, 2011). "Remembering a Forgotten Upset". thecrimson.com. Retrieved November 27, 2016.
↑ Merle Crowell (January 1, 1922). "David Whips Goliath Again". American Magazine. Colver Publishing House. 93: 52–53 – via Google Books.
↑ "Listening In". Boys' Life. 12 (3): 1. March 1922.
↑ "Bo McMillin Married.; Centre College Football Star Weds Miss Miers at Fort Worth". The New York Times. January 3, 1922.
↑ "The Heisman Winners Before There Was a Heisman" (PDF). The National Football Foundation's Football letter. 51 (3): 3. 2009. Archived from the original (PDF) on 2013-01-26. Retrieved 2015-10-27.
↑ Jim Joanos (August 2008). "The History of FSU Football: 1948- Sixty Years Ago".
↑ "M'Millin Tells Why He Coaches Centenary Team". Alton Evening Telegraph. November 16, 1922. p. 9. Retrieved December 1, 2015– via Newspapers.com.
↑ "Conference Championships". cfbdatawarehouse. Archived from the original on March 4, 2016. Retrieved September 4, 2016.
↑ "Alvin Nugent "Bo" McMillin". bcshof.org. Retrieved November 27, 2016.
↑ Marino Parascenzo (November 3, 1971). "The Geneva Story: A Winning Fairy Tale". Pittsburgh Post-Gazette.
↑ "Geneva College, Conqueror of Harvard, Plans Busy Grid Menu for 1927". The Evening Independent. October 14, 1926.
↑ Henry McLemore (April 26, 1937). "Cal Hubbard Chooses Star Pro Grid Team". Oshkosh Daily Northwestern. p. 15. Retrieved May 22, 2016– via Newspapers.com.
↑ "Robert "Cal" Hubbard". Louisiana Sports Hall of Fame. Retrieved November 27, 2016.
↑ "Kansas State University 1931 season results". cfbdatawarehouse.com. Archived from the original on March 3, 2016. Retrieved November 27, 2016.
↑ Sam Beishuizen (October 13, 2015). "Indiana Hoosiers - Indiana Honors 70th Anniversary of 1945 Hoosier Football Team". iuhoosiers.com. Indiana University. Retrieved November 27, 2016.
↑ "Former Centenary Grid Star Goes To Indiana". Monroe Morning World. March 20, 1938. p. 9. Retrieved June 8, 2016– via Newspapers.com.
↑ Alvin (Bo) McMillin (July 17, 1950). "Bo McMillin Calls All-Star Game No. 1 Gridiron Show". Chicago Daily Tribune.
1 2 "Bo McMillin Dies Same Day Rock Was Killed". The Jacksonville Daily Journal. April 1, 1952. p. 9. Retrieved July 10, 2016– via Newspapers.com.
↑ "M'Millin May Take Lions' Job Today". Chicago Tribune. February 19, 1948.
↑ "Leon Hart Biography". jockbio.com. Retrieved November 27, 2016.
↑ "McMillin Quits Detroit Lions". St. Petersburg Times. December 20, 1950.
↑ "Eagles fire Greasy Neale, Hire McMillan as Coach". Pittsburgh Post-Gazette. Associated Press. February 9, 1951. p. 20. Retrieved July 19, 2016.
↑ "Bo McMillin '22 inducted into the Kentucky Athletic Hall of Fame - Centre College". 20 June 2013.
↑ "Alvin (Bo) McMillin". Louisiana Sports Hall of Fame. Retrieved November 27, 2016.
↑ "Breeders, Kentucky Derby (1916-2015)" (PDF). kentuckyderby.com. p. 9. Retrieved November 27, 2016.
↑ "50th Anniversary of the Kentucky Athletic Hall of Fame". www.voice-tribune.com. 25 July 2013. Retrieved November 11, 2017.
↑ "1986 Men's All-Americans" (PDF). www.usila.org. Retrieved November 11, 2017.
↑ William N. Wallace (May 26, 1987). "Johns Hopkins Edges Cornell For Title". www.nytimes.com. Retrieved November 11, 2017.
↑ "U.S. Men History - Rosters - US Lacrosse Team USA". teamusa.uslacrosse.org. Retrieved November 11, 2017.
↑ "Bo McMillin Record, Statistics, and Category Ranks". Pro-Football-Reference.com. Retrieved November 27, 2016.
Auker, Elden (2001). Sleeper Cars and Flannel Uniforms. ISBN 1-892049-25-2.
Brown, John Y. (1970). The Legend of the Praying Colonels. Louisville, Kentucky: J. Marvin Gray & Associates, Inc.
Camp, Walter (1922). National Collegiate Athletic Association Football Rules: Official Intercollegiate Football Guide. 45 Rose St, New York: American Sports: Spalding's Athletic Library.
Cook, William A. (25 October 2012). Big Klu: The Baseball Life of Ted Kluszewski. McFarland – via Google Books.
Fitzgerald, Tim (2001). Wildcat gridiron guide: past & present stories about K-State football.
Goldstein, Richard (1996). Ivy League Autumns. St. Martin's Press. ISBN 978-0-312-14629-0.
Griffith, R. D. (September 1, 2012). To the NFL: You Sure Started Somethin': A Historical Guide of All 32 NFL Teams and the Cities They've Played In. Dorrance Publishing – via Google Books.
Hammel, Bob (January 1, 1999). Indiana University: Glory of Old IU. Sports Publishing LLC – via Google Books.
Kaplan, Inc. The Unofficial, Unbiased Guide to the 331 Most Interesting Colleges 2005.
Maxymuk, John (August 2, 2012). NFL Head Coaches: A Biographical Dictionary, 1920-2011. McFarland – via Google Books.
National Collegiate Athletic Association (1934). Spalding's Football Guide.
Pope, Edwin. Football's Greatest Coaches.
Shanklin, William L. (May 1, 1995). Against All Odds: Football's Great Comebacks and Upsets. Barclay House Books.
Stallard, Mark (January 1, 2000). "Wildcats to Powercats: K-State Football Facts and Trivia". Rowman & Littlefield – via Google Books.
Yust, Walter (1952). Encyclopædia Britannica: a new survey of universal knowledge. 9.
Wikimedia Commons has media related to Bo McMillin .
Pound sign (*) denotes interim general manager.
Robert Calvin Hubbard was a professional American football player and Major League Baseball (MLB) umpire. After playing football at Centenary College and Geneva College, Hubbard played in the National Football League (NFL) between 1927 and 1936 for the New York Giants, Green Bay Packers and Pittsburgh Pirates, playing the bulk of his career with the Packers. Hubbard is credited as being one of the inventors of the football position of linebacker.
Peter Louis Pihos was an American football player and coach.
Charles Barthell Moran, nicknamed "Uncle Charley", was an American sportsman who gained renown as both a catcher and umpire in Major League Baseball and as a collegiate and professional American football coach.
William Enoch Fincher was an American college football player and coach. He played the end and tackle positions for the Georgia Tech Golden Tornado football team of the Georgia Institute of Technology. Fincher was inducted into the College Football Hall of Fame as a player in 1974.
Carl Rudolph Frederick "Swede" Anderson IV was an American college football coach at Western Kentucky University and Howard Payne University. Anderson graduated from Centre College in Danville, Kentucky in 1924, where he played in the backfield with legendary alumnus Bo McMillin. Anderson then followed McMillin to Centenary College of Louisiana and Geneva College. Anderson then served one year as the head football coach at Western Kentucky, before moving to Kansas State as its freshman team coach in 1930. Anderson returned to Western Kentucky as its head coach from 1934 to 1937. He was the backfield coach under McMillin at Indiana from 1938 to 1945. He then returned to his alma mater, Centre College, where he coached the Praying Colonels until 1950. The following season, Anderson became the seventh head football coach at the Howard Payne University in Brownwood, Texas and held that position from 1951 to 1952. His coaching record at Howard Payne was 7–10.
The Centre Colonels football team, historically also known as the Praying Colonels, represents Centre College in NCAA Division III competition. The Colonels currently play in the Southern Athletic Association (SAA), which was established in 2011. Before the establishment of the SAA, Centre played 50 seasons in the Southern Collegiate Athletic Conference. Despite the school's small size, the football team has historically had success and possesses a strong tradition. At the end of the 2008 season, the school ranked as the 12th winningest school in Division III with an all-time record of 509–374–37.
Phillip Norris "Army" Armstrong was an American football player and coach.
The 1921 Centre Praying Colonels football team represented Centre College of Danville, Kentucky in the 1921 college football season. Led by coach Charley Moran, the Praying Colonels compiled a 10–1 record, scoring 334 points while allowing 28 points.
The 1919 Centre Praying Colonels football team represented Centre College in the 1919 college football season. The Praying Colonels scored 485 points, leading the nation, while allowing 23 points and finishing their season with a perfect record of 9–0. The team was retroactively selected by Jeff Sagarin as national champion for the 1919 season.
James Redwick "Red" Weaver was an American football player and coach.
Carmel Arthur "Tim" Temerario was a high school, college and professional American football coach and executive. He was an assistant coach for the Detroit Lions, Cleveland Browns and Washington Redskins, and served as the Redskins' director of player personnel between 1965 and 1978.
Herbert Hunt "Flash" Covington, also called "The Mayfield Flash", was an American football, basketball, and baseball player for the Centre Praying Colonels of Centre College in Danville, Kentucky.
The 1921 College Football All-Southern Team consists of American football players selected to the College Football All-Southern Teams selected by various organizations for the 1921 Southern Intercollegiate Athletic Association football season. This was the last year before many schools left the Southern Intercollegiate Athletic Association (SIAA) for the Southern Conference (SoCon).
Hall Terry Snoddy also known as Terry Snowday was a college football player.
The 1936 Indiana Hoosiers football team represented the Indiana Hoosiers in the 1936 college football season. The participated as members of the Big Ten Conference. The Hoosiers played their home games at Memorial Stadium in Bloomington, Indiana. The team was coached by Bo McMillin, in his third year as head coach of the Hoosiers.
The Kentucky Athletic Hall of Fame is a sports hall of fame for the U.S. state of Kentucky established in 1963. The hall "recognizes athletes and sports figures who were born in, or who played their respective sport, in the state of Kentucky." Individuals are inducted annually at a banquet in Louisville and receive a bronze plaque inside Louisville's Freedom Hall. | 2019-04-19T06:23:50Z | https://wikimili.com/en/Bo_McMillin |
PolitiFact's attempt to use an "In Context" item to soften the negative effects of President Obama's "you didn't build that" moment didn't work out so well.
More was needed to help the president.
Watch how many times PolitiFact uses partial quotations to protect its Obama from having his statement taken out of context. We have two already in the graphic up above ("is the result of government" "hard-working people").
On with the fact check.
PolitiFact tells us that the Romney campaign and the Obama campaign have been wrangling over whether the latter insulted entrepreneurs. That issue is somewhat settled when entrepreneurs perceive an insult. Romney wins that point. PolitiFact wants to let us know that Obama did not mean to insult entrepreneurs. And maybe attacking Romney in relation to this issue is the ticket.
Romney, in comments at public events and in several ads, has argued that the remarks show a general disdain for business. The Republican National Committee and the National Federation of Independent Business are among the groups have [sic] released their own videos and statements echoing Romney that the president is out of touch.
The above summary is fair but potentially misleading. We'll watch for those effects as the story progresses.
In one fundraising e-mail [sic], Matt Rhoades, Romney’s campaign manager, decried Obama’s "naïve view that government, and not the hard work, talent, and initiative of people, is the center of society and the economy."
The email from Rhoades helps make it plain that PolitiFact distorts the Romney campaign's argument. The argument is that Obama credits the government too much, not that he doesn't credit entrepreneurs at all. Yet the latter is what PolitiFact suggests in its graphic.
In another campaign e-mail [sic], Amanda Henneberg, a Romney spokeswoman, said Obama had "denigrated Americans who built their own businesses."
Henneberg's statement dovetails with the Romney campaign message that Obama overemphasizes the role of government, but PolitiFact can potentially make it look like she is saying that Obama gives entrepreneurs no credit.
The issue has become so big that the Obama campaign felt the need to address the issue head-on in a Web video titled "Tampered" that quoted media accounts saying the quote had been taken out of context.
The current size of the issue could mean that the Romney campaign is right that Obama is out of touch. But it would help Obama if it appeared that people were simply misled by Romney about what Obama said. PolitiFact did the Obama campaign a favor, by the way, by overlooking for the sake of this story the Obama campaign video suggesting Obama did not say what Romney quotes him to say.
Not only was Obama taken out of context, he didn't even say it in the first place.
President Obama recently said: "If you've got a business, you didn't build that. Somebody else made that happen."
Clearly, this President doesn't understand how our economy works.
In this item, we’ll rate the claim that Obama was saying success "is the result of government," not "hard-working people," when he said, "If you've got a business, you didn't build that. Somebody else made that happen."
PolitiFact distorts Romney's claim by taking his comments out of context. Ironic, no?
PolitiFact tries to set the stage by asserting that Romney's quote of Obama distorts the meaning of Obama's claim. In effect, PolitiFact suggests this is obvious if one reads Obama's statement in context. But doesn't the entire context of Obama's statement emphasize the role of the government in business creation at the expense of the entrepreneur? How does PolitiFact miss the obvious?
We believe, as do our friends at FactCheck.org and the Washington Post Fact Checker, that Romney has seriously distorted Obama’s comments.
PolitiFact is checking this fact by proclaiming it obvious that the context of Obama's statement puts the lie to Romney's claim. Other fact checkers supposedly agree. Hopefully one or both of them actually bothered to check some facts.
There's really nothing like that in this fact check. It consists of PolitiFact insisting that Obama was taken out of context, and Romney's statements taken out of context make up the bulk of the case against Romney.
PolitiFact is partly right. Obama was extolling the importance of the government role in allowing business to prosper. He did so in the context of beneficiary businesses "giving back" as if it wasn't the taxes of businesses that helped pay for the infrastructure in the first place. And the words he used diminish the role of individual effort ("Let me tell you something -- there are a whole bunch of hardworking people out there").
Why does PolitiFact simply ignore the material in Obama's speech that diminishes the importance of the entrepreneur?
By leaving out the "individual initiative" reference, Romney and his supporters have misled viewers and given a false impression. For that, we rate the claim False.
Romney ignores Obama's "clear summary" because the summary is ambiguous. The summary provides no justification for successful businesses "giving back." That concept comes out as Obama essentially tells entrepreneurs that they were lucky (others worked just as hard) and owe a big honkin' portion of their success to Our Glorious Government. And the government, Obama says, is ready to take its rightful cut.
By leaving out the reference to increasing taxes on entrepreneurs, PolitiFact has misleads readers and gives a false impression.
Matt Rhoades, Romney’s campaign manager, decried Obama’s "naïve view that government, and not the hard work, talent, and initiative of people, is the center of society and the economy."
By neglecting the importance of that context, PolitiFact again misleads readers and gives a false impression.
Once again, the subject of the fact check was arguably more accurate than his would-be fact checkers.
The fact checks by Annenberg Fact Check and the Washington Post Fact Checker essentially leap to the same conclusions PolitiFact achieved with its leaps of logic. But both of the other fact check services did a superior job to PolitiFact in providing context for the issue.
It's worth noting that anytime PolitiFact starts determining whether or not something is "in context", by definition the exercise is one fraught with subjective impressions as opposed to concrete facts. What context is relevant? What objective standard is used to measure what portions should be included, or what element of the speech is unnecessary?
One wonders what exactly Romney could have done to satisfy PolitiFact's ambiguous contextual standards. As Twitter user @CuffeMeh suggested, should Romney have hired the fast talking Fed Ex guy to repeat Obama's entire speech in a 30 second ad? For my money, Romney's ad didn't change, distort, or flub Obama's context at all. But there it is, right next to a big gimmicky False graphic. Romney's a liar and I'm a dim bulb because I'm not picking up on the subtle nuance of Obama's delicate context.
"Obama video deceptively edits Obama speech to make it sound pro-business"
The bottom line is Romney's ad didn't remove or change anything. This isn't a fact check. It's damage control from a partisan media group attempting to sugarcoat Obama's clear, unambiguous message declaring his attitude towards individual achievement.
The Weekly Standard: "PolitiFact Mucks Up the Contraception Debate"
This year has sped by at a breathtaking pace so far, and we've neglected to review some worthy stories about PolitiFact simply because we placed a higher priority on some stories than others.
Before I explain why PolitiFact is once again being deliberately misleading, grossly incompetent, or some hellbroth of these distinguishing characteristics, you'll have bear with me. Part of the reason PolitiFact gets away with being so shoddy is that it counts on its readers believing that it can be trusted to explain any necessary context to justify its status as judge, jury, and factual executioner.
Obviously the right thing to do now is click the link and read the whole thing for yourself.
Hemingway's latest example of PolitiFactian perfidy concerns its use of a Guttmacher Institute publication to support an Obama administration claim that 98 percent of sexually active women use birth control.
The Obama administration was trying to justify its insurance mandate requiring birth control as a basic coverage requiring no copay.
Hemingway noted the Guttmacher Institute's lack of neutrality, a number of the arguments marshaled against its findings and PolitiFact's selective use of the evidence.
At the end of the day, a study drawn from a group of women aged 15-44 does not justify extrapolating the data to the set of all women of any age. PolitiFact went soft again on an administration claim.
Ohio Watchdog: "PolitiFact slams GOP spokeswoman for ‘literally true’ statement"
Joe Guillen, the Cleveland Plain Dealer reporter writing for PolitiFact Ohio, was determined to find fault.
“The claim is literally true because it includes both Brown and his allies,” Guillen wrote, and he should have stopped right there. If it’s literally true, are we supposed to worry it might be figuratively untrue? It’s a number, not a simile.
It turns out that Guillen’s beef is that Santa’s declaration changed the subject.
Redfern is the least credible person to be commenting on outside spending when it comes to Ohio’s U.S. Senate race. Sherrod Brown and his special interest allies in Washington are plotting to spend over $13 million, with no end in sight. It’s clear that Brown and his supporters are having to spend this type of money because Brown’s out-of-touch record has exposed him to Ohioans as a 38-year politician and Washington insider who puts politics over people.
If the above represents the full context of Santa's response, then Guillen has misrepresented her. Santa specifically wrote "Brown and his special interest allies" and Guillen Sentenceshopped that into "special interest groups" minus Brown. Guillen's paraphrase, in other words, changed Santa's meaning. And Guillen proceeds to fact check his paraphrase and blame it on Santa.
Guillen probably shouldn't expect more than a lump of coal for Christmas this year.
Rather than interpreting "Sherrod Brown and his special interest allies" contrary to its literal meaning, he should have inquired further as to how Santa justified calling Redfern "the least credible person" to comment on outside spending.
Visit Ohio Watchdog to read the whole of Cassidy's report.
Big Journalism: "Politifact Yet to Report Two Glaring Falsehoods in Obama's Reelection Doc"
From earlier this year (March), Big Journalism's John Nolte took PolitiFact to task for its kindly treatment of the Obama documentary doubling as a campaign ad.
Nolte claimed PolitiFact missed at least two big whoppers in the film. First, GM's supposed repayment of its bailout loans (PolitiFact later graded that claim "Half True"--see below). Second, the repeated tale of Obama's mother supposedly denied health insurance coverage.
Politifact took a long hard look at the Obama reelection propaganda film and found it to be … mostly true!
Yep, 3 "mostly true's" to 1 "mostly untrue."
Yes, PolitiFact succeeded in giving the documentary a favorable frame.
One of the claims PolitiFact found "Mostly True" was actually very misleading. It portrayed President Bush as giving the auto companies money with no strings attached while Obama's strong leadership held the companies accountable. The loans from the Bush administration came with plenty of strings, including the requirement that by March the recipients present the Obama administration with a plan for achieving solvency.
To PolitiFact's partial credit, it updated its story with a fact check of the claim that Chrysler and GM repaid their loans.
PolitiFact fails to receive full credit because the applicable standard doesn't pass the sniff test when paired with the standard recently applied to Mitt Romney. In Romney's case a true statement was called misleading and was ruled "Mostly False." The film made a partially true statement that was misleading and received a "Half True."
PolitiFact's combination of story selection bias and biased fact checking served President Obama well.
Alternate title: "The unBainable lightness of Bane"
The intermittent "counterirritant" returns with another critique of PolitiFact, this time skewering Poynter's Pedants for ignoring the context of Rush Limbaugh's comments regarding the Bain-Bane connection Limbaugh mentioned on his radio program.
The transcript PolitiFact used as a source offers more support for the radio host than it does the fact checkers. Only two sentences discuss whether the name Bane was selected because of Romney. The first is a question: “Do you think that it is accidental that the name of the really vicious fire breathing four eyed whatever it is villain in this movie is named Bane?” After asking that question, Limbaugh was interrupted and went off on a tangent. When he returned to the subject, he continued: “So, anyway, this evil villain in the new Batman movie is named Bane. And there’s now a discussion out there as to whether or not this is purposeful and whether or not it will influence voters.” After noting it, Limbaugh never takes a side in the discussion of purposefulness.
The point is inarguable: PolitiFact fact checked Limbaugh on a statement he never made, unless one insists without reasonable supporting evidence that his question was rhetorical. PolitiFact didn't bother making the argument and moreover decided against dealing with this issue through its "In Context" feature. "In Context" functions for PolitiFact pretty much like a "nothing to see here" tag.
The critique by counterirritant serves as a fine bookend for my "PolitiFlub" critique of the same PolitiFact item. I took a different tack, showing that even if Limbaugh was making the claim PolitiFact imagined the fact checkers went about their business in entirely the wrong way.
How can one blame the Atlanta Journal-Constitution for publishing an editorial that calls PolitiFact "a distillery for truth"? The AJC, after all, is one of PolitiFact's state affiliates, the home of PolitiFact Georgia.
Blame aside, however, what a load of codswallop.
Maybe it’s the clarity it forces on public discourse. Perhaps it’s the eye-catching Truth-O-Meter with its brutal simplicity. Or could it be its distaste for nuance in a world grown comfortable with wiggle room?
Anybody else detect a paradox when a device of "brutal simplicity" is said to force clarity on public discourse?
The "Truth-O-Meter" and its "brutal simplicity" are a maul used to butcher a steer. Rather than distinct cuts of beef such as sirloin or ribs, one ends up with hamburger blended with all the humblest portions of the unfortunate beast. Hotdog/hamburger hash, as it were. PolitiFact provides all the clarity of Soylent Green, and creates its own rambling vistas of wiggle room.
PolitiFact is powerful because it represents the essence of what we do. It is intensely distilled journalism that filters out the good intentions, mendacity and ignorance that lead public officials to fracture the truth occasionally. Like a great scotch, the appeal is in its simplicity. That’s why politicians and power brokers hate it, if “hate” is a strong enough word.
Are we talking about the same PolitiFact?
I could maybe see the AJC's point if newspaper journalists weren't at least as capable of good intentions, mendacity and ignorance as politicians.
The state has so few powerful Democrats, that PolitiFact Georgia has to look to Democrats from elsewhere to avoid giving the impression that it trains its fire only on Republicans.
AJC editorialist Bert Roughton Jr. just spilled the beans that PolitiFact Georgia engages in the type of compensatory rating that critics have long suspected PolitiFact of doing. Some PolitiFact operations, such as Ohio's, deny using the technique. So either somebody's not giving us the facts or else PolitiFact's standards vary.
We promised to take a closer look at the Republican Party of Virginia's challenge to PolitiFact Virginia's objectivity.
The document works on some levels and not on others. The best evidence it contains showing PolitiFact Virginia's lack of objectivity comes from anecdote and circumstantial evidence.
The "open letter" section comes across well, but almost immediately afterward the document suffers from accuracy issues.
The graph of rulings by number and by party is off, as pointed out by the semi-daily clockwork accuracy of Karen Street: The "False" column for Democrats is too short. The document uses the correct figure for "False" rulings in determining the proportion of "False" statements attributed to Republicans but incorrectly asserts that PolitiFact "ruled disproportionately against Republicans" in that category. The 40 percent figure used in the comparison is disproportionately low compared to the 48 percent baseline derived from the listed numbers.
The criticism based on the individual breakdown mostly rings true. Virginia has two Democrats in the U.S. Senate. How does ex-senator George Allen warrant more fact checks than both combined? Complaints about the attention on House Majority Leader Eric Cantor don't carry much weight. Cantor serves as a major voice for congressional Republicans.
While it served as an intriguing idea to criticize PolitiFact Virginia for the timing of its stories, we were instantly skeptical of this claim. News dumps by the government are fundamentally different from the news reporting cycle, yet the GOP document relies on the comparison. Here's the problem: Dumping stories over the weekend can put them in the Sunday newspaper, which is often the most widely read portion of a major newspaper. No case is made for the significance of a weekend dump for either a daily paper or an Internet news site. If the Richmond Times-Dispatch literally publishes the most positive Republican stories in its least popular editions then the Virginia GOP may have a legitimate gripe, but that evidence does not appear in this document.
The case studies hit the mark more often than not, pointing out a good number of times where PolitiFact Virginia used stilted reasoning to reach conclusions unfavorable to Republicans.
The argument from the case study makes PolitiFact Virginia's actions look fishy, but it's far from conclusive without better evidence. It does contribute to the stated aim of the letter, however. This section is at its best when criticizing individual rulings from PolitiFact Virginia.
From Page 54 through the end of the 86-page document, the Appendix simply gives a rundown of PolitiFact Virginia's ratings without any commentary or criticism. It's hard to see the point, other than to help produce stories about an 86-page criticism of PolitiFact Virginia. If that was the case, the mission was accomplished.
In summary, the report scores with the anecdotes and not much else. The presentation softens the potential impact.
The Washington Times: "These three fact-checkers keep candidates in line"
(M)uch of what the fact-checkers do is inherently judgment calls.
For example, PolitiFact Virginia will grade a politician's words as true on their face, while other times will look for suggestive meanings that they say make factually true statements unfair.
The interpretive bias affecting the story focus is hard to quantify, but finding examples isn't hard. In June, Mitt Romney claimed that poverty among Hispanics increased under Obama. PolitiFact decided Romney was blaming Obama and ruled the true statement "Half True." Also in June, the Obama campaign claimed that Romney, as governor of Massachusetts, outsourced call center jobs to India. But Romney did not outsource any jobs. He vetoed a state law that would have prevented companies contracting with the state of Massachusetts from outsourcing jobs. The PolitiFact rating? "Half True." A true statement is half true depending on the focus PolitiFact gives it. A false statement is half true, likewise depending on the focus.
Similar examples occur often throughout the various PolitiFact operations.
Ray Allen, a longtime Virginia GOP consultant and adviser to House Majority Leader Eric Cantor, said the entire process is inherently flawed.
"So much of what is getting fact-checked is opinion and political philosophy," he said. "The fact-checkers are actively intervening in the campaigns. We've seen fact-checkers write things they clearly want to get in TV ads."
Allen's right about the flaws in PolitiFact's process. It enshrines liberal bias from the start through the end of the process. The imprecise rating system provides a versatile canvas for expressing political opinions, no less so as PolitiFact's ratings in practice ignore the definitions of the ratings.
The system almost inevitably results in spin.
Big Journalism: "Politispin: 'Fact-Checkers' Mislead on GOP Leaders' Favorable Unemployment Numbers"
That's old news around here, but like the liberals who endlessly parrot PolitiFact's spin, we appreciate confirmation bias as much as the next guy.
When doing that analysis resulted in Republican governors still reducing the unemployment rate faster than Democratic governors, Politifact decided to compare the unemployment numbers of the Republican predecessors in states that elected Democrats and Democratic predecessors in states that elected Republicans. Only then -- when not even comparing the current crop of governors or the past two years, which was the basis of Elliott’s analysis -- was Politifact able to find something they could use to say Democrats (predecessors) were slightly better than Republicans (predecessors) at reducing the unemployment rate.
Lee nails the point, and this reminds me of PolitiFact's treatment of Laura Ingraham's claim about RomneyCare's unpopularity with national voters. In that case, PolitiFact based their entire rating on statistics only from Massachusetts when Ingraham was probably talking about all 50 states. It appears that when PolitiFact doesn't like the initial outcome, they find new facts to throw into the mix until they reach their desired outcome.
Considering the unemployment rate has fallen in 49 states in the last year, that’s stretching the statistic pretty thin.
We find Robitaille’s claim "is partially accurate but leaves out important details or takes things out of context," our definition of Half True.
If the unemployment rate fell in 49 states, by definition Robitaille's claim is true. Using PolitiFact's logic, if Robitaille had claimed "The sun rose in every state that elected a GOP governor", he'd only be rated Half-True because he left out important details. It's nonsense. And it's not fact checking.
This is the first time we've noticed Tony Lee, but if this installment at Big Journalism is any indication, we're looking forward to highlighting his work in the future. Head over to Breitbart and read the whole thing. There's plenty more to this smackdown.
Matthew Hoy of Hoystory also takes issue with PolitiFact's rating of Robitaille.
One might cut PolitiFact a break for trying to take credit into account for the sake of its ratings if the effort was evenly applied and didn't force PolitiFact to largely ignore the definitions it established for its ratings.
What do I think of PolitiFact's execution? I'd borrow a line from legendary football coach John McKay: "I'm in favor of it."
The Washington Post: "Virginia Republican Party to PolitiFact: Don’t bother ringing!"
The Washington Post's reporter/blogger Erik Wemple updates his reporting on PolitiFact Virginia and the critique from the Republican Party of Virginia.
It turns out--no big surprise here--that the relationship broke down between the Virginia GOP and PolitiFact reporters. The Republican Party of Virginia joins Wisconsin Democrats in giving their state's PolitiFact franchise the silent treatment.
Wemple may have tipped his ideological hand by referring to the GOP's critique as a "screed." Sure, he can claim he just meant it was a long critique. But if he does that then it makes his use of the term appear redundant ("enormous screed"). Careful, Mr. Wemple.
State political parties cutting off their cooperation with a fact checker? Looks like the making of a news story.
The Franklin Center for Government and Public Integrity is onto PolitiFact, in the form of Watchdog Ohio and its seven-part (so far?) series "PolitiFact or Fiction."
Each of the seven parts reviews a questionable ruling by PolitiFact Ohio, with the focus falling on the U.S. Senate contest between incumbent Democrat Sherrod Brown and Republican challenger Josh Mandel.
The opening salvo by Jon Cassidy blasts PolitiFact Ohio for rating two nearly identical claims from Mandel differently. One version received a "Half True" while the other garnered a "Mostly True." Cassidy argues that both versions were true and explains the flaw in the reasoning PolitiFact used to justify its "Half True" rating in one case.
This installment, again by Cassidy, criticizes PolitiFact's use of softball ratings in the context of its candidate report cards. The report cards graphically total PolitiFact's ratings for a given candidate and PolitiFact encourages readers to compare the report cards when deciding for whom to vote.
Rooting for the Red Sox is like rooting for the drug companies. I mean it’s like they have so much money, they buy championships against the working-class, middle-America Cleveland Indians. It’s just the way you are.
Brown didn’t pick a dominant pharmaceutical company for his comparison. He picked all pharmaceutical companies, as though we should root against an entire industry because of its size.
Since 32 percent of Ohio graduates have no student debt at all, Brown overstated the average debt by half.
And that warrants a "Half True" on PolitiFact's "Truth-O-Meter." Supposedly.
As with Part 3, Part 4 hits PolitiFact Ohio for choosing a softball issue on which to grade Brown while also giving him an inflated grade. Cassidy points out how PolitiFact's use of equivocal language gets Brown off the hook for using a very misleading statistic. Brown ends up with a "Mostly True" from PolitiFact.
The fifth installment adds another example in kind with the previous two.
PolitiFact uses equivocal language--well beyond using mere charitable interpretation--to help defend another of Brown's dubious claims.
“You’d think it would be as easy as comparing the value of goods and services exported from the United States with those imported from other countries,” [PolitiFact Ohio's Stephen] Koff writes.
Note to Koff: it’s exactly that easy.
Cassidy could have shown PolitiFact's spin more graphically than he did.
For January through September 2010, the most recent measurement available, the trade balance was a negative $379.1 billion. Assuming the monthly trends hold through December, this year’s annual trade deficit should reach $500 billion.
Divide that by the days of the year and you’d have a daily trade deficit of $1.37 billion a day. That’s 32 percent lower than Brown’s claim of $2 billion a day.
The accurate figure should always serve as the baseline. PolitiFact uses Brown's number as the baseline instead, finding the real figure lower by 32 percent. A 32 percent error doesn't sound so bad. Use $1.37 billion as the baseline and it turns out that Brown's number represents an inflation of 46 percent. In PolitiFact terms, that's "Mostly True." PolitiFact tried to justify the rating based on higher trade deficits from prior to 2009.
Cassidy's right again that Brown benefited from grade inflation.
With Part 6, Cassidy offers an example of PolitiFact Ohio nitpicking Mandel down to "Mostly True" for a plainly true statement.
Mandel claimed his election to the office of state treasurer came from a constituency where Democrats outnumber Republicans 2 to 1. People would understand that to mean a count of voter registration records.
PolitiFact justified its ruling according to an expert's claim that voter registration numbers aren't "the best litmus test." But think how much more context was missing from Sherrod Brown's statement in Part 5. There's no comparison.
In Part 7 Cassidy switches gears and defends one of Brown's statements from the truth-torturers at PolitiFact, but uses the minor slight as a contrast to yet another example of grade inflation.
We’re not sure which half. If you take out the middle four words, “we buy… Chinese imports” is true. You can argue Brown’s claim is close enough, or that it’s way off the mark, but whatever you call it, it isn’t half-true.
But while PolitiFact Ohio isn’t looking to play Gotcha!, a key tenet is that words matter. In this case, Brown’s number is nearly 30 percent greater than the correct figure.
Yes, words matter. PolitiFact uses words that suggest the accurate figure was used as the baseline. But the math tells a different story. The 10 percentage point difference between 25 percent and 35 percent is nearly 30 percent of Brown's incorrect figure--the wrong one to use as the baseline. In fact, Brown's number is 40 percent greater than the correct figure.
Overall, Cassidy did a fine job of assembling a set of PolitiFact Ohio's miscues and explaining where the ratings went wrong. When PolitiFact botches the math on percentages, as we point out, it helps out Sherrod Brown all the more.
We appreciate Ohio Watchdog's contribution toward holding PolitiFact to account. | 2019-04-25T00:55:37Z | https://www.politifactbias.com/2012/07/ |
One of the most balanced quartets of teams headed into the Eurocup regular season is Group A, where the fight to reach the Last 16 can be expected to start on opening night. Chorale Roanne of France played the 2007-08 Euroleague and is ready to use that experience, the club's first in 50 years on the continental stage, to go far in the new Eurocup. Zadar of Croatia, a classic European club, reloaded its roster and had a strong start in the Adriatic League, the competition it won in 2003. ASK Riga of Latvia not only survived two qualifying rounds to join Group A, but was the last unbeaten team this season in the Baltic League. ASK hopes to revive the glory days that saw it win Europe's first three club titles, between 1958 to 1960, with a solid first step in the 2008-09 Eurocup. Last but not least, Maroussi Costa Coffee of Greece brings a defensive brand of basketball to counter its offensive-minded Group A opponents. Having won a continental trophy to start this decade, the 2001 Saporta Cup, Maroussi knows what it takes to excel in a competition like the Eurocup.
Roanne has undergone major roster changes in order to prepare to stay competitive in the Eurocup. The club brought back Aaron Harper, one of the stars of Roanne's French Cup and Semaine des As title teams in 2007. Center Taj Gray will be its major reference in the paint due to his post moves and scoring skills. Marcellus Sommerville is a modern power forward, ready to pull the trigger from downtown if Gray is double-teamed. Meanwhile, Chris Monroe is a tall swingman ready to help Roanne with his all-around skills. Pass-first playmakers Marc-Antoine Pellin and Pierric Poupet, as well as small forward Karim Souchu, round a solid team ready to win anytime, anywhere. Zadar keeps some of the players that helped the team to reach the Adriatic League final four last season, such as Juby Johnson, rebounding ace Todor Gecevski or combo guard Rok Stipcevic, not to mention returning head coach Aleksandar Petrovic. Zadar added veteran three-poing threat Marlon Garnett, up-and-coming forward Deyan Ivanov, as well as solid guards Damir Rancic and Malix Dixon. Zadar will be a tough opponent, especially at home, backed by thousands of its diehard fans.
Maroussi did not hesitate to play a major role in the off-season market and build a competitive team. The club added athletic guard Nikolay Padius, a ULEB Cup finalist with Aris in 2006, as well as playmaker Billy Keys, small forward Jarod Stevenson, aggressive swingman Pat Calathes and center Loukas Mavrokefalidis. Greek players like Fanis Koubouras, Costa Halarabidis, Kostas Kaimakoglou or Andreas Glyniadakis - who played the 2008 Olympic Games with his national team - will be basic for coach Soulis Markopoulos. Controlling the game rhythm against three high-scoring opponents will be a big key for Maroussi. After surviving the qualifying rounds, ASK Riga survived is ready to keep making noise. Corey Brewer, the ULEB Cup's second-best scorer all-time, will have the chance face Zadar, his former team. Power forward Ricardo Marsh, center Bruno Sundov and three-point specialist Uvis Helmanis will be the main pillars of a deep team that also features playmaker Sandis Valters, big man Raitis Grafs and versatile forward Milutin Aleksic. ASK was injury-plagued in the ULEB Cup last season, but now, backed by its loyal fans, is ready to rebound and fight for a Last 16 spot in the Eurocup.
Some of the biggest highlights in the Eurocup regular season are set to take place in Group B, with four talented teams fighting for the two Last 16 tickets available. Dynamo Moscow of Russia won the ULEB Cup title in 2006 and reached the semifinals last season. Dynamo is ready to shine in the Eurocup as one of the teams to beat yet again this season. Bulgarian powerhouse Lukoil Academic in its Europe's second club competition for the sixth consecutive seasons and as usual, its goal is to survive the first round and see what it can achieve from that moment. It will not be an easy task, however, as its Group B opponents also have potential to go very deep in the competition. Reigning Latvian League champion Barons/LMT also won the FIBA Eurocup last season and are ready to take a bigger challenge in the 2008-09 Eurocup. Last but not least, even when Unics Kazan of Russia reached Group B through the Qualifying Rounds, it cannot be underestimated. In fact, Unics reached the ULEB Cup semifinals in 2007 and the Final Eight last season.
Dynamo has put together arguably one of the best rosters in club history, landing marquee free agents all around Europe and even beyond. Coach David Blatt, who won EuroBasket 2007 with Russia, is the new boss in town. Dynamo kept a powerful core of experienced players such as Travis Hansen, Robertas Javtokas, Sergey Monya, Dmitry Domani or Sergey Bykov, as well as adding some of the best free agents available. Former All-Euroleague second team selection Darjus Lavrinovic, versatile forward Bostjan Nachbar, shooting guard Jannero Pargo, playmaker Hollis Price or combo guard Arriel McDonald, a ULEB Cup finalist with Akasvayu that returned to his former club, round a deep, solid roster with no limits.
Lukoil is back with Todor Stoykov, the ULEB Cup's all-time scorer and its assists leader, too. Stoykov plays a key veteran role in a team that features Bulgarian talents Chavdar Kostov and Hristo Nikolov, shooting guard Riste Stefanov, big man Kenny Adeleke, swingman Tim Pickett and recently signed playmaker Kevin Kruger.
Barons/LMT opted to keep the core of players that led the club to its biggest-ever success last season, such as veteran forward Dainius Adomaitis, guard Giedrius Gustas, scoring machine Armands Skele, center Kaspars Berzins and above all, star power forward Demetrius Alexander, its true leader on court. Barons improved its roster with several key additions, like forwards Adrian Henning and Corey Smith, playmaker Todd Abernethy or big man Charles Rhodes. Its options rely on Alexander and Skele as Barons' franchise players, as well as being strong at home, just as it has been in the Baltic League so far this season.
Unics Kazan survived tough tests against Energa Czarni and 2004 ULEB Cup champion Hapoel Migdal Jerusalem in the qualifying rounds to reach the regular season. Do-it-all forward Tariq Kirksay will be its main reference due to its outstanding versatility and game knowledge. Unics also landed a well-rounded group of veterans ready to deliver right away, such as scoring guards Terrell Lyday and Marko Popovic, as well as power forwards Kresimir Loncar and Vladimir Veremeenko. Sharp shooter Sergey Chikalkin and up-and-coming center Dmitri Sokolov are set to play major roles for Unics this season.
Sparks will fly in Group C with three mighty powers and one newcomer taking aim at two tickets to the Last 16. Besiktas Cola Turka, BC Khimki, Benetton Basket Tamoil and Le Havre promise some tense games to be played over the coming months, with the outcome likely up for grabs till the very end. Besiktas of Turkey reached last season’s ULEB Cup Final Eight and looks to add to that with an impressive roster that targets big success. Khimki, which bowed out to eventual champion DKV Joventut in the Last 16 last season, has a star-studded roster that features most of last year’s studs along with some impressive new faces.
Benetton is a traditional European power with a mix of seasoned Euroleague veterans and some hungry newcomers that has all the tools to leave its mark. And Le Havre, which battled through the qualifying rounds to reach the regular season, brings plenty of intensity as it makes its competition debut.
Besiktas and new head coach Hakan Demir bring back only two players that saw meaningful minutes last season – reserve playmaker Mehmet Yagmur and forward Cevher Ozer – but boast some of the most seasoned players in the history of the competition. In fact, swingman Marcus Faison, big man Mario Austin and point guard Mire Chatman rank fourth, fifth and 10th, respectively, on the competition’s career scoring charts. Austin, the 2006 ULEB Cup regular season MVP, joins Adem Oren and Ozer in the paint to give balance to a dynamic perimeter attack. Chatman and Yagmur run the show, creating opportunities for Faison, Haluk Yildrim and Muratcan Guler. Benetton looks to four players with Euroleague experience to help lead its team, including center Sandro Nicevic, among Besiktas’s stars last year. Nicevic, Rado Rancik, Judson Wallace and youngster Andrea Renzi form a strong interior trio for head coach Oktay Mahmuti. Gary Neal is the No. 1 offensive weapon, with Bobby Dixon scoring and creating for others at points guard. Swingmen Domen Lorbek and Matteo Soragna are also key contributors on this talented squad.
Khimki Moscow won its first-ever trophy last season – the Russian Cup – and will look to add the Eurocup next to it on the shelf with its impressive roster. The club made worldwide headlines over the summer by signing former Euroleague stars Carlos Delfino and Jorge Garbajosa – both medallists at the recent Summer Olympic Games. However they won’t need to carry head coach Kestutis Menzura’s team that also features former ULEB Cup final MVP Kelly McCarty, defending ULEB Cup champ Jerome Moiso, dominating center Maciej Lampe, veteran playmaker Milt Palacio and budding swingman Anton Ponkrashov, among others on a squad that is destined for big things.
Le Havre joins the big boys with a hungry roster that features a number of established players. The backcourt of TJ Thompson and Fabien Causeur and big center Romain Duport return from last season’s squad that surprised many with a strong domestic campaign. Bingo Merriex and Marcus Slaughter add power inside and veterans Danny Strong and Slaven Rimac provide the experience needed to compete with the top clubs in Europe as Le Havre looks to gain respect and take a big step forward in the European scene this season.
Group D will have a distinctly Mediterranean feel with two Greek clubs, one from Turkey and another from Israel. Aris BSA 2003 returns to the competition after a few strong runs in the Euroleague, including back-to-back appearances in the Top 16 in the last two years. Aris was the ULEB Cup runner-up in 2006. Panellinios BC is back after a tough season last year, but it proved it belongs by ousting Telekom Bonn and BC Kyiv in the qualifying rounds. Turk Telekom saw its promising season cut short prematurely, but is back with many of the same players looking to go further than ever. And Bnei Eshet Tours Hasharon will make its competition debut with the same deep and determined roster that has made it one of the best teams in Israel in recent seasons.
Aris BSA 2003 and head coach Andrea Mazzon are ready to lead an assault on Group D and the Eurocup. Aris brings back three key players from last season – starting small forward Dimitris Tsaldaris, center Lazaros Agadakos and shooter Savvas Iliadis – and adds some big time talent for a new run. Spencer Nelson leads a frontcourt that includes Blagota Sekulic and Nikos Barlos, while Keydren Clark and Nikos Argyropoulos lead the charge at point guard and Sean Marshall and Anton Gavel pack plenty of punch on the wings. Once Mazzon brings these forces together, Aris has the potential for another run at the crown.
Panellinios BC is off to a strong start after plowing through Bonn and Kyiv in the qualifying rounds. Anthony Grundy and Brad Newly have proven to be a powerful combo on the wings, scoring from the perimeter and with penetration. The duo of Jurica Golemac and Ivan Radenovic has supplied points in the paint and rebounds. Veteran guard Georgios Kalitzis is a major piece thanks to his defense and leadership, while Emmanouil Papamakarios adds scoring and Djuro Ostojic brings experience and size off the bench. If Panellinios keeps its momentum going, head coach Elias Zouros has a chance to take his club to new heights.
Turk Telekom went 9-1 in the ULEB Cup regular season last year, but stumbled in the Last 32 when star forward Michael Wright was injured. Wright is back now along with Erwin Dudley and Kris Lang to give head coach Ercument Sunter a strong frontline. Kennedy Winston arrived from Euroleague force Panathinaikos to add athleticism at the small forward spot, while Rod Blakney came from Olympiacos to play point guard. Veterans Serkan Erdogan and Tutku Acik round out the backcourt of an experienced squad with the tools and the hunger to go far this season.
Bnei Hasharon comes to the Eurocup with a nice mix of youth and experience as well as defensive aces and offensive weapons. Meir Tapiro, one of only three players to record a triple-double in ULEB Cup history, teams with former ULEB Cup champ Erez Katz to give the club a strong foundation in the backcourt. The athletic Ori Ichaki and seasoned swingman Cookie Belcher combine to give head coach Ariel Beit Halachmi what he needs at the guard spots. Rookie Richard Roby is a lethal scorer at small forward, while two more first-year players, Haminn Quantance and Shawn James, team with veteran shot-blocking ace Ousmane Cisse to give the club incredible rebounding and defensive power in the paint.
Four teams with impressive European track records will battle it out in an evenly matched Group E, which could wind up being the most exciting of the eight Eurocup regular season groups this year. All four advanced at least one stage in their respective competitions last season. Lietuvos Rytas Vilnius was a Euroleague participant, winning its regular season group and coming within one victory of the Quarterfinal Playoffs. Kalise Gran Canaria won its ULEB Cup regular season group and reached the Last 16 before bowing out, while Asvel Basket finished second to Gran Canaria in that same group and went to the Last 32. Ukrainian champion Azovmash Mariupol won five of six to finish the regular season and also reach the Last 32. This time around, only two of these teams will be able to play on after January and it could go to the last game before we know which two.
Lietuvos Rytas is arguably the best team in the history of this competition. The powerhouse from Lithuania was the ULEB Cup champion in 2005 and reached the title game in 2007. Four players on the current roster took part in that final and seven are back from last year’s team, with veteran head coach Antanas Sireika now on the sidelines. The duo of Matt Nielsen and Marijona Petravicius anchor the team inside, with the dependable Donatas Zavackas and developing big men Michailis Anisimovas and Milko Bjelica bringingplenty of power off the bench. Small forward Chuck Eidson is one of the team’s most important players, teaming well with Arturas Jomantas and Mindaugas Lukauskis on the wings, while Branko Milisavljevic and Marius Prekevicius split time at point guard. With even more young talent waiting in the wings, L. Rytas has the squad to reach far one more time. Kalise Gran Canaria is also a veteran of the competition and over the course of time has managed to go far thanks in part to its tremendous home-court advantage. Head coach Salvador Maldonado has developed a winner in part due to keeping many players together for a long time. In fact, six return from last year’s squad.
Gran Canaria is quite deep in the paint this year with Joel Freeland, Sitapha Savane, Daniel Kickert and Albert Moncasi. Carl English leads a backcourt that features Marcus Norris and Josh Fisher, while Melvin Sanders, Jim Moran and James Augustine team up on the wings. The combination of continuity, depth, a super home-court advantage and of course talent could spell another long run for Gran Canaria.
Azovmash Mariupol can look to a pair of Euroleague studs to lead its charge as it looks to confirm its status as a rising European power. With Alphonso Ford Top Scorer Trophy winner Marc Salyers at forward and two-time Euroleague champ Tomas Van den Spiegel at center, Azovmash has cornerstones to build on. Playmaker Khalid El-Amin adds leadership and plenty of explosive play from the point guard spot, while Panagiotis Liadelis, Tomas Delinikaitis and Aleksandar Capin can fill the baskets alongside him. Serhiy Lishchuk should compliment Van den Spigel at center with forwards Uchenna Nsomwu and Dijon Thompson rounding out a solid frontcourt that give the fans in Mariupol plenty to be optimistic about.
Traditional French power Asvel Basket has an experienced squad that will look to restore the club to greatness. Asvel lacks size, but more than makes up for that with speed and athleticism. Ali Traore, Eric Campbell and Chevy Troutman and Amara Sy make up a veteran frontline, while Laurent Foirest and Aymeric Jeanneau solidify a backcourt that includes explosive scorer J.R. Reynolds and sharpshooter Ben Dewar. That crew, under the guidance of head coach Vincent Collet, should be one worth watching this season.
Four teams with plenty of recent success will look for more this season in Eurocup regular season Group F. PGE Turow Zgorzelec of Poland made its European debut last season a smashing one by advancing all the way to the ULEB Cup Final Eight. The team that finally stopped Turow’s run was Dynamo Moscow, coached by the current BC Red Star head coach, Svetislav Pesic. Red Star is loaded with rising stars that helped the club go to last year’s Last 16. Brose Baskets Bamberg was in the Euroleague last season and still has a handful of those players back for its Eurocup run. And Belgian champion Spirou Charleroi is one of the original ULEB Cup teams and boasts one of its signature players in Andre Riddick, who is the competition’s all-time leader in rebounds, steals and blocked shots.
PGE Turow was the Cinderella story of last season’s ULEB Cup, but unfortunately that success saw many of the more familiar faces move on. However head coach Saso Filipovski is back with a squad that has a chance to duplicate that success. Reserves Iwo Kitzinger and Robert Witka are the two players that carry the torch from last season, but they are joined by some talented new faces. Centers John Turek and Darian Townes form a formidable tandem in the paint along with power forward Chris Daniels, while Donald Copeland and Damir Miljkovic balance them with their three-point shooting. Playmaker Bryan Bailey helps run the show and if all goes according to plan, Turow may continue its accent to the upper echelon of European club.
Brose Baskets Bamberg of Germany has a new look this year, despite bringing back four key contributors from last year. Filiberto Rivera and Michael Jordan share the point guard spot next to shooting guards Demond Greene and Robert Garrett. Predrag Suput, Jared Newson and Eric Taylor fill the forward spots, while Alexander Johnson and budding star Tim Ohlbrecht man the paint. New head coach Chris Fleming, the architect of Artland Dragons recent success, will guide this squad from the sidelines as Bamberg takes aim at another special season.
Red Star has one of its strongest rosters in years with a host of homegrown talent, some key imported additions and a coaching great on the sidelines. Forward Tadija Dragicevic is the undeniable star of the team, but he has plenty of support around him. Marko Keselj, Elmedin Kikanovic, Vladimir Stimac and Lawrence Roberts provide plenty of force inside that, joining Dragicevic for a deep and talented frontline. Playmaker Marko Marinovic and shooting guard Andre Owens form the starting backcourt with Boris Bakic spelling them off the bench. With Pesic around to make up for his players’ lack of big game experience, Red Star could be at the start of a golden era.
Belgian champion Spirou Charleroi has a veteran squad with some players that have played together for some time. The trio of Justin Hamilton, Jerry Johnson and Gerrit Major handles the playmaking duties, while Jonathan Tabu, Dwayne Broyles and Pankracije Barac share time on the wings. Meanwhile a frontline of Riddick, Wes Wilkinson, Mladen Sekularac and Len Matela provides head coach Drazen Anzulovic with plenty of depth and experience. All told, the chemistry and talents on this team could bring Spirou deep into the Eurocup this season.
Competition is set to be tough in Group G, with four deep, experience teams ready to face each other. Every game will count in this group, with traditional and up-and-coming teams. Original ULEB Cup champion Pamesa Valencia reached the Final Eight last season and returns with the same core of players ready to reach even higher this year. Fortitudo Bologna did not reach the ULEB Cup elimination rounds last season and is now hoping to bounce back with an improved roster. Fortitudo made it to the Euroleague final in 2004, its best result in European competitions, losing against Maccabi Tel Aviv. Artland Dragons is one of the fastest rising teams in European basketball, as it went out of nowhere to reach the 2007 German League finals and win the German Cup last season. Last but not last, BC FMP has the biggest run in Europe's second club competition and survived the elimination rounds, downing mighty Ural Great in the process. As one of the best farmyard clubs in Europe, FMP will be flooded with young talent ready to step up big in the Eurocup scenario.
Pamesa won the ULEB Cup title in 2003, reached the semifinals in 2005 and made it to the Final Eight last season. The club kept playmakers Vule Avdalovic and Shammond Williams, former ULEB Cup final MVP Ruben Douglas, up-and-coming forward Victor Claver or center Albert Miralles as its core of players. Pamesa renewed its froncourt with the addition of Kosta Perovic, Ermal Kuqo and Florent Pietrus, as well as finding a talented swingman in Rafa Martinez. As usual, Pamesa will be a major candidate to reach the Final Four and even go further. Fortitudo has a new star in Qyntel Woods, an incredible athlete with outstanding driving skills. Left-handed homegrown forward Stefano Mancinelli, combo guard Joseph Forte or playmaker Marcelo Huertas will share most minutes at all backcourt spots, whil Fortitudo also signed a battery of big men featuring Dalibor Bagaric, Kieron Achara and three-point threat Uros Slokar. Once Fortitudo undergoes an adjustment period, it will become a very tough team to beat.
Artland has always relied on American players to build up a competitive rosters. Its main players are scoring ace Adam Hess, playmaker Lamont McIntosh and center Darren Fenn, who offers rebounds, mid-range shots and post skills. Guard Will Blalock, experienced big man Darius Hall, center Chad Prewitt and scoring guard Zack Whiting round the core of a team in which its most important German player, Dirk Madrich, plays a key role off the bench. Artland counts on its athleticism and up-tempo game to beat the expectations and advance to the Last 16. As in every season, FMP lost some key players but is ready to bring in up-and-coming replacements right away. Over the last five years, players like Dejan Milojevic, Ognjen Askrabic, Ivan Zoroski, Milos Teodosic, Marko Marinovic, Zoran Erceg, Dusko Savanovic or Milan Macvan. None of them is with FMP in the 2008-09 season, but the club have a new franchise player in power forward Dragan Labovic. He leads a young talented team in which players like Filip Covic, Predrag Samardziski, Nemanja Protic, Mladen Jeremic or Miroslav Raduljica. Teen sensations Dejan Musli and Andreja Milutinovic will be key players for FMP in the very near future.
Group H is expected to be one of the most balanced ones in the Eurocup regular season, as all four teams had solid starts in their respective domestic competitions and have all options to make it to the Last 16. Hemofarm Stada of Serbia is a modern classic in Europe's second competition, as it reached the ULEB Cup semifinals in 2005 and 2006. Perennial Montenegrin League champion Buducnost reached Group H through the qualifying rounds and hopes to take revenge of its defeat against Hemofarm in the Last 32 two-way round last season. Both Hemofarm and Buducnost rely on a group of homegrown players to reach deep in the Eurocup this season. Czech powerhouse CEZ Basketball Nymburk reached the elimination rounds last season, breaking all existing ULEB Cup home attendance records last season. Nymburk hopes to use that experience to advance to the next round, too. Meanwhile, iurbentia Bilbao Basket is a newcomer to European club competitions with well-rounded, experienced players who are used to play with each other. Those that underestimate Bilbao Basket will pay a high price for that.
Hemofarm has kept a base of players that have been together for several seasons, with sharp shooter Nebojsa Joksimovic and center Vladan Vukosavljevic as its main references in offense. Milan Macvan is set to play a major role, as he is set to become one of the best power forwards in Europe. Rebounding ace Milovoje Bozovic, up-and-coming guard Stefan Markovic, experienced forward Bojan Krstovic and playmaker Miljan Pavkovic. Hemofarm also has big hopes on 222cm center Boban Marjanovic, too. Buducnost also has opted to give playing time to its youngest talents, who have immediately delivered at the beginning of this season. As such, its new franchise player is power forward Vladimir Dasic, a 20-year old talent ready to prove his value in the Eurocup. Small forward Vladimir Micov and defensive centers Nenad Misanovic will be the main pillars of their team, along with Dasic. Nemanja Gordic, Marko Simonovic, Ivan Maras, Nikola Otasevic or Milos Bojovic round a deep, solid roster that may well become the surprise team in the Eurocup this season.
Nymburk shocked everyone in the ULEB Cup last season and despite losing franchise forward Rado Rancik, it managed to land well-rounded veteran Goran Jagodnik, a former Hemofarm forward who can score in many ways. Jagodnik is Nymburk's major addition, as the club managed to keep most of the main players it had last season. As such, sharp shooter Blake Schilb, big man Petr Benda, small forward Ladislav Sokolovsky, playmaker Arthur Lee or swingman Michal Kremen. With sellout crowds in its home games in Pardubice and one year of experience on its back, Nymburk is stronger than it has ever been. Bilbao Basket comes off an outstanding season, in which it reached the Spanish League playoffs and the Spanish King's Cup semifinals. Bilbao Basket has the complete package. Javi Salgado and Janis Blums are solid choices at point guard. The club has offers like battery of sharp shooters like Luke Recker, Quincy Lewis, Predrag Savovic and Reinaldas Seibutis, as well as a deep frontcourt with defensive centers Fred Weis and Salva Guardia or star forward Marko Banic. Bilbao Basket has always been a very ambitious club that went from the Spanish third division to the ACB playoffs in record time. Its first Eurocup appearance is another step forwards for the club. | 2019-04-21T06:36:46Z | https://forums.prosportsdaily.com/archive/index.php/t-294784.html?s=25637cd1b61a6d857f64bc25d0988b85 |
The Stone in the Skull, by Elizabeth Bear, Tor Books, October 2017, $27.99, hc.
A Peace Divided, by Tanya Huff, DAW, June 2017, $26, hc.
The Last Good Man, by Linda Nagata, Mythic Island Press, June 2017, $18, tpb.
Monstress Volume Two: The Blood, by Marjorie Liu and Sana Takeda, Image, July 2017, $16.99, tpb.
Elizabeth Bear cannot, by any conceivable standard, be called unknown. Multiple-award-winning and generally highly regarded for her sf, she is outspoken and visible. So it will come as a surprise to some to hear me say that I think she is invisible in one regard. She is not the go-to name for fantasy readers.
In part this is because Bear is tonally flexible; she writes across a range of subjects and sub-genres, and there's no commonality of voice that declares that the book in question is an Elizabeth Bear book. This is not a bad thing. But it is a thing. And it is also a thing of which I am guilty. The Stone in the Skull is pure, secondary world fantasy. And it is, in my variant of a humble opinion, excellent high fantasy. It is not Bear's first foray into the sub-genre, but…when I think of Bear, I don't think of high fantasy, and I believe the loss is entirely mine. I have read and enjoyed (or adored) her sf. But when a pile of books comes in, I have not really picked up her fantasy, and although a sample of Range of Ghosts was brilliant, when the book came in, I did not immediately pick it up.
I regret this, but luckily for readers, books are persistent.
The Stone in the Skull is not a doorstop-sized novel. It clocks in at 368 pages. For those of you who assume that a short book can't be epic in feel or scope—and most can't—and therefore pass it by, I think you're doing the book a disservice. Bear manages the feat of writing a complicated, complex world and offering it without scanting anything. This is not a sketch of a world that could be living and breathing if given more room—it's complete. It never feels rushed, but it never bogs down in repetition or recycled detail. Every word works for the creation of world, context, kingdoms—and characters.
Characters drive my reading. They always have. And if there is one change in Bear's writing over the years, I would say it's the characters. Not the handling, not the reality, not the pain or the doubt that burden them, but the type of character. The Dead Man and Gage are the characters that begin the book. The Dead Man has been tasked, by the One Eyed Sorceress, to deliver a message to the Lotus Kingdoms. His partner, Gage, carries that message because his partner is literally a man made of metal, the soul housed in his very large metallic body the soul of someone who once had living flesh. He was created by a Wizard, as gages are.
The Dead Man was an oathsworn guard of a Caliphate that has ceased to exist. He's outlived his master—and his family. If he has one friend in the world, it is the Gage, or Gage, as he calls himself. Gage has outlived his creator, as well. They are for hire, landless and homeless.
Mrithuri is the rajni, the queen, of one of the Lotus kingdoms. Her grandfather ruled the principalities, and held the greater kingdom together until his death; now, the unification has broken. She rules her kingdom, and it is to Mrithuri that the message the Gage and the Dead Man are tasked with delivering has been sent. But in the auguries that precede the rains, there is nothing good to be taken, for all imply war. Death.
She is not the only queen in the Lotus kingdoms. Not the only woman whose kingdom is imperiled by war. But it is through the Lotus Kingdoms that the Dead Man and Gage must travel with their message—a message whose contents they do not know—while sorcerers and armies gather in their wake.
Bear's prose here is elegant, descriptive, textured, and pragmatic, filtered as it often is through the viewpoints of the characters that inhabit the text. She brings the characters to life through their conversations, their doubts, their fears and their grief, and she hints at a way forward, a way through these elements which are so foundational. Much is unsaid, but in the hands of an author like Bear, the unsaid exists between the words, implied by action or inaction. There is hope here, and if that hope is bitter and slender, it exists, even as the world begins to go dark and the promise of death and loss grows heavier and heavier.
This is obviously the first of a series. I'm going to guess it's a trilogy, but don't quote me on that if I turn out to be wrong. It doesn't end on a cliffhanger, precisely, but it clearly leaves the story unfinished. And I want more of it. In fact, in that way of impatient readers who have found something to love, I want it all Right Now.
Tanya Huff is, unlike Elizabeth Bear, an author whose every work, and practically every word, shouts Tanya Huff has written this. It doesn't matter which genre, which sub-genre. If the novel has the name Tanya Huff on it, what you're getting is a Tanya Huff novel.
This doesn't mean that there is no originality; it doesn't mean that there's nothing new. It doesn't mean that the stories are retreads—clearly, writing across a spectrum, they can't be. She's written humor, contemporary fantasy/horror, secondary world fantasy; chosen single viewpoint stories, multiple viewpoint stories, epic almost-historicals.
But there's something ineluctably Huff about all of them.
And so it is with A Peace Divided. It's a Huff novel—one of her military sf novels about the no-longer-military former Gunnery Sgt. Torin Kerr. Torin has adapted to non-military life by finding a use for her expertise and experience: She is now a Warden, and part of the Warden special strike force, teams of largely former military personnel who have been tasked with dealing with people who were also formerly military, but who have chosen to use their skills on the other side of federation law.
With her are her old team-mates: Binti Mashona, Wersk and Ressk, Craig Ryder, Alamber. They're a mix of people from the Confederation's younger races, and they're good at their very different jobs. Kerr pulls them together; she makes them run.
Unfortunately for Torin Kerr, the assignment she's given involves not only a Class Two planet, but civilians who could easily become hostages to the mercenary force that's taken over their survey team. And that mercenary force is comprised of former Confederation military personnel and citizens from the Primacy's military races.
The Confederation and the Primacy have been fighting an intergalactic war for far, far longer than they've been at peace, and the peace is therefore tentative. The Primacy citizens are not citizens of the Confederation, and while they may be breaking laws, it's the Primacy's responsibility to police them.
At this time, the policing requires a certain political sensitivity, given peace and its tentative nature, which means Torin and her team are not going down there alone. No, they're going down to the planet with a combined team of Federation Wardens, their Primacy counterparts, and a neutral observer. And one of the Primacy counterparts was an officer in the Primacy forces, Torin's sergeant.
I adore Torin Kerr. I have since the first time she crossed a page. She is one of nature's sergeants, she's good at her job, and she's good at her job no matter what that job actually is. Not being military, she's now a civilian, and as a civilian, she makes a damn good sergeant. But she's learning the ropes of this civilian life, and the rules that come with it. If her team is ordered to finish a mission with a minimum of casualties—she's accustomed to prioritizing low casualties on her own side, but not as accustomed to worrying about the enemy—she's going to do exactly that, even if no casualties involves trying not to kill the people who are actively trying their best to kill her team. And her.
A Peace Divided follows Torin's newly enlarged team as they try to rescue scientists who are being held hostage by a group that is chasing the possibility of a weapon that can destroy the plastic aliens who are at the heart of the Confederation/Primacy conflict (it's a social science experiment, for the aliens). Torin is very interested in that weapon. Everyone is. But that's not the job at hand, and did I mention that she's good at doing the job at hand?
Huff has the best dialogue in the business—which I've said before—but she also has a very pragmatic eye to world-building and the realities of Torin Kerr's life. I don't want to spoil anything, but it's clear that this second book of three is following not just Torin, but the consequences of war, war cut short, and those who profited from it.
This book is fun, it's entertaining, and it touches on serious issues as it zooms along, never dragging its feet. While it's part of a series, I think it can be read as a standalone, although An Ancient Peace is available in paperback as well, if you want to start there. Alternately, you could start with A Confederation of Valor, the first two books in Torin Kerr's story. I don't think there's a bad place to start.
"You need to read Linda Nagata's The Last Good Man. It's almost an older Torin, in a dark near future (no humor), by a better writer."—Tanya Huff, 7/19/17.
You can probably guess the impetus for my choice of Linda Nagata's The Last Good Man. Although the phrase "a better writer" should be excised. Nagata is an excellent writer. She is a different writer. She is not a better writer. Ahem.
The character to whom the above quote refers is a woman named True Brighton. Daughter of a military man, from a family with a military history, she is ex-military, and the Direction of Operations of ReqOps. ReqOps is a licensed private military company. True has seen active combat. Her oldest son followed her family's tradition and paid the ultimate price for it; he was captured and killed on camera in a media-saturated world in which only spectacular, horrible deaths command any attention at all. She knows the price parents pay for war. And she knows, as well, the price daughters pay when their military fathers disapprove of their career decisions.
ReqOps is hired to train people, and its operatives are often hired as private bodyguards or security. They have, however, taken missions that are distinctly military in nature, and as the book opens, they are being asked to rescue a man's daughter. She is technically a hostage, in the hands of El-Hashem, a warlord who navigates in the ungoverned TEZ (Tigris-Euphrates Zone). A medical doctor, she went overseas to help people in need of medical service. Her father begged her not to go because of the dangers. He's desperate.
Lincoln Han is the CEO and principal owner of ReqOps. The decision to accept the mission is in his hands. And True Brighton knows that he wants to take it. What follows are the various discussions—and permissions—required to get to yes. It's honestly one of the strengths of the book, for me: it's pragmatic, practical; it acknowledges the reality of being a small business owner who operates within the confines and parameters of international law, and U.S. law. This mission is going to be costly; both True and Lincoln are pretty certain they're going to take a bath on it. It requires U.S. military permission, because the U.S. government and the private military do not want to be stepping on each other's toes. All of these things—all of them—are considerations that must be dealt with. The desire to take the job is not the only thing on the table.
That practicality, that forward-looking reality, is blended with near future tech, with 3D printed weapons and 3D printed combat drones; Nagata doesn't look away from the cost of progress, and the benefit, while absolutely there, is shadowed. But it's a future that True and Lincoln both believe is coming: a military world in which soldiers will sit in the confines of rooms as remote from the war as our bedrooms, directing drones and robots to acts of war in zones in which there will always be casualties among the civilians.
What use do retired military have? What use is their skillset, their years of training, what meaning does the physical sacrifice—of limbs, or of life itself—have? How is the cost of fighting a war etched into a society if none of these things can happen?
These are the questions Nagata asks as ReqOps heads out to rescue Fatima Atwan at the request of her father. The whole team knows that they're not going to make any money on this venture—that the best they can hope for is to lose none—but it's the right job. It's a job that they can believe, absolutely, is on the right side. In this opening sequence, you can see the team at work, you can see the tools at their disposal, and you can see what drives their decisions.
It is not, in the end, Fatima alone who is hostage in the compound of El-Hashem; there are three other men. And the team will not leave them behind when they learn of their existence. For True, there's an edge of the personal in their rescue; it is everything she could not do for her own son.
And it becomes significantly more personal when one of the three rescued men, a journalist, tells her that the monstrous man in charge of his capture had a tattoo: Diego Delgado. The Last Good Man.
To me, this book has all of Huff's pragmatism and drive. But it is a much darker work, a much grimmer look at the cost of war, the cost of death, the cost of change; at the scars that are obvious and the deeper scars that are not; at the way war changes both sides of the divide that is combat. It is not without hope, but it is grim enough that I was not entirely certain which way things would go until the end.
If you like your military science fiction grounded in the real and in the probable, this is your book.
Marjorie Liu is the author of the under-rated Hunter Kiss contemporary fantasy/horror. She is also the author of a number of other books and comics, but Hunter Kiss is the one I'm most familiar with.
When Liu first announced Monstress, with a preview of the art by Sana Takeda, I was intrigued and, I admit, excited. The art is beautiful. It is gorgeous. I, who am not visual at all, could spend an afternoon looking at the art. I could happily frame it and hang it on the wall.
I'm not, of course, an art critic. Or art reviewer. The only reason I mention the art is because Monstress is a comic book, and the art is part of the structure of the story. The tones of the images are darker, muted, and that suits the story Liu is telling.
Monstress starts with an auction. An auction of curiosities, which in this case includes slaves, almost none of whom are human. One looks human, but she's missing most of her right arm. She is the protagonist of this dark, fantasy story. The pacing of this story is more in keeping—to me—with a novel; the density of words replaced by a density of images. The dialogue is entirely that: dialogue. There's not a lot of info-dumping, which means teasing out the shape of the world, and the rules of the world, by how the people who live in it interact with it. And given that this is an auction, and the people who are talking are either being sold or are buying, there's a sense that this is a story that takes place in the margins of the world.
Maika Halfwolf is the Monstress of the title. She is looking for information about her dead mother, with a mind to vengeance. But what she discovers disturbs her far more than the usual "avenge your dead parents" trope. She is young—a teenager—and powerful, and it is the nature of that power that is the greatest threat, both to Maiki herself and to the people who begin to hunt her when they realize she exists at all.
Monstress: The Blood is the second graphic novel released in this series. Old alliances have been tested, and some have been broken; the strands of a prophecy have begun to take certain shape. Maika is on the run; she has some hope of possibly freeing herself from what she considers her curse: the being she carries inside her. A fallen being, a deadly being, one that would be right at home in a Charles Stross novel—and not as one of the marginal good guys. The demon, for want of a better word, can't answer her questions because he himself cannot remember his past.
Maika knows almost nothing about that being except that it kills indiscriminately whenever it can—and she is not always entirely in control. In this volume, she begins to learn more. There is a powerful sequence in which the unveiling of some of her monster's memories walk hand in hand with her own memories of her mother, and the pain and the doubt are perfectly expressed by the art and events that have very, very little to do with them.
I almost never review graphic novels, but those who like darker epic fantasy that requires a bit of thought and effort will find a lot to enjoy in this. It's not at all appropriate for children, though. | 2019-04-25T23:09:56Z | https://www.sfsite.com/fsf/2017/msw1711.htm |
On March 20, 2000, the Center verified that the Complaint satisfies the formal requirements of the ICANN Uniform Domain Name Dispute Resolution Policy (the "Policy"), the Rules for Uniform Domain Name Dispute Resolution Policy (the "Rules"), and the Supplemental Rules for Uniform Domain Name Dispute Resolution Policy (the � Supplemental Rules �).
On March 22, 2000, Respondent sent an e-mail to Complainant and to the Center, informing them that her correct surname was not Arrieula, but Arr. Respondent indicated that she had requested � the Internic � to correct this misspelling. On March 24, 2000, the Center acknowledged receipt of Respondent�s e-mail and noted that all future correspondence regarding the administrative proceeding should be addressed to Annie Arr. The Center received Respondent�s response on April 3, 2000, by e-mail and on April 6, 2000 in hard copy. The Response was thus submitted within the deadline provided by paragraph 5 (a) of the Rules. On April 4, 2000, the Center acknowledged receipt of Respondent�s Response.
On April 7, 2000, Complainant requested to be allowed to file an answer to the Response. When informed of this request, Respondent requested the right to reply to such answer. In view of the fact that Respondent raised in her Response an argument that Complainant could not expect, i.e. that she planned to use the name "Girondins de Bordeaux" for a historical web site, the Panelist decided to grant Complainant�s request. For the sake of equal treatment between the parties, the Panelist also granted Respondent�s request to reply to Complainant�s answer. Accordingly, an Interim Order setting deadlines for the answer and the reply was issued by the Panelist on April 11, 2000. On April 17, 2000, within the set deadline, Complainant filed an answer to Respondent�s Response (the "Answer"). On April 21, 2000, also within the set deadline, Respondent filed a reply to Complainant�s answer (the "Reply").
After reviewing the statements made by the parties in the Complaint, Response, Answer and Reply, the Panelist considered necessary, in order to reach a decision on the issue of the legitimate interests of Respondent, to request from Respondent evidence of certain facts alleged in the Response. Accordingly, as permitted by paragraph 12 of the Rules, the Panelist issued an Interim Order on April 26, 2000, requesting the submission of several documents. In the same Interim Order, the Panelist set a deadline for Complainant to submit observations on the documents (the � Observations �) and a deadline to Respondent to comment on such observations (the � Comments �). The Panelist considered that an exchange of Observations and Comments was justified by the fact that the requested documents might prove material to the issue of the case. On May 3, 2000, the Panelist received the original documents sent by Respondent. Copies of such documents were communicated to the Center and to Complainant. Complainant affirming that the copies received by fax were not legible, the Panelist sent a copy of her own set of documents by mail to Complainant. Because of this delay, the deadlines set for the submission of Observations and Comments had to be extended.
Complainant has demonstrated that it is the owner of two French trademarks "F.C. GIRONDINS DE BORDEAUX & design" for various products and services (registrations N� 93478495 of July 26, 1993, and N� 98742280 of July 17, 1998).
"F.C. Girondins de Bordeaux" is the name of the football club managed by Complainant (� football � is the name for � soccer � in France). The football club has used this name since 1936. The F.C. Girondins de Bordeaux took part in major football competitions in France and in Europe, and became champion of France for 1998 - 1999. The football club Girondins de Bordeaux is widely known in France and in Europe among football fans. Complainant publishes a magazine entitled "Marine et blanc", which is the official magazine of the F.C. Girondins de Bordeaux. "Marine et blanc" (meaning "Navy blue and white") are the colors of the football team. Complainant also issues a mail order catalogue.
On December 10, 1999, Mr. Yann Genest, in charge of the marketing of the football team, sent an e-mail to Respondent at the address "[email protected] with the purpose to inform Respondent that the football team planned to launch a web site under the address "www.girondinsdebordeaux.com", and offer that Respondent transfer her registration for such Domain Name to Complainant in exchange for compensation of her expenses. There is no evidence that Respondent actually received such e-mail. This seems unlikely as Respondent�s e-mail address is "[email protected]" and not "[email protected]".
On February 14, 2000, Complainant�s counsel sent a registered letter to Respondent demanding that Respondent transfer the Domain Name at issue to Complainant. This letter was addressed to Ms. Annie Arrieula at the address indicated in the Registrar�s database. Complainant mentions in its Answer that all correspondence sent by express mail to Respondent was returned. The Panelist therefore assumes that Respondent did not receive this letter.
Respondent contests that the Domain Name "girondinsdebordeaux" is identical or confusingly similar to Complainant�s trademark "F.C. GIRONDINS DE BORDEAUX & design".
Respondent contends that she has legitimate interests to the Domain Name because of Respondent�s preparations to use such Domain Name as the name of a non commercial historical web site dedicated to the French Revolution and the movement of the Girondins.
Complainant is the owner of two trademarks � F.C. GIRONDINS DE BORDEAUX & design �, which are registered in France in relation to a number of products and services (reg. N� 93478495 of July 26, 1993, and N� 98742280 of July 17, 1998).
Since domain names cannot comprise graphic elements, the comparison between trademarks and possibly conflicting domain names must be limited to the verbal elements of both. In the present case, the only difference between the trademarks of Complainant and the Domain Name is the presence, in the trademarks, of the letters � F.C. � at the beginning of the marks. The other terms composing the marks and the Domain Name are identical.
It is the Panelist�s opinion that the letters � F.C. � do not influence the overall impression left by the trademarks in a way that would remove the risk of confusion between the marks and the Domain Name. From a visual point of view, the letters � F.C. � occupy much less space than the words � Girondins de Bordeaux �. Thus, the terms that strike most the memory are � Girondins de Bordeaux �. In this respect, viewers are likely to overlook the presence of the acronym, especially if it does not make sense for them. From an intellectual point of view, the letters � F.C. � constitute also a weak element. Indeed, they usually stand for � Football Club �, which terms are devoid of distinctiveness. Because of its descriptive character, this acronym plays only an accessory role in Complainant�s trademarks.
In view of the above, the Panelist reaches the conclusion that the Domain Name "girondinsdebordeaux" is confusingly similar to Complainant�s trademarks � F.C. GIRONDINS DE BORDEAUX & design �.
Generally speaking, the use of a domain name corresponding to a particular historical or cultural subject in connection with a cultural web site dedicated to such subject whose contents are made available for free does undoubtedly fall under the notion of a � legitimate noncommercial fair use � in the sense of paragraph 4 (c) (iii) of the Policy.
Thus, a person or company who registers as a trademark a name which belongs to the world�s historical and cultural patrimony should not be able to prevent third parties from using this name (as a domain name or otherwise) in relation to the historical or cultural theme at issue. For example, should someone manage to register � Charles Dickens � as a trademark, he/she cannot prevent the use of a corresponding domain name (such as � charlesdickens.com �) for a noncommercial web site dedicated to the life of the great British writer, unless particular circumstances warrant a finding that the domain name owner intended to divert consumers or to tarnish the reputation of the trademark.
It is the Panelist�s view that legitimate interests exist in the sense of paragraph 4 (c) (iii) of the Policy when the respondent has not yet begun use at the time it is notified of the dispute, but has already made demonstrable preparations towards such use. It would indeed not be justified, in this respect, to treat those who make preparations to use a domain name in connection with a bona fide offering of goods or services more favorably than those who make preparations to use such domain name in a noncommercial way. In the second case, the proposed use is even less threatening for the trademark owner than in the first, since there is no competition between the parties.
In the present case, Respondent asserts that � Girondins de Bordeaux � is the name of the French revolutionary movement that will be the subject of the cultural web site that she plans to launch. This assertion is disputed by Complainant, according to whom the accurate name of this movement is � Girondins �, and not � Girondins de Bordeaux �, the latter referring exclusively to the French football team. This question is crucial.
Indeed, whereas Respondent is certainly entitled to devote a web site to the subject of the Girondins, she will be found to have a legitimate interest to use the terms � Girondins de Bordeaux � only if these terms correspond indeed to the name of the concerned political movement. It should be noted here that � Girondins de Bordeaux �, in French, means � Girondins of Bordeaux �.
� Also called � Brissotins �, members of the moderate republicans, many of them originally from Bordeaux in the d�partement of Gironde, who controlled the Legislative Assembly from October 1791 to September 1792 during the French Revolution. Young lawyers who were basically idealists, the Girondins de Bordeaux soon attracted a large following of businessmen, merchants, industrialists and financiers. They were initially known as Brissotins, as followers of Jacques-Pierre Brissot de Warville [...] �.
� member of the moderate republicans, many of them originally from the d�partement of the Gironde, who controlled the Legislative Assembly from October 1791 to September 1792 during the French Revolution. Young lawyers who were basically idealists, the Girondins soon attracted a large following of... �.
Complainant wondered at the fact that the Encyclopedia Britannica excerpt provided by Respondent (which obviously matches the excerpt found on Britannica.com) refers to the � Girondins de Bordeaux � when the excerpt printed from Britannica.com refers only to the � Girondins �.
Football player of a good level, Aim� Jacquet is four times champion of France [...]. In 1976, he takes up the career of coach, in Lyon. In 1980, he signs for the Girondins de Bordeaux, whom he leads to the title of Champion of France in 1984, 1985 and 1987.
Offensive midfielder, the French football player Zinedine Zidane starts in the Championnat de France with the A.S. Cannes in 1989.[...] in 1996, he participates [...] to the adventure of the Girondins de .... �.
3/ GIRONDINS & MONTAGNARDS, ideological �.
� My ten-year old copy (21 volumes) that I quoted in my Response mentioned the � Girondins de Bordeaux � �.
� Encyclopedia Britannica excerpt (1967) as quoted in the edition I had access to (county library). The encyclopedia has used the terms Girondins de Bordeaux until 1989 and now refers either to Girondins de Bordeaux or simply Girondins as many other sources. Both are however used by historians although it is acknowledged here that the �99 edition refers to the Girondins �.
The Panelist is not satisfied by this explanation. The purpose of the Interim Order was to provide the Panel with an original extract of the hardcopy encyclopedia allegedly quoted by Respondent, with the purpose to verify whether such encyclopedia uses the terms � Girondins de Bordeaux � or not. Respondent declared in her Reply that she had quoted her own � ten-year old copy �. She could easily have made a photocopy of this extract as requested. Even if she did not possess her own copy and used the copy of the county library, a photocopy could easily have been provided, more easily, in fact, than the new computer extract, whose origin Respondent does not indicate. Panelist concludes that Respondent has not demonstrated in a satisfactory manner that the excerpt of the Encyclopedia Britannica quoted in her Response refers to the � Girondins de Bordeaux �.
Admittedly, other documents submitted by Respondent refer to the � Girondins de Bordeaux �. Those documents are letters, e-mails or faxes sent to Respondent by other scholars and a descendant of the Girondin Brissot de Warville purporting to support her web site project. The Panelist does not find, however, that such documents are conclusive, because they were written in answer to letters or e-mails from Respondent (copy of which are not provided), who in all likelihood used the term � Girondins de Bordeaux � and thus might well have led the addressees to use the same terms. Another document is a computer processed historical article by Respondent herself. The only screen print-out submitted by Respondent following the Interim Order of April 26, 2000 is a portrait of Brissot de Warville. This document refers to the � Girondins �, not to the � Girondins de Bordeaux �.
In view of all the evidence submitted by the parties, the Panelist reaches the conclusion that the name of the revolutionary movement at issue is � Girondins �, and that the terms � Girondins de Bordeaux � are used exclusively in relation to the football club.
Since the revolutionary movement of the Girondins is not called � Girondins de Bordeaux �, Respondent does not have a legitimate interest to use these exact terms to designate her website. She only has a legitimate interest to use the term � Girondins �.
In particular, Complainant demonstrates by the means of the documents submitted with the Complaint and the Answer that � marine-et-blanc.com � is the name of the official magazine published by Complainant, and that it is moreover confusingly similar to the French trademark � V MARINE ET BLANC & design � registered in the name of Mr. Robert Martin, Association Football Club Girondi�res (sic) de Bordeaux (reg. no. 97660354).
Complainant also asserts in its Complaint that Respondent is the registrant of the domain name � lilian-laslandes.com �. Lilian Laslandes is a player of the F.C. Girondins de Bordeaux. Complainant did not provide a print out from the Registrar�s Whois database to evidence this assertion. However, since Respondent did not dispute or deny it in her Reply or in her Comments, the Panelist considers that this registration exists indeed.
Complainant finally asserts that � Irreductibles � is the name of the football team�s most popular fan club.
Respondent alleges that she registered all those domain names on behalf of her grandson, who is a football fan. According to Respondent, the registrations were made to allow Respondent�s grandson to create � fan sites � (except for � irreductibles.com �, which was allegedly registered because Registered is a fan of the French cartoon � Asterix �). However, Respondent did not allege that any such fan site was actually created.
In view of the evidence, the Panelist finds that the football related domain names were registered in order to prevent the owners of corresponding trademarks or names to reflect their trademark or names in a domain name. In view of the number of concerned domain names, the Panelist finds that a pattern exists. Moreover, the Panelists finds that the registration of the Domain Name � girondinsdebordeaux � is a part of that pattern. According to Respondent�s presentation of the facts, she registered the football related domain names in order to satisfy her grandson�s wish, whereas � Girondins de Bordeaux �, which is the name of a football club, would alone have been registered for a totally different purpose. The fact that � girondinsdebordeaux � happens to be the name of a football club would thus be a coincidence. The Panelist is not convinced by this interpretation of the situation and believes that the registration of the Domain Name was part of Respondent�s pattern of registering football related domain names, and that Respondent knew that � Girondins de Bordeaux � was the name of a football club.
Complainant did not submit evidence that the other domain names registered by Respondent are identical or confusingly similar to registered trademarks, except for � marine-et-blanc.com �. As a consequence, the Panelist cannot decide whether the Respondent engaged in a pattern of registering domain names corresponding to trademarks or service marks. However, the circumstances of a nature to demonstrate bad faith according to paragraph 4 (b) (ii) of the Policy are listed without limitation. Thus, although this provision only mentions trademarks or service marks, a pattern of registering the corporate or trade names of third parties with which a respondent has no connection whatsoever may also be considered as a circumstance demonstrating bad faith. In the Panelist�s opinion, the registration of names such as � olympique-de-marseille � and � paris-st-germain �, which are the names of well-known football clubs with whom Respondent claims no relationship is such a circumstance.
Accordingly, pursuant to paragraph 4 (i) of the Policy, the Administrative Panel requires that the registration of the Domain Name at issue be transferred to Complainant. The Domain Name is: � girondinsdebordeaux.com �. | 2019-04-20T13:03:33Z | https://www.wipo.int/amc/en/domains/decisions/html/2000/d2000-0149.html |
A vast carpet of stars stretched from horizon to horizon giving way to a panoramic onslaught of pure serenity. Epic mountain ranges laid blurred by the obscurity of distance while tall pines coated in thick layers of snow reached for the heavens. Pale moonlight bathed the landscape in a light tint of blue as finely tempered shadows separated the forest from the trees. No wind blew in this arctic woodland. No creature stirred. It was the calming peace of silence in the depth of the night.
That all changed in a split second with the thunderous crack of a cataclysmic fireball cleaving a clear, star filled night in two. Shadows deftly played under the new found light pointing the way for the streaking thing to the distant mountain ranges. Then, sharply, those shadows reversed course, averting away from the distant impact, the blinding flash, and impossibly silent boom capable of searing dread down the spine of the hardest of men. Within seconds, a tranquil night had been torn asunder. Half the forest laid on its side, suppressed by the thing’s immense shockwave. The mountain ranges had been carved into a gaping wound. And, the horizon glowed a brilliant orange and red under the blaze of a calamity from the skies.
Cierra Aronaii stood upon her terrace gazing upon the stars in the heavens. The terrace connected to a giant, four story shell abandoned by some creature millennia before. The shell had been cleaned out and transformed into living chambers. There were many shells like that within the city. Hundreds of shell dwellings lined the canyon floor of the gully at the base of the Knowlespole mountain ranges. They were home to Cierra’s people, those called the Cetra.
A cool breeze through the night air flowed through her long, brown hair that hung at the back of her thighs. The silken, gold embroidered opal robe she wore fluttered under the same breeze and wrapped snugly around her thin form. She closed her eyes and smiled. There was always a peace inherit during the nighttime.
Calm, green eyes opened and stared up towards a thin cluster of clouds silently traversing the sky. She breathed in heavily and let her breathe escape slowly. An arm wrapped around her waist and drew her close to a warm body. The owner pressed his lips unto the side of her face and kissed her gently.
“A beautifully warm night. So clear with but a few clouds,” he whispered into her ear.
Without turning, her smiled broadened and she ran her hand along his smooth face. His own robes, of similar design to Cierra’s, intermingled with hers in the wind. They stood there enjoying the moment when a streak of orange shot overhead from beyond the canyon rim and proceeded past them towards the mountain range. The sky burned a deep orange.
“What is it!?” Cierra exclaimed, her eyes widening as a roaring boom shook the foundations of the earth.
“That’s no average meteor. The Council will be meeting,” the man spoke and hurriedly turned towards the hallway that lined the interior of their conch shell.
Cierra followed him down the spiraling hall that led to the entrance of the complex. Together, they proceeded outside and towards the grand hall located at the city’s center. Many other people had exited their own domiciles and looked towards the distance. Being within the canyon gully made it difficult to determine the damage caused by the thing from above. Rumor was already spreading that a meteor had struck the northern perimeter of the Knowlespole. Yet, Cierra and her husband had seen the thing, and she felt a stirring sensation that whatever it was, was far more sinister than a meteor. They looked beyond the foliage lining the canyon walls as they hurried along the polished, pearlesque path and saw the mountain ranges looming in the far distance. A strange deep orange glow crowned the range ridges.
Darkness shrouded the impact crater that ran deep into the center of the mountain ranges. IT came forth from the crater mired in a cloak of shadows and stood completely erect in its seven foot height. Eyes glowed an unearthly blue and took in the environment now surrounding the impact site.
The forest went intensely silent as the creature began its trek into the woodland. It could sense power and it craved that power. The creature left the newly formed crater in its wake. That crater was two miles deep and four miles wide at its diameter. Nothing stirred as nature quietly watched the thing traipse through the thigh high snow and continued on into the dark depth of the night.
Carved out of the interior of a mile high cliff, the Grand Council chambers were immense. A single column with a platform atop of it rose up from the subterranean waterways. White light shone down from the open observation decks half a mile above the chamber. Around the empty space surrounding the center platform where the Council Elder would speak, was the auditorium rotunda. A quarter mile in diameter, it was the largest space dedicated to the Council meetings of the Cetra. Five balconies, one above the next, lined the chamber walls. The first balcony was parallel to the level of the center column, the podium for the Supreme Chancellor of the Cetra nations. Below that one, a walkway lined with support columns led to the stairwells traversing to each balcony in the chamber.
Hundreds of Cetra had arrived and a tremendous din filled the chamber as talk of the event emitted amongst the councilmen. Dawn had nearly broke and several scouts had returned to report on what had transpired.
Cierra approached the railing upon the third balcony and looked down towards the Council podium. She saw the Supreme Chancellor making his way over the one connecting bridge of the podium to the first balcony. He was engaged in a very emotional conversation from what she could gather and sense. The white pillar of light hung over the podium like a spotlight on a stage actor. The Supreme Chancellor looked very agitated as he progressed out to the podium. His beard swayed under a slight breeze coming upward from the waterways beneath the city.
Cierra’s husband came up beside her, concerned etched upon his visage. She looked up at him with concern. He shook his head, understanding her emotion. A grimace came to his face as his lips drew taught.
“What is it, Sion?” she inquired nervously.
“It isn’t good. The scouts have returned and tell of a disturbing event. Whatever crashed into the Knowlespole has tore a hole in Mother Tiamus. Many tribes of Cetra have already gathered near the northern borders,” he responded and viewed the Supreme Chancellor making his last moment preparations.
“What will a bunch of wandering vagrants be able to determine?” Cierra queried in irritation, feeling the weight of the planet upon her.
“Be kind. They may build and construct and tend the lands the way we do, but they are our people. Besides, word has it, all the Cetra will be needed to heal this wound.” Sion said and motioned for Cierra to still any response forthcoming as the Supreme Chancellor lifted his arms for silence.
Cierra looked at the old man below in trepidation. Things were fast spiraling out of control. The Northern Boundaries were a virtual no-man’s land. Only the wandering tribal nations made their homes in the forests there. Naturally, they would be the first to respond. This despite the fact that the main Cetra Council lived within the great city of Collust along the southern ridge of the massive mountain range leading through the Northern Boundaries.
Murmurs erupted within the chamber. Cierra stared at the old man and felt a tremor in her soul. Something didn’t feel right. Surely the others felt it? But, then again, she figured they may just contribute that emotion to the loss of life. Cierra’s gaze wandered to the spiral interior of an ancient mollusk shell beyond the balconies of the easternmost wall. It was now more a decoration merged within that wall and was only a pale reminder of what it once was. What had caused those elegant creatures deaths? She found herself suddenly wondering. Extinctions occurred every so often and she considered that another may have just arrived.
A slender and aged finger waggled at the gathered masses, having noted the cynical remarks being made casually and quietly amongst the Council. Cierra remembered when it was traditional to make pilgrimages to the Northern Boundaries to plant the pines that lined the ridges there. That was when she had been a young little girl. She had been seven the last time she had went. She shook her head viewing those in the Grand Chambers. Many within had become accustomed to the finer vanities of city life and were not looking forward to any prolonged exposure to nature uninhibited.
Turning to leave, the Supreme Chancellor summoned his Viceroy. A man a full head taller than the Supreme Chancellor who was fond of red robes with silver linings, which stood in contrast to the graying robes of the Supreme Chancellor. The Viceroy made way for his Elder to leave by the bridge and took the podium. Cierra rolled her eyes. Anything the Viceroy had to say was generally too trite to be practical. Of course, this wasn’t going to stop him from speaking.
The Viceroy left the podium and the Grand Council Chambers emptied. Cierra walked with her husband and pondered all the emotions flowing through her personage. Sion walked beside her and cast a glance at her. Knowing how contemplative she generally was, he didn’t bother Cierra in her thoughts, but turned forward and continued towards the entrance.
Rhythmic chantings reverberated off of the trunks of a legion of pines within the quarter mile of forestry surrounding the newly formed crater in the Northern Boundaries. Hundreds of tribal Cetra sat upon the frozen ground with their eyes closed deep in a healing trance. Their lifeforces created salve for the wound pulsing deep into the earthen clay. The Cetra could feel the cries of a world in pain. Those cries echoed throughout fresh caves far below the billowing mists covering the immediate interior of the crater.
The shadowy creature sensed the Cetra tribes gathering around the crater and felt the power of their lifeforces pulsated outward into the air. Those lifeforces were a tangible sheet across its flesh and it hungered.
Voices nearby its position beneath a copse of pines echoed within its ears. The new dawn was breaking yet was stilled by thick cumulus, saturated with the vapors of a coming storm. It flowed towards the voices, desiring the knowledge those voices held.
“...They are coming. I heard it from the Elders. The Grand Council must respond...” one voice was saying.
“They’ve become a bunch of lazy cowards. They ignore the planet until it is too late. Now they come? The Council is weak...” the other answered and walked away angrily.
“...You shouldn’t be so angry, Enson.” she spoke in response to his words.
He merely waved her off and continued through the woods to find his brothers. The young woman watched him go and turned back to her camp. It watched him too. The shadowy it remembered his name. Enson. And, the shadow memorized his features. His long, platinum blonde hair trailing down his back to his waist. He wore a brown hide tunic and leggings and wore shoes of the same material. This was a member of the tribes and it wanted to use him to its advantage.
“There is no way the Council can do anything. Living in their lap of luxury. Dining on their fancy suppers and happy in their simple ways. What work have they done?” the young man gestured angrily to no one.
The shadow smiled a secret smile for it had no lips. With an invisible tongue it tasted his jealousy and his tremendous lifeforce. The wildlife went silent and the young man turned, looking around the dimly lit woodland. The suns light filtered through the dark cloudlines minutely and illuminated his light toned flesh, revealing his puzzled expression.
“Hello?” he queried into the early morning air.
The shadow came up behind him. The young man turned and stared at the thing coming for him. A shadow engulfed him and he tried to scream. However, silence thundered through the forest.
Faint chantings came on the wind as the form of the young man lay upon the snow. Slowly, he rose and smiled to himself. It was now Enson. And, Enson had work to do. The power was too fierce to consume in this state. A little bit of deception was in order. Enson walked back towards his camp. He knew instinctively where it lay. Whiffs of snow blew across the forest floor covering Enson’s tracks as he walked.
* * * * * Fine flakes of snow formed a thick curtain in the gushing wind. The frozen vapor blew horizontally across the forest floor, miring the progression of the Choboa, and their riders, through the woodlands towards the impact site. Members of the Cetra Council covered their heads with the hoods of thick cloaks. Many blocked the fierce wind blown snow with the sleeves of their robes.
Not far behind the Choboa procession, were the members forced to walk through the thick, wintery accumulation. There were no complaints as they walked onward. The edge of the crater was not far ahead of them.
It felt like the journey had taken weeks to Cierra as she and her husband sat upon their Choboa, trying to make out the distant shapes of Cetra camps through the blizzard. In fact, the journey had been but three days. She didn’t waste any energy speaking her disdain of plodding through the winterscape. A grimace of misery crossed the features of her face. Her husband, Sion, wasn’t enjoying the journey anymore than she was.
The procession stopped. Cierra uncovered her face and tried to look around. She held up her held to shield some of the wind. She mostly saw white, but the group had definitely exited the forest and were upon the perimeter of the northern expanse of the great Boundaries. The edge of the impact laid mere kilometers from their positions.
A slight murmur ran through the Cetra members and it was apparent that camp was being made. Cierra and Sion dismounted their Choboa, ostrich sized flightless birds, and began to set up their equipment. Within a few hours, they had their Choboa covered under a massive tarp attached to their oval tent and heat delivering devices were turned on.
“The meeting should be taking place, let’s go.” Sion spoke to Cierra and they exited their tent.
~ ~ ~ “We should begin the meditations immediately,” a concerned member of the Council said from his position to the rear of the massive Council shelter.
The enclosure was the size of a carnival tent, except it was a complete dome, and spanned over a good portion of the clearing just beyond the forest edge. Several hundred Cetra listened intently to the debate waging amongst the Elder members of the Council.
“The blizzard is too fierce, we should wait til the morn,” another responded drawing praise from others gathered within.
“Tiamus needs us. We must act immediately. The other tribes are out there now giving their lifeforces to the planet. We need to join them, storm or no. Hesitation could mark our deaths,” a woman of the Grand Council spoke, walking forward.
Cheers and jeers erupted throughout the tent. Cierra took the scene in from her place in the back of the tent. Small, fist sized heaters lined the tent walls sending a slight orange glow onto the gathered Cetra. A howling wind was hammering the side of the tent causing the heater-lanterns to bounce their light across the assembly. The light didn’t dim the dark green robes of the woman who spoke at the center of the meeting. The Supreme Chancellor sat in a seat and smoothed out his ruffled and gray robes. He raised his hands, trying to bring order to the assembly.
“Councilor Eanon’s words ring truth. We must not spare anymore time. The wound is gaping and Mother Tiamus screams in pain,” the old man spoke to an intermittent silence.
“Bah! I did not spend all night traveling, just to sit in the snow and chant in the middle of a blizzard! Let the savages do as they will. Tomorrow, if the weather permits, will be better suited for delivering our energies,” a tall Councilman replied harshly.
“Stay your tongue, Edrick. The Supreme Chancellor has spoken and we ALL are required to lend our energies tonight. Grab your thickest furs, it’s going to be a long night!” the Viceroy responded ending the tirade.
“Is this wise...” another Councilor, a statesmen from the business sect, began.
“They have us packed in here like a bottled selection of Fastitocalons. I’m going to get some air.” Cierra whispered to Sion.
He nodded as she turned to leave the cramped confines. The Cetra stood nearly shoulder to shoulder as Cierra pardoned her way through to the exit and breathed a sigh of relief as the cold winter chill struck her cheek.
Cierra closed her eyes and inhaled slowly. The wind had died down to some extent. She gently rubbed her stomach through the heavy clothing she wore, furs made from the hide of a great, northern Cuahl. Soon, the Council would be joining the itinerant Cetra tribes in healing the wound of Tiamus. She only hoped that the effort wouldn’t harm the child she carried within. A fact she’d been meaning to tell Sion upon the terrace when the thing from the sky had fallen.
She exhaled and felt that she could reserve enough energies to assist in getting the job done and returning home in one piece. A moment of fear jolted Cierra from her solitude. Her eyes opened and she gazed around the silent woodland. It had suddenly gotten too quiet, save for the annoying bickering emanating from within the tent.
Cierra could only perceive the deep shadows clinging unto the forest interior like a small child to its parent. Within those shadows, lurked an uncertainty. It was beyond her range of senses, yet lingered just at the edge of her perceptions.
A whiff of breath blew in the stilling breeze and now calmly falling snow. Now that she thought about things, the weather was a bit colder than was usual for the season. This even for the Northern Boundaries and the constant snow that linger within them. Her gaze shifted to the massive dark spot covered by an eternal mist marking the gaping wound of Tiamus. She shivered not because of the cold, but because of that something clawing at her senses.
“How many tribes are there anyway?” Enson inquired from his seated position next to his brother.
They had been chanting for most of the night and day, Enson feigned his involvement knowing full well that he wasn’t offering any lifeforce to a wound he caused. Whether it was intentional or not, was beside the point. Power is what drove the possessed Enson now. He had ceased being a Cetra the second the shadow had devoured his soul and infected him with death.
“Come on, brother, you know the answer to that. Seventeen tribes wander the Northern Boundaries, planting pines and healing the planet. Just like we’re doing. What’s with you lately? You’ve been acting weird for days.” the brother spoke to the smiling, closed eyed Enson.
The held the hands to their sides in the meditative gesture of focus. Enson had learned much these past four days and was eager to learn more. He had discovered that these Cetra creatures were mostly an itinerant race that went around settling the land and making it habitable for the birth of life. Simplistic and archaic to Enson. He never cared for the bringing forth of life. Not when the act of power and absolute chaos was so much more enjoyable.
Enson would need assistance, though, in his endeavors. He and his brother sat alone in the snow only a short distance from camp. The Cetra had been chanting in shifts and soon their shift would be up. They would rise up and enter the camp grounds and warm within the slumber facilities of the small skin tents. The time to move had come.
The heavy furs around Enson’s person fluttered in the slight breeze as a creeping shadow slowly eked its way from beneath his seated position. He sat still and let his eye open a slit. Enson watched his brother’s face; saw his closed eyes. The shadow merged with the rippling snow and snaked towards the brother. Coiling around his form, the shadow struck Enson’s brother in the back and tore around into his face. The brother struggled violently and spasmed upon the snowy ground. He raised his hands to his face as the shadow entered his nose and his mouth. Screams died in silence.
Enson watched his brother’s form go lifeless and jumped up to sit on top of him. He placed his hands to either side of his face, sinking into the snow. Fear and individuality dissipated into the cold night as Enson placed his face near his brother’s and looked him in his darkening eyes.
The brother stared vacantly at Enson, and his eyes turned black under the shadows influence. Soon, though, a smile crossed his face and Enson knew, he was getting stronger.
Deep clouds slightly parted for the shining sun beyond their depths. Yet, this barely illuminated the massive wound or the thousands of Cetra gathered around the fringes of the crater. Chantings echoed deep into the crater’s recesses as invisible lifeforces surged into the fissure.
Cierra could feel the combined energies of all the Cetra as they lent their lifeforces to Mother Tiamus. She continued to chant, ignoring the chill of the long winter. It felt like they’d been there for ages. It was tiring work, allowing once life to drain forth and be given unto another. The planet was massive and the Cetra were so few. Yet, every little bit of lifeforce energies helped heal the pain of the world.
Life was birthing around the world and Cierra smiled, knowing that what they were doing was helping. The natural flow of life, didn’t remain hindered as it had been for days after the initial impact. Now, weeks later, the planet was drawing enough energy to recontribute to the flow of the lifeforce.
She opened her eyes and viewed the clearing crater. A dense fog still hung over its interior, but daylight was beginning to filter through the clouds. She whispered a secret prayer and continued chanting. Soon, the Cetra would be returning to the holy city of Collust. She was eager to go, though she enjoyed these peaceful moments. She enjoyed being one with the lifeforce, having forgotten how good it felt.
A tiny kick distracted Cierra, and she realized her child was enjoying the connection as well. She looked over at her husband, who had his eyes closed and was deep in meditation. She couldn’t help but to smile in a manner that she hadn’t done since the age of seven. Too long, she thought, too long.
Tents started to come down and she knew, the Cetra Council was preparing to return home. She felt her smile wane, but she was part of this lifeforce again and would make sure to remain that way. Cierra smirked to herself in deep resolve, and then nudged Sion from his trance.
“Looks like we’re leaving,” she said to Sion.
He opened his eyes and looked about. Reluctantly, he nodded and stood. He helped Cierra to her feet, not because she had informed him of her pregnancy, but because her joints had become stiff with the winter winds. Being one with nature had its tolls.
Thousands of Cetra tribesmen walked away from the crater, feeling that they had done all that they could. Enson stopped upon an embankment and looked outward at the traveling Cetra. Where they would go, he didn’t know. It wasn’t like they had homes. They carried hide-tents with them everywhere. He supposed they were returning to the warmer southern regions of the Northern Boundaries. That posed no difference to him. The warmer it was, the easier to spread the virus.
Enson looked at the white tops of a thousand miles of forestry and then gazed upon the thirteen individuals he’d already infected. Several would die, he knew, but the others would be formidable warriors in his new war.
Stomping through the snow mound, Enson led the way in the direction of the main tribes of the Cetra wanderers. The Council he would tackle when he had adequate minions. Until then, however, the uncivilized, as they were, would have to suffice.
Sion Aronaii stood upon his terrace overlooking the main city of Collust. His wavy, blond hair danced in the breeze. He wore a silken shirt that was unfastened, exposing his chest. The day was waning yet still held a solid warmth. It was a day he was enjoying.
Nearly a year had passed since the impact in the Northern Boundaries. The Cetra had gathered around the gaping wound and lent the Mother Tiamus their energies. Unfortunately, it didn’t seem to have been enough. The woodland around the crater, had wilted and the land collapsed. What was left in such a wake was a steep incline surrounding the wound. Only the most skilled mountaineers could enter her wound as a result.
Sion shook his head and closed his eyes. He breathed deep the flowing breeze and exhaled slowly, allowing the lifeforce energies to heal his weariness. Opening his eyes, Sion looked back into his home to see his young son sleeping peacefully. If any good had come of recent times, it was his child. He smiled and entered his abode.
I wonder what is taking Cierra so long? He thought to himself and turned to look back out towards the city surrounding his house. All he could see was a sea of shell tops, rimmed with the distant walls of the canyon their city resided within. Sion hoped his wife would be home soon.
Daylight was fast running out as Cierra made her way through the throngs of Collust citizenry. The market had been practically overcrowded. So much so that the cloth overhangs had barely afforded any relief from the rays of an overzealous sun. The day had been unseasonably warm given that winter was approaching once more. It would seem that Autumn wasn’t through yet.
“...It’s true! Many have already fallen ill to this strange disease! And our own kin would raise their arms against us! They blame us for the cause!” a distressed man spoke from atop a soap container.
Cierra stopped to listen to what he was saying. A mass of the curious had gathered before him as he related what he had heard in animated fashion. It was rare for this part of the town circle to be so crowded. Even rarer still for anyone to stop long enough for local gossip.
“...If we don’t act soon, the heathen masses will be upon us!” he said, waving his arms with dramatic flair.
Shaking her head and moving along, Cierra wondered how anyone could believe that the normally peaceful Cetra tribes would raise arms against the Council.
“...Tohen to the west has already fallen...” the man continued.
Cierra ignored him and continued home. Tohen was one of the three great city nations of the Cetra and existed on the Western Boundaries of the massive continent of the Knowlespole. The Knowlespole was the most northern continent in all the world. It was subject to extreme winters in the Northern Boundaries and mildly warm summers in the Southern Boundaries. This was during the best conditions.
Tohen was at the far peninsula of the continent. Collust was the Easternmost city nation, their city, and sat deep in a gully. It was the Council center of the Cetra species. To believe it could be attacked, even if Tohen had fallen, was absurd. Only Middas along the white plains of the southern edge of the Northern Boundaries could possibly be left open to attack.
Of course, it hadn’t been but a few months earlier, when rumor had it that Middas had indeed fallen to some strange plague. This had yet to be confirmed by the Grand Council. So, Cierra was hardly worried.
She had rounded the south path that led to her home when a commotion drew her attention. Several Cetra warriors were hurrying towards the main path to the Council temple. Their dismounted Choboa were towing a wheeled gurney. Cierra placed her hand to her mouth as they rushed past. She stopped at the main intersection as she saw the warrior laying on the gurney dying. He had grown pale and the blanket covering him did nothing to hide that fact.
The warriors said nothing as they led the dying man towards the temple. She had wanted to say something, to ask them what had happened. But the words upon seeing him died in her throat. A numb feeling overtook her. ...Could it be true?
Cierra watched them disappear into the assembly complex and felt a tremor in the world. Something was stirring. And, she felt it had been stirring for quite awhile. She hadn’t felt this since the days following the great impact. Not wanting to consider the implications any further, Cierra hurried home.
“You’re unusually quiet,” Sion spoke to his wife as she was rocking their child.
At first, she didn’t say anything from the chair she rocked in. Sion watched her from where he sat at the dinner table and felt a disturbing sensation. She looked up from the baby and smiled at Sion. It wasn’t the comforting smile she normally gave.
“Something...is in the air,” she responded.
Before Sion could respond, a voice echoed up the spiraling hall. It was the masculine voice of a warrior he had been long acquainted with. And that voice sounded grave.
“Sion...a word. If you please,” came the voice.
“Nilo? What brings you here at this time?” Sion inquired and stood to walk down the hall.
He disappeared around the bend as Cierra looked out the terrace doorway. Moonlight streamed through the windows competing with their candles to light the home. A still wind blew as the soft echoing of conversation in whispered tones echoed up into Cierra’s ears. She continued rocking and closed her eyes.
Moments seemed like hours when the tap came on her shoulder. She didn’t want to open her eyes, but did so in great trepidation, knowing what was coming. Cierra looked into her husband’s blue eyed gaze.
“Cierra...all the warrior’s are being called upon,” he softly spoke.
“Tohen has fallen,” Cierra responded before he could say anything further.
A look of surprise donned Sion’s face. It dissipated with a slight smile when he realized that he shouldn’t have been taken aback. His wife was always one of the most perceptive women he had known.
“I heard word of some strange virus in town. They say the tribes blame us for our complacency,” she answered.
“They need me,” he simply said with a nod.
“I know. Be safe, my love,” she smiled and kissed his lips lightly.
Sion hugged her shoulders and rubbed his son’s head gently. He stood and left for the assembly complex. Cierra didn’t watch him leave but instead closed her eyes and cried to herself. The breeze beyond the windows picked up and caressed her brow.
Enson sat within the saddle atop a Choboa. The rein of the whitish, brown speckled bird was in his right hand and held loosely. Long, platinum hair whipped around in the arctic wind, slightly hindering his view of the panoramic landscape. Regardless, there wasn’t much to see. Plains that had existed in recent times, were buried under a permanent frost. The Knowlespole climate was changing as a result of the meteor strike hundreds of miles to the north.
He didn’t require any sort of heat maintaining clothing, but Enson wore a thick coat nonetheless. He had grown partial to the furry design of the clothes. There was much he enjoyed about the Cetra civilization. However, he was created for one purpose. And, that purpose he was fulfilling.
From his vantage point on a tall, snowy hilltop, Enson could see the ravaged townspeople of Tohen striking out against the Council warriors that had been stationed at the edge of their city. The Tohenians weren’t normally aggressive, but the toxins he naturally released generated a virus that destroyed what humanity they harbored. This meant he had his army and that the only people standing in his way, were those in the capital city of Collust.
Enson kicked his Choboa in motion, and headed towards the field of chaos. Blood was painting the snowfields a dark red. The warriors fought back valiantly, though, in the end, they were forced to retreat. The townspeople didn’t cheer; they only hungered for the chaos and tried to follow the forces fleeing upon Choboa. Enson raised his left arm and allowed his aura to flow into the gathered masses.
“Let them go. Soon enough, there will be no where for them to flee,” he chuckled as he spoke those words and turned back towards Tohen.
The Tohenians returned with him. Enson looked back at the fleeing warriors and a thought occurred to him. This may work out to my advantage. They will bring the Council to me. I won’t have to mount an attack into the canyon surrounding Collust. Yes, bring them to me...he smiled and continued forward.
“Did you tell your wife that the warrior came from Middas?” Nilo inquired of Sion as they slowly rode down the mountain path.
“No. Word in town has it that Tohen fell. If this is true, we may not be safe for much longer.” Sion responded.
They rode on through the thick pines casting deep shadows across the narrow path. The journey had been less than pleasant. Their thick furs were barely keeping out the winter weather. Autumn was fading in Collust, but the southern wind currents and the surrounding mountain ranges were keeping the fierce winter storms at bay. That was a temporary phenomenon Sion realized. Since the meteor, everything was changing so fast.
“Who do you think is attacking? We’ve no enemies, at least, none that I’m aware of,” Nilo spoke solemnly.
“I don’t know. Something is very wrong about all of this...How far are we from Middas?” Sion replied and queried with his eyes set to the darkening northern skies.
The orange and red glow of a year past, no longer was present. However, there in its place was a strong sensation of death. No one could see it, and only a few of the more sensitive could feel the sensation. Sion figured his wife was attuned to the feeling. He was becoming fast unnerved by an invisible enemy.
“I’d say only a few days, maybe a week. Four weeks are behind us. Uh, I wish we didn’t have to bypass the inland sea. Were that extension not there, we would’ve been there by now.” Nilo spoke with a wry quirk tugging at the corner of his mouth.
“Perhaps we should pick up the pace? I feel that if we don’t, something terrible may be waiting for us.” Sion said and cast his view towards the procession of warriors following in their wake.
The group pressed on through the night deeper down the mountain pass. The path would let out into a massive plain. He hoped the snow there wouldn’t be so deep as to hinder their progress. During that particular time of year, green fields were still abundant. However, the temperatures were dropping faster than usual which meant normalities were out the proverbial window.
“Wounded warriors from Middas. They tell a strange tale, Sion. Something of some creature swooping from the skies and laying Middas to waste,” the scout hurriedly spoke.
Sion caste a wary glance at Nilo and they ushered the procession towards the camp not far beyond. Upon arriving, Sion saw wounded men laying all around the camp site. Their wounds were dressed in as well a manner as they could manage. It was obvious, though, that their time in the world was limited.
“What happened?” Sion asked the commander of the battalion remains.
“Well, sir, there was a virus that had spread rampant through Middas. For weeks we battled the sick and tried to heal whom we could. The thing is, they couldn’t be healed. Several days ago, the diseased rose up against us. It was so sudden. Even more sudden, was the beast that came in from the Northern Boundaries. It breathed a strange flame, but not fire as we’ve known. It was a green flame that leveled Middas! We fled...th...there wasn’t anything we could do!” the commander spoke in great agitation, catching his breath when he could.
Sion shook his head and looked to the north. The plains could just barely be seen through the mountain ranges, and they were unusually dark, even for the night. He stood and let the commander rest upon the ground. He wasn’t severely wounded and would live, but he was so panicked, Sion wondered if he would ever truly recover mentally.
“Sion, if what the commander speaks is...” Nilo started but was cut short by Sion.
“None of that. We’ll deal with such an event should it occur. I don’t want to think about the idea of some supernatural beast beyond our abilities to best. Better to keep the morale higher and focused.” Sion spoke.
“Aye, sir.” came Nilo’s reply as he rushed off to deliver the commands.
Nilo nodded in affirmation to Sion and continued delivering his commands. Sion made his way towards his Choboa and the equipment he would need to set up camp.
A short while later, Aria entered Sion’s tent. Two lanterns lit the interior heightening the somber mood of the lone occupant. He sat busily going through old manuscripts, trying to ascertain any references in the past to giant beasts. When on a expedition such as the one that brought them to this spot, he always brought his antiquated manuscript of mythologies and technological achievements. He had yet to find any references to such a beast outside of those alluding to the various species of dragons that inhabited the world.
“You wished to speak with me?” Aria inquired and stood with her arms folded in the folds of her robe sleeves.
“A planet reading? Such a thing has not been done for ages. What would be the purpose?” Aria questioned, a perplexed expression etched across her visage.
“I don’t know, really. Just a feeling. Something has, apparently, destroyed Middas and I thought that perhaps a reading would shed some light on what the Mother Tiamus was feeling? Perhaps she can tell us more than what our eyes can see?” Sion replied.
“Well...I don’t suppose it could be of detriment. I haven’t performed a reading in my time, though I am versed in its teachings. Any Priestess knows of the act. However, I caution you, do not take too much stock in its being completed correctly.” She said, and folded her arms back.
“I trust that you will provide us with the answers we seek. I thank you for your assistance in this matter. Let me know what you discover, if anything at all.” he spoke.
“I will need until midday tomorrow. Readings are extensive. I hope that will be enough time,” she said, drawing into slight contemplation.
Sion nodded and Aria left for her own tent. He folded his hands together and braced them to his mouth. He hoped this would work, elsewise, they might never know the depth of the events transpiring.
Morning came swiftly and found Sion up before the new day’s light. He saw off the twenty warriors that would be escorting the wounded back to Collust. Though, he knew he wouldn’t be returning home anytime soon. Once they verified the accounts coming from Middas, they would have to make their destination Tohen. Every fiber of his bones told him that Middas was a lost cause and they should be heading towards Tohen. However, the Council had been specific. Tohen would have to wait.
“Sir, I was sent to inform you that Aria is in the midst of her reading. She hopes to have it complete by midday,” a woman in silken robes spoke to Sion.
He nodded in understanding and the aid returned to the Priestess’s tent. Waiting until midday wasn’t something he wanted to do, but he figured that was better that waiting for several days. Which was something that olden readings had apparently taken. He approached the canyon edge he saw vaguely into the night before and looked down. He was drawn to the chasm for some reason. And, it seemed to him like a shadow was moving deep below the thick fogline clouding the chasm bottom. Miles of the ravine stretched out below and outward from him. The mountain range across from him took on a menacing appearance. The features remained the same but its aura was different than it had been.
Sion backed around from the edge and started back towards camp. The procession was slowly making its way out of camp. Then the air went still and silence prevailed in the woodlands. He stopped and hesitated, listening for any disturbance. What was it? His answer came as a massive figure sprung from the chasm and lurched over Sion. He instinctively ducked and rolled into the snow. Coming to his knees his saw a beast striking at the now fleeing procession. His warriors were quickly wiped out along with the injured.
The camp came alive in terror and determination. Spears and arrows were lodged at the massive beast. Sion was trying to see the shape through the thick accumulation kicked up by the thing attacking. Then he saw what it was. It had eight legs. Those appendages were affixed to a torso very similar to a scorpion, with twin claws clamping down on warriors. Only, the creature was completely metallic. Instead of normal arachnid eyes, the thing had three stalks jetting from its head. An opening for a mouth issued forth streams of green flame that burned the perimeter of the massive camp. The tail struck forth with violent abandon. However, instead of a stinger, there were six living needles. Two of those needles held the bodies of several of his warriors.
“Fall back!” Sion called out springing to his feet, swinging his arms in the air trying to get the creature’s attention.
It focused on him for but a second and sent forth a green flame that he evaded. None of their weapons were penetrating the thick hide of the metal scorpion. It let forth a soul shattering screech and the warriors fell back the best they could. Over three-quarters of his party were dead in the sudden attack. If they didn’t get out of there then, they probably never would.
He grabbed a sling from the armaments left from the wounded warriors from Middas and shot a heavy marble at the beast. This seemed to have grabbed its attention and it veered for him, following him to the edge of the chasm. Several warriors tried to stop the rampaging beast.
Sion continued slinging marbles at the thing and it struck forth a massive claw near his position and lodged deep into the frozen ground. It pulled its claw free and struck at him again. He evaded, but the attack upon the frozen ground loosened the soil. He found himself falling within an avalanche with the beast in tow. He was thankful that the beast would fall with him, but he couldn’t help but wonder how much time this would by the rest of the survivors in the camp. They continued through the avalanche of snow and rock deep into the chasm as several warriors dared near the edge and yelled out his name.
Cierra woke with a start. Her infant son was crying in his crib near her bed. She gathered him in her eyes and soothed him. She was about to feed him when something tore into her awareness. Sion!?
She stood for moments looking out the window, her eyes wide with fear. There was something else there as well. She’d never felt a presence like that before. Its lifeforce was immense and was full of rage. Yet, it was a malevolent rage. It was retaliatory. She wondered for what and looked at her son. He must have felt it too. She rocked him in her arms and a short time later was dressed.
Having taken care of the baby’s needs and her own, she readied some things for him. She was going to her mother’s. Something needed to be done. The Cetra could no longer afford to stand idly by while chaos reigned across the lands. But, what do I do? she considered and sat down with a helpless feeling. She absently smoothed the wrinkles on her mahogany pants. She had dressed in materials made for the demands of nature. She wouldn’t be needing a dress for what she was planning. First, though, she felt the need to take the issue up with the Council. That was the wisest thing to do. She gathered up what she had packed and picked up her son. Together, they left the home for an uncertain destiny.
Panic gripped Enson as he charged towards the open window of the wooden Council House. He viewed the cloudy horizon in fearful trepidation. A small breeze blew back his platinum hair and his silver robes exposing his flesh to the chill in the air. Impossible...the Cetra don’t harbor power such as this! Could it be...? I cannot afford to wait, I have to lay siege to Collust soon. Whatever it is, the power it contains is beyond what is mine already. Only the Council can help me rival this. And then ‘ITS’ power will be mine! he thought and smiled knowingly.
. Enson turned from the window and dressed himself in more regal attire. He then turned his attention to bringing to full bear those that were left against the Cetra Council. He headed towards the city square and mounted the risen podium. He called out with his mind and thousands of those that remained gathered within the square.
“The time has come. We can ill afford to wait for those cowards. We ride today. Go,” he spoke and with those words, the thousands gathered uneasy Choboa and attached war wagons to as many as the people could.
Shifting snow fell around Sion as he dug his way from beneath the avalanche. Several rocks had sliced the side of his leg causing a shooting pain in his flesh. He breathed in heavily and looked up the sheer side of the cliff rising above the fog shrouding his location. He started to stand and slipped on a slick stone. This almost sent him over the edge of the ledge he had landed upon.
Looking down into the chasm, Sion saw that he was roughly half the way down the side of the cliff wall. The fog was thick, yet transparent enough to give a view of the river slicing through the bottom a mile and a half below.
“Wonderful,” Sion spoke to himself.
He didn’t see the beast and assumed it had fallen into the deep chasm. Though he couldn’t ascertain an impact basin. Putting the thing out of mind, he struggled to the edge of the wall and searched for hand and foot holds to begin his ascent to the top. Hold by hold he climbed, daring not to look down. He proceeded slowly making sure he had adequate footing. Roughly an hour and a half later, he was nearly to the top.
“We’re going to have to pack up soon, sir. I don’t know when that thing will be returning,” a foot soldier spoke to Nilo, hoping his commander would issue the command.
“We’re not going anywhere just yet, soldier. See to what wounded you can,” Nilo huffed in agitation at the soldier.
Sion pulled himself up over the edge of the chasm and saw the confrontation. The foot soldier was turning to attend to the duties assigned him when he saw Sion crawling unto the ledge.
“Sir! It’s Captain Sion!” the foot soldier shouted and charged towards him to help him up.
Nilo and several others darted after him and were ecstatic to see Sion alive and well. They assisted him to his feet and brushed off his damaged armor. One person brought a cover for Sion to stave off the cold. He waved it away, hoping to maintain a confident demeanor, though in all actuality he was freezing.
“Sion, I’m so glad to see you survived! That thing flew away earlier...” Nilo started, prompting hand motions from Sion.
“I know. It nearly knocked me off the cliff. It headed west, didn’t it?” he inquired of Nilo.
Nilo nodded somberly. Sion stood on his own and headed back towards his tent with Nilo at his side. Before he could get there, an assistant to Aria arrived.
“Priestess Aria has finished her reading, Sir,” she spoke and politely bowed her head.
“Excellent. Nilo, ready the soldiers to depart,” he commanded and headed towards Aria’s tent instead.
“Sooner than later I hope,” Sion responded cryptically.
A few moments passed as Sion entered Aria’s tent. She sat there somewhat dazed. Aria motioned for Sion to take a seat on the cushion beside her reading couch. He did as requested and waited for Aria’s results.
“I wasn’t able to determine much, I’m afraid,” she began.
“Anything you can tell me,” Sion responded, catching his breath from the cold and wrapping a cover around himself that lay upon the cushion.
“It was very difficult to hear the Mother Tiamus through her screams of protest. What I gathered was that something came from the heavens above,” Aria spoke.
“No, not Meteor. There was something in the meteor. The language the planet speaks is so ancient as to be almost indecipherable. Only the emotions I could read. And of those emotions I determined that this thing from the heavens, she considers a ‘calamity from the skies.’ And she seems to be intent on wiping it out,” she related between exasperated breathes.
“Good. Then that thing she’ll destroy,” he said in weary happiness.
“Not quite. Don’t let your eyes deceive you,” she spoke to his curious eyes, “What you faced out there was delivered by our Mother,” she said.
“What? That’s not possible! It tried to kill us!” he pled.
“Only because the survivors had been exposed to the calamity,” she input sagely.
“Then, the virus,” he spoke looking to the center cushion that was solid and held a cup of tea upon it.
“The creature you fought was a predecessor to a greater instrument of destruction. I cannot tell you what she considers it, but the only thing I can call it, the closest word I can use, would be Weapon,” she finished.
Sion sat in stunned silence as he went over what she said in his head. He couldn’t believe that Tiamus would willingly sacrifice her children to prevent the scourge, this calamity, from spreading. However, he felt that she would probably be justified in the endeavor.
“What if we stop it?” Sion finally spoke.
“If it is possible. I do know that she is still building the Weapons to strike at the calamity. This predecessor is just to determine its total strength and the damage it has inflicted. The predecessor will cleanse any area infected,” Aria looked pale in the barely lit room and stared off into the nothingness.
“Tohen...I will stop it. I must,” Sion resolved and stood up.
Aria watched him depart her tent and she was impressed by his desire. Although, she knew the chances of defeating the shadowy calamity was slim at best. She prayed to Tiamus for final resolution and for the continued existence of the Cetra clans.
“Nilo, we leave by dusk. We must make our way back to Collust,” Sion commanded heading back towards his tent to prepare for departure.
“What of...” Nilo began only to be cut off mid-sentence.
“Now!” Sion shouted leaving no further room for debate.
“Make ready for departure double-time!” Nilo turned with resolve.
All the soldiers hurried to take down the tents and pack the supplies. Nilo looked at the piled corpses of his fallen comrades and felt sick to his stomach. He knew that they would not be returning with them for a proper burial.
She nodded in acquiescence and headed off to prepare the pyre. Nilo looked around the camp and wondered, not for the first time, what tomorrow would bring.
Cierra led the procession through the mountain pass. A group of fifty people, citizens and those warriors that remained behind, had joined her when she had made the case before the Council. She was one of the most perceptive of the Cetra and highly respected by her peers. It also helped that people adored her husband Sion as one of the greatest of the Cetra warriors. Atop her Choboa, she couldn’t help but reflect upon the meeting and the hesitation of the Council.
“We understand your feelings on this matter,” the Supreme Chancellor had said. Cierra stood along the first tier balcony pleading her case to the gathered Council. She had related the sensation she had that morning. She’d been so afraid, yet determined, she had taken her son to her parents before calling on the Council. They had reluctantly granted her the session.
“My husband is out there. Our connection through Mother Tiamus is solid. I know he is in trouble. This isn’t just my personal feelings, though. There is a great danger to our people, our very way of life. Whatever it is, is coming here,” she had spoken.
A murmur played through the gathered Council. Many felt the same thing. The Supreme Chancellor and his Viceroy spoke quietly with three of their closest advisors. They all were nodding in agreement to each other.
“You’re asking us to send our remaining defenders to undertake an expedition based on a feeling,” the Supreme Chancellor began.
“No, not all that remains. If we could gathered fifty willing bodies, we could counter the threat before it reached Collust. Perhaps buy enough time for our warriors to return home,” she replied.
“Of course. It just so happens, though, that several members of the High Council have also felt the cries of Tiamus. We grant you this request, but you will lead them. Your insight will be most needed,” the Supreme Chancellor concluded to Cierra’s surprise.
That had been over a week ago. Soon, they would be entering the Colleia Basin, an extremely wide field separating the segments of mountain ranges in the Knowlespole. They could see the field expanding into the distance just beyond the forest edge mere kilometers away. A blizzard was blowing across that field as they traveled.
Cierra drew her furred robed closer to her body. A brown shawl covered the bottom portion of her face. Only her eyes were exposed as she watched nature’s chaos unfold. It still astounded her how cold it was beyond the canyon of Collust. The group had made sure to be well prepared for it, but nothing really prepared a person for the sub-zero temperatures.
“Cierra, I think we should make camp along the edge of the forest. We can remain just within the protection of the woods. I certainly don’t recommend going out into that blizzard,” a man by the name of Ezra said to Cierra.
“That sounds like it would be a good idea. Let the others know,” Cierra replied as Ezra delivered the word.
Cierra slowed her Choboa and looked into the darkening skies. A storm was on the horizon and an uncertainty was in the air. She removed the bottom of her shawl from her mouth and she exhaled a steamy breathe. Up until three days ago, they were headed to the northwest towards Middas. Then a cry from the world sent a chill into her dreams. It was then she knew she should go west towards Tohen. Whatever was coming, would be coming from there. She only hoped they wouldn’t pass whatever it was.
A shadow fell across Tohen as the creature that cast it struck at the heart of the city. Adobe huts and wooden constructs were crushed and burned under the barrage of the marauding creature. Green flames poured from the stalks upon its head and a gaping maw that was its mouth. Six legs pounded into those structures made of stone. The cityscape was glowing under the assault of the creature known only as the predecessor. This was not its title, for it had none. This was simply a term given it by the Priestess Aria.
Mother Tiamus could feel the Priestess reading its emotion. She understood what the Cetra were trying to do and slowed the production of Weapon. She had guided this predecessor to Tohen to eliminate any traces of the calamity’s presence. Yet, the calamity itself, under the guise of a young man, had already abandoned Tohen and led his virally infected followers towards Collust. In response, Tiamus had given another a dream, to follow the trail of the calamity.
The predecessor stood amidst the ruins of Tohen and screeched into the stormy skies. Soon, the storm rains would settle the burning rubble surrounded by a snowy plain. The creature stared off to the east and heard the Mother Tiamus in its created mind. It slowed its destructive course and began a trek towards the east. A silent command sent it walking across the cold plains. For now, the predecessor would not fly. It left the leveled Tohen in its wake and to its hind quarters and proceeded on it mission.
Journeying back to Collust had been long and ardous. It had also been very slow going. There were many who had been wounded in the attack by the predecessor and this caused the procession to take several weeks to cross the mountain ranges back home. Sion spent most of his time in a worried state, praying to Mother Tiamus that they wouldn’t be too late. Fortunately, though, the route back had seen a reduction in harsh weather conditions, so clear skies and bright sun had helped warm the days.
Sion was beyond ecstatic to see his hometown laying within the canyon valley below. With home so close, they had sped up as much as allowable given the survivors and wounded they had in tow. However, it wasn’t the greatest of homecomings when they finally entered the town limits.
“I’m going to the Council. Take the wounded to the infirmaries,” Sion commanded and ushered his Choboa deeper into the empty streets of Collust.
Within the Council chambers connected to the main amphitheater, a heated discussion was taking place among the remaining members of the government. The chamber was small and just as round as the amphitheater. The maximum number of individuals that could be comfortably seated within were one hundred and fifty. Seats for those individuals rested around the U-shaped, limestone table that sat in the center of the chamber. Only three-quarters of the seating arrangement was filled, including the head seat at the table’s middle. In this seat sat the Supreme Chancellor with his Viceroy at his side.
“How will we hold off an attack in the state we find ourselves in?” questioned a Senator. “Forget holding off an attack, we should do as the others have and depart for the southern temple,” another Senator concluded.
“Well, I...” started a Council member on the far right before he saw the form of Sion entering the Council chambers.
The Viceroy saw him as well and motioned him to the center space within the table’s perimeters. Sion walked from the entrance and stood before the Council. He was exhausted, bloodied, and haggard.
The Council members were silent for several moments. The Viceroy leaned back and placed his left index finger around the base of his nose, clamping his palm to his mouth. It was apparent that the Council saw this as distressing indeed.
“Tohen, you say? Are you certain of this?” the Supreme Chancellor queried in trepidation.
Sion dropped his gaze to the floor and caught his breath. That Cierra would do something so foolhardy and daring was unacceptable. Although, he knew it would be exactly like her.
“When did she do this?” Sion inquired.
“Two and a half weeks ago. We have not heard from her since the runner last week,” input the Supreme Chancellor.
“Your child is in her parent’s safe keeping. They remain within their home,” the Viceroy added.
“Thank you, sir. With your permission, I will take my leave and depart with as many as I can towards Tohen. May I recommend the Council retreat, with the wounded warriors that have returned with me, to the southern isles?” Sion stood straight and suggested.
“I believe the majority of the Council will take you up on your recommendations. I implore them, as well, to take the wounded with them,” the Viceroy responded feeling the weight of the matters at hand.
“Thank you, Viceroy, Council. I will be sending the remainder of our families with you, as well.” Sion concluded and turned to exit the chambers.
The Council sat silently, realizing they would have to abandon their homes after all. Many stood to make the preparations for their journey. The Viceroy and Supreme Chancellor remained seated and contemplated the future of the Cetra.
Nilo waited outside the Council auditorium. Sion had been within the chambers for nearly fifteen minutes, which was too long for Nilo’s taste. He didn’t have to wait much longer for Sion exited and approached him. Nilo saluted and Sion waved the gesture aside.
“Formalities are no longer an issue, my friend. Gather all able bodied warriors. We’re setting out by evening to march towards Tohen,” Sion began as they walked towards the entrance to the Grand Council chambers.
“Already? What’s going on?” Nilo inquired nervously.
“The reason the streets are so bare is that most of the Cetra have evacuated in anticipation of imminent attack. They’ve fled to the southern isles of the Kaedor chain. Most of those that remain will be joining them. We, however, are at least going to buy them the time they’ll need to escape. We will counter this calamity head-on,” Sion informed him.
“There are not many warriors left that are able to put up much of an offensive, Sion,” he replied.
“I know, I know. We’ll have to make do with what we’ve got. In the meantime, we need to make sure our families are on that boat. I know my son and in-laws are still here. I should make sure my own parents and my brother have departed as well. Let’s get this over with,” he said.
“What of Cierra?” Nilo asked.
“Seems Cierra went after the calamity,” he replied.
“What? Is she daft? She’s no warrior! I mean, no offense, Sion,” Nilo spoke.
“None taken. You’re right. However, she loves me and probably was sensitive to the events transpiring along the Knowlespole. She’ll fight the calamity. We just need to be there to make sure she has plenty of back-up,” Sion concluded as they departed the massive chambers. Nilo nodded in apprehension. The ante had just been increased and he wasn’t certain there would be any coming back from this mission. The two warriors set off for their destinies.
Cierra pushed her Choboa as hard as she could in her retreat through the mountain pass. The attack had been sudden and their counter-strike had been hopeless. The Tohenians were possessed by some force beyond her understanding. They were violent and quickly subdued her defenders. Several of those that had followed her on this quest, instructed her to flee, that they would hold the invaders back. She had fought hard against those that had been infected, but, in the end, was forced to reluctantly retreat. A much larger force would be needed against the infected.
It wasn’t easy to do and she shuddered against the thought of the act and the bitter cold surrounding the region. Several others had initially joined her in the flight. Though, they had turned back to dissuade the pursuers. She was going to join them, when one of the warriors instructed her to not be foolish and go to inform the Council of the coming calamity.
Cierra had seen him, of course, the one that led the infected Cetra. She didn’t know who he was, but she could feel the shadowy evil pouring forth from the silvery haired individual. He wasn’t like the others, the infection wasn’t within him. There was something in his maniacal stare, though, that told her he was the deliverer of the disease. The stare they had exchanged was more than enough to inform her of who was in charge.
She slowed her pace and thought about how much further the distance was to Collust. Almost a week, she figured. Already, her flight had lasted several days and the Choboa she had been pushing was showing its exhaustion. She guided the flightless bird through a copse of snow covered vegetation that was overshadowed by the massive trees rising overhead. A few more yards and she found herself dismounting near a mountain stream. Kneeling, she took a drink of the river using her hands for a cup. The water was frigid, but it came as soothing relief. A kwehing sound issued forth from the Choboa as it bent its thick feathered head down to take its own drink.
Cierra sat back unto a log with only a thin accumulation of snow covering its length. She caught her breath and looked up into the cloudy sky. A small ray of sun spilled through a crack in the cumulus. Drying off her hands the best she could on her robe, Cierra put her gloves back on and prepared to lead the Choboa further through the forest. Though only ten minutes had passed, she wasn’t about to wait for the evil thing catch up to her.
The silence of the forest was disturbed by a cracking echo. Cierra stopped handling the saddle bag on the Choboa’s back, and stared around at the shadowy forest. Bits of sunlight poured through the snow strewn leaves and pines. A chill ran up Cierra’s spine and it wasn’t because of the weather. She could feel the presence of something. Grabbing her blade, a mid-length sword, from the bag scabbard, she found herself in a defensive posture.
Several uncomfortable moments passed before Cierra relaxed her posture. The crack didn’t repeat and she thought maybe she was imagining things. Then several things happened all at once: two of the infected followers of the shadow attacked and frightened her Choboa away, which resulted in Cierra flaying them with the sword she still held; and then she encountered the being she had hoped to evade.
Cierra didn’t bother responding to the creature upon his Choboa. She ran up the river bank and towards a cave up the side of a steep hill. The creature, Enson, gave chase and was forced to dismount, since the bird he rode was unable to keep its footing. She ran as hard and fast as she could until she found herself within the cave entrance. Quickly, she ducked into a small and shadowy hole in the side of the cave interior. Within seconds, Enson was past the entrance and scanning the dark for her form.
She jumped out and attacked Enson and tried to pierce his gut with her sword. Enson managed to block the side edge of the sword, preventing himself from being cut and deflecting the weapon. He threw a punch at Cierra who dodged the blow and plowed her shoulder into his ribcage. He reeled in that instant as she rushed past him, deeper into the cave.
Enson scowled in rage and followed her into the recesses of the dank and dark hole in the ground. His eyesight wasn’t as good as hers and Cierra made good use of this advantage. Enson slowed his harried pace as he entered a massive section of the cave that was lit almost completely by a large hole in the ceiling of the stone mountain interior. He couldn’t see Cierra, but he could feel her presence.
Enson walked into the center of the cavern and beckoned with his arms wide open. He grinned in an evil taunt, trying to trick Cierra into the open. She hid behind a stone at the farthest recess of the cavern and didn’t care what trick he employed. She knew instinctively that she was going to have to rush him, taunt or no taunt.
“Cierra, isn’t it? What a beautiful name. You Cetra, there is a power in you. This power is marked by the lifeforce flowing through this planet. You should know something about me, I was created to destroy. When my usefulness was through, and the threat of my self-affiliation was recognized, they cast me aside; thrust me into the endless abyss. However, I have but one purpose, to spread the seed of chaos. When the time comes, I will seek out my creator, and destroy him. And those who employed his unique talents...but, first, I need power, and intellect. You fit both bills...” he uttered in grinning disdain.
Enson watched as the form of Cierra emerged swiftly and thrust her weapon towards his abdomen. He didn’t try to evade her and let her jam the sword through his body. The smile waned only slightly as the pain shot through his system. He grabbed her head and pulled Cierra closer to his body. She threw him to the floor and he pulled her with him. They rolled across the floor jamming the weapon all the way through his form. Before the life could flee him, though, he forced her eyes towards his visage. His essence flowed from his form and into hers. Shrieks of terror and anguish filled his ears with savory joy. Yet, she resisted.
Cierra winced as the force entered her body. No! Get out of my head! Get out of my body! What are you!? she screamed internally and let out a shriek externally. The power of the entity was overbearing. Though, she sensed a greater power within herself, elsewise, the creature wouldn’t wish for her so badly. However, she was ill prepared to fight a mental battle with an entity that had did just so for eons.
Time passed in her mind as she saw what the thing had done over its long existence. Chaos to many worlds had been wrought by the creature in servitude of a warring Civilization. However, that civilization had entered an era of peace, and their biological weapon was no longer needed. This weapon was taking control of her mind and she slammed her hands into the stone floor, screaming with the effort of internal warfare.
An avalanche of stone cascaded from the ceiling practically burying them both. The shockwave had, surprisingly, come from her own aura. Cierra was devastated to know what she could have become and even more disgusted that she was losing. Her torso and her right arm remained unburied as she struggled with the vacant gaze of the creature whose body was quickly fading in life. Huge stones were crushing its back and its horrible stare lingered towards her eyes. She couldn’t look away.
“Ugh! Get off me! Tiamus...help me...” she said, closing her eyes under the weight of the debris.
The creature Enson went limp upon her. Sweat poured from every gland in Cierra’s body and then she only saw the dark. She collapsed underneath the stone and her breathing grew shallow. A stale wind blew from the widened hole above, causing a thin layer of snow to coat the two bodies under the stones.
Twenty five warriors sat atop their Choboa staring at the remains on the battlefield. Already, a sheet of snow was covering the corpses. It was easy to tell, though, that this was the contingent that Cierra had led.
Sion looked the field over and felt a thick fear settle over him. These were fifty warriors that died under a brutal onslaught. Those he led were only twenty five. How could they hope to be victorious over a calamity that could bring about so much death?
“I don’t see her here. She must have escaped to Collust. What do we do now, Sion?” Nilo inquired as he trotted his Choboa beside Sion.
A sigh came forth from Sion’s lips. He wasn’t sure what they could do anymore. Things had just gone from worse to hopeless. He looked towards the distance and where he imagined what Tohen looked like. He shook his head.
“We pray,” were Sion’s only words as he turned his Choboa and headed back for Collust. The Predecessor ceased its forward momentum and stared through its three long stalks at the far distance. It could feel the anxiety of Mother Tiamus. Something had gone wrong. The Calamity had been underestimated. Only a handful of Cetra stood, now, between the Calamity and its dark desires. Tiamus could not wait for much longer. Were the Calamity to be left unchecked, she would perish into the ashes of history.
The Colleia Basin lay out before the Predecessor and presented too much of a hindrance to its progression were it to continue walking. Massive wings unfolded from protective flaps drawn flat against the upper torso. With little effort, the creature lifted into the air and made headway to Collust.
The Predecessor allowed its long tail to trail behind it in the wind. Six needles waggled in the air at the tip of the tail in testy demeanor. A slight shadow from the scorpionesque beast drew its outline on the snow covered fields of the basin. It would wait for the right moment to strike, allowing the Cetra time to battle against the Calamity.
Particles of snow drifted across the form of Cierra who lie trapped beneath fallen stone. She awoke and opened her eyes to soft light filtering into the cavern she had battled Enson within. Enson lie dead on top of her and she tried to remove his body. The stone prevented any massive movement.
She shut her eyes and drew in a breath and, instinctively, the innate power that was buried within her shell. She held her right arm out to the side and called forth an invisible force to shatter the debris. Dust and snow littered the air making it difficult to see and move. This didn’t stop her from moving forward to the exit, though. Wiping her forehead with the sleeve of her wet and frigid right arm, she stepped over Enson and paid him no further attention.
A short time later, she found herself back at the entrance to the cave. She strained her eyesight against the sudden brightness after having been within the cavern. She stumbled into the open air and fell to the ground. With some effort, Cierra got upon her hands and knees. With shallow breaths, she regained her composure and issued forth a smile to the frozen ground.
Exhaustion overpowered the group of twenty five warriors as they re-entered Collust. Depression eked its way through the consciousness of all who returned. The Cetra way of life was coming to an end. Those that had remained in Collust, had at last abandoned their city. Which left these warriors very solemn as they walked through the city.
“We will hold position here. The Calamity will come for Collust and we must make sure to prevent it from leaving the Knowlespole,” Sion commanded.
“As you wish. Though, I wonder how we will hold this Calamity back?” Nilo questioned bringing his Choboa up beside Sion.
“We’ll gather what weapons we can find. Hopefully, we’ll find something that can be advantageous for us,” Nilo commented.
Sion nodded and guided his Choboa towards the Grand Council chambers. The city made from ancient shells, was a lonely sight to behold when there was no one around. Essentially, Collust had become a ghost town. He shook his head slowly, feeling forlorn over how quickly everything had gone wrong in their lives. Shadows lurked around every bend, reminding him of his failure to counter the looming threat. Now, there was only the vague hope of fighting back the Calamity.
He dismounted his Choboa outside the chamber perimeters and entered the massive complex built into the side of the mountain. Shortly, he found himself staring into the empty amphitheater as he briskly walked towards the smaller meeting chambers at the eastern border. Entering the room he glanced around looking for any sign of the Supreme Chancellor and his Viceroy. He saw two forms hunched in their seats at the end of the chamber Council table. With great uneasiness, he edged towards the two and drew his sword. They weren’t moving and he saw blood caking the Supreme Chancellor’s robes.
“This can’t be...Chancellor? Viceroy?” he beckoned the lifeless bodies to speak. When no answer was forthcoming, which he hadn’t expected, he held his sword to his side and inched closer to the table center. The torches in the chamber had been extinguished and a skylight above cast a dual ray of light upon the two men.
The voice manifested itself from behind the Chancellor’s chair. A woman with long hair walked slowly into the beaming light, grinning with an insanely evil grin. Sion recognized her at once and was both thrilled and alarmed.
“Cierra! ...What are you doing here? The Council told me you had set out to the east? What happened here?” he questioned quickly, still maintaining a grip on his weapon. Cierra slid herself towards the table edge and sat upon its surface. She brushed back her hair and stared at Sion. She wasn’t herself. And, Sion was starting to get a very bad feeling about all this.
“What happened? Heh. They couldn’t handle the pressure and well...see for yourself,” Cierra said, motioning towards their limp forms.
“So, you must be the Calamity. Release my wife,” Sion demanded, coming to a straight posture.
“I am your wife, Sion,” she replied with an innocent expression and propped her right hand on her chest.
“I know my wife. Her aura is one of beauty. I sense from you only hate!” Sion pointed his sword at Cierra, or what was Cierra.
“Release Cierra, please...” Sion beseeched the shadowy creature within her form.
Cierra held wide her arms and looked up towards the ceiling. Her body lifted off the ground as an invisible wave surrounded her. Sion stepped back a few paces as she summoned forth a fierce thunderclap. The shockwave ripped through the room and pushed Sion back towards the far wall. He held up his arms in a feeble gesture of blocking the unexpected attack.
Seconds felt like an eternity to him until the wave subsided. He found himself standing just a fraction of a step away from the edge of what used to be the back of the chambers. He looked down to see the city sprawled out below. The precarious step he maintained gave way and he found himself careening down the side of the mountain slope. Sion twisted himself to keep his feet and legs pointed down at the impact zone he was fast approaching. A swirling birth of snow and debris was tossed into the air at Sion’s landing.
Sion coughed up bits of rubble and black soot covered cumulation. Crawling out of the debris, and feeling very lucky to have survive, he looked up to see his wife, the Calamity, floating on an invisible field and out into the open above the city.
Nilo heard an explosion and looked up to see the front wall of the Grand Council chambers blow outward. He was shocked at the event and even more so when Sion fell out the newly formed exit. Then, Cierra floated out of the fresh ruin. He could only stare as the woman floated over the city and began to survey the terrain as if looking for something to destroy. He wasn’t misguided in the thought when, a moment later, she lifted her hands causing several homes to implode. This was followed by a shockwave that blew him off his feet.
He sat up from his where he lie on his back and saw Sion running around the bend of the neighborhood. He jumped to his feet and rushed towards Sion.
“What in the world!?” Nilo began, unsure of what it was that he was seeing.
“Cierra’s succumbed to the Calamity,” Sion stated and crouched behind a building.
“No...what do we do?” Nilo quietly asked, numb at the thought.
“We have to save her!” Sion shouted and rushed out into the open, waving his arms like mad, trying to get her attention.
“Sion! ...how praytell do you think we can do that?” Nilo asked himself.
. Dozens of arrows immediately filled the air, as the warriors that remained counter-attacked Cierra’s barrages. The arrows were nearly dead-on and only missed by inches.
“No! Stop! Don’t hurt her!” he shouted to his men, who couldn’t hear him over their own shouts of fear and anguish.
It was a futile command anyhow, as Cierra responded with a motioning of her hands. This time, instead of a shockwave, there came an Avalanche from the ground. Sion had never seen such a thing before. Stone and dirty snow rose and covered those firing arrows. Then a fierce wind shot forth, piercing several warriors with small pebbles. Blood seeped from their wounds and they collapsed to the ground. Snow turned red under their slain bodies.
Sion ducked behind another structure as a whirlwind ripped through the center of the city, shattering the markets and rest facilities for travelers. He grimaced at the destruction and wondered how to save his wife, and how he would survive the onslaught being brought upon them. This is hopeless...he thought.
A screech pierced the air distracting Sion from his own considerations. Flying across the canyon rim was the Predecessor. It came to a hovering position just beyond the gully the led to Collust. Cierra paused her strike and saw the beast.
Sion witnessed green flame spewing from the eyestalks and mouth of the Predecessor. At the same time, it unleashed a volley of spiked energy from the six needles on the tail. He wanted to scream for Cierra to watch out, but he saw her smiling. The green flame hit her invisible energy field and flow harmlessly around the spherical apparition. She lifted her hand and the energy spikes flung from her path and smashed into the sides of the canyon. Stone fell from the gashes and an avalanche of rock formed on the ground.
Refocusing on Cierra, Sion saw her hands rotating around each other and then a massive ice wave struck out at the Predecessor. It raised its two clawed arms and blocked the ice. However, the invisible wave that drove the ice smashed into the beast. The Predecessor was encompassed by the icy wave and froze in mid-air. Cierra snapped her fingers and the creature shattered into millions of tiny shards.
An awful cackling filled the air, and Sion saw Cierra spinning in the air in joyous rapture. She then continued her barrage on Collust. Only ten warriors remained and they were avoiding Cierra the best they could. The arrow assault was halted, since it only resulted in instant death.
I knew I should have exterminated you pests when I had the chance! Cierra thought angrily and raised her arms. The rhythmic chantings were giving her a headache and disrupting her focus. She was about to unleash a shockwave when a shout echoed up into her ears.
“Cierra! Please! Fight it! Tiamus is here! Fight it!” Sion screamed from where he stood in the middle of an avenue.
“Be gone with you, gnat!” Cierra responded and raised her hand to summon a blaze to engulf his body.
Noooo! Came a pleading and exasperated voice in her head. Cierra grabbed her head and struggled against the voice. It was forceful. Much more so than it had been before. She looked at the gathered Cetra around the rim and heard the chanting growing louder.
“Go...away! I own this now! You are nothing!” Cierra screamed to herself trying to force the voice to grow silent.
I will not be silenced! You...eyaaa! You may have taken my body...but you’ll never assimilate my soul! the voice exclaimed. Cierra found her vision growing blurry. The Calamity was losing control.
“I don’t need your soul, silly girl! I only need the vessel and the power it commands!” Cierra shot back and unleashed a massive shockwave that leveled several blocks of the downtown area.
However, this caused a dizziness within the Calamity, and it fell from the air and landed upon a heap of rubble. Cierra rolled down the ruined slope and flopped unto her stomach. She lie face down for several moments. Sion had seen her fall and came running to her aid. Hearing his approach, Cierra got up unsteadily and tried to send another burning wave towards him.
“I’ve had it with this species!” she screamed and shot her arm forward, but nothing occurred.
She grabbed her head as the voice returned. This time, the Cierra within wouldn’t let the Calamity regain composure so quickly.
“Cierra! You’re back!” he replied and rushed forward.
“No!” she commanded him and held her hand out for him to stop.
Cierra held one hand to the left side of her head and blood was pouring from a wound there. Her eyes looked at him briefly then cast themselves away. The Calamity was fighting for control and wrenched at her gut nearly causing her to fall to her knees.
“Kill me! Do it now...” she forced out, her breath fleeting as she waged war with the Calamity.
Its evil and control were fierce and unrelenting. There was no way she could stave it off indefinitely. Only the chanting of the Cetra tribes above had allowed for her to break the concentration of the Calamity. She could sense several hundreds rushing down the mountain sides to counter the threat she posed. She was Cierra no more. This moment was all that she was given.
“Sion! Don’t hesitate! Now...ugh...” she fell to her knees and Sion rushed forward.
The Calamity ceased the moment and brought up her fist, slamming it into Sion’s face. He reeled from the impact and drew his sword.
“We can save you!” he responded, fearing the dread of truth.
“Save yourself, Pion!” the Calamity responded and drew forth a invisible force to unleash at Sion.
“Now...” she commanded and thrust herself towards Sion.
Sion instinctively brought forth his weapon and Cierra’s body was pierced upon the blade as it ran through her stomach and out the rear of her ribcage. Sion stared into her eyes as he saw her life fading and felt the wretched, stabbing aura of sorrow.
Cierra continued as ripples of black energy sought its way past her eyelids. Sion could see little black strands of the energy trying to escape. A thousand needles cut off anything more Cierra had to say, as the tribal marksmen shot her full of poison darts. His tears moistened the hand she had placed in front of his eyes to prevent him from looking at her as it went limp.
Nilo pulled Sion away from his wife. He fought his friend’s grasp to no avail and was drug away sobbing. No! Not Cierra! Tiamus...why must this be!? he cried and could sense the world weeping with him.
Nearly a week later, Sion followed the procession of Cetra tribesmen to the pass that would lead to the Northern Boundaries of the Knowlespole. At the center of the group, there was a casket containing the solidly wrapped form of Cierra. Ice and snow packed the coffin of his wife and served a dual purpose. One was to keep her from decomposing and risking the exposure of the virus that inhabited her lifeless body. The second was to prevent the Calamity from jumping to another soul.
The tribesmen had communicated with Tiamus and had understood what must be done. They had traveled to where the final conflict would transpire and brought with them the thickest furs. Now, Sion could only stare at the stone coffin. A cold chill ran a course through his veins and he looked away towards the mountainous terrain surrounding them.
Pinkish hues gave way to the splendor of snowy peaks far in the distance. Clouds were clearing and, finally, a gentle sun was shining down upon the Knowlespole. Soft kwehing of the Choboa calmed Sion’s unsteady heart as a slight breeze caressed his face.
Freezing water welcomed the stone coffin as it plunged into its grasp. A chanting filled the air as the Cetra gathered around the long, cavernous pit that led deep into the welling lifestream far below. Sion stared down into the hole in the earth, watching the coffin slide down the slope into the water. After everything was said and done, he turned his Choboa and walked a few paces to where Nilo waited.
“You ready?” Nilo inquired, feeling the burden of all that had transpired.
“Yes...It is time I joined my son in the southern isles. ...Cierra has returned to the planet,” Sion stated flatly and looked to the ground.
“This is good,” Nilo replied, gazing at the pit a dozen tribesmen sat around.
“You realize, of course, that I won’t be returning here...” he related to his friend.
“Oh, that’s ok. I’ll miss home, but it seems, a little sun just may do us some good,” said Nilo with a slight smile.
Sion chuckled slightly and turned south. Nilo motioned for the eight warriors going with them to mount their Choboa. The group left the tribal Cetra to care for the Knowlespole and, with Cierra’s gravesite to their backs, they began their journey. | 2019-04-19T19:14:44Z | http://www.angelfire.com/indie/caeliclord/crisis.html |
VIDEHA MITHILA TIRBHUKTI TIRHUT 1.Introduction Mithila includes `North Bihar',parts of Anga(south of Ganges), 'Tarai' and `Southern' portion of the kingdom of Nepal inclusive of lower ranges of hills. The earlier reference to Videha is in Satapatha Brahmana' ' Circa1000 B.C. Sadanira demarcated Videha from Kosala. Sadanira has been identified with the Budhi Gandak.Itcovers the modern districts of Muzaffarpur, Darbhanga, Madhubani, Champaran, Khagaria,Saharsa and parts of Purnea in India and those of Rohtara, Sarlahi, Mobitari, Saptari and Morang of Nepal.The Eastern boundary has been fluctuating with the changes in the course of river Kosi, the common boundary of the provinces of Mithila and Kamrup, the Ganga andthe Himalayas,the estates of Dinajpur, Koochbihar, Maldwara,Maldah, estates in Bangladesh,Rajmahal district of jharkhand and as far as Tejpur Pargana, the traditional grant of the kingdom of Mithila to Maharaja Mahesa Thakura by theMughal Emperor Akbar the District of Champaran, linguistically and culturally, been encroached by the Bhojpuri speaking people. On the other hand much of Monghyr and Bhagalpur Districts as lie to the south of Ganga river has been encroached by the Maithils.
It has also crossed the Kosi and occupied Purnea, KoochBehar, Dinajpur, gidhhaur, badh etc. also habitations. goa also. Kosi never been known to return eastwards to any of it deserted channels advancing westward Rama had finished journey between the Sona and the Gangs before reaching Vaisali within a day only. It took Visvamitra along with Rama and Lakshmana, four days to reach the capital of the country Of Videha from Ayodhya. They rested on the way for one night only.' In the Buddhist texts extended the connot tation of Madhyadesa - the most sacred part of India- simply because they had to include in it the land par excellence of Buddhism, viz., Bodhgaya and Banaras. eastern boundary of Majjhimadcsa - Pundravardhana which in ancient times included Varendra'.' (North Bengal). the Aitareya Brahmana' boundary of Madhyadesa somewhere near Prayag. sage of Mithila, Yajnavalkya, in that country in which black antelope roams about,' is that though Mithila was not included in the four ancient holy lands of Bharatavarsa-Brahmavarta, Brahmari.. sidesa, Madhyadesa and Aryarvarta. sanctity only from the fact pointed out by the Dharmasastra.
Mithila was consistently regarded as an independant unit of the Pracyadesa. Praci, in ancient Tibetan works, excluded even Magadha, Kasi and Kosala but included Mithila and Vanga.The Puranas only in Brihad Vishnu Purana c. 5th cen. A.D., Mithila Mahatmaya ll Khamla Tirabhukti (a later name of the province) is described as` situated between the river Ganga and the Himalayas, extending over fifteen rivers and from Kosi (Kausiki, in the east) to the Gandaki in the west, for -24 yojanas and from Ganga to the forests of Himalayas for 16 Yojanas. The messengers sent by Janaka reached Dasaratha's capital in three days by travelling very fast, while Dasaratha on his journey to the Videhan capital in his chariot took four days.Buddhist work Divyavadmra.those of Rohtara, Sarilahi, Mohitari, Saptari and Morang of subsequent movement of the Kosi. The Brihacf-Vishnu Purana gives the following twelve names of Mithila. 1 Mithila 2. Tairabhuktisca 3. Vaidehi 4. Naimikunanam 5. Jnanaksetram 6. kripaoitham 7. svarnalai 8. galapaddhati 9. Janakijanma bhumischa 10. nirapeksh 11. vikalmasha 12. Ramanandakuti viswabhavani nityamadgala.
At first it seems that the whole province was called Videha and had several kingdoms in it, the chief ones being those of Mithila and Vaisali.Indeed, from the account in earlier literature it would seem that the chief city of the kingdom of Mithila, was Mithila. The name Videha appears to have lost vogue in the mediaeval times.Then came the name Tirabhukti 4th and 5th centuries A.D. The Basarh terracotta seals of the 4th century A.D. mention this name for the first time. It became very popular and its simplified form, Tirhut, is now used extensively, though, the name Mithila is now gradually gaining ground. 'Tirhut' also indicated at one time a Sirkar (a division of the Subah of Bihar) under Muslim rulers ; it comprised of a very large tract of Brilrad-Vishnu Purana Mithilakhanda : Milimla; Tirabhukti; Vaidehi; Naimikanarn the forest associated with the descendants of Mini; Jnanakehelram, Kripa-pitham-the home of knowledge and the centre of grace; Svarnalangalpaddhari-The footsteps of the gold plough; lanakijanmabhumi; Vihalmashn-Devoid of sins ; Ramanandakuri-the cottage of Sita's Pleasure; Visvahharani-world pleasant; and Nityamangala-ever blissful.Britishers formed the modern division of Tirhut comprising the Districts of Muzaffarpur, Darbhanga, Champaran and Saran.'Videha' is the earliest designation, probably derived from the name of the Vedic King Videgha Mathava who is said to have introduced the Agni into the lands beyond the river Sadanira.
visit led to the cultivation and more habitation of the country, for we are told that previously the land was extremely marshy and had to he dried.Mithila is not mentioned in the Vaidika or post-Vaidika Literature. The Ramavana and the Mahahharala, Dasakumaraehariia, Raghuvalnia Prasannargghara etc use it for the whole country. It is used most extensively in literature specially as the capital city of Videha or Tirabhukti province situated somewhere in the Tarai - modern Janakpur.Mithila is also called Miyulu in the Buddhist Annals. the origin of the name Mithila too in the title Mathava of this king, Mithi being reminiscent of it.In some Jataka accounts a city called Jayanta on the bank of the Gangas is spoken of as the capital of Videha. The Devi Bhogar'ata (Skandhe 6) wrongly located the city on the bank of the Ganga.The use of the appellation 'Mithila' along with 'Tirabhukti' or Tirhut for the whole country is comparatively very late-from about thef time of the installation of Karnata Dynasty in 1097 A.D. the Valmikiya Ramayana observes that the city of Mithila was founded by king Mithi.
Pre-historic Mithila,watery nature of its land particularly because of its situation at the foot of the Himalayas and by the frequent changes in the courses of its numerous rivers and rivulets have made it difficult to collect materials in the field of pre-historic antiquities.marshy character of the land.Jalodbhara i.e. reclaimed from swamp.it was cultivated by the Brahmanas. who had caused agni, the Fire God, to taste it through sacrifices vast chain of temporary lakes, joined together by the numerous beds of hill streams Nepal to the Ganges. communications are open for only three or tour months of the year.The river side is so common that the expression `aadi dim ' is used by every one irrespective of age for going out for excreting wild animals used to roam about till recently, the long grass which grows in abundance in such a land all these give the picture of Mithila gradually coming out of water in the Cain-Ozoic Epoch.The story of the Avati ras is believed by a group of scholars to indicate the gradual stages of evolution, especially that of Vishnu as half-tortoise and half-fish.
We have in Mithila, in the first instance the famous Varahaakshetra Tirtha which map indicate the evolution of man through the stage of a boar; and then there is a Pauranic story of the birth of Narakasura by the Union of Vishnu and Varaha. This may indicate in some form, the knowledge or existence of the evolution of the primitive man from half-animals and half-man in Mithila-^ Of the ages that followed the age of sub-men or primitive men, the remains are so scanty in India that much cannot be said about any region, especially that of Mithila, which has been so far practically has remained wholly unexplored. Of the ages that followed the age of sub-men or primitive men, the remains are so scanty in India that much cannot be said about any region, especially that of Mithila, which has been so far practically remained wholly unexplored. There is a great paucity of material to eliminate the `Pre-Vedic' inhabitants of Mithila.The various types of skulls that were discovered at the site near Darbhanga Railway Station, which is called ‘Harahi’, (i.e. the site of bones), remained unclassified and unstudied.
There is a pond there, in the name of ‘Harahi’.All that is possible in the present state of our knowledge is to took forward to the study of some apparently primitive castes and tribes of Mithila. As early as the 5th century AD,several tribes made up the Vajjian Confederacy and one of the most important of them was 'Lichchhavis', who was held for a long time to be of foreign stock. The names of other important ones are mentioned in the Jyotirisvara's Varnaratnakara. They are Tatama, Dhanukha, Goara, Khatbe, Amata etc. In the earlier part of Satapatha Brdhmana it is mentioned that King Videgh Mathawa carried Agni in his mouth and he moved from Saraswati, in the Punjab, where the king dwelt),to Sadanira, drying up all the rivers. He did not, however, burnt Sadanira. The Brahmanas did not cross it,therefore, thinking it has not been burnt over by Agni Vaisvanar.But when Mathava reached the Sadanira,he asked the Agni where will be his dwelling and the reply was that he should live to the East of Sadanira.However it is fact that Ayodhya and Videha were long united and their Kings were of the same tree.
It might mean that the reformed Brahmanism passed from the Bharata Kingdom to Ayodhya and then to Videha.The Videha country received Vedic culture long before the trine of the compilation of this Brahamana.In Brihaddrapyaka Upanishad which forms a part of the Satapatha Brahmana Samrat Janaka is mentioned as a great patron of Vedic culture and it is said that the Videha Brahmanas were superior to the Kuru Panchalas in the Upanishadic phase of the development of vedic culture.The vedic(Aryan) culture has taken its root long before the Brahmana age, most probably in the early Samhita age of the Rigveda.The Yajurveda Samhita mentions the famous cows of Videha. The Vedic sites were unknown to the inhabitants of Mithila. Mathava Videgha's priest Gautama Rahugana is credited in the Satapatha Brahmana with the discovery of the Mitravinda sacrifice which is further said to have been revived by Emperor Janaka through Yajnaavalkya.Besides, earlier still, Nami Sapya, King of Videha (Vaideha-Raja) is held up as a memorable example of a monarch who successfully performed elaborate sacrifices and thereby reached heaven.
As the name of this King appears in several passages in the Rigveda,very early period in the development of Vedic Culture in India.Rig Veda1.53,7 says that Nami was the friend and associate of Indra in quarelling the Asura Naaiuci,in the fight with Namuci Indra protected Nami Sapya.The priest Gautama Rahugana is one of the important Rishi in Rigved. It may be noted that the Brahmanic culture must have made a very rapid progress In the country to justify its description in the latter part of the Satapatha Brahmana as the centre of intellectual activity of the age.The Mahdbharata attests that the Vedic lore was as popular in the East as anywhere else.In the Shanti Parva and in the Brihadaranyaka Upanishad, the authorship of Sukla Yajurveda is ascribed in clear terms to Yajnavalkya Vajasaneya, who belonged to Mithila. From a perusal of all these things it becomes clear that Mithila figures prominently in Ancient History from the very beginning of the Vedic period.
Mithila was visited by Videgha Mathava and his followers and probably, its marshes and jungles were cleared, and its soil was cultivated and a great and powerful kingdom was founded.Vedic Mithila knew other kings too, such as, Nami Sapya (Rigveda 1.53 .7) and Par Ahlara. Nimi Vaideha, who IS reported in certain Puranas to have founded this line of Kings in Mithila, is perhaps a later name of the king of Kings.At any rate, Videgha Mathava should be regarded as the earliest known King, if not the founder, of the Videha kingdom and of the line of Vaideha Janaka. In course of time it seems that a confederacy of kindered peoples known as the Kosala Videha, occupying a position no less important than that of the Kuru Panchalas, grow up at the time of the Redaction of the Brahmana.The Kingdom thus founded by the Vedic Mathava was in course of time ruled by the Vedic Samrat Janaka the contemporary of Aruni and Yajnavalkya, and Ashvapati, a king of the Kekayas. Majajanaka II,12th century BC,is court was adored with the philosophers of Kosala and Kuru-Panchala such as Ashvala, Jaratkarava-Arthabhoga, Bujjya Lahyayanani, Vshasta Chakrayana Kahoda,Kausi-takeya, Gargi Vachakuari, Uddalaka Aruni and Videgha Sakalayaa Yajfvalkya Vajaseneya, who was a pupil of Uddalaka Aruni. In the Mahabharata the Mithila King is said to have sided with the Duryodhana because he had learnt the science of fighting with mace from the latter. Bhima and Karna are said to have conqured Mithila. One Karala Janak made a lascivious attempt on a Brahmin maiden leading to the overthrow of the monarchy and that was followed by the rise of a republic, the Vajjian confederacy.
The Mahabharata and Ramauyana mentions a great battle between Pratardana, King of Kasi Janaka King of Mithila.The Vajjian confederacy, were the offsprings of a queen of Kasi. The Videha ended on the west by the Sitamarhi, Muzaffarpur andVaishali districts, on the east by the Kosi and the Mahananda rivers in the south by the Ganges and on the north by the lower ridges of the Himalayas. It includes the following areas-North Bihar excluding the Saran region and the Champaran-Muzaffarpur region,i.e,theMadhubani,DarbhangaSamastipur districts, the Begusarai district and Araria sub-district,the Saharsa district,the npart of the Bhagalpur district,Khagaria district and the Purnea and Katihar and the Nepalese Terai contiguous with the northernmost parts of the Madhubani, Saharsa and Purnea.
The ancient most name for this region available in literature is Videha.It is possible that a small tract of the Sitamarhi district might have formed part of the state of Videha and not of Vaisali during the reign of Siradhwaja Janaka.The tribe which inhabited the area east of the Gandaka,the Videhan state with its capital at Mithila usually identified with Janakpur in the Nepalese Terai situated at a distance of 14 miles from Jaynagar Railway Station on the Indo-Nepal border and Videha as a geographical term which included the Vaisali state also, along with the Videha state within its borders. It was in this last sense that Kundgrama-near Vaisali, the birthplace of Mahavira, is placed in Videha and that the mothers of Mahavira and Ajatasatru, which were the sister and daughter respectively of Chetaka, the Lichchhavi leader cf Vaisali, are called Videhadatta and Vedehi respectively.There is no controversy whatsoever with regard to its northern and southern frontiers.
The Sadanira river acted as the boundary between Videha or Vaisali and its western neighbour Kosala but its identification has been a matter of some dispute. It is identified by the Indian lexicographers with the Karatoyas modern Kurate which flows through the Bogra district in Bangladesh but this seems to be too far east. On the ground that the Mahabharata distinguishes the Gandaki from the Sadanira, it is held that the Sadanira was the Rapti. But it is the Gandaki-the Kondo-chates of the Greek geographers. The Sadanira flows from the northern Himalaya mountains and formed the boundary bet-ween Kosala and Videha and its waters are never exhausted.From the bank of the Great Gandak to the forest of Champa the country is called Videha, also known as Tirabhukti. This name is found some of the Basarh seals as one of the provinces of the Gupta empire. Purnea seems to have been the easternmost district of Videha or Tirabhukti and in that case the Kosi or Mahananda would naturally form the boundary between Videha and Pundra.
The ancient kingdom of Anga does not seem to have extended north of the Ganges, because there is no clear indication of this in ancient literature. The forest in which Rishyasringa son of Kasyapa Vibhapdaka, lived is said to have bordered on Anga, and the whole of this quaint story thatRishyasringa being beguiled by the courtesans of Malini into a boat and brought down the river to the capital of Anga implies that he was living within the territory of Anga, for no embassage was sent to any other king for permission to bring him away, as when Dasratha paid a special visit to Lomapada to invite the Rishi's attendance at Ayodhya to perform the sacrifice which was to bless the king with a son.The Epics has no reference to the effect that Rishyasringa's hermitage lay in Anga.It was situated on the Kosi river near some mountain. Dasaratha's visit was necessitated by the fact that Rishyasringa happened to he the son-in-law of the Anga king and not because he was living within the territory of Anga.
The Kausiki is one of the most ancient rivers of India It is frequently mentioned in the Epics and the Puranas. It has ever been a shifting river,its playground being the area between the river Mahananda in the district of Purnea on the east and the river Balan in the old district of Darbhanga on the west. Kosi in some remote period joined the Mahananda through the river Panar also called the Parman near Araria. The belief of the local people is that at some bygone time the Kosi used to flow along the course of the Panar this river, the Panar also in its short course through the Nepalese territory is called the Burhi(old) Kosi.The Buddhist conception of Videha differ from the above because the Buddhists mention Vajji and Videha as two distinct geographical and political entities.But sometimes they inter-change Vaisali and Videha.Ajatashatru, son of a Vaisali princess, is called Vaidehiputra in Buddhist literatureThe Taitariya Samhita of Yajurveda mentions the cows of videha as famous in India in the Vedic times.
The commentator of the Taitariya Samhita explains the adjective Vaidehyah-plural of Vaidehi by vishishta dehasambandhinyah-having splendid bodies the portion translated by Keith is-Indra slew Vritra,from the head of Vritra came out cows, they were of Videha, behind them came the bull.Apparently cows of Videha were especially famous.The regular genealogy of the Janaka dynasty of Videha does not go beyond the Mahabharata War.Nimi Videha was the founder of the Videhan state and its capital town called Jayanta and his son Mithi Janaka Vaideha as that of Mithila city.The co-operation of Gautama-a priestly dynasty, was readily available to the family. It appears Jayanta was soon abandoned in favour of a more strategic place, Mithila.The Puranas mention Jayanta and Mithila, as the early and later capitals of Videha. The Buddhist literature does not know Jayanta but speaks of Mithila only. The Tripitaka commentaries state that Videharattha was colonised by the inhabitants who were brought by king Mandhata from Pubbavideha, the eastern sub-continent of Asia, placed to theeast of Mount Sumeru.
This Mandhata, who was at Rajagriha.The Buddhist tradition provided in the Digha,the division of India among the sons of Manu says that this country was divided into seven political units and Renu, son of Disampati, was allotted Mithila in the country of the Videhas.Mithila was founded by Mahagovinda, the steward of king Renu. Disampati and Renu were kings or chieftains in Banaras or king of the Kurus are referred to, apparently as kings of Banaras, at Dipavamsa.The Videhan state was founded by Nimi Videha, son of Ikshvaku, who also founded a town called Jayanta. He dwelt in a town famed as Vaijayanta or Jayanta. This town was situated near the ashrama of Gautama and also near the Himavat mountain. Nimi instituted a sacrifice that was to last for a thousand years and requested Vasishtha to preside. Vasishtha said that he had already been engaged by Indra in a sacrifice which would last for five hundred years and asked him to wait for the period.
Nimi in the meantime employed Gautama and other Rishis for his sacrifice.On the completion of the sacrifice of Indra Vasishtha hastened to Nimi but found Gautama and others.He cursed Nimi that henceforth be body-less (vi-deha).Nimi cursed Vasishtha in return and both abandoned their human bodies.Nimi's dead body was preserved in oil and scents till the completion of the sacrifice. The sages then agitated his body and consequently a boy was born, who was called Janaka because of being self-born, Videha because of being Mini Videha's son and Mithi because of his birth from agitation-manth- to churn.A great sacrifice of the glorious Nimi, the king of the Videhas, is referred to in the Bhagavata.The Vedic texts know of a king of Videha Nam Sapya, is nowhere indicated as the founder of the Videhan royal family.Nimi has been mentioned at several places in the Mahabharata, but generally his territory is not stated. At one place he has been called a Vaideha which removes the doubt with regard to his territory. There it is stated that he gave his kingdom to the Brahmanas.
The Videhan dynasty, being a branch of the Ikshvakus, is called the solar dynasty who did not eat meat during the month of Kartika. We are not quite sure if this Nimi is the first king of the dynasty or the penultimate sovereign, who is frequently mentioned in Buddhist literature. Sadanira,she that is always filled with water which is more probably the Gandaki. Agni Vaisvanara,the fire that burns for all men,fire which is the common property of all men,not sacrificial fire, but fire in its ordinary everyday use applied to human wants. The primeval forests from the Sarasvati to the Sadanira, and there the course of the colonising Aryas stopped until Mathava carried Agni to the east of the latter river. If Agni Vaisvanara went burning along the earth from the Sarasvati to Videha,Agni burnt over the Paurava territory-including North Panchala and the Ayodhya realm, two of the most famous and best cultivated regions even in early times-which is absurd. If itenshrines any historical truth it might mean that the reformed Brahmanism passed from the Bharata kingdom to Ayodhya and then to Videha.
The Videha ended on the west by the Sitamarhi, Muzaffarpur andVaishali districts, on the east by the Kosi and the Mahananda rivers in the south by the Ganges and on the north by the lower ridges of the Himalayas. It includes the following areas-North Bihar excluding the Saran region and the Champaran-Muzaffarpur region,i.e,theMadhubani,DarbhangaSamastipur districts, the Begusarai district and Araria sub-district,the Saharsa district,the npart of the Bhagalpur district,Khagaria district and the Purnea and Katihar and the Nepalese Terai contiguous with the northernmost parts of the Madhubani, Saharsa and Purnea. The ancient most name for this region available in literature is Videha.It is possible that a small tract of the Sitamarhi district might have formed part of the state of Videha and not of Vaisali during the reign of Siradhwaja Janaka.The tribe which inhabited the area east of the Gandaka,the Videhan state with its capital at Mithila usually identified with Janakpur in the Nepalese Terai situated at a distance of 14 miles from Jaynagar Railway Station on the Indo-Nepal border and Videha as a geographical term which included the Vaisali state also, along with the Videha state within its borders.
It was in this last sense that Kundgrama-near Vaisali, the birthplace of Mahavira, is placed in Videha and that the mothers of Mahavira and Ajatasatru, which were the sister and daughter respectively of Chetaka, the Lichchhavi leader cf Vaisali, are called Videhadatta and Vedehi respectively.There is no controversy whatsoever with regard to its northern and southern frontiers. The Sadanira river acted as the boundary between Videha or Vaisali and its western neighbour Kosala but its identification has been a matter of some dispute. It is identified by the Indian lexicographers with the Karatoyas modern Kurate which flows through the Bogra district in Bangladesh but this seems to be too far east. On the ground that the Mahabharata distinguishes the Gandaki from the Sadanira, it is held that the Sadanira was the Rapti. But it is the Gandaki-the Kondo-chates of the Greek geographers.
The Sadanira flows from the northern Himalaya mountains and formed the boundary bet-ween Kosala and Videha and its waters are never exhausted.From the bank of the Great Gandak to the forest of Champa the country is called Videha, also known as Tirabhukti. This name is found some of the Basarh seals as one of the provinces of the Gupta empire. Purnea seems to have been the easternmost district of Videha or Tirabhukti and in that case the Kosi or Mahananda would naturally form the boundary between Videha and Pundra.The ancient kingdom of Anga does not seem to have extended north of the Ganges, because there is no clear indication of this in ancient literature. The forest in which Rishyasringa son of Kasyapa Vibhapdaka, lived is said to have bordered on Anga, and the whole of this quaint story thatRishyasringa being beguiled by the courtesans of Malini into a boat and brought down the river to the capital of Anga implies that he was living within the territory of Anga, for no embassage was sent to any other king for permission to bring him away, as when Dasratha paid a special visit to Lomapada to invite the Rishi's attendance at Ayodhya to perform the sacrifice which was to bless the king with a son.The Epics has no reference to the effect that Rishyasringa's hermitage lay in Anga.It was situated on the Kosi river near some mountain.
Dasaratha's visit was necessitated by the fact that Rishyasringa happened to he the son-in-law of the Anga king and not because he was living within the territory of Anga.The Kausiki is one of the most ancient rivers of India It is frequently mentioned in the Epics and the Puranas. It has ever been a shifting river,its playground being the area between the river Mahananda in the district of Purnea on the east and the river Balan in the old district of Darbhanga on the west. Kosi in some remote period joined the Mahananda through the river Panar also called the Parman near Araria. The belief of the local people is that at some bygone time the Kosi used to flow along the course of the Panar this river, the Panar also in its short course through the Nepalese territory is called the Burhi(old) Kosi.The Buddhist conception of Videha differ from the above because the Buddhists mention Vajji and Videha as two distinct geographical and political entities.But sometimes they inter-change Vaisali and Videha.Ajatashatru, son of a Vaisali princess, is called Vaidehiputra in Buddhist literatureThe Taitariya Samhita of Yajurveda mentions the cows of videha as famous in India in the Vedic times.
This Mandhata, who was at Rajagriha.The Buddhist tradition provided in the Digha,the division of India among the sons of Manu says that this country was divided into seven political units and Renu, son of Disampati, was allotted Mithila in the country of the Videhas.Mithila was founded by Mahagovinda, the steward of king Renu. Disampati and Renu were kings or chieftains in Banaras or king of the Kurus are referred to, apparently as kings of Banaras, at Dipavamsa.The Videhan state was founded by Nimi Videha, son of Ikshvaku, who also founded a town called Jayanta. He dwelt in a town famed as Vaijayanta or Jayanta. This town was situated near the ashrama of Gautama and also near the Himavat mountain. Nimi instituted a sacrifice that was to last for a thousand years and requested Vasishtha to preside. Vasishtha said that he had already been engaged by Indra in a sacrifice which would last for five hundred years and asked him to wait for the period. Nimi in the meantime employed Gautama and other Rishis for his sacrifice.On the completion of the sacrifice of Indra Vasishtha hastened to Nimi but found Gautama and others.He cursed Nimi that henceforth be body-less (vi-deha).
Nimi cursed Vasishtha in return and both abandoned their human bodies.Nimi's dead body was preserved in oil and scents till the completion of the sacrifice. The sages then agitated his body and consequently a boy was born, who was called Janaka because of being self-born, Videha because of being Mini Videha's son and Mithi because of his birth from agitation-manth- to churn.A great sacrifice of the glorious Nimi, the king of the Videhas, is referred to in the Bhagavata.The Vedic texts know of a king of Videha Nam Sapya, is nowhere indicated as the founder of the Videhan royal family.Nimi has been mentioned at several places in the Mahabharata, but generally his territory is not stated. At one place he has been called a Vaideha which removes the doubt with regard to his territory. There it is stated that he gave his kingdom to the Brahmanas. The Videhan dynasty, being a branch of the Ikshvakus, is called the solar dynasty who did not eat meat during the month of Kartika.
We are not quite sure if this Nimi is the first king of the dynasty or the penultimate sovereign, who is frequently mentioned in Buddhist literature. Sadanira,she that is always filled with water is more probably the Gandaki. Agni Vaisvanara,the fire that burns for all men,fire which is the common property of all men,not sacrificial fire, but fire in its ordinary everyday use applied to human wants. The primeval forests from the Sarasvati to the Sadanira, and there the course of the colonising Aryas stopped until Mathava carried Agni to the east of the latter river. If Agni Vaisvanara went burning along the earth from the Sarasvati to Videha,Agni burnt over the Paurava territory-including North Panchala and the Ayodhya realm, two of the most famous and best cultivated regions even in early times-which is absurd.
The reformed Brahmanism passed from the Bharata kingdom to Ayodhya and then to Videha.Videgha Mathava, who led the Aryans from the Sarasvatt to colonise Mithila, and his great priest Gautama Rahugana wandered through the northern Himalayan regions till they came to the upper reaches of the river Gandak, and laid the foundation of the Mithila kingdom to the north of what formed the kingdom of Vaisali. Sadanira flowing from the northern mountain also indicates that the people coming might have passed through an area from which it could see clearly that the river came from the northern mountain. Moreover, there are places in the northern part of the Champaran region, Jankigarh eleven miles to the north of Lauriya Nandangarh-which are associated with the rule of the Janaka dynasty. This tradition may lend support to the supposition that Videgha Mathava might have proceeded to Videha through this region.The word Janaka has a reference to the tribe, jana and the best or the leader of the janas was called Janaka.
Thus Videgha Mathava, who led the party, might be called a Janaka.In the Buddhist tradition the founder of the royal line of Videha is Makhadeva who is represented as the king of Mithila. For successive periods of 84000 years each he had respectively amused himself as prince, ruled as viceroy and reigned as king. He one day asked his barber to tell him as soon as he had any grey hairs. When many years later the barber found a grey hair, he pulled it out and laid it on the king's palm as he had been requested. The king had 84000 years yet to live, but he granted the barber a village yielding one hundred thousand and on that very day gave over the kingdom to his son and renounced the world as though he had seen the king of Death. For 84000 years he lived as a recluse in the Makhadeva-amhavana, and was reborn in the Brahma-world. Although the figure 84000 is merely conventional and has no significance, the story is inclined towards asceticism.
The scene of the finding of a grey hair is marvellously sculptured on a railing of the Bharhut stupa. In this scene Maghadeva or Mahadeva,king of Videha, is upset at the sight of a grey hair picked up from his head and resigns his kingdom in favour of his eldest son. He is seated on a throne that resembles one of the modern fashionable chairs. His face is clean shaven. The prince stands gently before him. The barber stands behind him with his shaving pot. The Buddhist tradition calls Makhadeva founder of the royal line but his capital is said to be Mithila. Makhadeva founded Jayanta and made a beginning of the foundation of another town later called Mithila. The Vedic tradition furnished by the Satapatha Brahmana the identification of the first Videhan king of the Puranas with the first Videhan king of the Vedic account is proved by a fact that Gotama is the priest of that king in both the accounts. The only apparent difference between the accounts is the one concerning the name of the first Videhan king, the Puranas call him Nimi, the Satapatha-Brahmana calls him Mathava. But the name given in the Satapatha Brahmana is clearly a patronym, meaning son of Mathu.
Thus, while the Puranas call the king by his proper name, the Satapatha-Brahmana calls him by his patronym. The surname of the king is the same in both the accounts- Videha in the Puranas and its Vedic form Videgha in the Satapatha Brahmana. Nimi, the founder of the Videha dynasty was not a son but a descendant of Ikshvaku. Nimi was a contemporary of the rishi Gotama, near whose hermitage he built a city named Jayanta. As no rishi of the name of Gotama is ever included by the Puranas among those primaeval sages who were the contemporaries cf Manu and his sons, Nimi, the contemporary of Gotama, could not have been a son ofIkshvaku. Thus, the identification of the first Videhan king of the Puranas (Nimi Videha) with the first Videhan king of theVedic account (Videgha Mathava) is proved by the fact that Gotama is the priest of that king in both the accounts.No Videha king is ever mentioned in the Puranas in connection with any early person or event,. which means that the Videha dynasty did not exist in early times, and so could not have been founded by Ikshvaku's son.
The list of the Videha kings itself lends support to this.This list gives some 51 names. The certain point where a synchronism exists is the reign of Siradhvaja, who was a contemporary of Dasaratha. The Puranas give the account of only three dynasties.The certain descendants of Trasadasyu mentioned in the Rigveda, such as Mitratithi, Kuru Sravana and Iipama. It was Bhagiratha who left his ancestral kingdom on the western confines of the Punjab and marching hundreds of miles with his army and other subjects, reached the river Ganga, which he gave the name of Bhagtrathi. To the east of the Ganga he founded a kingdom named Kosala with its capital at Ayodhya on the bank of the Sarayu, a tributary of the Ganga. The Sarayu and the Gomati , two of the chief rivers of Kosala, were named after the tributaries of the river Sindhu. The conquest of the Gangetic territory of Kosala by Bhagiratha was soon followed by the conquest of the region to its east by another prince of the Ikshvaku family named Nimi Mathava. Mathava belonged to that branch of the Ikshvakus that had earlier settled on the banks of the Saraswati.
He left the Sarasvati river and accompanied by his priest Gotama Rahugana crossed the river Sadanira and colonised Videha. Gotama built an ashrama in this country and Nimi founded a town named Jayanta near that ashrama. Nimi was succeeded by Mithi Janaka who founded the city of Mithila that became the capital of Videha. Some twelve generations after Bhagiratha of Kosala and Nimi Mathava of Videha, an Ikshvaku prince named Visala, who was a scion of either the Kosala or the Videha dynasty found a new kingdom in the vicinity of Videha. This kingdom was named Vaisali after its capital, which was founded by and named after Visala.Mithi Janaka was the son of Nimi Videha. The Bhagavata Purana calls him Mithila instead of Mithi. The Garuda Purana, though it gives the genealogy of Videha kings, does not mention Mithi because due to the loss of some verses closing the Ikshvaku dynasty of Ayodhya and introducing the Videhan line. Prasuilruta-a king of Ayodhya father of Udavasu-Vlithi's son- of the Videhan line.
The Ramayana makes Mithi Janaka two kings.Mithi, being son of Nimi Videha, is also known as Vaideha. Mithi is celebrated as the founder of Mithila. Jayanta founded by Nimi did not prove to be a good capital and need was felt to proceed further north. Mithila is identified with modern Janakpur in the Nepalese Terai. It is regarded as a sacred spot by the Hindus and is visited by many pilgrims every year. It is rather strange that while in other kingdoms capitals were generally founded on the banks of the rivers. Mithi established his capital at Janakpur in the Nepalese Terai, so close to the Himalayan mountains.The plain area of the old Muzaffarpur district had already been seized by the state of Vaisali founded by the son of Manu. So the Videhan state, founded by Manu's grandson and strengthened by his great grandson Mithi, might establish its capital either in the old Darbhanga district, which must have been very marshy at that time or in the sub Himalayan area.
The hilly tribes must have been very turbulent and hence it might have been considered expedient to have the capital there. An adjective meaning valorous was used for Mithi in two Puranas may have a reference to the defeat of the hill tribes. The Himalayan area was considered particularly sacred from the point of view of asceticism or performance of rites. Janaka got instruction from Chyavana Bhargava. We do not find any direct or even indirect details about the successors of Mithi Janaka till we come to the time of Siradhvaja and his brother Kusadhvaja.Udavasu he was the son and successor of Mithi Janaka.Nandivardhana was the son and successor of Udavasu.He is called pious by two Puranas and the Ramayana.Suketu was the son and successor of Nandivardhana and is called chivalrous and pious.
He was the son and successor of Suketu and is called pious and very strong and a royal sage.The ancient kings, who were called or said to have become Indras only held or usurped the position of High Priest of the tribe or realm, in addition to that of king e.g.the Devaraj and Dharmaraj of Bhutan, its High Priest and Chief Judge. The Epic-Puranic tradition knows of one Videha and one Ikshvaku king as Devaraja, and one Vasishtha with the same designation.One of the known achievements of Devaraja was his getting a bow from the gods who had received it from Shiva.This was the bow used by Siva after the destruction of the sacrifice of Daksha. It was a remarkable thing and continued in the family of the Janakas as a glorious heritage. It was in the time of Siradhvaja Janaka that it was broken by Rama.Brihadratha, the Videhan king, was a contemporary of king Mandhatri of Ayodhya . One Janaka Daivarati of Mithila got instruction from Yajnavalkya.
He was probably different from Brihaduktha, son, of Devarata.He is called Mahavirya by the Puranas. He is said to be valorous. One Janaka Daivarati is mentioned in the Mahabharata the management of whose father's sacrifice was taken by Yajnavalkya. He seems to have flourished after the Bharata War. Dhrishtaketu is stated to be pious.,a defeater of foes and a royal sage.An ancient king named Dhrishtaketu is mentioned in the Mahabhrarata, but his territory is not given. Haryaswva is known to all our sources and is the first ruler of Videha whose name contains a synonym of horse.Suketu -a good banner and Brihadratha-a large charioteer.The Mahabharata states that Rama Jamadagnya defeated and killed many tribes, the Videhas being one of them. If this tradition has any basis in fact, it may mean that the king of Videha was defeated by Rama Jamadagnya. The Videhan king defeated might have been Haryasva or his predecessor Dhrishtaketa.
The Mahahharatas refers to a battle between Janaka Maithila and Pratardana. In this battle the warriors of Mithila were victorious. The kingdom of Pratardana is not indicated here. But the Mahabharata mentions him at two other places as the king of Kasi.The Janaka Maithila who had an encounter with Pratardana might have been Pratindhaka. Maharoman is the first of the threee successive kings who bore names ending in roman. He is said to be learned.Svarnaroman is said to be pious and a royal sage. Hrasvaroman, the last of the three successive kings who bore names ending in roman is said to be a knower or piety and one possessing a great soul. He had two sons and Kusadhvaja.Siradhvaj to Sakuni was the expansionist phase of the Videhan kingdom. Sankasya was annexed and a branch line of Videha was established there which is said to have ruled for four generations. After Sumati, a contemporary of Stradhvaja Janaka, we do not hear of Vaisali, Videha's western neighbour the Vaisali state was absorbed by kingdom.Another feature is that with Siradhvaja begins an age in Videhan history in which the names of sovereigns are better preserved. Siradhvaja is a famous king of Videha for several reasons. His adopted daughter, Sita, was married to Rama. Siradhvaja is a famous king of Videha for several reasons.
His adopted daughter, Sita, was married to Rama. Ramayana is devoted to this important event of the alliance between the Ikshvakus and the Videhas.The story is narrated by the Mahabharata also. The Great Epic does not call him Siradhvaja, but Videharaja and Janaka. His great fame and scholarship misled Bhavahhuti, the celebrated Sanskrit dramatist of a much later period, who confused him for the Vedic Janaka.Siradhvaja was also a good fighter.Thus he specialised in the arts of war as in those of peace.Siradhvaja had one son -Bhanumat- one adopted daughter, Sita, and one daughter Urmila. His brother Kushadhvaja had two daughters-Mandavi and Srutakirti. Siradhvaja ascended the throne after his father Hrasvaro-man left for the forest.He kept his younger brother under his special care.Once while Siradhvaja was ploughing the mead, there arose a damsel and as he obtained her while furrowing the field for sacrifice, she came to be known by the name of Sita, arising from the earth she grew as his daughter.The greater part of her education 'was post-marital, and most likely influenced by her husband and by the special environments of her long periods of exile from court. Yet the first nine or ten years of Sita's life were not left blank.
She was certainly literate. The script she learnt was perhaps pictographic. She knew three languages, at least two of which were begun in her childhood. Besides studying many branches of learning, she had a lot of instruction from her mother and other relatives about wifely duties.A valuable and attractive possession of Siradhvaja was a bow of Siva which his ancestor Devarata had received as a trust from the gods. These two Sita and the bow became sources of his friction with contemporary kings. The Buddhist reference that makes Rama brother and husband of Sita is historically right, the origin of the modified version discloses itself in Sita's appellation janakaduhita .The proper name Janaka was a very easy one, and had the merit of supplying a plausible and honourable connection for the subsequently deified tribal hero, while removing the objectionable feature smoothly. Sh.S.C.sarkar opines that Siradhvaja may have been hit upon as a suitable Janaka for the Janaka-duhita, because of the connection between 'Sita' and 'Sira'.
Another suggestion made by the same scholar twenty years later is that Sita was Vedavati's illegitimate, abandoned child, found and adopted by her Vedavati's generous uncle, Siradhvaja. Siradhvaja vowed that he would give his daughter only to him who would be able to string the bow. The kings, who failed to do this laid siege to Mithila and oppressed the town. This went on for a year. Much of the wealth of Siradhvaja was uselessly spoiled. Later he made exertions, received a four-limbed army and defeated the kings who fled away with their ministers.But the troubles were not over with this episode. Sudhanvan, king of Sankisa invaded Mithila and demanded the bow of Siva as well as the beautiful Sita. He was resisted and ultimately defeated. Sudhanvan was killed in battle. Sankisa became an appendage to Videha. A branch dynasty was established there with his younger brother Kusadhvaja as the king of the territory.Siradhvaja then announced the performance of a ceremony regarding the bow.
Visvamitra, who had brought two sons of king Dasaratha of Ayodhya to have his Ashrama area in South Bihar cleared of Rakshasas, heard of this and the party decided to see this ceremony for themselves.The Ramayana of Valmiki furnishes us with certain clues which enable us to trace the route of the party consisting of Vishwamitra, Rama and Lakshmana from Ayodhya to Siddhasrama,modern Sahasram, and from there to the capital of Videha.The marriage of Rama and Sita was performed on the twentyfifth day of the journey from Ayodhya. The fifth day of the bright fortnight of the month of MargaShirsha is universally regarded as the date of the marriage of Rama and Sita.The journey began on the eleventh day of the bright half of the month of Kartika. But it is stated that on the eleventh day of the journey the moon was visible after midnight.So it was probably the eighth day of a dark fortnight. The two dates will disappear and two other dates will be repeated, one of the disappeared dates falling after the fifth day of the bright half of Margashirsha in which period we are not interested.Such a phenomenon is very common in the Hindu calendar in which two dates disappears and two other dates gets repeated.The party travelled for half a yojana from Ayodhya and in the night on the bank of the Sarayu.
They reached the confluence of the Sarayu and the Ganges and spent the night there.They crossed the confluence and came to the southern shore of the Ganges. Taraka, the wife of Sunda, was killed.They reached the Siddhashrama which was near a hill, and preparations for the sacrifice began. The night was passed there guarding the Ashrama. The sacrifice lasted for six days. On the last day of the sacrifice the invading Rakshasas were killed, The night was passed there. Now that the sacrifice was over, they wanted to visit Mithila.The bow of Shiva was kept there. So they started from the Siddhashrama and travelled till the evening. They halted on the Sopa's distant shore. When the sage was telling tales to the princes it was past midnight and the moon was rising forth.So perhaps it was the eighth day of a dark fortnight. It was the eighth day of the dark fortnight of Margashirsha. Then they reached the southern shore of the Ganges where the night was passed.
They crossed the Ganges and reached the northern shore. While sitting on the bank of the Ganges they saw a big city. Soon they went to Vaisali. They accepted the hospitality of king Somali of Vaisali and passed the night there,the party reached Vaisali on the tenth day of the dark fortnight of Margasirsha.They left Vaisali and proceeded towards Mithila..They halted at the ashrama of Gautama,where Ahalya was rescued. They then reached the place of sacrifice,which was at some distance from Mithila. Vardhamana Mahavira, the twenty fourth Tirthankara of the Jainas, left his home for asceticism on the tenth day of the dark fortnight of Margasirsha. Thus Vardhamana's renunciation of the world on a date associated with the visit of Rama to Vaisali assumes double significance which has so far escaped notice.
Then it was stated there by Janaka that now there were only twelve days to complete the sacrifice.The bow was shown and its history explained. It was broken by Rama. Messengers were sent immediately to Ayodhya on very swift conveyances.The messengers passed three nights on the way.The messengers reached Ayodhya and king Dasarathaa was informed. He decided to start next day. The night was. passed at Ayodhya.The party of Dasaratha started for Mithila.Four days were passed on the way. The party arrived at Mithila where the night was passed.Kusadhvaja was brought from Sankasya. The marriages of the daughters of Siradhvaja and Kusadhvaja took place on the fifth day of the bright fortnight of Margasirsha.The party of Dasaratha went back to Ayodhya thus the matrimonial alliance between the two most important houses of the Ikshvakus in North India was accomplished.The reign of Siradhvaja seems to have marked a further advance in the consolidation of the Videhan territory. Dhanusha, a place in Nepal, now overgrown into jungle, six miles away from Janakpur, is believed to be the place where the bow of Siva was broken by Rama. A bow is still shown there in mark the memory of that great event.Some parts of the Champaran District were brought under his control. Local tradition says that king Janak lived at Chankigarh, locally known as Jankigarh, eleven miles north of Lauriya Nandangarh.
The name Janaki suggests that this Janaka may have been Janaki's father Siradhvaja, who otherwise too is known as a valiant prince. The Mahabharata speaks of a battle between king Janaka Maithila and king Pratardana. The Ramayana makes one Pratardana king of Kasi and a contemporary of Rama.A more famous Pratardana of Kasi flourished 24 steps earlier. Sankasya was a well defended city. Its ramparts were ranged round with pointed weapons. It appears that the messengers of Siradhvaja Janaka went to Sankisa and brought Kusadhvaja to Mithila the same day,it was near Videha probably somewhat near its border.Sankisa was situated on the Ikshumati river. This river is known to the Puranas also, as on its bank was the hermitage of Kapila. It is also mentioned at another place in the Ramayana. The lkshu is the name of three rivers in the Puranas, while there are also rivers known as Ikshuda and Ikshula.Thus there might be another Ikshumati river at this place or it may simply mean a river in the sugarcane producing area.The Sankasya kingdom was near some mountain or forest,as a later king of this place visited his cousin in the forest.There was no intervening territory between Videha and Sankisya otherwise the Sankasya king would have been prevented from carrying out a raid against Mithila.
A quick messenger from Mithila went to Sankisya and came back the same day,the distance was comparatively shorter.It was a well-defended city and a seat of government. One such place near the Gandak or the Kosi might be Sankasya.Jankigarh (also called Chankigarh) in Champaran district may be a probable site for this purpose.The genealogy of the Sankasya branch of the Janakas is given by three Puranas and is as follows Kusadhvaja,Dharmadhvaja and Mitadhvaja. Kusadhvaja was the younger brother of Siradhvaja.There was good relation between the two brothers.When Sudhanvan, the king of Sankasya, invaded Mithila and was slain in battle, Siradhvaja installed his younger brother on the throne of Sankasya. This event did not happen long before the marriage of Sita, because while invading Mithila Sudhanvan had demanded Shiva's bow and lotus eyed Sita.
After the party of Dasaratha had arrived at Mithila, Janaka sent messengers to Kusadhvaja at Sankasya to bring him to the Videhan capital. Kusadhvaja came immediately and being incharge of the sacrifices took active part in the performance of the marriages. Sita and Urmila the daughters of Siradhvaja were married to Rama and Lakshmana respectively. Mandavi and Srutakirti the two daughters of Kusadhvaja were married to Bharata and Satrughna respectively. Thus the four daughters of Mithila were married to the four sons of Dasaratha amidst great festivities.The Ramayana knows of a girl named Vedavati daughter of Kusadhvaja who was molested by Ravana. Thereupon she mortified herself by cutting off her hair and immolated herself on a pyre. S. C. Sarkar regards this Vedavati as the daughter of Kusadhvaja, the younger brother of Siradhvaja of Mithila which is not tenable because Kushadhvaja Vedavati's father is never called a Maithila but had been called a Brahmarsi and a son of Brihaspati. Kushadhvaja, father of Vedavati was killed by Sambhu, king of the Daityas. Later Vedavati, having been molested by Ravana, burnt herself to be reborn as Sita.Thus Kushadhvaja was dead before the birth of Sita.
How could then he be installed on the throne of Sairkabya and take part in the marriage ceremony of Sita, Urmila and his two daughters? Vedavati is stated to have flourished in the Krita Yuga, while Kushadhvaja of Mithila flourished in the Treta age.Vedavati is said to have been reborn in the Maithila kula now,hinting thereby that while Vedavati she belonged to some other family.Siradhvaja and Kushadhvaja never mention Vedavati’s name in any connection.The Brahmavaivarta Purana which gives in detail the story of Kusadhvaja’s daughter Vedavati being ravished by Ravana. There Kushadhvaja is not the younger brother of Siradhvaja, king of Mithila, but quite a different personality. It is stated there that in the Krita age there was Hamsadhvaja who had two sons Dharmadhvaja and Kushadhavja. The latter's wife was Malavati who gave birth to Vedavati. Vedavati in her youth was molested by Ravana.She was reborn as Sita. Bhanumat was the son of Siradhvaja and the brother of Sita and Urmila. He is called a Maithila by puranas and did not belong to the Sankasya line but to the Mithila one.S. C. Sarkar makes an original suggestion with regard to Bhanumat. He says that Hanumant of later legends is an amalgam of two elements-Bhanu-mant, son and successor of Siradhvaja, at Mithila,prime assister in the rescue of Sita and Au-manti, a Dravidian deity.The name meaning the male monkey,vedic Vrisha Kapi. He is called Satadyumna by some Puranas and Pradyumna by some other Puranas. In two Mahabharata lists of royal munificence to Brahmanas it is said king Satadyumna gave a splendid furnished house to the Brahmana Maudgalya, descendant of king Mudgala of North Panchala.
The only Satadyumna mentioned was a king of Videha, Siradhvaja's second successor. Hence although his territory is not indicated, this Satadyumna appears to be the same as Siradhwaja's second successor. The Bhagavata and the Vishnu, the Vayu, the Brahmanda and the Garuda parunas deals with Janaka dynasty all the pre Bharata war dynasties.Arishtanemi is also called Adhinemika. The second part of his name,Nemi, i.e., Nimi dynasty to which he belonged.The MahaJanaka II of the Jataka and Nami of the Jaina Uttaradhyayana do not care for the burning of the palaces of Mithilathe mention of Nemi in juxtaposition with Arishta in the Vishnu Purana- Nami or Nemi with MahaJanaka II, whom the Jataka represents as the son of Arittha,ArishtaNemi Janaka of the Purana, MahaJanaka II-son of Arittha Janaka- of the Jataka and Nami of the Jaina Uttaradhyayana are identical. Maha Janaka II and Nami of the Utaradhyayana Sutra belong to the era posterior to the Bharata War.MahaJanaka II, being son of Arittha was Arishta and not ArishtaNemi. One Kshemadarsin, a prince of Kosala, was advised by Kalakavrikshiya to take help from Janaka of Mithila for recovering his kingdom.The king of Videha, on the recom-mendation of the sage, accepted Kshemadarsin, honoured him and gave him his own daughter and various kinds of gems and jewels. Kshemadarsin recovered his kingdom and made Kalakavrikshiya his priest who performed many sacrifices for the king. Upagupta or Ugragupta was Ugrasena Janaka Aindradyumni of Videha at whose court Ashtavakra, son of Kahoda and Sujata,daughter of Uddalaka Aruni, defeated the Suta scholar Vandin and consequently relieved his father after twelve years of confinement.
The probability is that Upagupta (or Ugragupta) and Ugrasena were one and the same person and that he was ruling at one of the two principalities into which Videha was divided between the two branch dynasties that issued from Kuni. In the same way, Sankasya was divided between Kesadhvaja and Khandikya. But Ugrasena Aindradyunini, a con-temporary of Ashtavakra, Uddalaka's daughter's son, flourished after the Bharata War, while Upagupta of the Puranas, far removed from Bahulasva, a contemporary of Krishna, flourished much before the War. The Mahavamshsa furnishes a list of twentyeight early kings and says that these twentyeight princes dwelt in Kusavati, Rajagriaha and Mithila.The Dipavamshsa also gives an identical list and says that these were twentyeight kings by number- in Kusavati, in Rajagriha and in Mithila. The rulers belonged to the pre Bharata Age. (to be continued) Uposatha is the Buddhist fast day,Upagupta was a famous Buddhist saint. A Jataka mentions a king of Videha and calls him Vedeha . He is made a contemporary of Chidani Brahmadatta of Kampilya who conquered all except Videha in the course of a little over seven years but was defeated by Vedeha due to the superior wisdom of the Videhan minister, Mahosadha. A new era of close intellectual co-operation between Videha on one side and the Kuru-Panchala country on the other . Bahulaiva is represented as the king of Mithila in the Bhagavata. There lie is depicted as a contemporary and devotee of Krishna who paid a visit to Mithila to see his Brahmana friend Srutadeva, so Bahulaiva flourished slightly before the Bharata War.
Two events given in Purana belong to the reign of Bahulaiva, the visit of Balarama and Krishna to Mithila in search of a jewel and Duryodhana's training there under Balarama and the visit of Krishna to Mithila to show favour to Srutadeva and Bahulaiva. Krishna, Bhima and Arjuna went to Girivraj to have a fight with Jarasandha of Magadha, this event occurred in the reign of Bahulaiva of Mithila through which territory the three passed in their journey from Indraprastha to Rajagriha.A king of Mithila, called Janaka, was the disciple of Vyasa Krishna Dvaipayan who used to officiate at the sacrifices. Vyasa had a high opinion of the learning of his disciple. He asked his son Suka to go to him to learn the science of liberation. Janaka received and instructed his son who later reported this to his father. This Janaka was Bahulaiva. The Bhagavata says that Suka was also with the Rishis who accompanied Krishna to Mithila to see Bahulaiva and Srutadeva. There were Jankriti, the last of the Janaka dynasty, might flourish even after Yudhishthira.The Puranas conclude with the remark that with Kriti ends the race of the janakas.We Know from Arthashashtra that Karala Janaka brought the line of Vaideha to an end. Karala is represented as the son of Nimi, whereas Kriti was the son of Bahula.Karala Janaka, king of Mithila, is known to the Brahmanical literature. Kriti flourished after Siradhvaja but not after Vedic Janaka. Karala is reported to be cruel and unscrupulous. The names of Bahulaiva ,one with many horses and. Kriti,performance.
The list of Puranas appears to be continuous and there is no apparent break, it is presumed that other Janakas are to follow. So, Kriti is not the last Janaka,who is a distinct Karala Janaka. The Puranas are assumed to have been narrated in the reigns of the Paurava king Adhisimakrishna, the Aikshvaku. Bahulaiva, the king of Mithila is a contem-porary of Krishna in the Bhagavata, his son Kriti cannot be identified with Karala on any account.With Kriti the main regular line of the Janakas closed and after him came irregular lines of the Janakas as we know from the Jatakas and the Mahabharata.One of the clans of the Vajjian Republic were the Kauravas. Pandu, the Kuru king, get strengthened by the treasure and army from Magadha, went to Mithila and defeated the Videhas in battle. Vaideha Kritakshana was one of the princes who waited upon Yudhishthira in his palace newly constructed by Maya. He was Kriti as a Yuvaraja or as a King. Krishna, Bhima and Arjun on their way from Kuru to Rajagir, for fighting Jarasandha, took circuitous route through Mithila to avoid detection.Videha was a friendly country. The Videhas were defeated by Bhima on his digvijaya in the east and was staying with Vaidehas and then he could defeat other powers with comparative ease. The rivalry between the sons of Pandu and Dhritarashtra had its effect on the Videhas and Karna defeated these people and caused them to pay tribute to Duryodhana.Vaidehas were vanquished by Arjuna on the battle of bharata.At one place in Mahabharata the Videhas along with others attacked Arjuna, at another place they are in the army of Yudhishthira and are slain by Kripa.Balarama who did not take part in the Bharata war took refuge during the period in Mithila thus it may be surmised that Videha kings remained neutral in Bharata war.Pandu had conquered Mithila, Bhima subdued the Rajas of Mithila and Nepal but Duryodhana came to Mithila to learn Gada Yudha from Balarama, when Krishna and Balarama were in Mithila in quest of Syamantakamani.
Later Balarama went on a pilgrimage and visited the ashrama of Pulaba-Salagrama and the Gandaki. After the Bharata war the Puranas do not provide us with any genealogical list for Videha and for this information is available from the Mahabharata and the Jatakas. Videhan king was reputed for the welfare and all were versed in the discourses of atman the grace of the Lord of the Yogas they were all free from the conflicting passions such as pleasure and pain, though they were leading a domestic life. The Buddhist literature mentions Makhadeva of Mithila and all his 84000 successors and says that they adopted the lives of ascetics after ruling over the kingdom.The kings of Videha are known to be sacrificers. Nimi and Vasishtha had a quarrel and cursed each other to become bodiless,i.e.,Videha. Both then went to Brahma and he assigned Nimi to the eyes of the creatures to wink ,i.e., nimesha, and said Vasishtha should be son of Mitra and Varuna with the name Vashistha. This fable just supply a reason for the birth from Mitra and Varuna. It says that long sacrifices were performed by the Videhan kings. Other famous sacrificers were Devarata and Siradhvaja. Devarata obtained the bow of Shiva which centred the sacrifice of Siradhvaja. The Yajnavata of Siradhvaja correspond to the sacrificial areas with temporary residences of members of the kingship in the manner described in YajurVeda. The barber who found a grey hair in Makhadeva's head got grant of a village, equivalent to a hundred thousand pieces of money. The King Satadyumna , Siradhvaja's second successor , gave a house to the Brahmana Maudgalya descendant of King Mudgala of North Panchala. Vedeha, king of Videha, gave Mahosadha a thousand cows, a bull and an elephant and ten chariots drawn and sixteen excellent villages and the revenue taken at the four gates, when he was pleased with an answer given by him. Before becoming king he lived as a prince and ruled as a viceroythe the maneer exactly in the case of Makhadeva.
The eldest son succeeded the throne when the old king adopted the life of an ascetic. The king was assisted by his ministers and the priest played an important role and the sages instructed the king. King Vedeha of Mithila had four sages, Senaka, Pukkusa, Kavinda and Devinda , who instructed him in the law. Senaka was most important and Senaka and Pukkusa were counsellors King Videha of Mithila had his counsellor Mahosadha.Mithila was invaded by Sudhanvan, king of Sankaiya, and much later by Chulani Brahmadatta and Kewatta, king of Kampila both were defeated by Siradhvaja and Videha, respectively. Jataka story of king Videha and Mahosadha,commander. Secret service reported daily ,employed a hundred and one soldiers in as many cities,employed parrots also, great rampart,watchtowers, and between the watctowers,three moats, water,mud and a dry moat. In city old houses were restored and large banks were dug made warter-reservoirs and grain store-houses. The siege of Mithila and the great tunnel have been described in the Jataka.The weapons included,red-hot missiles,javelins,arrows,spears and lances,and showers of mud and stone. The society consisted of Brahmanas, Kshatriyas, Vaisyas. Sirivaddha, father of Mahosadha was an important merchant of Mithila.
The Chandala is also referred.A hawk carried off a piece of flesh from the slab of a slaughter-house. A dog fed upon the bones, skins of the royal kitchen. There was a type of education and later Videha students went to Takshsila for education,e.g.Pintguttara. Kahoda Kaushitaki was married to the daughter of his teacher Uddalaka Aruni. Suka visited Mithila to acquire wisdom. Srutadeva was a great scholar of pre-Bharata era. Agriculture and Cattle-rearing was in vogue and Yajur-Veda mentions famous cows of Videha.King Vedeha gave a thousand cows and a bull to Mahasodha. There was a place where foreign merchants showed their goods. Goods from Magadha and Kasi were imported. The conches of Magadha,Kasi-robe and Sindh mares were famous.Krishna visited Mithila to see his devotees Srutadeva and Bahulashva.The Mahabharata says that shaligrama is another name of Vishnu, Shaligrama worship begun. Janakpur had four gates were four market towns distinguished as eastern, southern, western and northern.
There was a revival of Mithila after Bharata war which lasted for more than two centuries and in this period the famous sages of the Brahmanas, the Aranyakas and the Upanishads flourished. Vaishali lost its significance. After Bharata War period the Puranas furnish genealogies of Pauravas(Hastinapura-Kosambi), the Ikshvakus (Kosala) and the Barhadrathas (Mag adha).The names of the kings of Videha ia available in the Jatakas.The Upanishads mention one ruler known as Janaka Videha.Videha has been omitted in the sixteen Mahajanapada available in the Buddhist work Aiguttara-Nikaya where we have Vajji.Karala Janaka perished along with his kingdom and relations. Kasi was conquered by Kosala and Anga by Magadha. The Vajji established their republic before the Kosala conquest of Kasi and the Magadh conquest of Anga.Mall, the penultimate sovereign of the Janaka dynasty of Videha, adopted the faith of the Jaina Parsva, the first historical Jaina 250 years before Mahavira(561BC-490BC).Between Bharat war circa.950 BC and Karala Janaka circa 725 B.c Videha monarchy flourished. Suruchi group consisting of Suruchi I, Suruchi II Suruchi III and Mahapadmanada. Janaka group consisting of Mahajanaka I, Aritthajanaka, Polajahak, Mahajanaka II and Dighavu.Then a group of two kings Sadhina and Narada and then Nimi and Karala(father and son).
Makhadeva is regarded as the founder of Mithila monarchy. Angatis was righteous king,had a daughter named Raja. His ministers were Vijaya, Sunama and Alata. Narada set him to right path after the influence he got from the heretical teachings of a naked Guna Kassapa. Purana Kassapa and Maskari Gosala were the contemporaries of Buddha, thus, Guna Kassapa flourished round 6th century B.C. Chulani Brahmadatta of Kampilya conquered 101 princes of India and only Videha had been left. There is reference that Gandhara king and the Videha king met and mystic meditation was taught to Videha King by Gandhara king.There were land owners and Alaras is mentioned in this regard.The Vedic texts mention Uddalaka and Svetaketu as belonging to the age of Janaka of Videha. The Jatakas mention these two scholars connected with Banaras.For MahapanadaVisvakarman, engineer, constructed a palace seven storeys high with precious stones. Mahajanaka II was brought up by his mother in the house of a Brahmana teacher at Kalachampa and after finishing his education at16 sailed for Suvarnabhumi on a commercial enterprise, in order to get mone to recover the kingdom of Videha. The ship perished in the middle of the ocean.
He managed to reach Mithila, where the throne had been lying vacant since the death of Polajanak, his uncle, who had left a marriageable daughter Sivalidevi and no son. Mahajanaka II was now married to this princess and raised to the throne. He later renounced the world. A remarkable feature of the character of Mahajanaka II was his spirit of renunciation. He gives utterance to a famous verse : ‘We have nothing own may live without a care Mithila palaces may burn,nothing mine is burned . Mahajanaka-Jataka is sculptured on a railing of the Bharhut Stupa having inscription : The arrowmaker, King Janaka, Queen Sivali.Nimi and Kalara are mentioned in Buddhist,Brahmanical and Jaina literature. Ugrasena Janaka revived the greatness of Mithila. Ashtavakra sais as all other mountains are inferior to the Mainaka, as calves are inferior to the ox, so kings of the earth inferior to the king of Mithila (Ugrasena). He is called Janakana varishtha Samrat(Mahabharata),great performer of sacrifices and is compared with Yayati. In one such Yagya Ashtavakra, son of Kahoda and Sujata (daughter of Uddalaka), attended and Ashtavakra defeated Vandin, son of a charioteer and got released his son.Paurava prince, Satanika, the son of Janamejaya, was a Vaidehi. Sathnika married the daughter of Ugrasena Janaka who sought to enhance his influence by means of this matrimonial alliance.
Devarata II was contemporary of Yajnavalkya, who took the management of the royal sacrifice where a quarrel arose between Yajnavalkya and his maternal uncle Vaisampayana as to who should be allowed to take the sacrificial fee and in presence of Devala, Devarata, Sumanta, Paila and Jaimini Yajnavalkya took half of that. Devarata I obtained the famous bow of Siva. The Vedic texts mention five Videha kings,Videgha Mathava, Janaka Vaideha, Janaki Ayasthuna, Nami Sepya and Para Ahlara. Janak Ayasthuna in the Brihadaranyaka Upanishad is said to be pupil of Chuda Bhagavitti and a teacher of Satyakama Jabala. Satyakama Jabala is contemporary of Janaka Vaideha and Yajnavalkya. Ayasthuna was a Grihapati of those whose Adhvaryu was Saulvayana and taught the latter the proper mode of using certain spoons. Sayana Ayasthuna is the name of a Rishi. Jatak mentions a city named Thuna between Mithila and the Himalayas, a favourite resort of Ayasthuna. Janakpur corresponds exactly with the position assigned by Hiuen Tsang the capital of Vaji. Janaka Vaideha is Kriti Janaka, son of Bahulasva and was contemporary of Janamejaya Parikshita and his son Satanika. Yajnavalkya and Kritis were the disciples of Hiranyanabha Kausalya.
Uddalaka Aruni was approached by Janamejaya Parikshita to become his priest. Uttanka instigated Janamejaya to exterminate the non-Aryan Sarpas by burning them in a sacrifice.Uddalaka Aruni with his son Svetaketu attended the Sarpa satra of Janamejaya. Yajnavalkya taught the Vedas to Satanika, the son and successor of Janamejaya.Kriti, the disciple of Hiranyanabha, was the son of a king. Janaka Videha was a contemporary of Uddalaka Aruni,Yajnavalkya, Ushasti Chakrayana. Janaka Vaideha brought centre of political and intellectual gravity from the Kuru country to Videha.The royal seat of the main branch of the Kuru or Bharata dynasty shifted to Kausambi. Aitareya Brahman says that all kings of the are called Samrat. Satapatha Brahman says that the Samrat was a higher authority than a Rajan as by the Rajasuya he becomes Raja and by Vajapeya he becomes Samrat. The Kuru Panchalas were called Rajan. Janaka Vaideha’s was a master of Agnihotra sacrifice. Yajnavalkya learnt the Agnihotra from this king. Yajnavalkya Vajasaneya, who was a pupil of Uddalaka Aruni. | 2019-04-21T06:58:50Z | http://www.biharlokmanch.org/cultural-article-46.html |
What better book to review on Super Bowl week than a book about Brady? Except I flipped through most of this last week, only finishing it this week, and the Brady in question is Matthew Brady, the mid-ninteenth century photographer, and not the football player. Other than that, it’s almost the same thing.
The book sat on my side table for flipping through during football games, but the paragraph-length text was a little too detailed for distracted browsing, and the coffee table book size made it unwieldy for the sofa. But now that I’m clearing the books from that table, I spent some dedicated time with it.
Historians spend a lot of time poring over these photos in detail, but I looked at them a little less studiously. Mostly marveling at the photographs that are 150+ years old.
I did spend a lot of time with the captions, though, more than the glances at the images themselves. As I always do when I review picture books from the Civil War, I realize how little I really know about the details of it. I could do better, as I inherited a decent collection from my beautiful wife’s uncle, and I did just buy a reading copy of Ulysses Grant’s memoirs. Perhaps I need to want to brush up enough to stack the books on a table and then, in a year or so, make it a project to read them all to get them off the table.
At any rate, back to this book: A good collection, and amazing, of course, that these are pictures. Of the Civil War.
So we’ve got to design a bag for cherries. Of course, we’ll put a zipper at the top to keep the cherries from spilling out; all grape and prepackaged produce bags have them, so it’s a matter of course.
But you know what we need to really differentiate our bags? How about cutting holes in the bag to make it easier for the customer to pick up the bags on impulse.
This book is a chapbook of poetry written by an elderly woman in the twentieth century. The book itself is not dated, but one of the poems says now in ’91, and there’s a prose story that praises one of Lawson’s relatives that is dated 1998. I cannot find any information about the author or this book on the Internet, so you’ll have to trust me that it exists at all.
It’s a little like Leah Lathrom’s The Best of Wheat and a Little Chaff.
The poems are simple, faith-based lyrics with good rhythm and end rhymes. Many, if not most, of the poems end with a Bible verse that inspired the meditation. Pretty simple things, not great literature, but a pleasure to read. A couple focus on the gospel teaching of not worrying about tomorrow and being thankful for what you have today, which you know, gentle reader, is a theme I constantly try to embrace and embody, so I really enjoyed those poems the most. Also, note I enjoyed it more than the aforementioned Lathrom book.
I love buying the packets of chapbooks at the Friends of the Springfield-Greene County Library for books like this.
Brian J., Did Nogglestead Get Any Junk Mail On Saturday?
I would say that it’s all my shell companies that I use to hide my ill-gotten gains, but, really, we have mail for two former owners of my beautiful wife’s company, two current owners of the same, me, and the “media company” owned by the son of this home’s former owners (nine and a half years gone) that left a couple of swords made from table legs and scrap lumber in our shed (that my boys still haven’t found and bludgeoned each other with and that I cannot throw away in case of apocalypse where I’d wish I hadn’t thrown them away should somehow I lose my two real swords and halberd and, oh, yeah, guns).
But six pieces of mail from what looks to be the same campaign? Indeed.com is casting a very wide net.
It was 1982. I was freshly ten years old; my parents were separated for probably a year. My mother listened to country and western on the radio when we lived in Milwaukee before shifting to oldies when we lived in St. Louis, which explains my listening habits as I grew up (I didn’t learn I could change the station on the radio and did not have a radio of my own until I was about thirteen, which explains why I was so pressed to think of a pop song as a favorite song on a questionnaire when I was chosen as Student of the Week in eighth grade and had to go with “Ghostbusters” as both my favorite song and movie). We spent a lot of time with the Odya boys, and I remember singing along with them when “The Bird” came on the radio.
I’m not sure I had heard the song between then and looking it up on YouTube to post as a comment on Facebook.
But now I have, and I feel all thirty-six years that have passed.
It’s kind of funny: I read tourist guidebooks for places I have not visited (such as Chichen Itza), and I don’t have trouble counting them in my annual reading list. But when I read a book about a place I have been, especially when it’s the same sort of touristy guidebook but for a place that I’ve been or a tour I’ve taken, suddenly I feel guilty for counting it in my annual total. You would think, gentle reader, with all the trickery I use to pad my annual books read total, I would become inured to the pangs. Oh, but no.
Regardless, I counted this, and you get to read a bit about what I think on it.
I bought this book on our 2017 trip to Wisconsin. The book covers a boat tour of the upper Wisconsin Dells; that is, the side of the river north of the dam downtown (in 2015, I suffered the same pangs when I reviewed a guidebook for a Duck Boat tour of the lower Dells in Old Trails and Duck Tales).
As such, it recounts some of the history of the area along with some of the questionable stories told in the boat crew’s patter. It includes bits about moving lumber down the river (the last such trip was in 1890; in context, this was four years after the last Impressionist art exhibition in Paris which featured Mary Cassatt–these two events would seem to be from far different times, but they were contemporaneous), and Witch’s Glen, a narrow gorge where tourists land and walk through a very cool and very narrow canyon to a gift shop run by the boat tour company.
With many of these stories, one has to wonder how much of the history and stories are retconned to fit the places where the boat goes and how much is true. Probably most of it, but you have to take it with a grain of salt. Although I learned quite a bit about Ho Chunk history on the tour which this book refreshed. Okay, the “quite a bit” is just my saying, “That should be Ho Chunk now” when passing a Winnebago RV on the road. But still.
I’m pleased to have read this book(let) as it refreshed some memories from that trip and the stories I heard on the tour. Which makes it more resonant than some of the guidebooks/tour books I read.
This is the second of the two books I bought about Cassatt last fall (the other was entitled simply Mary Cassatt.
Of course, the book has the standard art book template: A bit of bio in the beginning and full color plates of samples of Cassatt’s work along with a couple paragraphs of text about each. It’s pleasant to revisit the works that I have most likely seen recently.
The book plays up the relationship between Degas and Cassatt, wondering whether they had some romance that was stifled because her father did not like Degas.
I mentioned in my book report on [John Singer] Sargent that he and Cassatt were contemporaries; this book says he got her a portrait commission on one of her trips to the United States (remember, gentle reader, this “middle class” young lady traveled and settled in Europe).
Cassatt completely rejected Matisse’s work. In a letter to Louisine Havemeyer in March 1913, she exclaimed, “If you could see his early work! Such a commonplace vision, such weak execution, he was intelligent enough to see he could never achieve fame, so shut himself up for years and evolved this and has achieved notoriety…. It is not alone in polities that anarchy reigns, it saddens me, of course it is in a certain measure our set [the Independents] which has made this [freedom] possible.
I think the insertion of [freedom] instead of [excrement] is pro-Matisse commentary by this book’s author and not necessarily the intent of Cassatt. But I agree with her assessment (see also my report on the monograph Matisse. With this, though, Cassatt moves easily into a second-place tie with Manet in my list of favorite Impressionists.
Worth a browse, certainly, and worth the couple of bucks I paid for it at the autumn Friends of the Springfield-Greene County Library Book Sale.
Side note: Interestingly, Cassatt, the nineteenth century artist died in 1926, just three years before The Iron Mask was released. They seem of two completely different eras, but history is ultimately seamless.
Well, it sort of emerged. I found another Christmas decoration in the first place you would think I would look: The mantel in the living room.
It’s a litte sculpture that was hidden behind a framed photo. I found it when I was dusting. I think it’s supposed to be a church. One of my sons made it two years ago, when he was ten. And he’s no worse with the polymer clay than I am.
You’re right, it’s the first time I’ve dusted the mantel this month, and I would have found it earlier if only I were a better housekeeper.
But I’m too busy blogging for my seven daily Google-search readers a day to bother with maintaining or improving the place I live. Besides, after nine years, we’ve about sucked the blood out of Nogglestead, and it might be getting time to find a new host.
And here I thought I caught the annual Christmas Straggler two weeks ago.
For Christmas, my oldest son received a gift card to a local sporting goods store along with a skateboard helmet, and at the end of last week, he actualized that gift card into a skateboard.
Which has led me to needing to announce the rules for the skateboard. Rules which I would have thought are akin to natural laws, that my pre-teen boys could reason or infer out of other rules that they have been told as well as the laws of physics they know.
No riding the skateboard in the house.
No skateboarding in the dark.
No skateboarding in the rain.
No skateboarding before 6:30 am.
No skateboarding in the dark and rain before 6:30 am.
No firing Nerf guns from on the skateboard.
One person on the skateboard at a time.
No riding the skateboard into the house or any part of it.
No hitting another person with the skateboard.
That’s why the call me Daddy Deutoronomy. Or they would if they’d thought of it.
So the guidebook to this course presents me with a little dilemma: Should I count it as a book against my annual reading or not? I mean, I counted the guidebook for the course From Yao to Mao: 5000 Years of Chinese History as a book, but not the one for Elements of Jazz: From Cakewalks to Fusion. Of course, the former was over 100 pages, and the latter was like 25. The guidebook to Origins of Great Ancient Civilizations is 72 with the glossary, timeline, and bibliography. All right, you have convinced me to count it as a book read in 2019 even though I listened to the course probably over a year ago and only completed the guidebook now because I found it at one of my book accumulation points.
At any rate, this is a fascinating course, twelve lectures in all, that covers Egyptian and Mesopotamian civilizations (with a bit of a nod to early civilization in the Indus River valley, but as this last was not that well explored at the time of the course, it only gets passing recognition). The course covers the Bronze Age to the Early Iron Age, so you’ve got lectures on Sumer, Babylon, Egypt, Assyria, Israel, and the Persians as well as mention of the Hittites and Chaldeans and other tribes in those time periods who made a name for themselves.
This sort of holds true for the Egyptians, whose civilization is controlled at various times by tribes from the Delta, tribes from up the river, and Greek peoples. The tribes that roam back and forth over Mesopotamia, though, aren’t characterized as a single civilization. I wonder why this is. The limited geography of Egypt versus the distributed loci of the other civilizations’ power? Aliens?
From the lectures and the guidebook, I come away with a vague understanding of the succession of the small empires and their chronology, and I will have something to say about the origin of the peoples in real life called Akkadians or Cimmerians when my boys are old enough to watch The Scorpion King or Conan the Barbarian.
Reviewing the guidebook makes me want to go through the lectures again, which is probably as high of praise as I can put into a brief report on the course.
Also, in retrospect, I want to count the much shorter guidebook for Elements of Jazz to my annual list.
For Christmas, I received a large gift card to Barnes and Noble, which meant that I needed, needed to make a trip to the store to buy some books, as I’ve not bought any in five whole days.
Old School: Life in the Sane Lane by Bill O’Reilly with Bruce Feirstein. I just bought a Bill O’Reilly book almost five days ago; note his co-author is the author of Real Men Don’t Eat Quiche and a long-time friend of O’Reilly.
Lies, Half-Truths, and More Lies by Herb Reich, a de-bunking of received and school-taught wisdom.
The Savage Tales of Solomon Kane by Robert E. Howard. I used a gift card some five years ago on the three volumes comprising the complete Conan collection (The Coming of Conan the Cimmerian, The Bloody Crown of Conan, The Conquering Sword of Conan). I’m not familiar with Solomon Kane, so I’ll get a whole new experience here. The funny thing is when I bought the Conan books, the Howard section of science fiction and fantasy was chock full of books. This time, there were only four Howard titles available.
30-Second Quantum Theory by Brian Clegg which is one pager overviews of concepts in quantum physics. Given that I’m ever hopeful that one of these books will help me get over the hump in understanding advanced physics, this book might help. When I find it again.
So I’ve bought a total of 12 books in the last week. I’ve read eleven, and that’s only through my usual accounting trickery. It’s clear why I continue to fall behind: I have more books already than I can ever read, but not more than I can ever want.
This is one of the two “art” books I bought for a buck last month in Osage Beach (I already read the other, Painted Treasures).
This book is not so much of a how-to project book, although there are a couple step-by-step picture sets, a couple materials lists, and text about considerations and planning, but mostly it’s photos to use as inspiration for your own mosaic projects. The book includes some client commissions that the author did, including a swimming pool that’s quite out of the reach of hobbyists, and many of the photos are variations on a theme (a sculpture flower is represented in various colors and sizes).
But it did make me want to try my hand again at mosaics. I say “again” as though I’ve ever done a serious mosaic project, but I haven’t; I did a couple in art class in school, and I did a construction paper and glue mosaic of a city skyline when doing art with my children once some years ago, but nothing serious.
Oh, and I learned from this book that they make epoxy glue guns, which I had not realized. I’ll have to get one sometime to see if it works well, or if it’s just like the syringe-like blenders that come with the blister packed epoxy at the hardware store.
At any rate, worth a browse if you’re into mosaics, especially if you can find it for a buck. Which you probably cannot, as I got the last one.
I go through phases listening to these CD courses, and I think I’ve figured out the secret. I tend to accumulate courses in subject areas with which I’m already familiar, like philosophy or literature, and they underwhelm or bore me. That, and if they’re a summary course from the 21st century, I’ll find enough to disagree with politically to not really want to finish them. But something I’m not really familiar with, such as deep dive history courses (not summary courses) or music courses, these I listen to with some zeal, and I learn a lot more from them probably because they’re completely new knowledge to me and not merely rehashing what I already know.
I really enjoyed this course for those reasons, if they are the real reasons why I get away from listening to these in the car, and because I rather like jazz music, but I’ve not really been educated in it. Until now, a bit.
The course is eight lectures. The first seven talk about a building block in the evolution of jazz, and the last has the lecturer, a known jazz pianist, improvising with some other artists to illustrate how it works. The building blocks include cakewalks, ragtime, blues, swing/big band jazz, boogie and bop/bebop, and modern jazz including free jazz, cool jazz, and fusion.
I’ve learned a heck of a lot about music, including what syncopation means (although I’ve read the word, I’ve never tied it to the actual sound), the origins of the words in jazz (jazz, ragtime, bebop, and so on). And I’ve identified the styles of jazz I prefer (swing, cool jazz, and fusion)–although I would have probably guessed these. Also, I like free jazz like I like Matisse. Which is not at all.
So I’m glad to have spent, what, six hours on this course. I wish it were longer. I wish I could play a boogie woogie bass line on the piano. I have tried because of this course. So take that as an endorsement.
Unfortunately, I have a five foot shelf of other courses which on DVD and/or fit the bill of courses that I have mentioned aren’t the ones I get the most from. So expect other entries in this series irregularly. | 2019-04-23T10:43:29Z | https://brianjnoggle.com/blog/2019/01/ |
When I started this challenge, a number of people asked me why I was doing it in October when the weather is crappy, rather than during the summer when the weather is perfect for air drying clothes. Well, I did that on purpose. You guys want a challenge, don't you? Where's the challenge in perfect weather? I'm just kidding, of course.
For many Americans, learning a new way of drying clothes that doesn't involve the minute it takes to transfer clothes from the washer to the dryer is a challenge. Sure, we look pathetic to the rest of the world where line drying is de rigueur, but we all have it in our heads that we can't live without a dryer and that just isn't true. Clothes dryers have only been around for the masses for the last 50 years and I would argue that Americans at the turn of the 20th century, working in factories, were a heck of a lot busier than we are today.
There are two issues at play: one is the expectation that you can wear an article of clothing for 10 minutes and it's destined for the laundry bin. Even one day is sufficient. Two days it's starting to get scary and don't even think about wearing something for more than that. Convenience has taught us that clothes are dirty after one wearing. When, for most of us (unless you are a farmer or work in a mine), you could easily get away with another wearing.
The second is that there is no work involved in washing and drying clothes. And that's the expectation we've come to have. Line drying seems insurmountable and the idea that it takes a ton more time to line dry clothes really isn't all that accurate. It takes maybe 5 minutes? Tops. Are you that strapped for time that you can't spend 5 minutes?
Anyway, I'd thought I'd share a few tips for drying clothes inside since people are asking for help. I'll follow-up with a post for how to keep clothes from feeling "crunchy".
First off, if you live in an area where it is rainy and moist most of the year (like we do in Seattle), you're going to have to adapt a few things. The primary complaint is that clothes take too long to dry and they start smelling moldy.
1. Use a movable rack so that you can move your clothes into the sun/daylight near a window if it does decide to rear its head.
2. Use a movable rack or position your line near a heating source. If you have a wood burning stove, you're in luck. If you have central heating, place it near a heating vent. If you use electrical heat, put it near the baseboard or fan. You get my drift. If it's too cold out to dry your clothes, most likely you are using some heat at least part of the day inside. Or the oven, or some room is going to be warmer than others. Use it.
3. If you don't turn the heat on (stay tuned for this year's Freeze Yer Buns!) then make sure you rotate your clothes on the rack or line. So, if there are any spots that get less airflow, alternate positions. If you use a rack, flip the clothes over so the damp parts are exposed.
4. When in doubt, or desperation, use a space heater or a fan to help with airflow. The electricity used will be far less than using the dryer.
5. If you must use the dryer, dry your clothes for about 5 minutes before "finishing" them on the line. They'll dry faster and have less opportunity for smelling mildewy.
6. If moisture is your problem, try a dehumidifier. It will not only help your clothes, but probably the rest of the house as well. It costs pennies a day to run smaller dehumidifiers. If you really have a humidity problem, look into a hybrid water heater that pulls moisture out of the air to help heat the water.
7. If certain items start smelling funky, try a chlorine free bleach, vinegar rinse or something else to kill the stink next time you wash it. This shouldn't be necessary, but if you feel you need it, give it a try.
Those are my hints and tips for successful indoor drying. When in doubt, don't freak out, just finish drying for 5 minutes in the dryer.
I air dry a decent percentage of laundry, but I have to admit I've thrown them in the dryer for a fluff on occasion because they're too stiff. Jeans are no big deal because they "soften" almost immediately when you put them on, but my 2yo has a few dresses that feel like cardboard when they're dry.
I can also second the "re-wash with 1/4 cup vinegar to get rid of a mildew-y smell" tip. Not that I've left clean clothes in the washer for 3 days on several occasions ... I just read it somewhere.
It's interesting about the concept of modern washing machines being timesaving.
I read somewhere that we actually spend more time doing laundry now than our grandmothers did because it is so convenient we wash everything whether it needs it or not.
Something I'm trying to do less, but it's chiefly a problem in the children's rooms. They either wear one outfit for a fortnight or have 6 outfits out, which all end up in the wash at the same time.
i always find posts on line drying on US blogs very interesting- if not amusing. the cultural differences are astounding. The comment above on never drying clothes in direct sun (not a US comment)- well i live in OZ.. umm always. Sunlight bleaches stains..yup, removes them and sanitises clothes. And I had NEVER EVER thought about my clothes being crunchy (now there's a great pun) until i read about it as a reason for not line drying on US blogs. This was a great post. it deconstructed a habit that is just second nature.
also- here's a hint. it doesnt need to be hot or suny to dry on a line outside. the best weather can be cold but windy. put clothes outside to evaporate most of the moisture and finish on a rack inside.
Line drying is pretty much the standard in Germany...what helps here is that the washing machines have *insane* spin cycles. At 1200 rpm for a couple minutes, the clothes come out practically dry already. Not sure if these are available anywhere in the US, but for someone needing a new W/D, it could save some money or space.
Like Anne, I'm from Norway, but I don't agree with her comment, she must have had some bad luck with some poor dyeing) and here we line dry all the time. The carousel she mentions are fairly common, and the indoor rack. I've never had any problems with crunchy clothes, mildew smell, and I've never rotated the clothes on the line. Whenever I can, I hang my clothes across two lines, to make it as airy as possible. If your house is so moist that the clothes won't dry within 2-3 days, then you have a moist problem, not a clothes drying problem.
I was especially amused by the 'win a rack' contest. Here, the rack is a bit like yarn - you can get it anywhere.
We have a woodstove, so in the cooler months, I put up 3 lines over it. We have 6 hooks in the wall and I have 3 lines with loops on the ends, so I can put them up and take them down easily.
Between line drying out clothes and only running our water heater for 2 hours per day, we are able to save quite a bit of money, which we send to the children we sponsor through Compassion International. When I think of how those families generally have 2-4 outfits each and go to the river to beat their clothes clean, it makes the little bit of extra work seem insignificant to say the least.
I also dry my clothes in direct sunlight without any significant issues . . . never yet noticed any spotting or uneven fading.
Never noticed "crunchy" clothes. The towels can occasionally be a little rough on first use but I actually like that - it's kind of a loofah effect. We almost always have some sort of breeze here so things generally blow dry and soft. My kids actually request that I do NOT put their clothes in the dryer as they feel it ruins them. In fact, the only one around here who uses the dryer at all is my DH - he likes to fry his clothes. In the dead of winter I may throw the duvet covers in as we only have one each and I prefer to keep the duvets covered. It would take 2 or 3 days to dry indoors.
My washing machine will spin at a jet engine level as well but I'm afraid it would take down our 140 year old wooden farmhouse so I always use a low speed.
Reading Michelle's post reminded me of when DH and I were young and travelling through Mexico in a VW van (hippies we were). Noticing women beating their clothes clean on rocks in the river, I decided to give it a try and ended up shredding our clothes. I hadn't realised that one had to use SMOOTH rocks, not the rough,jagged ones I had selected!
I too am looking forward to the followup. I also have the same problem with stiff clothes if I try to dry them on a rack. Just last week, we took towels from the washer and hung them over a rack to dry. A few days later, we took the towels off; they didn't change shape as we removed them, they were so stiff, so now our towels form perfect U shapes and are all scraggly. Hopefully there's a way around that!
I'm allergic to fabric softener so the vinegar rinse thing gets used here instead of fabric softener. Whenever I remember the rinse cycle, I add in 1/4-1/2 of white vinegar (I don't generally bother measuring, just pour in what seems like enough).
It also seems to help cut down the smelly-ness of my pre-used machine since I don't currently have the inclination to take the basin and such apart to clean it all properly or the funds to pay someone else to do so.
All you crunchy towel/clothes people, have you tried using a bit less detergent...?
I wish I had brought my drying rack from Japan with me to America. In the area I lived in, everyone hung clothes on the line. Even those in the smallest apartments had lines on the small balconies to hang clothes on. And the drying racks are awesome and can easily be moved in and outdoors. Because everyone hung their clothes out to dry, those nifty, fancy drying racks were about the price of the cheap ones that aren't nearly as useful here.
A tip about fading--vinegar can help your clothes not fade in the sun. I usually use vinegar and baking soda to do the laundry and just a tiny bit of detergent (if any at all). Detergent wears your clothing out faster--and so does washing them in general.
To save money and reduce the amount of clothes you throw away, wash only when it's really needed. Also--dryers wear clothing out faster, as well, so line drying will help preserve your clothing longer. And don't use so much detergent--the recommended amount is always way more than you need and it does a number on your clothing.
Just a few thoughts. If you have a shower bar you can use plastic hangers to hang clothes from the shower bar. They should not be dripping wet when you hang them, if they are have you washing machine serviced/cleaned or run the drain and spin cycle again.
Crunchy is actually caused by the build up of soap in your laundry. Wash with less soap and use a 1/4 c of white vinegar in the fabric softener spot. It helps disinfect, soften and clean your clothes.
We have almost everything in the basement and have no issues in the Fall/winter. In the summer however I have to run a dehumidifier.
As for rewearing it can be done. Wash your sundries after every use, maybe. I wash my bras every 3 or 4th wear (I have a specific bra for working in the garden or when I am going to get sweaty). When you get home from work (if you work outside the home) hang you business clothes back up. Check for stains, spills and smells. If all good put back in the closet. If you want to freshen them between washing use a solution of diluted white vinegar in a spray bottle or hang in the bathroom when taking a show (the steam will refresh).
For clothes that are truly crunchy hang in bathroom during shower- they will dewrinkle and soften.
To help break myself of the 'just throw it in the wash habit' I hung a rack with several clothes hooks right near where I get dressed or into pajamas. I hang sweaters, skirts(I mostly wear skirts) and tank tops(I use these, with the built in 'bra' as my underlayer). Most shirts get washed after a day but some don't, so they get hung. It had helped to have a specific, easy place to put the clothes that I'm going to ware again.
I love the crunchy feeling of line-dried clothes. For me, it is a sign that they are really clean. Clothes out of the dryer feel like they have already been worn.
I agree with Hazel about the myth of time-saving. I am always amazed about the amount of laundry people in the US have to do during one week. You actually can wear clothes twice, if they are not stained - except undies, of course.
Btw, the laundry gets dry even at frosty temperatures, as long as the air is dry! My children loved watching the clothes freeze stiff and get soft again when they were dry.
I line-dry indoors all year long. I don't particularly like crunchy towels, and we have pet cats (= cat hair on our clothes). So once the laundry is dry, I run it through the dryer on the air fluff (unheated) setting for five minutes. I de-crunchifies the towels, and removes a good deal of cat hair. It's the only use our dryer ever sees, but it is a good use of it, imo.
We have 2 of these (the picture's not great but you get the idea) ... because they are 'tall and square' instead of 'wide' they take up less room in the house than many of the drying racks I've seen.
Sheets and bigger stuff (dresses, etc) go on hangers in the doorway.
Also - we do have a front load washer with excellent spinnability ... I'm sure that does make a big difference to how long stuff takes to dry. Highly recommended if you are replacing your washer.
I wash as few times as possible and have begun air drying precisely because both of those options are a timesaver -- I am too lazy to slave all day over laundry. It takes maybe five minutes to hang up your clothes, and then you're done. Presto.
Have you heard the statistic that the average American household does nearly 8 loads of laundry a week? (See here.) It's hard for me to believe... unless the average American household has an infant or two, which can't be true.
The one thing that I would emphasize that Crunchy mentioned is to turn your clothes. I don't have much space to hang (chair backs, opened doors, hangars hung from doorframes), so my shirts often get folded in half and hung. If there's not enough airflow in the room, I will need to flip those so that the fabric that was previously facing in towards itself is now on the outside, or it will stay damp forever.
Maybe if people are having issues with mildewy clothing, it is because their clothes are hanging too close together so that air cannot flow around them? Or maybe your house holds too much moisture inside, as Therese said.
Interesting to hear that the crunch comes from detergent buildup.
I live in Greece where everyone air dries.
Air drying in direct sun is the BEST thing you can do for your clothes because they get sanitised. Unless you leave them under the sun for...2-3 days!!!...you'll have none problems. On the contrary, whenever a t-shirt of my son just doesn't get clean after washing I put it out in the sun for a few hours and the stains ARE GONE!
We are a family of 3 and we do 3 loads tops per week. One for whites, one for colored and one for darks.
I can't imagine why the average family of 4 would do 8! loads per week!!!
I always line dry my kids' clothes inside (because do I really need them shrinking even the tiniest bit?). I just hang them on their hangers wet, then toss them on the shower curtain rod and towel rods in their bathroom with space between. If I want some air movement, I just turn on the exhaust fan and voila!
Just incase no one else has said it yet... turn your clothes inside out and dry in the sun. I live in Australia and don't own a dryer. My friend was taking some hand me down clothes last week and she commented that you could tell that i hang the clothes inside out as the difference in the colour really is noticable.
I live in Northern Alberta, like up by the 60th parallel, and the sun does not remove stains from clothes but it does bleach the colour out (how could it not). So I hang my clothes up outside after I've turned them inside out. Yes, they are very crunchy when I bring them in the house. Solution; put them in the dryer on air dry for 5-10 minutes, problem solved. I wonder if any of this has to do with the fact that we have very hard water.
I plan on attempting to air dry my clothes is the house this winter, we'll see how that goes. I have two racks to set up in front of my wood stove. My only concern is big things like blankets, sheets etc. I guess I'll just have to try it and see what happens. I figure even if I only end up using the dryer for 5-10 minutes on heat it's still better than drying each and every load that way.
thanks for the great post. Many comments concerned drying indoors and I may be able to help out. I sell unique wall mount drying racks which can accommodate up to 5 QUEEN sized bed sheets!
I live in NE Florida in a forest, where it is very hot, humid, and shady. Our clothes begin to mildew almost immediately when I hang dry them, but I am learning how to time my laundry around the hot part of the day when the heat it enough to dry them even in the shade. It's a work in progress. Some clothes dry very well, others (like towels) just won't dry completely so I do have to use the dryer for them (at least until I find a solution). We do get some sunshiny spots so I'll practice moving the drying rack to those spots and see how that works. Only problem is the sunny spots keep on moving so I'll have to keep track of them, lol!
I am a big fan of not washing more than is necessary.
I worked for a family that insisted on washing sheets that they didn't even sleep in 2x's a week, and their clothes every single day. I did 2-3 loads A DAY for them. This was a family of 3 adults mind you. I was constantly washing clothes that weren't even dirty. It was such a huge waste of resources, drove me crazy.
At my house, I do what others have suggested, hang the clothes to air between wears and do only the essentials ike undies more often than that. As I said it is really humid here so I do tend to sweat through my clothes and have to change a few times a day, and even at that, I have only one load of my own clothing a week most of which I hang to dry, I may have two loads if I do sheets/towels but I only do those every other week, to every 2 weeks. Our clothes always smell fresh and clean, I only use a small amount of natural laundry soap, cold water and nothing else. There are three in our family and pets with bedding and my son is a growing boy that lives in the dirt. He has only one load of dirty clothes every other week.
As always thanks for the great blog, love all the helpful comments from other readers too!
My concern with air drying is sanitation, and how clean is clean? In the days when everyone line dried because we didn't have dryers, they boiled the laundry, at least they used boiling water to wash it. Today, we don't do that. The most bacteria-ridden places in the home are doorknobs, the inside of the toilet bowl and the inside of the washing machine. Detergents aren't soap, they are primarily fragrance and surfactants, certainly not disinfectants. Bleach won't solve this either, and using bleach in hot water is good for nothing in this department. What kills the most common contaminant in the washer, E.coli, is cooking it out in the dryer. I do dry a fair number of things on hangers or drying racks, but never anything that comes into contact with parts of the body that could be infected and cause illness. That would be towels, washcloths and undergarments. Those always go in my dryer. Sheets out on the line, in the sun, in the breeze have to be better healthwise, but I do draw a line about drying indoors with certain items.
Maybe because I was raised by immigrant parents, it's the norm for me to wear clothes a couple times (as long as they don't smell) before I wash them. We use to hang dry clothes in the garage when I was younger... as we got older, we started using the dryer more often. Now that I am in med school and my apartment doesn't have a washer/dryer hook-up, just community washer/dryer... I decided to by a portable washer to wash my clothes in my apartment (the community washer/dry has had SO many problems, I've given up). I was going to by a dry along with it, but it's too much a hassle and too expensive IMO... so I just got the washer. I'm purposely hang drying my clothes again, it's kind of cool. I'm doing the hang drying inside though, because I don't necessarily trust my neighbors... maybe I'll do it outside eventually.
TheLadyDragonfly, I think you're being a bit overly paranoid. As long as your clothes aren't soaking wet, you should be fine when it comes to germs.
I'm an American spending three months in the UK without a dryer! When we first arrived, there was still a few warm and sunny days. Now that it's getting colder, drying clothes out doors isn't really an option. Our house is blocked from the sun, so we hang our clothes on a rack, and open up a window during the day to let in some air for circulation. Then after dinner, we move the rack into the kitchen to heat dry next to the stove!
Thanks for giving me a few more tips to get our clothes clean and dry!
I think the reason we wash our clothes every time we wear them is because advertisers encourage it. They sell more detergent and fabric softener that way. I developed allergies to perfumed products thirty years ago and currently hand wash or dry clean everything I own. I use a Nina Soft spin dryer to extract water from hand washed items. You don't need a lot of soap to hand wash clothing. All you need is a bucket from Home Depot and a special plunger available for hand washing your clothing. It aerates your clothes as it washes them, forcing oxygen through them for a real cleaning. My clothing never smell musty. In fact, some had a musty washer smell because I inherited them from a friend who used unscented products. But the smelly washer odor was on them. That odor eventually went away after I hand washed the clothing a few times. I love hand washed items. And air drying them ensures on static electricity like you get in the dryer. | 2019-04-21T18:38:46Z | http://www.thecrunchychicken.com/2010/10/tips-for-drying-clothes-indoors.html |
Our Programs, Products, and Services are owned and operated by Sabrina The Digital Witch (“Company,” “we,” or “us”). The term “you” refers to any purchaser and user of any of our Programs, Products, and Services.
The Term of Use apply also to Video creative (videocreative.sabrinathebrinathedigitalwitch.ccom) and video creation (videocreation.sabrinathedigitalwitch.com) that are sub-companies owned and operated by Sabrina The Digital Witch.
All our Programs, Products, Services and Program Materials are intended solely for users who are eighteen (18) years of age or older.
Our Limited License to You. Our Programs, Products, and Services and all the Program Materials are our property, and our affiliates or licensors and are protected by copyright, trademark, and other intellectual property laws.
You may download and print Program Materials for your personal use in your business.
However, you are not permitted to share, sell, reprint or republish any other of our Program Materials, including handouts, for resale or mass reproduction purposes for your business use.
For those trademarks, taglines, and logos for which you are granted permission to use, the trademark indicia must always be included.
Any marketing or promotional tools and Program, Product or Service titles or any other title or information of ours bearing the trademark symbols (™) or ® may not be used by you for any reason without our express written permission.
You will not engage in the improper and unauthorized use of our Programs, Products, Services and Program Materials. Improper and unauthorized use includes but is not limited to modifying, copying, reproducing, republishing, uploading, posting, transmitting, translating, selling, creating derivative works, exploiting, or distributing in any manner or medium (including by email or other electronic means) any Program Materials or any other information accessed or purchased through our Programs, Products or Services, or any other communications provided by us for your own personal use, business/commercial use or in any way that earns you money.
You will not duplicate, share, trade, sell, or otherwise distribute our Programs, Products, Services or Program Materials to any other person, for their personal use, business/commercial use or in any way that earns them money, whether it was known to you or not at the time that you shared the information that their intention was to use the Program Materials for their personal use or business/commercial use. This means you cannot share or sell or any part of our Programs, Products, and Services or Program Materials to someone else, so they can copy and use them for their personal use, business/commercial use or in any way that earns them money. You are the only one granted a limited license to use our Program, Product, Service, and Program Materials.
You will not violate our intellectual property rights, including copyright and trademark rights. Downloading, printing, or otherwise using our Programs, Products, Services or Program Materials for your training purposes in no way gives you any copyright, trademark, intellectual property or ownership rights of our Program, Product, Service or Program Materials.
You will not reprint or republish any part of our Programs, Products, Services or Program Materials for publication or compilation into your products, programs, services or program materials for your personal use or business/commercial use or in any way that earns you money.
You agree and understand that prohibited use, improper and unauthorized use may give rise to a civil claim for damages and be a criminal offense.
You also grant us, and anyone authorized by us, the right to identify you as the author of any of your comments, posts, photos, images, videos or other contributions by name, email address, or screen name. You acknowledge that we have the right but not the obligation to use and display any contributions from you of any kind and that we may elect to cease the use and display of any such contributions on our Programs, Products, Services and Program Materials at any time for any reason whatsoever.
By participating in our Programs, Products, and Services, and using our Program Materials, including our Facebook community, you consent to photographs, videos, and audio recordings that may be made that may contain you, your voice and your likeness. In our sole discretion, we reserve the right to use these photographs, videos, and or/audio recordings and/or any other materials submitted by you to us regarding your participation in our Program, Product or Services in our current or future Programs, Products or Services, and/or our marketing or promotional efforts, without compensation to you at any time, now or at any time in the future.
If we permit you, you agree to use the specific Content that we allow and ONLY in the ways for which we have given you our written permission.
If you choose to use the content in ways that we do not specifically give you written permission, you agree now that you will be treated as if you had copied, duplicated and/or stolen such Content from us, and you consent to stop using such Content immediately and to take whatever actions as we may request and by the methods and in the time frame that we prescribe to protect our intellectual property and ownership rights in our Programs, Products, Services or Program Materials.
When you apply for, enrol in, purchase or use our Programs, Products or Services, or Program Materials we may seek and collect personal data and information including but not limited to your name, e-mail address, phone number, billing information, credit card or payment information, demographic information, preferences, interests, or other personally-identifying information (“Confidential Information”).
However, due to the nature of the Internet, we cannot completely ensure or warrant the security of your Confidential Information or any other data or information transmitted to us or through our services; therefore, submitting Confidential Information, data or other information is done at your own risk.
We have security measures in place to prevent the loss, misuse, and alteration of the information that is obtained from you, but we make no assurances about our ability to prevent any such loss, misuse, to you or any third party arising out of any such loss, misuse, or alteration.
As a Licensee, you agree that you are using your judgment in using our Programs, Products, Services and Program Materials and you agree that you are doing so at your own risk. Our Programs, Products, Services and Program Materials are for informational and educational purposes only. You agree and understand that you assume all risks and no results are guaranteed in any way related to our Programs, Products, Services and Program Materials. Our Programs, Products, Services and Program Materials are merely to provide you with education and tools to help you make your own decisions for yourself. You are solely responsible for your actions, decisions and results based on the use, misuse or non-use of our Programs, Products, Services and Program Materials.
We take every precaution to protect our Programs, Products, Services and Program Materials. However, due to the nature of the Internet, we cannot completely ensure or warrant the security of the Programs, Products, Services and Program Materials or the contributions or information transmitted to us on or through our Website or our Programs, Products, Services and Program Materials. Submitting contributions or information on our through our Programs, Products, Services and Program Materials is done entirely at your own risk. We make no assurances about our ability to prevent any such loss or damage to you or any other person, company or entity arising out of use of our Programs, Products, Services and Program Materials and you agree that you are assuming such risks.
Our Programs, Products, Services, and Program Materials are not to be perceived as or relied upon in any way as medical advice or mental health advice. The information provided through our Programs, Products, Services, and Program Materials is not intended to be a substitute for professional medical advice, diagnosis or treatment that can be provided by your own physician, nurse practitioner, physician assistant, therapist, counsellor, mental health practitioner, licensed dietitian or nutritionist, member of the clergy, or any other licensed or registered healthcare professional. Do not disregard professional medical advice or delay seeking professional advice because of information you have read in our Programs, Products, Services, and Program Materials, or received from us. Do not stop taking any medications without speaking to your physician, nurse practitioner, physician assistant, mental health provider or other healthcare professional. If you have or suspect that you have a medical or mental health issue, contact your health care provider promptly. We are not providing health care, medical or nutrition therapy services or attempting to diagnose, treat, prevent or cure in any manner whatsoever any physical ailment, or any mental or emotional issue, disease or condition. We are not giving medical, psychological, or religious advice whatsoever.
Our Programs, Products, Services, and Program Materials are not to be perceived or relied upon in any way as a business, financial or legal advice. The information provided through our Programs, Products, Services and Program Materials is not intended to be a substitute for professional advice that can be provided by your accountant, lawyer, or financial advisor. We are not giving financial or legal advice in any way. You are at this moment advised consulting with your accountant, lawyer or financial advisor for any and all questions and concerns you have regarding your income and taxes about your specific financial and legal situation. You agree that we are not responsible for your earnings, the success or failure of your business decisions, the increase or decrease of your finances or income level, or any other result of any kind that you may have because of information presented to you through our Programs, Products, Services, and Program Materials. You are solely responsible for your results.
You acknowledge that we have not and do not make any representations as to the health physical, mental, emotional, spiritual or health benefits, future income, expenses, sales volume or potential profitability or loss of any kind that may be derived as a result of your participation in this Program, Product, Services or Program Materials. We cannot and do not guarantee that you will attain a particular result, positive or negative, financial or otherwise, through the use of our Programs, Products, Services and Program Materials and you accept and understand that results differ for each. We also expressly disclaim responsibility in any way for the choices, actions, results, use, misuse or non-use of the information provided or obtained through any of our Programs, Products, Services or Program Materials. You agree that your results are strictly your own and we are not liable or responsible in any way for your results.
WE MAKE NO WARRANTIES AS TO OUR PROGRAMS, PRODUCTS, SERVICES, OR PROGRAM MATERIALS. YOU AGREE THAT PROGRAMS, PRODUCTS, SERVICES, OR PROGRAM MATERIALS ARE PROVIDED “AS IS” AND WITHOUT WARRANTIES OF ANY KIND EITHER EXPRESS OR IMPLIED. TO THE FULLEST EXTENT PERMISSIBLE UNDER APPLICABLE LAW, WE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT. WE DO NOT WARRANT THAT THE PROGRAMS, PRODUCTS, SERVICES, OR PROGRAM MATERIALS WILL BE FUNCTIONAL, UNINTERRUPTED, CORRECT, COMPLETE, APPROPRIATE, OR ERROR-FREE, THAT DEFECTS, WILL BE CORRECTED, OR THAT ANY PART OF THE WEBSITE, CONTENT ARE FREE OF VIRUSES OR OTHER HARMFUL COMPONENTS. WE DO NOT WARRANT OR MAKE ANY REPRESENTATIONS REGARDING THE USE OR THE RESULTS OF THE USE OF OUR PROGRAM, PRODUCT OR SERVICES MATERIALS OR ON THIRD-PARTY WEBSITES REGARDING THEIR CORRECTNESS, ACCURACY, TIMELINESS, RELIABILITY OR OTHERWISE.
We try to ensure that the availability and delivery of our Programs, Products, Services and Program Materials is uninterrupted and error-free, including our content and communications through methods like our Website, member forum, private Facebook groups, email communications, videos, audio recordings, webinars, recorded webinars, teleseminars, recorded teleseminars, emails, downloadable Mp3 audio files, downloadable PDF printed transcripts, downloadable PDF handouts/slides, handouts, eBooks, or any other materials provided by us to you. However, we cannot guarantee that your access will not be suspended or restricted from time to time, including to allow for repairs, maintenance or updates, although, of course, we will try to limit the frequency and duration of suspension or restriction. To the fullest extent permitted by law, we will not be liable to you for damages or refunds, or for any other recourse, should our Programs, Products, Services or Program Materials become unavailable or access to the them becomes slow or incomplete due to any reason, such as system back-up procedures, internet traffic volume, upgrades, overload of requests to the servers, general network failures or delays, or any other cause which may from time to time make our Programs, Products, Services or Program Materials inaccessible to you.
We may provide links and pointers to other websites maintained by third parties that may take you outside of our Programs, Products, Services or Program Materials. These links are provided for your convenience, and the inclusion of any link in our Programs, Products, Services or Program Materials to any other website does not imply our endorsement, sponsorship, or approval of that website or its owner. We do not endorse, and we are not responsible for the views, opinions, facts, advice, or statements provided by external resources referenced in our Website or its Content, or their accuracy or reliability. We assume no responsibility for errors or omissions caused by other websites that may be included our Programs, Products, Services or Program Materials. We have no control over the contents or functionality of those websites, and so we accept no responsibility for any loss, damage, or otherwise, that may arise from your use of them, and therefore we do not guarantee the accuracy, completeness, or usefulness of any other website or their content. It is your responsibility to review the terms and conditions and privacy policies of those linked websites to confirm that you understand and agree with those policies.
By purchasing and using our Programs, Products, Services or Program Materials in any way or for any reason.
We will not be held responsible or liable in any way for the information, products or materials that you request or receive through or on our Programs, Products, Services or Program Materials. We do not assume liability for accidents, delays, injuries, harm, loss, damage, death, lost profits, personal or business interruptions, misapplication of information, physical or mental disease, condition or issue, or otherwise, due to any act or default of anyone or any business, whether owners, staff, agents, joint venture partners, contractors, vendors, affiliates or otherwise, affiliated with us. We do not assume liability for any owners, staff, agents, joint venture partners, contractors, vendors, affiliates or otherwise who are engaged in rendering our Programs, Products, Services or Program Materials, or in any way or any location. If you use our Programs, Products, Services or Program Materials or any other information provided by us or affiliated with us, we assume no responsibility.
You agree that you will not use our Programs, Products, Services or Program Materials in any way that causes or is likely to cause the Programs, Products, Services or Program Materials, or access to them either to be interrupted, damaged or impaired in any way. You understand that you are solely responsible for all electronic communications and content sent from your computer to this Website and its Content and us.
If you have a question or concern about your Programs, Products, Services, or Program Materials, you may send an e-mail to supp[email protected], and we will do our best to reply to your question or concern promptly.
If payment is not received by the date due, you will have a three (3) day grace period to make the payment otherwise the Program, Product or Services will not continue, and we reserve the right to cease your access immediately and permanently.
We do not tolerate or accept any chargeback threat or actual chargeback from your credit card company. In the event that a chargeback is placed on a purchase, or we receive a chargeback threat during or after your purchase, we reserve the right to report the incident to all three credit reporting agencies or to any other entity for inclusion in any chargeback database or for listing as a delinquent account which could have a negative impact on your credit report score. The information reported will include your name, email address, order date, order amount, and billing address. Chargeback abusers wishing to be removed from the database shall make the payment for the amount of the chargeback.
Your satisfaction with your Program, Product or Service is important to us. Because of the extensive time, effort, preparation and care that goes into creating and providing our Programs, Products, Services and Program Materials, we have a very strict refund policy. Most of our content is digital, and therefore, a lengthy refund policy could result in the theft of our materials.
If you are unhappy with your purchase, we welcome you to email us at [email protected], to provide feedback.
We recommend contacting us for assistance if you experience any issues receiving or downloading our products. We welcome you to email us at [email protected], to provide feedback.
It is hoped that should we ever have any differences, we could be able to work them out amicably through e-mail correspondence. However, should we be unable to seek resolution within a reasonable time, you agree now that that the only method of legal dispute resolution that will be used is binding arbitration before a single arbitrator, selected jointly, by the European Alternative Dispute Resolution. Before seeking arbitration, you must send an email to us at [email protected] and include all of your reasons for dissatisfaction with your Program, Product or Service. You understand and agree now that the only remedy that can be awarded to you through arbitration is a full refund of your Payment made to date. No other actions or financial awards of consequential damages, or any other type of damages, may be granted to you. We both agree now that the decision of the arbitrator is final and binding and may be entered as a judgment into any court having the appropriate jurisdiction.
By purchasing our Programs, Products or Services, you agree to a modification of the statute of limitations such that any arbitration must begin within one (1) year of the date of your e-mail to me referenced above or you waive the right to seek dispute resolution by arbitration or to take any other legal action.
You also agree that should arbitration take place, it will be held in Dublin, Ireland, and the prevailing party shall be entitled to all reasonable attorneys’ fees and all costs necessary to enforce the decision of the arbitrator.
Disclosure 1: We are a website that needs compensation to operate like any other website on the internet. We may receive consideration for our reviews, but we are unbiased and do not accept paid reviews or fake reviews claiming to be something they are not.
Disclosure 2: This website contains endorsements for products and services, which means when you click on a link that we recommend, we may receive a commission. Not every link is an affiliate link, but some are. It won’t affect your purchase. | 2019-04-22T02:09:17Z | https://www.sabrinathedigitalwitch.com/terms-of-use/ |
The terms of this User Agreement (“Agreement”) constitute a fully integrated agreement between You and Us (defined below) that supersedes any and all prior agreements between You and Us concerning our grant of permission (license) to You to use the websites and platforms offered by the Green Business Certification Inc. (“GBCI”), as well as any of its affiliates and subsidiaries, including but not limited to, the U.S. Green Building Council, Inc. (“USGBC”), GRESB, Green Building Certification Institute Pvt. Ltd. (“GBCI India”), and Arc Skoru Inc. (“Arc”), (collectively, the “GBCI Affiliates”). The GBCI Affiliates may be updated from time to time. To the extent that any information provided herein is conditioned on updating from time to time, You agree to be bound by and to check for such updates often. The rights granted herein are personal to You and may not be transferred or assigned by You. All of Our rights and obligations under this Agreement are freely assignable by Us in connection with a merger, acquisition, or sale of assets, or by operation of law or otherwise. If there is a discrepancy or conflict between these terms and the content of our website, these terms shall govern. However, should you subsequently accept another agreement offered to You on any of Our Online Platforms, and any terms are inconsistent between the two agreements, You agree that the terms of the latter agreement shall control.
By accepting this Agreement you agree to be bound by all the terms of this Agreement. If You do not agree to these terms, You must stop all use of websites and platforms of GBCI, and the GBCI Affiliates immediately.
You warrant and represent that you are over 18. If You are under 18, You may not access and use the Website (defined below) and services offered by the GBCI Organization(s) (“Services”) without Your parent's or legal guardian's supervision.
Regardless of Your location, You consent to having Your Personal Data, including but not limited to your name, and contact details (See our Privacy Notice for more information, available at: http://www.gbci.org/legal#privacy, transferred to a cloud based server located in the United States and, when applicable, processed in the United States.
“We,” “Us,” and “Our” refer to the Green Business Certification Inc. (“GBCI”), the GBCI Affiliates, and all of their respective employees, agents, officers, directors, assigns and successors in interest (collectively, the “GBCI Organization”).
“You,” “Your,” and “Yourself” refer to those individuals and entities who use this website and have an authorized user account, as well as their authorized agents and employees.
“Website” or “Online Platform” refers to the online tools designed to facilitate the certain services offered to you by any entity in the GBCI Organization, including but not limited to education courses, performance tracking and/or an applicable certification process. The websites and online platforms (“Our Online Platforms”) may be updated from time to time.
Use of Our Online Platforms. Each of Our Online Platforms is designed and administered solely for the purpose of facilitating certain specific services, which may include course offerings, performance recognition, data collection and benchmarking, and certification review, as combinations or as individual organizational offerings. You acknowledge that access to certain sections and use of certain services may require the acceptance of additional terms and conditions. Such additional terms and conditions will be presented to You where applicable. You agree that Your use of any of Our Online Platforms will be for lawful purposes only. Further, You agree that You will not post to or transmit through any of our Online Platforms any information containing threatening, offensive, abusive, harassing, or defamatory content. You agree that You shall not use any of our Online Platforms for advertising, to collect site content for commercial purposes including screen scraping, to collect user or project information for commercial purposes, and/or to solicit others with respect to the purchase or sale of products or services. Please note that all activity on our Online Platforms or Websites is monitored, including use of our Services by registered users. If We see indications that our Online Platforms are being used outside of this License Agreement, we may contact You and/or Your organization and ask You to investigate Your use of the Online Platforms or Websites and provide Us with information to validate that Your use of our website and Services offered is within Your account parameters.
Account Identifiers. You agree to be responsible for maintaining the confidentiality of any passwords, usernames, or other account identifiers. If You do elect to share any of Your account information, You agree to be responsible for all activities that occur under Your account. You agree that: (i) Your account and password are to be used only by You (ii) You will not create registration accounts for the purposes of abusing the functionality of the Online Platforms, or other users (iii), You will not do anything to aid anyone who is not a registered user to gain access to any area of any Online Platform that is reserved for registered users; and (iv) You will not seek to pass Yourself off as another user. Furthermore You agree to notify us immediately pursuant to the notification provisions in Section 11 if You become aware of any unauthorized use of Your account.
Availability of the Online Platforms. Our Online Platforms generally will be available to you twenty-four hours a day, seven days a week, other than when unavailable for maintenance. However, We do not guarantee that availability of it or that access to it will be uninterrupted or error free. We reserve the right to interrupt, limit, or suspend the platform from time to time for purposes of maintenance, upgrades, modifications, or similar reasons.
Changes to our Online Platforms. We reserve the right to unilaterally update, change and/or remove the content and availability of features and programs offered by any of our Online Platforms. All such updates and changes shall be effective and binding on You immediately upon us making them. You are solely responsible for keeping yourself informed of the current content and features provided by the relevant Online Platform. We are under no obligation to inform You of changes to the Online Platform other than by posting such changes on the Online Platform, but We agree to refrain from taking action without prior affirmative notice to You if the provision upon which our action is to be based is materially different from the Sections that are applicable to this Agreement on the Effective Date. If you do not agree with any changes initiated by us to the relevant Online Platform, your sole remedy is to terminate this Agreement.
Use and Protection of Our Intellectual Property.
The intellectual property rights in each of Our Online Platforms are the property of one of the GBCI Organizations, as identified on the specific Online Platform. Other materials, programs and processes made available through the use of any of our Online Platforms may be the property of one or another of the GBCI Organizations, or of third parties. Any of our Online Platforms may contain other proprietary notices and copyright information, the terms of which must be observed and followed. Unless otherwise noted, all information, screenshots, text, articles, data, images, documents, software or other materials (collectively hereinafter referred to as the “Materials”) contained within any of Our Online Platforms are copyrighted by GBCI, a GBCI Affiliate and/or a third party (hereinafter collectively referred to as the “Copyright Holder”). Title to copyright in the Materials will at all times remain with the Copyright Holder.
Permission to display and/or download any Materials on any of our Online Platforms is granted only by entering into an agreement offered by such Online Platform. You may NOT copy, edit, distribute, sell, or modify the Materials without the express, prior written consent of the Copyright Holder.
We respect the rights of all copyright holders and in this regard, we have adopted and implemented a policy that provides for the termination in appropriate circumstances of users who infringe upon the rights of copyright holders. If you believe that your work has been copied in a way that constitutes copyright infringement, please send an email to our webmaster http://www.gbci.org/contact with the following information required by the Online Copyright Infringement Liability Limitation Act of the Digital Millennium Copyright Act, 17 U.S.C. 512: (i.) A physical or electronic signature of a person authorized to act on behalf of the owner of an exclusive right that is allegedly infringed; (ii.) Identification of the copyright work claimed to have been infringed, or, if multiple copyrighted works at a single online site are covered by a single notification, a representative list of such works at that site; (iii.) Identification of the material that is claimed to be infringing or to be the subject of infringing activity and that is to be removed or access to which is to be disabled, and information reasonably sufficient to permit us to locate the material; (iv.) Information reasonably sufficient to permit Us to contact the complaining party; (v.) A statement that the complaining party has a goodfaith belief that use of the material in the manner complained of is not authorized by the copyright owner, its agent, or the law; and (vi.) A statement that the information in the notification is accurate, and under penalty of perjury, that the complaining party is authorized to act on behalf of the owner of an exclusive right that is allegedly infringed.
You also agree that all techniques, algorithms, and processes contained in any of Our Online Platforms and any other of Our computer program products offered through the Online Platforms are proprietary to the relevant entity within the GBCI Organizations, and you agree to safeguard them as such. You agree that You shall not, and shall not permit any other person to: (i.) copy any software associated with the Online Platform, in whole or in part; (ii.) modify, correct, adapt, translate, enhance or otherwise prepare derivative works or improvements of the online platform; (iii.) rent, lease, lend, sell, sublicense, assign, distribute, publish, transfer or otherwise make the online platform to any person, including on or in connection with the internet or any time-sharing, service bureau, software as a service, cloud or other technology or service; (iv.) reverse engineer, disassemble, decompile, decode or adapt the online platform, or otherwise attempt to derive or gain access to the source code of the online platform, in whole or in part; (v.) bypass or breach any security device or protection used for or contained in the online platform; (vi.) remove, delete, efface, alter, obscure, translate, combine, supplement or otherwise change any trademarks, terms of the online platform documentation, warranties, disclaimers, or intellectual property rights, proprietary rights or other symbols, notices, marks or serial numbers on or relating to any copy of any of our Online Platforms or documentation related thereto; (vii.) use any of our Online Platforms in any manner or for any purpose that infringes, misappropriates or otherwise violates any intellectual property right or other right of any person, or that violates any applicable law; (viii.) use any of our Online Platforms for purposes of: (a.) benchmarking or competitive analysis of the platform; (b.) developing, using or providing a competing software product or service; or (c.) any other purpose that is to the disadvantage, detriment or commercial disadvantage of the relevant entity in the GBCI Organization offering the Online Platform; (ix.) use any of our Online Platforms in or in connection with the design, construction, maintenance, operation or use of any hazardous environments, systems or applications, any safety response systems or other safety-critical applications, or any other use or application in which the use or failure of the Online Platform could lead to personal injury or severe physical or property damage; or (x.) use any of our Online Platforms other than for any use or in any manner or for any purpose or application not expressly permitted by this Agreement. You agree that any breach of this obligation will actually and materially damage the relevant entity in the GBCI Organization offering the Online Platform. You agree that in the event you breach this Agreement, you will be liable for damages as may be determined by a court of competent jurisdiction. You agree that in no event shall You exercise less than due diligence and care in accordance with the laws of the country of purchase and international law, whichever operates to best protect Our interests.
Third Party Website and Information Access. When accessing any of our Online Platforms, you may be provided with access to websites and information controlled, maintained and/or published by third parties. Your use of such information and/or access to such sites is governed by the terms and conditions imposed by those third parties. We are not responsible for the security, accuracy, or availability of third party websites. Any link or reference to any website or source of information controlled, maintained and/or published by any party other than the entity offering the Online Platform shall not constitute an endorsement or warranty of any kind either express or implied including the implied warrant of merchantability and/or the implied warranty of fitness for any particular use.
Release and Limitation of Liability. You knowingly and intelligently waive and release all claims and causes of action against the GBCI Organization entity offering the relevant Online Platform arising out of or in any way related to the use of the Online Platform other than claims and cases of action for loss, damage, cost or expense that is the direct and proximate result of such entity’s willful misconduct or gross negligence. THIS WAIVER AND RELEASE INCLUDES, BUT IS NOT LIMITED TO, CLAIMS AND CAUSES OF ACTION ARISING OUT OF OR RELATING TO OUR DECISION OR ABILITY TO MAINTAIN, ALTER AND/OR SECURE THE ONLINE PLATFORM, OR THE INTENTIONAL SUSPENSION OF ACCESS TO CERTAIN SERVICES, PROCESSES OR PROGRAMS MADE AVAILABLE THROUGH THE ONLINE PLATFORM.
Notice of Claims. If you have been damaged by any act or omission by Us, then, within thirty (30) calendar days after the occurrence of each such act or omission, You must provide Us with written notice describing with reasonable detail the act and/or omission, how You were damaged by it, and a reasonable estimate of the extent of monetary amount of Your damages you claim to have suffered. You must provide this written notice to us by certified mail, return receipt requested, addressed as follows: Name of Relevant [GBCI Organization] entity, General Counsel, 2101 L Street NW, Suite 500, Washington, DC 20037. Your providing us with the notice in the manner and within the timeframe described in above, is an express condition precedent to your right to commence and maintain litigation against us. You knowingly and intelligently waive any and all claims and causes of action against Us to the extent that You do not provide us with the notice in the manner and within the timeframe described herein. Further, you agree not to commence litigation against Us until sixty (60) calendar days after we receive (as evidenced by our signature on the return receipt) the written notice described, above. Your right to commence and maintain litigation against us is further limited as described below.
Information Submitted. Any information you submit through any of our Online Platforms will be used internally only, unless You otherwise consent or unless the issue is separately addressed in an agreement under which it is provided that You may submit information as a project team member; however, Your submission of information authorizes such internal use by Us. Billing information is collected through a secure server and is not shared with other organizations other than the credit card issuing entity. Your credit card number is not retained once Your transaction has been authorized and processed. Regardless, You warrant, to the best of your information and belief, that You have the right to provide all information that you submit through any of our Online Platforms; and that all such information You submit is and will be true correct and complete, and accurate in all respects, and does not and will not infringe upon or misappropriate the intellectual property rights of any third party.
Information Collected. Our Online Platforms use “cookies” which are small files stored on your computer’s hard drive used to track certain information. These cookies enable us to track and target the interests of users to enhance their experience. If you find cookies objectionable, please consult your browser’s documentation for information on how to block or erase cookies. In addition, Our Online Platforms collects and saves the default information customarily logged by World Wide Web server software. (See our Privacy Notice and Cookies Statement: http://www.gbci.org/legal#privacy and http://www.gbci.org/legal#cookie. Our logs contain the following information for each request: date, time, originating IP address and domain name, object requested, and completion status of the request. These logs may be kept for an indefinite length of time and may be used at any time and in any way necessary to prevent security breaches and protect the integrity of the data on Our Online Platforms. We retain the right to disclose submitted or collected information if required to do so by law or if acting on a good faith belief that such disclosure is necessary to protect Our rights or property or to respond to an emergency situation.
Review, Update, and Deletion of Information. If you are concerned about the information you have provided to Us (or which We have collected) or would like to review, update, or delete this information, please email Us at: http://www.gbci.org/contact. If You are a national or resident of the European Economic Area (EEA), and are subject to the jurisdiction of the General Data Protection Regulation (GDPR), You have the legal right to access, amend, edit and request erasure of your personal data stored with Us, so long as You are not part of an ongoing business transaction with Us.
Security of Information. We take reasonable precautions to protect Our users’ information. Please note, however, that electronic transmissions via the Internet are not necessarily secure from interception, and We do not guarantee the security or confidentiality of transmissions. Except as may be otherwise provided in a specific agreement for services, We undertake no responsibility or liability for the deletion or failure to store any information or communications submitted through any of Our Online Platforms.
Export Controls. The use of Our Online Platforms is controlled by the United States Export Administration Regulations and it may not be used in or exported or re-exported to any country to which the United States embargoes goods. In addition, none of our Online Platforms may be used or distributed to persons on the Table of Denial Orders, the Entity List, or the List of Specially Designated Nationals. By executing this Agreement, You are certifying that you are not a national of any country to which the United States embargoes goods and that you are not a person on the Table of Denial Orders, the Entity List, or the List of Specially Designated Nationals.
Indemnity. If anyone brings a claim against Us related to Your actions, content or information on any of our Online Platforms, you will indemnify and hold us harmless from and against all damages, losses, and expenses of any kind (including reasonable legal fees and costs) related to such claim.
For Government Entities. If You are an employee of a Government Entity (meaning a sovereign nation, and any of its agencies or instrumentalities, as well a state, provincial or local government, including an agency, board or commission in the executive branch of such government) and are using one of Our Online Platforms during the course of your employment, the foregoing provisions of this Agreement regarding indemnification, equitable relief, disputes and choice of law, to which You are prohibited from agreeing to as a matter of law, are hereby waived. | 2019-04-25T03:52:35Z | https://greenhomeguide.com/eula |
TONY Abbott’s concession to be more collegial and consultative has forced change on processes for delivering agricultural policy initiatives.
After his near miss in this week’s Liberal leadership challenge, the Prime Minister engineered what he says are significant internal changes to Cabinet processes, staff appointments and public service travel.
He said fundamentally, “this is going to be a government which socialises decisions before they’re finalised”.
READ MORE: ‘Kick up the bum’ for PMThe new process will see the 12 backbench committee chairs now involved in holding Cabinet discussions, at least once every two months. That includes the Coalition’s agricultural backbench committee, chaired by Victorian Liberal MP Dan Tehan.
Mr Abbott said at least every month there would also be a discussion of the full Ministry to address any issues.
“I’m really looking forward to (being) the voice of agriculture at the Cabinet table”“I want to harness all the creativity, not just ministers’ creativity, not just public service creativity, I want to harness all of the creativity and insights that this party room has to offer,” he said.
Other changes included in Mr Abbott’s new regime include getting rid of the paid parental leave scheme and axing prime ministerial knighthoods.
The Coalition also announced stronger scrutiny on the rules governing foreign investment in agricultural land on Wednesday.
Mr Tehan said the Prime Minister’s commitment to include the committee chairs more in policy decisions was “an extremely worthwhile proposition”.
“I’m really looking forward to (being) the voice of agriculture at the Cabinet table,” he said.
Mr Tehan will also be meeting on a regular basis with the cabinet’s policy unit to discuss initiatives.
“Obviously I’ll remain in constant touch with the Agriculture Minister Barnaby Joyce, but the idea here is for us to take some policy ideas forward and I think that’s very important,” he said.
Mr Tehan said the changes to agricultural policy weren’t urgent but any improvement to current processes would be welcomed.
He said Mr Joyce was very approachable and also attended the committee’s meetings held every Monday when parliament sits.
“Mr Joyce has been a very good conduit and the agriculture sector has been very well represented,” he said.
“But what has happened, in areas where there’s been crossover into other portfolios – not just with agriculture – there tends to be a sort of silo (effect) and it can be hard work to bring different departments together to try to solve issues.
“(Now) when issues need more than just the input of the Agriculture Department, we can bring others in and say ‘ok we need to work across portfolios to get outcomes’.
“To put it plainly, the government is spending $100 million a day more than it’s receiving at the moment”A spokesman for Mr Joyce said while Mr Abbott was already closely engaged in agricultural policy, the Minister welcomed moves to increase consultation with the backbench.
Mr Tehan said the average farmer working in the paddock wanted the federal government, “delivering profitability at the farm gate for them”.
“They won’t be too concerned by how we go about it; what they’ll want to see is a result and that’s what drives me,” he said.
Mr Tehan said the committee met this week and pinpointed the Agricultural Competitiveness White Paper and implementing new rules for better scrutiny of foreign agricultural investment, as key issues.
Shadow Agriculture Minister Joel Fitzgibbon has criticised the government for ongoing delays in finalising those two key areas – but Mr Tehan said the Coalition needed to get both processes right.
“The key thing about the commitment on the Foreign Investment Review Board changes is that we’ve got to ensure there’s not too big an administrative burden,” he said.
Mr Tehan said the government wanted to ensure the White Paper would “stand the test of time” and wasn’t just a document that’s announced one day and then a month later “is old news”.
“We’ve got to make sure there are policies and approaches in the Agricultural White Paper which will set up the agriculture sector, not only for tomorrow, but for the next three to five years,” he said.
However, Mr Tehan warned the White Paper was being designed in a tight fiscal environment.
“To put it plainly, the government is spending $100 million a day more than it’s receiving at the moment,” he said.
“We have to do something about the monetary situation, and that’s the context in which we’ve got to frame this White Paper.
“Now that doesn’t mean we can’t do things by reprioritising and ensuring the focus is really on the issues that matter; and that in particular means driving profitability back to the farm gate.
Liberal MP Angus Taylor – also a Committee member -said the White Paper needed to address issues around agricultural finance.
He said various parts of the agricultural sector faced a “debt crisis… and we’ve got to start addressing that head on”.
Mr Taylor said any improvements to agricultural financing via the White Paper process would also relate to drought policy.
“At the end of the day you get through drought because you’re able to finance your way through drought; you can’t make it rain,” he said.
VIETNAM remains closed to Australian fresh fruit over concerns of Mediterranean fruit fly, with no resolution on the horizon.
The Vietnamese government stopped issuing import permits for fresh Australian fruit from January 1 this year and has sought advice regarding Australia’s management of Mediterranean fruit fly (Medfly).
According to the Australian Horticultural Exporters Association (AHEA), the Australian horticulture industry stands to lose more than $40 million per annum with the ban affecting some 41 commodities.
Australian officials in the region are reportedly meeting as often as possible with Vietnamese counterparts to minimise trade disruptions and open trade opportunities again.
The Department of Agriculture says it is holding regular discussions with industry peak bodies.
Vietnamese relationship valuedAustralian officials are seeking recognition by Vietnam that Medfly is contained to Western Australia and that industries there have systems and treatments within orchards and packing sheds to ensure that the insects are not exported along with fresh fruit.
A Department spokesperson told Good Fruit and Vegetables it has provided Vietnam with 23 detailed technical market access submissions encompassing 41 fresh fruit commodities including table grapes, cherries, citrus and summerfruit to protect existing trade.
“The technical submissions address items such as pest control and orchard hygiene. In addition, the department has made a number of additional written representations regarding the status of Mediterranean fruit fly in Australia since November when Vietnam raised its specific concerns,” the spokesperson said.
The Department said it valued its trade relationship with Vietnam very highly and is committed to providing Vietnam with products that meet their importing country requirements.
The AHEA reported Australia is experiencing market failure for many horticultural commodities this season.
It listed cherries, stonefruit, mangoes and – as a result of the Vietnam closure – table grapes, as crops battling an oversupplied domestic market.
AHEA executive director Michelle Christoe said given the Australian and Vietnamese governments have both been in negotiations since November 2014, a resolution to current problems could be a long time coming.
“Vietnam want access for some of its produce, lychees, mangoes and dragonfruit,” Ms Christoe said.
“The ban in Vietnam should never have happened. Australia was put on notice of the potential ban and it should have been more proactive to bring it to resolve.
Ms Christoe said Australia needs a senior ministerial approach to resolve the situation.
“The industry needs resolution on key market access issues that will make a difference to the survival of horticulture in Australia,” she said.
WA growers call for better controlsThe ban has fuelled some Western Australian stonefruit growers to call for better Medfly control measures from the WA Department of Agriculture and Food (DAFWA).
Hills Orchard Improvement Group (HOIG) members said fruit growers were “suffering the consequences of lack of action” to control Medfly.
In a statement HOIG claimed members were concerned “other long-standing, traditional export destinations may follow the lead of Vietnam”.
HOIG has previously called on DAFWA to implement area-wide Medfly management systems, similar to those in the Eastern States, which involve all landowners in an area being part of a monitoring, trapping, baiting and property hygiene program – usually in conjunction with a release of sterile male flies to mate with any female flies.
HOIG spokesman Brett DelSimone said the Vietnamese government’s decision to stop issuing fresh fruit import permits to Australia was “a concerning escalation of the consequences that industry is suffering due to DAFWA inactivity in developing area-wide management”.
“Departmental staff have travelled the world for decades, at taxpayer expense, studying area-wide management and are yet to implement more than a few trials across affected production areas,” Mr DelSimone said.
“The last thing we need is further obstacles to export access into new and traditional markets.
“This has come about due to years of neglect by DAFWA, which has custody of Medfly control.
DAFWA director of plant biosecurity John Van Schagen said the impact of the Vietnam ban will predominately be felt in the Eastern States that are free from this pest and have systems in place to maintain that freedom.
He confirmed that in WA, only the Ord growing region in the north was free from Medfly, but he rejected the claims DAFWA’s lack of action on area-wide management systems was to blame.
“As with other established pests or weeds, it is up to growers to manage these pests on their property,” Mr Van Schagen said.
“Many growers are working hard on control and DAFWA continues to work with and provide advice to growers about control options, which include baiting, mass trapping, monitoring, orchard hygiene and permitted cover sprays.
APAL Industry Services Manager Annie Farrow said she is eager to see the Department of Agriculture work with the Vietnamese government and achieve access to the market again.
“Whilst our export volumes to Vietnam have been small in the past, it is an important and expanding market to a number of growers,” Ms Farrow said.
“In 2013 we exported 82 tonnes of pears to Vietnam, up on the 64 tonnes of the previous year. And, for the first nine months of 2014 pear shipments had increased to 106 tonnes.
More give, less take: AHEAAustralia may need serve up more “give” and less “take” if it’s to smooth over Vietnam’s ban on fruit imports.
“If Australia wants re-entry into Vietnam, it needs to fast track the approval process of the import applications,” Ms Christoe said.
“Australia has dragged its feet in the science of import risk assessments. We have been reviewing lychees since 2003.
“Whilst Australia is concerned about biosecurity, the issue here is not a pest concern.
“It is a lack of resource and priority on the issues to bring it to conclusion. The process is not working.
The situation has prompted AHEA to propose solutions, make submissions to government and call for more commercial mindedness from the government, whilst also recognising it needs to assist the government in achieving commercially viable agreements.
Although Ms Christoe commended the government in achieving recent free trade agreements with Korea, Japan and China, she said if Australia cannot get access for its commodities, it can’t take advantage of them.
“The way the department is engaging with the export industry is not working,” she said.
THE body handling a variety of food regulation issues in Australia and New Zealand wants to improve the project management of its larger research and action initiatives, in response to cost-cutting pressures from government.
Food Standards Australia New Zealand (FSANZ) looks at proposals and applications to change the Food Standards Codes for the two countries.
One reason for referring to them in the plural is that New Zealand chooses to specify some modifications and exceptions to provisions which are otherwise totally uniform between the two polities. Regulatory officials and most business interests prefer to have the divergences as infrequent as possible, in the interests of production uniformity in a common trading market.
There is a constant flow of items needing attention, from product composition, packaging sizes, fine print on grocery items, use of insecticides, all watched over with close attention by the food industry, health advocates, consumer groups, farmers and other interested parties.
So drives for “efficiency dividends” and a general cost-trimming mood at higher administrative levels have induced FSANZ to look for outside assistance.
“In 2014, in light of diminishing government resources, a series of change management related initiatives were initiated,” the tender document explains.
“One of these initiatives was a project to rethink and redesign internal approaches and processes for projects to ensure they are fit for purpose.
TenderSearch says the closing date for applications is March 2, at either 154 Featherstone St, Wellington, New Zealand or 55 Blackall St, Barton, ACT for hand delivery, or the postal address in either Wellington or Canberra. FSANZ is registered for GST in both Australia and New Zealand.
If the successful consultant is based in New Zealand, the fee calculated will have a GST component at the New Zealand rate of 15 per cent. The agency is looking for rapid implementation. It hopes to have an initial scoping meeting by March 23 and a seminar for staff outlining the results by June 5.
The focus will be on the large scale projects, where there should be more room for improvements. The aim is fewer and more carefully tailored projects, making better use of resources and achieving faster completion times. Included in the standard references to methods, structure, processes and leadership is a look at culture, or the embedded habits, corporate memories and expectations of the workforce.
The food policy framework for Australia is set by the Australia and New Zealand Ministerial Forum on Food Regulations, consisting of the health and agriculture ministers of Australasian governments.
Aspects covered include use of ingredients, processing aids, colouring, additives, vitamins and minerals, novel new foods, composition of dairy, meat and beverages, and labelling for both packaged and unpacked foods, including specific mandatory warnings or advisory labels.
CHINA’S largest privately owned agribusiness company and the Perich family from Sydney are looking to buy a $100 million dairy in western NSW, as the lower dollar and China free trade agreement revive foreign interest in the farm sector.
The Chengdu-based New Hope Group and the Periches are targeting the giant Moxey Farms dairy outside Forbes as their first joint transaction.
Family patriarch Tony Perich told The Australian Financial Review his private company was doing due diligence on the Moxey dairy and was looking to bring New Hope in as an investor.
A short list of bidders was finalised earlier in the month by NAB Advisory, which is conducting the sale process for the Moxey family.
Mr Perich said the listed Freedom Foods, which is controlled by his family, was not involved in the deal.
Offshore interest in the Australian farm sector comes amid surging demand from China’s increasingly wealthy middle class for higher-quality imported food.
Beef and powdered milk have seen strong growth in recent years, but the latest trend in China is for fresh milk. This has companies such as NSW dairy co-operative Norco air freight fresh milk into Shanghai, where it sells for $7.60 a litre in supermarkets and online.
Chinese fresh milk imports grew by 74 per cent last year and have increased tenfold since 2010.
New Hope, which has annual sales of $US8.8 billion ($11.3 billion), said it will begin selling an Australian fresh milk product this year.
It has earmarked $500 million to invest in Australian agricultural assets over the next decade.
The bulk of these funds are expected to go into the dairy sector and be invested alongside the Perich family.
New Hope’s first Australian investment was in late 2013 when it bought a controlling stake in Queensland’s Kilcoy abattoir.
The investment agreement between the Perich family and New Hope was struck on the same days as negotiations concluded in Canberra for the free trade agreement with China.
This will see tariffs on Australian dairy products eliminated 11 years after the FTA comes into force.
“We are definitely seeing more interest from both institutional and private investors in dairy due to the depreciating Australian dollar, the attractive free trade agreement and some favourable pricing,” said Darren Craike from Bell Potter Securities.
The Moxey family put its 2700-hectare dairy operation on the market last October.
Its preference is to remain involved in business, but bring in a strategic partner, allowing it to pay down debt while also expanding.
The operation is estimated to be worth about $100 million.
It milks 3500 cows, produces 50 million litres of milk annually and generated earnings before interest and tax of about $12 million last year.
One financial investor said he was told earlier this month his consortium had been unsuccessful in its bid for Moxey, as the family was looking to bring in a strategic investor.
This would favour a partnership between the Perich family and New Hope, which both have strong links into China.
New Hope is China’s largest feed-grain producer. It also has some of the country’s leading red meat, dairy, pork and poultry brands.
The Perich family runs one of Australia’s biggest dairy farms west of Sydney and have supply agreements with China’s Bright Foods and the Shenzhen JiaLiLe Food Company. With the Pactrum Dairy Group, the family also has extensive property holdings in western Sydney.
Increasing demand for fresh food in supermarkets is driving interest in refrigerated warehouses.MORE than half a billion dollars’ worth of refrigerated warehouses are on the market as the demand for fresh food among such supermarket chains as Coles, Woolworths and Metcash attracts new entrants to the sector.
As revealed by The Australian Financial Review, Goodman Group and Brickworks have put up for sale, through JLL and Colliers International, a $250 million-plus, 50,000-square-metre chilled distribution centre at Sydney’s Eastern Creek.
Separately, family-owned cold storage company Oxford Cold Storage has appointed CBRE to sell its 24-hectare Laverton North estate in Victoria, also tipped to fetch about $250 million.
Analysis by JLL Research shows that of the 94 refrigerated logistics and distribution facilities identified in major capital cities, 27 of the largest are occupied by Coles, Woolworths or Metcash. A further 29 are occupied by Americold or Swire Cold Storage – two of the groups responsible for major contracts to Coles and Woolworths for meat, dairy and other products.
JLL director of national industrial research Nick Crothers said the refrigerated logistics and distribution segment is estimated to account for nearly 18 per cent of warehouse industry revenue in 2014-15, making it an $859 million dollar industry.
“Food and beverages imports in customs value has experienced remarkable growth in recent years, increasing 8.7 per cent per year in the three years to November 2014,” he said.
Stud cattle judging at Beef Australia 2015 will be held from Tuesday May 5 to Thursday May 7.JUDGES for the stud cattle competition at Beef Australia 2015, Rockhampton, have been announced.
Check out who will be making the big decisions.
Renee Rutherford works at her family’s Redskin Droughtmaster stud at “Redbank”, on the Fitzroy river.
Ms Rutherford has twice been a judge at the Brisban Ekka, as well as judging at many of her local shows.
Located 75 kilometres west of Rockhampton, “Redbank” also runs a Droughtmaster/Brahman based commercial herd.
A third generation beef producer, Lindsay Dingle breeds both stud and commercial Simmental and Simbrah cattle.
Mr Dingle judged at Beef Australia in 2012, and has previously judged at feature shows in Queenlsand and Western Australia, as well as at local country shows.
A director of the family owned meat processing Nolan Meats, Terry Nolan is involved in cattle breeding, backgrounding, feedlotting, beef processing and distribution.
Based in Gympie, Queensland, Mr Nolan judged at the inaugural Beef Australia in 1988, and in 2010 was named the Maersk Shipping Distinguished Australian of the Year for service to the Australian export meat industry.
Manager of Yulgilbar Pastoral Company, Baryulgil, New South Wales, Rob Sinnamon runs 5500 stud and commercial Santa Gertrudis cattle.
National Champion Young Beef Cattle Judge in 1987, Mr Sinnamon has judged the majority of beef breeds at every Royal show in Australia.
Co-principal of Palgrove stud with wife Prue, David Bondfield’s family was among the first breeders of Charolais in Australia.
Based in south east Queensland, Palgrove cattle have won the interbreed competition at the Brisbane Royal a record 10 times in the past 23 years.
He has judged cattle at every Royal show in Australia, as well as at events in New Zealand, Canada, United States and Scotland.
Neil Goetsch has 38 years’ experience in the livestock industry, showing both commercial and stud cattle.
This includes running a stud, commercial feedlot, fitting service.
The family also have Brangus breeding and fattening operations across Queensland in the Springsure, Dingo and Anakie districts.
Reade Radel’s family runs cattle across four properties in the Taroom, Injune and Augathella districts, Queensland.
This included the Kandoona Red Brahman Stud. Mr Radel has judged at shows across Queensland, including previously at Beef Australia.
Based at “Rowanlea”, south west of Calliope in central Queensland, Andrew Chapman is a fourth generation cattleman.
Now managing Rowanlea Cattle Company, a Santa Gertrudis and Brahman stud and commercial cattle operation, Mr Chapman has judged at regional and Royal shows in three states.
Raised on a stud and commercial cattle property between Chinchilla and Eidsvold in Queensland, Glenn Trout has managed the Tynan family’s Birubi Limousin and Lim-flex Studs at Wagga Wagga, New South Wales, since 1996.
He has previously judged at events including Farmfair International Edmonton, Canada 2014 and the Alberta Supreme Show, as well as royal shows across Australia.
Steve Pocock has worked in cattle breeding, feedlotting and stud operations across New South Wales, Queensland and the Northern Territory.
Currently operations manager at Brunette Downs Station for AACo, Mr Pocock has judged in the US as a member of the University of Illinios team, as well as locally.
Matthew Welsh family’s business, Welsh Cattle Co, has evolve over the years from commercial breeding to a major seedstock operation, Huntington Charbrays.
Jason Catts established Futurity Shorthorns in 1987 with wife Kylie and his parents John and Althea.
Now running the business, Mr Catts has judged at numerous royal shows, most recently the Angus at the 2011 Brisbane EKKA.
THE sheep industry is set to benefit from two new innovative research projects that will be undertaken at Charles Sturt University, Wagga Wagga.
The projects, funded by the NSW Sheep Industry Fund, were announced by NSW Primary Industries Minister, Katrina Hodgkinson, at Wagga last week.
The first of the research project will be a pilot study to investigate the potential claimed link between soil pH, nutritional conditions and the clinical expression of Ovine Johne’s Disease (OJD).
The results from this trial would then determine if further research in this area was warranted.
The second project will look at the effectiveness of vitamin and mineral supplements commonly used in sheep in NSW.
“This research will provide sheep producers with unbiased scientific information to help them decide if vitamin and mineral supplements are effective and economically worthwhile,” Ms Hodgkinson said.
Ms Hodgkinson said the initiative delivers on Goal 1 of the NSW Agriculture Industry Action Plan launched last year – to maintain a responsive and flexible industry.
“This strategic roadmap was developed between industry and the NSW government and ensures the continued growth of the State’s $12 billion primary industries sector,” Ms Hodgkinson said.
Sheep Advisory Group chairman Andrew Martel said the group provided advice to the Ms Hodgkinson on proposals for the use of the funds.
He said the NSW Sheep Industry Fund was used for research, extension or surveillance projects with outcomes that deliver practical benefits to NSW sheep producers.
Applicants seeking funding from the NSW Sheep Industry Fund for research, extension or surveillance projects may apply using the application form on the Department of Primary Industries website.
Allan Milan checking his wet season crop with SunRrice northern operations manager Steve Rogers.BURDEKIN cane grower Allan Milan calculates he made 50 per cent better net return from rice than he would have if the same land had grown sugar cane last season.
Rice, yielding nine tonnes a hectare from 54ha, also delivered a 30pc better return per megalitre of irrigation water than sugar.
A leap in input costs associated with cane farming in the past decade, particularly electricity to run irrigation pumps, have convinced Mr Milan and his wife Lynette to make better use of fallow cane land on their Giru district farm east of Ayr.
Cane crop input costs had jumped almost $10 to $30 for every harvested tonne in just eight years.
“There’s got to be more than one way to skin a cat,” said Mr Milan, pictured checking his wet season crop (expected to average about 8t/ha) with SunRrice northern operations manager Steve Rogers (right).
The Milans, with teenage sons Ryan and Caleb, expanded this season’s rice area to 184ha of their 560ha aggregation and will probably plant a dry season crop of up to 280ha.
Mr Milan said northern yields and returns, particularly for niche varieties, had improved notably since rice was previously grown in the Burdekin in the 1990s, with aerobic crops yielding about 2t/ha better than the 7t/ha previously grown in flooded bay systems.
“It’s an exciting time. SunRice has come in with the resources to provide technical support, markets and new varieties,” Mr Milan said.
“Although a lot of people are reluctant to leave the security of cane growing, there’s quite a bit of interest in rice.
Solid grain legume markets were also an attraction for growers using their 20pc fallow rotation area to grow mungbeans other pulses.
Many cane growers were also looking ahead at diversification options because of looming changes to cane marketing structures by global milling giant Wilmar.
NATIONAL forecaster the Australian Bureau of Agricultural Resources Economics and Sciences (ABARES) has made some late revisions to its final numbers for the 2014-15 winter crop.
Senior commodities analyst at ABARES Peter Collins said total national winter crop production had been increased slightly from the December figure to 38.2 million tonnes.
This was on the back of a 6 per cent increase in Western Australia and a 5pc upward revision in Victoria.
“What we found was that in Victoria, in spite of the well-publicised tough season in the Wimmera and Mallee, a lot of other areas had years better than expected, with frost damage not quite as severe as growers thought,” Mr Collins said.
In WA, he said while there were issues with hail and heavy rain at harvest it had not influenced the overall figure too much.
The 38.2mt crop is squarely in average territory, in spite of big rainfall deficits right down the east coast.
The crop was 13pc down year on year, but Mr Collins said the 2013-14 harvest was a large one, based on near record production in WA and South Australia.
barley output dipped 18pc to 8 million tonnes and canola dropped 10pc to 3.4 million tonnes.
The wheat figure is well below the five-year average, but Mr Collins pointed out this average was made up of several good seasons.
Mr Collins said the season could be described as reasonable.
The major falls in production occurred down the east coast.
Total production also looked to fall substantially in SA, down 12pc to 7.6 million tonnes, and WA, down 16pc to 14.6 million tonnes, but Mr Collins said it was important to remember these two states had come off historically high figures the season before.
Mr Collins said total canola production was down 10pc, but still clocked in at 3.4mt, well above averages up to 2010.
“We lifted forecasts slightly from December, primarily on the back of better yields than we thought in WA and Victoria.
Milos Trifunovic at Jets training on Thursday. Picture: Max-Mason HubersTHEY arrived in Newcastle with high hopes and, in some cases, illustrious reputations.
But can Serbian import Milos Trifunovic succeed where the likes of Emile Heskey, Mario Jardel, Michael Bridges, Francis Jeffers, Edmundo Zura and Edson Montaño failed and provide the Jets with a goal haul in double figures this season?
In the 10 seasons since the A-League’s inception, only two Newcastle players, Joel Griffiths and Adam Taggart, have scored 10 or more goals in a campaign.
Griffiths found the net 14 times in the championship-winning 2007-08 season, and Taggart scored 16 in 2013-14. Both were Golden Boot winners.
The best single-season return from an overseas player was Heskey’s nine-goal tally in 2012-13.
Trifunovic, who trained for the first time with his Newcastle teammates on Sunday, has scored 97 goals in a 327-game professional career at clubs in Serbia, Sweden, Uzbekistan, Kazakhstan and China.
Jets coach Scott Miller accepts that for his team to challenge for the play-offs they must dramatically improve their firepower up front.
Last season’s wooden-spooners scored only 23 goals in 27 games, the fewest in the A-League and 19 behind sixth-placed Brisbane.
‘‘If you look at the statistics from that, driven from there, you’d probably want him to score at least 10 to 15,’’ Miller said of his new recruit.
‘‘Now, that’s not my ambition for him. He’ll set his own targets.
Speaking with teammate Mateo Poljak acting as interpreter, Trifunovic was on the same wavelength as his new coach.
‘‘He doesn’t want to talk about himself,’’ Poljak said.
‘‘He wants to leave it on the pitch for everyone else to judge.
Asked if 15 goals was realistic, Poljak replied, on behalf of Trifunovic: ‘‘Obviously you can’t know what’s going to happen, but he can promise that he’s going to work hard.
The 30-year-old had a brief training session with the rest of Newcastle’s players on Thursday before individual shuttle runs with conditioning staff.
‘‘The initial response was good,’’ Miller said.
‘‘It was obviously a limited session for him, but he’s looking well, he’s physically fit, and he actually did some conditioning as well, which he came through very positively … Milos is right down the track of where we want him.
‘‘It’s now more about training with the team daily, to understand the principles.
While Trifunovic speaks limited English, several Jets players can speak Serbian, so Miller said the language barrier would not be a problem.
‘‘The first thing we did this morning was a three v one session, which was highly technical,’’ Miller said.
Miller said after extensive research and references he established that Trifunovic was ‘‘very dynamic’’ in front of goal and capable of succeeding in the A-League.
He was hopeful of giving him some game time in an intra-club hit-out at Magic Park, Broadmeadow, on Saturday.
‘‘I’d like to include him in that at some part,’’ Miller said.
The Jets still face a race against time to ensure their target man has his paperwork processed for the round-one game against the Phoenix in Wellington on October 11.
‘‘I’m preparing him as if he’s available,’’ Miller said.
● The Jets have announced a new jersey sponsor in global smartphone and tablet brand Alcatel OneTouch, whose logo will feature on the back of their away jerseys this season. | 2019-04-26T03:37:27Z | http://www.xmwyjj.com/2018/07/ |
"Ortsteil" redirects here. For subdistricts of Berlin, see Boroughs and neighborhoods of Berlin.
For other uses, see Village (disambiguation).
A village is a clustered human settlement or community, larger than a hamlet but smaller than a town, with a population ranging from a few hundred to a few thousand. Though villages are often located in rural areas, the term urban village is also applied to certain urban neighborhoods. Villages are normally permanent, with fixed dwellings; however, transient villages can occur. Further, the dwellings of a village are fairly close to one another, not scattered broadly over the landscape, as a dispersed settlement.
In the past, villages were a usual form of community for societies that practice subsistence agriculture, and also for some non-agricultural societies. In Great Britain, a hamlet earned the right to be called a village when it built a church. In many cultures, towns and cities were few, with only a small proportion of the population living in them. The Industrial Revolution attracted people in larger numbers to work in mills and factories; the concentration of people caused many villages to grow into towns and cities. This also enabled specialization of labor and crafts, and development of many trades. The trend of urbanization continues, though not always in connection with industrialization.
Although many patterns of village life have existed, the typical village is often small, consisting of perhaps 5 to 30 families. Historically homes were situated together for sociability and defence, and land surrounding the living quarters was farmed. Traditional fishing villages were based on artisan fishing and located adjacent to fishing grounds.
"The soul of India lives in its villages," declared M. K. Gandhi at the beginning of 20th century. According to the 2011 census of India, 68.84% of Indians (around 833.1 million people) live in 640,867 different villages. The size of these villages varies considerably. 236,004 Indian villages have a population of fewer than 500, while 3,976 villages have a population of 10,000+. Most of the villages have their own temple, mosque, or church, depending on the local religious following.
In mainland China, villages 村 are divisions under township Zh:乡 or town Zh:镇.
In the Republic of China (Taiwan), villages are divisions under townships or county-controlled cities. The village is called a tsuen or cūn (村) under a rural township (鄉) and a li (里) under an urban township (鎮) or a county-controlled city. See also Li (unit).
In Brunei, villages are officially the third- and lowest-level subdivisions of Brunei below districts and mukims. A village is locally known by the Malay word kampung (also spelt as kampong). They may be villages in the traditional or anthropological sense but may also comprise delineated residential settlements, both rural and urban. The community of a village is headed by a village head (Malay: ketua kampung). Communal infrastructure for the villagers may include a primary school, a religious school providing ugama or Islamic religious primary education which is compulsory for the Muslim pupils in the country, a mosque, and a community centre (Malay: balai raya or dewan kemasyarakatan).
The same general concept applies all over Indonesia. However, there is some variation among the vast numbers of Austronesian ethnic groups. For instance, in Bali villages have been created by grouping traditional hamlets or banjar, which constitute the basis of Balinese social life. In the Minangkabau area in West Sumatra province, traditional villages are called nagari (a term deriving from another Sanskrit word meaning "city", which can be found in the name like "Srinagar"=sri and nagar/nagari). In some areas such as Tanah Toraja, elders take turns watching over the village at a command post.[citation needed] As a general rule, desa and kelurahan are groupings of hamlets (kampung in Indonesian, dusun in the Javanese language, banjar in Bali). a kampung is defined today as a village in Brunei and Indonesia.
Kampung is a term used in Malaysia, (sometimes spelling kampong or kompong in the English language) for "a Malay hamlet or village in a Malay-speaking country". In Malaysia, a kampung is determined as a locality with 10,000 or fewer people. Since historical times, every Malay village came under the leadership of a penghulu (village chief), who has the power to hear civil matters in his village (see Courts of Malaysia for more details).
A Malay village typically contains a "masjid" (mosque) or "surau", paddy fields and Malay houses on stilts. Malay and Indonesian villagers practice the culture of helping one another as a community, which is better known as "joint bearing of burdens" (gotong royong). They are family-oriented (especially the concept of respecting one's family [particularly the parents and elders]), courtesy and practice belief in God ("Tuhan") as paramount to everything else. It is common to see a cemetery near the mosque. All Muslims in the Malay or Indonesian village want to be prayed for, and to receive Allah's blessings in the afterlife. In Sarawak and East Kalimantan, some villages are called 'long', primarily inhabited by the Orang Ulu.
Malaysian kampung are found in Singapore, but there are few kampung villages remaining, mostly on islands surrounding Singapore, such as Pulau Ubin. In the past, there were many kampung villages in Singapore but development and urbanization have replaced them.
In urban areas of the Philippines, the term "village" most commonly refers to private subdivisions, especially gated communities. These villages emerged in the mid-20th century and were initially the domain of elite urban dwellers. Those are common in major cities in the country and their residents have a wide range of income levels.
Selo (Cyrillic: село; Polish: sioło) is a Slavic word meaning "village" in Bosnia and Herzegovina, Bulgaria, Croatia, North Macedonia, Russia, Serbia, and Ukraine. For example, there are numerous sela (plural of selo) called Novo Selo in Bulgaria, Croatia, Montenegro and others in Serbia, and North Macedonia. Another Slavic word for a village is ves (Polish: wieś, wioska, Czech: ves, vesnice, Slovak: ves, Slovene: vas, Russian: весь). In Slovenia, the word selo is used for very small villages (fewer than 100 people) and in dialects; the Slovene word vas is used all over Slovenia. In Russia, the word ves is archaic, but remains in idioms and locality names, such as Vesyegonsk.
In Russia, as of the 2010 Census, 26.3% of the country's population lives in rural localities; down from 26.7% recorded in the 2002 Census. Multiple types of rural localities exist, but the two most common are derevnya (деревня) and selo (село). Historically, the formal indication of status was religious: a city (gorod, город) had a cathedral, a selo had a church, while a derevnya had neither.
The lowest administrative unit of the Russian Empire, a volost, or its Soviet or modern Russian successor, a selsoviet, was typically headquartered in a selo and embraced a few neighboring villages.
In the 1960s–1970s, the depopulation of the smaller villages was driven by the central planners' drive in order to get the farm workers out of smaller, "prospect-less" hamlets and into the collective or state farms' main villages or even larger towns and city, with more amenities.
The historically Cossack regions of Southern Russia and parts of Ukraine, with their fertile soil and absence of serfdom, had a rather different pattern of settlement from central and northern Russia. While peasants of central Russia lived in a village around the lord's manor, a Cossack family often lived on its own farm, called khutor. A number of such khutors plus a central village made up the administrative unit with a center in a stanitsa (Russian: стани́ца; Ukrainian: станиця, stanytsia). Such stanitsas often with a few thousand residents, were usually larger than a typical selo in central Russia.
There is, however, another smaller type of settlement which is designated in Ukrainian as a selysche (селище). This type of community is generally referred to in English as a "settlement". In comparison with an urban-type settlement, Ukrainian legislation does not have a concrete definition or a criterion to differentiate such settlements from villages. They represent a type of a small rural locality that might have once been a khutir, a fisherman's settlement, or a dacha. They are administered by a silrada (council) located in a nearby adjacent village. Sometimes, the term "selysche" is also used in a more general way to refer to adjacent settlements near a bigger city including urban-type settlements (selysche miskoho typu) or villages. However, ambiguity is often avoided in connection with urbanized settlements by referring to them using the three-letter abbreviation smt instead.
The khutir (хутір) and stanytsia (станиця) are not part of the administrative division any longer, primarily due to collectivization. Khutirs were very small rural localities consisting of just few housing units and were sort of individual farms. They became really popular during the Stolypin reform in the early 20th century. During the collectivization, however, residents of such settlements were usually declared to be kulaks and had all their property confiscated and distributed to others (nationalized) without any compensation. The stanitsa likewise has not survived as an administrative term. The stanitsa was a type of a collective community that could include one or more settlements such as villages, khutirs, and others. Today, stanitsa-type formations have only survived in Kuban (Russian Federation) where Ukrainians were resettled during the time of the Russian Empire.
Saint-Cirq-Lapopie in Lot is one of "The Most Beautiful Villages in France".
A commune is considered as a village if it is not part of a ville (urban unit). For the Insee, an urban unit has more than 2000 inhabitants living in buildings less than 200 metres from each others. An independent association named Les Plus Beaux Villages de France, was created in 1982 to promote assets of small and picturesque French villages of quality heritage. As of 2008, 152 villages in France have been listed in "The Most Beautiful Villages of France".
Villages are more usual in the northern and central regions, Azores Islands and in the Alentejo. Most of them have a church and a "Casa do Povo" (people's house), where the village's summer romarias or religious festivities are usually held. Summer is also when many villages are host to a range of folk festivals and fairs, taking advantage of the fact that many of the locals who reside abroad tend to come back to their native village for the holidays.
A village in the UK is a compact settlement of houses, smaller in size than a town, and generally based on agriculture or, in some areas, mining (such as Ouston, County Durham), quarrying or sea fishing. They are very similar to those in Ireland.
The major factors in the type of settlement are: location of water sources, organisation of agriculture and landholding, and likelihood of flooding. For example, in areas such as the Lincolnshire Wolds, the villages are often found along the spring line halfway down the hillsides, and originate as spring line settlements, with the original open field systems around the village. In northern Scotland, most villages are planned to a grid pattern located on or close to major roads, whereas in areas such as the Forest of Arden, woodland clearances produced small hamlets around village greens. Because of the topography of the Clent Hills the north Worcestershire village of Clent is an example of a village with no centre but instead consists of series of hamlets scattered on and around the Hills.
Some villages have disappeared (for example, deserted medieval villages), sometimes leaving behind a church or manor house and sometimes nothing but bumps in the fields. Some show archaeological evidence of settlement at three or four different layers, each distinct from the previous one. Clearances may have been to accommodate sheep or game estates, or enclosure, or may have resulted from depopulation, such as after the Black Death or following a move of the inhabitants to more prosperous districts. Other villages have grown and merged and often form hubs within the general mass of suburbia—such as Hampstead, London and Didsbury in Manchester. Many villages are now predominantly dormitory locations and have suffered the loss of shops, churches and other facilities.
For many British people, the village represents an ideal of Great Britain. Seen as being far from the bustle of modern life, it is represented as quiet and harmonious, if a little inward-looking. This concept of an unspoilt Arcadia is present in many popular representations of the village such as the radio serial The Archers or the best kept village competitions.
Many villages in South Yorkshire, North Nottinghamshire, North East Derbyshire, County Durham, South Wales and Northumberland are known as pit villages. These (such as Murton, County Durham) grew from hamlets when the sinking of a colliery in the early 20th century resulted in a rapid growth in their population and the colliery owners built new housing, shops, pubs and churches. Some pit villages outgrew nearby towns by area and population; for example, Rossington in South Yorkshire came to have over four times more people than the nearby town of Bawtry. Some pit villages grew to become towns; for example, Maltby in South Yorkshire grew from 600 people in the 19th century to over 17,000 in 2007. Maltby was constructed under the auspices of the Sheepbridge Coal and Iron Company and included ample open spaces and provision for gardens.
A village does not have a town hall nor a mayor.
If a village is the principal settlement of a civil parish, then any administrative body that administers it at parish level should be called a parish council or parish meeting, and not a town council or city council. However, some civil parishes have no functioning parish, town, or city council nor a functioning parish meeting. In Wales, where the equivalent of an English civil parish is called a Community, the body that administers it is called a Community Council. However, larger councils may elect to call themselves town councils. In Scotland, the equivalent is also a community council, however, despite being statutory bodies they have no executive powers.
There should be a clear green belt or open fields, as, for example, seen on aerial maps for Ouston surrounding its parish borders. However this may not be applicable to urbanised villages: although these may not be considered to be villages, they are often widely referred to as being so; an example of this is Horsforth in Leeds.
Like France, villages in Lebanon are usually located in remote mountainous areas. The majority of villages in Lebanon retain their Aramaic names or are derivative of the Aramaic names, and this is because Aramaic was still in use in Mount Lebanon up to the 18th century.
Syria contains a large number of villages that vary in size and importance, including the ancient, historical and religious villages, such as Ma'loula, Sednaya, and Brad (Mar Maroun's time). The diversity of the Syrian environments creates significant differences between the Syrian villages in terms of the economic activity and the method of adoption. Villages in the south of Syria (Hauran, Jabal al-Druze), the north-east (the Syrian island) and the Orontes River basin depend mostly on agriculture, mainly grain, vegetables, and fruits. Villages in the region of Damascus and Aleppo depend on trading. Some other villages, such as Marmarita depend heavily on tourist activity.
Pacific Islands Communities on Pacific islands were historically called villages by English speakers who traveled and settled in the area. Some communities such as several Villages of Guam continue to be called villages despite having large populations that can exceed 40,000 residents.
New Zealand The traditional Māori village was the pā, a fortified hill-top settlement. Tree-fern logs and flax were the main building materials. As in Australia (see below) the term is now used mainly in respect of shopping or other planned areas.
Australia The term village often is used in reference to small planned communities such as retirement communities or shopping districts, and tourist areas such as ski resorts. Small rural communities are usually known as townships. Larger settlements are known as towns.
Argentina Usually set in remote mountainous areas, some also cater to winter sports or tourism. See Uspallata, La Cumbrecita, Villa Traful and La Cumbre.
In twenty U.S. states, the term "village" refers to a specific form of incorporated municipal government, similar to a city but with less authority and geographic scope. However, this is a generality; in many states, there are villages that are an order of magnitude larger than the smallest cities in the state. The distinction is not necessarily based on population, but on the relative powers granted to the different types of municipalities and correspondingly, different obligations to provide specific services to residents.
In some states such as New York and Michigan, a village is usually an incorporated municipality, within a single town or civil township. In some cases, the village may be coterminous with the town or township, in which case the two may have a consolidated government. There are also villages that span the boundaries of more than one town or township; some villages may straddle county borders.
There is no population limit to villages in New York. Hempstead, the largest village, has 55,000 residents; making it more populous than some of the state's cities. However; villages in the state may not exceed five square miles (13 km²) in area. Michigan and Illinois also have no set population limit for villages and there are many villages that are larger than cities in those states. The village of Arlington Heights, Illinois had 75,101 residents as of the 2010 census.
In Michigan, a village is always legally part of a township. Villages can incorporate land in multiple townships and even multiple counties. The largest village in the state is Beverly Hills in Southfield Township which had a population of 10,267 as of the 2010 census.
In the state of Wisconsin, a village is always legally separate from the towns that it has been incorporated from. The largest village is Menomonee Falls, which has over 32,000 residents.
In Maryland, a locality designated "Village of ..." may be either an incorporated town or a special tax district. An example of the latter is the Village of Friendship Heights.
In North Carolina, the only difference between cities, towns, and villages is the term itself.
In many states, the term "village" is used to refer to a relatively small unincorporated community, similar to a hamlet in New York state. This informal usage may be found even in states that have villages as an incorporated municipality, although such usage might be considered incorrect and confusing.
In states that have New England towns, a "village" is a center of population or trade, including the town center, in an otherwise sparsely developed town or city — for instance, the village of Hyannis in the town of Barnstable, Massachusetts.
In the North, villages were under traditional rulers long before the Jihad of Shaikh Uthman Bin Fodio and after the Holy War. At that time Traditional rulers used to have absolute power in their administrative regions. After Dan Fodio's Jihad in 1804, political structure of the North became Islamic where emirs were the political, administrative and spiritual leaders of their people. These emirs appointed a number of people to assist them in running the administration and that included villages.
Every Hausa village was reigned by Magaji (Village head) who was answerable to his Hakimi (mayor) at the town level. The Magaji also had his cabinet who assisted him in ruling his village efficiently, among whom was Mai-Unguwa (Ward Head).
^ "Indian Census". Censusindia.gov.in. Archived from the original on 14 May 2007. Retrieved 2012-04-09.
^ "Archived copy". Archived from the original on 13 November 2013. Retrieved 14 March 2014. CS1 maint: Archived copy as title (link).
^ a b "Tutong District" (PDF). www.information.gov.bn. pp. 7–9. Retrieved 2018-03-01.
^ "Region2-city | Brunei Postcode". brn.postcodebase.com. Retrieved 2018-03-01.
^ "Brunei will remain a MIB-guided nation, thanks to religious education | Borneo Bulletin Online". borneobulletin.com.bn. Retrieved 2018-03-01.
^ "Merriam-Webster Online". M-w.com. 2007-04-25. Retrieved 2010-03-28.
^ a b c "Human Settlement Country Profile, Bulgaria (2004)" (PDF). United Nations Department of Economic and Social Affairs. Retrieved 2008-11-30.
^ a b Russian Federal State Statistics Service (2011). "Всероссийская перепись населения 2010 года. Том 1" [2010 All-Russian Population Census, vol. 1]. Всероссийская перепись населения 2010 года [2010 All-Russia Population Census] (in Russian). Federal State Statistics Service.
^ (in French) Ville - definition on the insee.fr site.
^ Wild, Martin Trevor (2004). Village England: A Social History of the Countryside. I.B.Tauris. p. 12. ISBN 978-1-86064-939-4.
^ Taylor, Christopher (1984). Village and farmstead: A History of Rural Settlement in England. G. Philip. p. 192. ISBN 978-0-540-01082-0.
^ OECD (2011). OECD Rural Policy Reviews: England, United Kingdom 2011. OECD Publishing. p. 237. ISBN 9264094423.
^ The Parliamentary gazetteer of England and Wales. 3. A. Fullarton & Co. 1851. p. 344.
^ "Maltby Ward". Rotherham Metropolitan Borough Council. Archived from the original on 21 March 2012. Retrieved 26 June 2011.
^ Baylies, Carolyn Louise (1993). The history of the Yorkshire miners, 1881–1918. Routledge. ISBN 0415093597.
^ "National Statistics". Statistics.gov.uk. Archived from the original on 13 March 2010. Retrieved 28 March 2010.
^ "Portobello Community Council". Porty.org.uk. Archived from the original on 4 March 2012. Retrieved 28 March 2010.
^ "Ouston Parish Council". durham.gov.uk.
^ "A project proposal". Almashriq.hiof.no. Retrieved 2010-03-28.
^ "Detailed map of Ohio" (PDF). United States Census Bureau. 2000. Retrieved 2010-03-28.
^ "Ohio Revised Code Section 703.01(A)". Retrieved 2010-03-28.
^ Adesiyun, A. A.; Adekeye, J. O.; Umoh, J. U.; Nadarajab, M. (1983). "Studies on well water and possible health risks in Katsina, Nigeria". The Journal of hygiene. 90 (2): 199–205. doi:10.1017/S0022172400028862. PMC 2134251. PMID 6833745.
^ How Katsina state is doing so much with so little. abrahamplace.blogspot.jp (29 October 2012; original from peoplesdaily-online.com).
^ Nigerian Operator Expands Coverage. cellular-news.com (5 April 2006).
"Village Communities" . Encyclopædia Britannica (11th ed.). 1911. | 2019-04-21T17:05:00Z | https://wiki2.org/en/Village |
Jacob is interested in machine learning and computer vision, particularly in in applying real-time implementations for robotics systems. He has a background in theoretical mathematics and software development, and is currently focused on his research with multi-robot systems and the robot soccer team. Jacob is an active runner and biker, and enjoys a nice game of Magic: The Gathering.
Sanmit is interested in reinforcement learning, and in machine learning in general. His current research focuses on curriculum learning -- the automated design of a sequence of tasks that enable autonomous agents to learn faster or better. Sanmit is also a member of the UT Austin Villa Standard Platform League team, where he works primarily on the vision system. In his free time, Sanmit enjoys playing soccer, running, and reading.
Josiah is interested in how the capabilities of autonomous vehicles can be used to increase the efficiency of modern traffic systems. He is also part of both the Standard Platform League and 3D simulation team for UT Austin Villa working on robot motion and skill optimization. Outside of his research, Josiah enjoys just about any sport, running, hiking, traveling, and reading.
Shih-Yun is interested in the development of autonomous systems, which can learn, self-regularize, and interact with the dynamically changing environment, including humans. She is currently working on the BWI project, working on integrated planning algorithms. She has a background in adaptive control systems, and is interested in the combined framework of control and learning algorithms. Outside of research, she enjoys tennis, reading, movies, and traveling. She sometimes travels for movies when in Taiwan, but not so much in the US.
Faraz is interested in reinforcement learning and imitation learning, particularly in how to use already existing resources to train agents. He is currently focused on learning to imitate skills from raw video observation. In his free time, Faraz enjoys playing volleyball, ping-pong, movies, and traveling.
Ishan is interested in Reinforcement Learning and AI in general, with a focus on techniques involving Deep Learning. His current research focuses on intrinsic motivation, meaning behavior that is motivated by the agent itself rather than as a result of a reward signal that is given to the agent externally. In his spare time, Ishan enjoys photography, reading, gaming and cooking.
Yuqian is interested in robotics and AI, with a current focus on using planning and learning techniques to improve systems of autonomous service robots. She is working on the BWI project, and participating in the RoboCup@Home team for UT Austin Villa. Outside of research, she enjoys watching basketball, traveling, and playing the piano.
Eddy is interested in applying insights from human intelligence to deep learning systems. He believes that doing so can lead to two important benefits: improved performance of said systems, and a deeper understanding of human intelligence. Outside of research, he is interested in mountaineering and climbing.
"Sequential Decision Making in Artificial Musical Intelligence"
Elad is interested in machine learning and its application in autonomous multiagent settings, as well as the emergent field of computational musicology. His dissertation focused on learning musical preferences and modeling the effect of musical stimuli on human decision making. Elad was also a member of the UT Austin Villa Standard Platform League team, working primarily on robotic vision and object recognition. In his free time, Elad enjoys music in every way and form (listening to it, playing piano and guitar, and writing his own), reading (anything from classic literature and philosophy to the sports section), cooking, and playing racquetball.
"Multilayered Skill Learning and Movement Coordination for Autonomous Robotic Agents"
Winner of UT Austin Computer Science Bert Kay Outstanding Dissertation Award.
Patrick's dissertation was on autonomous multiagent systems and machine learning. His research was motivated by using reinforcement learning to develop locomotion skills and strategy for the for the UT Austin Villa RoboCup 3D Simulation League team. Before coming to UT, Patrick worked as a software engineer at Green Hills Software and Acelot, Inc. in Santa Barbara, California. Outside of his research, Patrick enjoys playing soccer, traveling, and following college football.
"Fly with Me: Algorithms and Methods for Influencing a Flock"
Katie's dissertation examined the problem of influencing flocks of birds using robot birds that are seen by the flock as one of their own. In particular, Katie considered how these robot birds should behave, where they should be placed within the flock, and how to minimize disruption while joining and leaving the flock. Katie contributed to the UT Austin Villa robot soccer team throughout her time at UT, including a first place finish in the Standard Platform League (SPL) at RoboCup 2012 and a second place finish in the SPL at RoboCup 2016. She served as the SPL organizing committee chair for RoboCup 2013, the SPL technical committee chair for RoboCup 2014-2017, and will serve as an SPL executive committee member for RoboCup 2018-2020. Before joining UT, she obtained her B.S. in Computer Science from the Georgia Institute of Technology.
"On-Demand Coordination of Multiple Service Robots"
Job after graduation: Research Scientist, Cogitai, Inc.
Piyush's research focuses on advancing mobile robot systems in unstructured indoor environments. As part of his dissertation research, he developed multiple indoor Segway-based robots. Using these robots, he demonstrated how to use centralized probabilistic planning techniques to efficiently aid humans in the environment. During his time as a Ph.D. student, he has also worked on autonomous vehicles and the RoboCup Standard Platform League (SPL). In his spare time, he likes to cook.
"Cooperation and Communication in Multiagent Deep Reinforcement Learning"
Matthew's research focuses on the intersection of Deep Neural Networks and Reinforcement Learning with the goal of developing autonomous agents capable of adapting and learning in complex environments. In his spare time he enjoys rock climbing and freediving.
"Autonomous Trading in Modern Electricity Markets"
Daniel, an NSF IGERT Graduate Research Fellow, is researching how to design learning agents that solve sustainable energy problems. Such agents need to take robust decisions under uncertainty, while learning, predicting, planning and adapting to changing environments. Daniel's research included designing a learning agent for controlling a smart thermostat, and designing the champion power-trading agent that won the finals of the 2013 Power Trading Agent Competition. Previously, Daniel was part of the champion RoboCup 3D simulation team, UT Austin Villa. Outside work, Daniel enjoys literature, theatre, hiking and biking.
"Making Friends on the Fly: Advances in Ad Hoc Teamwork"
Currently: Senior Software Engineer, Cogitai, Inc.
Sam's dissertation examined the problem of ad hoc teamwork, cooperating with unknown teammates. His work explored how robots and other agents could reuse knowledge learned about previous teammates in order to quickly adapt to new teammates. While at UT, he also helped the UT Austin Villa team win the 2012 international RoboCup competition in the standard platform league (SPL). Before joining UT, he obtained his B.S. in Computer Science from Stevens Institute of Technology.
"TEXPLORE: Temporal Difference Reinforcement Learning for Robots and Time-Constrained Domains"
Todd's dissertation focussed on reinforcement learning and robotics, specifically looking at the exploration versus exploitation problem in reinforcement learning and working to apply it to large domains. Before coming to UT, Todd worked in the Motion Analysis Laboratory at Spaulding Rehabiliation Hospital, Motorola, Sun Microsystems, and the Air Force Research Laboratory. Outside of his research, Todd enjoys ultimate frisbee and foosball and is a dedicated New England Patriots fan.
Brad, an NSF Graduate Research Fellow, is researching how to design agents that can be taught interactively by human reward—somewhat like animal training. The TAMER framework is the result of his efforts. After giving a lot of demos of a trainable Tetris agent, he keeps getting called "The Tetris Guy." Brad spent the summer of 2011 collaborating at the MIT Media Lab with with Cynthia Breazeal, where he implemented TAMER on the social robot Nexi and began a postdoc in late 2012. In his free time, Brad runs in "barefoot" sandals, eats tasty trailer food, and tries out his robot training techniques on his dog.
"Sample Efficient Multiagent Learning in the Presence of Markovian Agents"
Doran's research is on agent modeling in multiagent systems. His main interest lies in modeling opponents in multiagent settings such as repeated and sequential games. He also has a parallel interest in model-based reinforcement learning and its overlap with multiagent modeling. He is also a member of the team that won the first Trading Agent Ad Auction competition held at IJCAI, 2009. Between his years in schools, he has worked as a software architect for a couple of years for Sybase and Johnson & Johnson. He is one of the developers of the open source software project perf4j: a statistical logging framework. Outside work, he is a soccer geek and loves following all kinds of soccer leagues around Europe.
"Learning Methods for Sequential Decision making with Imperfect Representations"
Shivaram is fascinated by the question of how intelligence can be programmed, and in particular how systems can learn from experience. His dissertation examines the relationship between representations and learning methods in the context of sequential decision making. With an emphasis on practical applications, Shivaram has extensively used robot soccer as a test domain in his research. His other interests include multi-agent systems, humanoid robotics, and bandit problems. Shivaram's return to his home country, India, upon graduation is motivated by the desire to apply his expertise as a computer scientist to problems there of social relevance.
"Robust Color-based Vision for Mobile Robots"
Juhyun's dissertation was on robust color-based vision for autonomous mobile robots. Specifically, he employed concepts and techniques from 3D computer graphics and exploited the robot's motion and observation capabilities to achieve that goal. As a member of the UT Austin Villa team, he contributed to the RoboCup @Home league 2007 and RoboCup Standard Platform League 2010, which finished in 2nd and 3rd places, respectively. Before joining UTCS, he obtained his B.S. in Computer Science from Seoul National University and worked at Ebay Korea. In his free time, Juhyun enjoys playing the electric guitar, snowboarding, and videogaming.
"Adaptive Trading Agent Strategies Using Market Experience "
David's research focuses on applications of machine learning in e-commerce settings. This research was motivated by his participation in the Trading Agent Competition, where he designed winning agents in supply chain management and ad auction scenarios. His dissertation explored methods by which agents in such settings can adapt to the behavior of other agents, with a particular focus on the use of transfer learning to learn quickly from limited interaction with these agents.
"Structured Exploration for Reinforcement Learning"
Nick's dissertation examined the interplay between exploration and generalization in reinforcement learning, in particular the effects of structural assumptions and knowledge. To this end, his research integrated ideas in function approximation, hierarchical decomposition, and model-based learning. At Apple, he was responsible for the typing model and search algorithms that underlie keyboard autocorrection on iPhones and iPads. Now at Google, he continues to help bring machine learning to mobile devices.
"Automated Domain Analysis for General Game Playing"
Greg's dissertation explored the benefits of domain analysis and transfer learning to the general game playing problem. Earlier in his graduate career, he was also a contributing member of the UT Austin Villa robot soccer team in both the standard platform and simulated coach leagues. At 21st Century Technologies, Greg applied machine learning and intelligent agent techniques to unmanned systems and data mining problems.
UT Austin Outstanding Dissertation Award.
Kurt's dissertation was on Autonomous Intersection Management, the project he helped start in his second year. He currently is employed at Google, where he employs mind-boggling amounts of data to make the World Wide Web a better place. Outside of his academic interests, Kurt enjoys playing the guitar, listening to music, playing board games, and photography.
"Autonomous Inter-Task Transfer in Reinforcement Learning Domains"
Matt's Ph.D. dissertation focused on transfer learning, a novel method for speeding up reinforcement learning through knowledge reuse. His dissertation received an honorable mention in the competition for the IFAAMAS-08 Victor Lesser Distinguished Dissertation Award. After UT, Matt moved to The University of Southern California to work with Milind Tambe as a post-doc, pursuing his interests in multi-agent systems.
"Autonomous Sensor and Action Model Learning for Mobile Robots"
Dan's dissertation presented algorithms enabling an autonomous mobile robot to learn about the effects of its actions and the meanings of its sensations. These action and sensor models are learned without the robot starting with an accurate estimate of either model. These algorithms were implemented and tested on two robotic platforms: a Sony AIBO ERS-7 and an autonomous car. After graduating, Dan joined Morgan Stanley as a trading strategist to model the behavior of illiquid credit derivatives.
"Adaptive Representations for Reinforcement Learning"
Shimon's research is primarily focused on single- and multi-agent decision-theoretic planning and learning, especially reinforcement learning, though he is also interested in stochastic optimization methods such as neuroevolution. Current research efforts include comparing disparate approaches to reinforcement learning, developing more rigorous frameworks for empirical evaluations, improving the scalability of multiagent planning, and applying learning methods to traffic management, helicopter control, and data filtering in high energy physics.
"Robust Structure-Based Autonomous Color Learning on a Mobile Robot"
Job after graduation: Research Fellow at University of Birmingham (UK) on the EU-funded Cognitive Systems (CoSy) project. August 2007 -- October 2008.
Then: Assistant Professor in the Department of Computer Science at Texas Tech University. 2008 -- 2014.
Currently: Senior Lecturer in the Department of Computer Science at University of Birmingham (UK).
Mohan's Ph.D. dissertation focused on enabling a mobile robot to autonomously plan its actions to learn models of color distributions in its world, and to use the learned models to detect and adapt to illumination changes. His post-doctoral work on using hierarchical POMDPs for visual processing management won a distinguished paper award at ICAPS-08. His current research interests include knowledge representation, machine learning, computer vision and cognitive science as applied to autonomous robots and intelligent agents.
PhD in Software and Information Systems Engineering, Ben Gurion University, 2019.
Research Interests: plan recognition, diagnosis, human-robot interaction.
Reuth's dissertation focused on plan recognition challenges, such as compact problem representation, efficient domain design and hypotheses disambiguation. Her algorithms have been applied in tasks for education, clinical treatment, and finance. Her long-term goal is to make human-aware machines that can perform tasks in collaboration with human team members.
Ph.D. in Industrial Engineering and Management, Ben-Gurion University, 2015.
Research Interests: distributed coordination of multi-robot systems, human-robot interaction.
Harel's thesis focused on developing a framework and distributed algorithms to represent and solve distributed mobile multiagent problems. Harel is a part of the BWI project and his work lies at the intersection of Robot Perception, Grasping and Navigation, Human Robot Interaction, Natural Language Processing, and Reinforcement Learning. In his free time, Harel enjoys playing basketball, soccer, swimming, and outdoor activities.
Ph.D. in Computer Science, Bar-Ilan University, 2017.
Research Interests: artificial intelligence, information disclosure, value of information, information brokers in multiagent systems, game theory, auction theory, multiagent economic search/exploration, human-computer interaction, mechanism design.
Shani's thesis research focused on the role of providing information to agents in multi-agent systems. Her thesis focused on three highly applicable settings: auctions, economic search, and interaction with people. Her research is based on both theoretical analysis and online empirical experiments. The theoretical analysis was carried out using concepts from game theory, auction theory, and search theory, while the online experiments were conducted on Amazon Mechanical Turk, a well-known crowdsourcing platform. Shani is currently working on projects including robots, ad-hoc team work, and real time traffic management of autonomous vehicles.
Ph.D. in Computer Science, Yale University, 2014.
Research Interests: robotics, human-robot interaction.
Justin's dissertation focused on robots learning about their bodies and senses through experience, culminating in a robot inferring the visual perspective of a mirror. His current work focuses on autonomous human-robot interaction, in particular the use of natural language and language grounding. His long-term goal is to enable robots to pass the mirror test, and to use self-reflexive reasoning and perspective-taking in human-robot dialog.
Ph.D. in Information Systems Engineering, Ben-Gurion University, 2015.
Research Interests: artificial intelligence, heuristic search, real-time search, multiagent pathfinding.
Guni's thesis research focused on two complicated variants of the path finding problem on an explicitly given graph: (1) multiagent path-finding where paths should be assigned to multiple agents, each with a unique start and goal vertices such that the paths do not overlap and (2) real-time agent-centered where a single agent must physically find its way from start to goal while utilizing a bounded amount of time and memory prior to performing each physical step. These days Guni is working towards integrating his past research into real time traffic management of autonomous vehicles.
Ph.D. in Artificial Intelligence, The University of Edinburgh, 2015.
Research Interests: multiagent interaction, ad hoc coordination, game theory.
Stefano's research focuses on ad hoc coordination in multiagent systems. Therein, the goal is to develop autonomous agents that can achieve flexible and efficient interaction with other agents whose behaviours are a priori unknown. This involves a number of challenging problems, such as efficient learning and adaptation in the presence of uncertainty as well as robustness with respect to violations of prior beliefs. The long-term goal of this research is to enable innovative applications such as adaptive user interfaces, automated trading agents, and robotic elderly care.
Ph.D. in CS and Human-Computer Interaction, Iowa State University, 2013.
Jivko's research focuses on aspects of developmental robotics dealing with multi-modal object perception and behavioral object exploration. His long term goal is to enable robots to autonomously extract knowledge about objects in their environment through active interaction with them. He is currently working on projects involving Transfer Learning in a Reinforcement Learning setting and Building-Wide Intelligence (BWI) using autonomous robots.
Ph.D. in Financial Economics, Duke University, 2013.
Michael's research focuses on robust autonomous mechanism design. His work looks at the allocation of scarce resources to self-interested agents in an optimal fashion. This requires making assumptions about the value of those resources to the agents. His research explores the sensitivity of the mechanism design process to those assumptions and how to design algorithms that generate mechanisms that are robust to mis-specification of the assumptions. His long term goal is to integrate this line of research with machine learning techniques to estimate and incorporate the valuations of the agents in a repeated mechanism design setting.
Currently: Assistant professor of Computer Science at SUNY Binghamton.
Shiqi's research is on knowledge representation and reasoning in robotics. His research goal is to enable robots to represent, reason with and learn from qualitative and quantitative descriptions of uncertainty and knowledge. He is currently working on projects including hierarchical planning using ASP and Building-Wide Intelligence (BWI).
Research Interests: reinforcement learning, knowledge representation, robotics.
Matteo's research is about the application of AI to robotics, in particular about decision making. His work is focused on mitigating the uncertainty on knowledge representations in autonomous robots, and the consequent flimsy behavior, through reinforcement learning. He is in general interested in how the rationality of automated reasoning can come to terms with the wild attitude towards exploration of most machine learning.
Noa's research is focused on various aspects of multi-robot systems, including multi-robot patrolling, robot navigation and multi-agent planning in adversarial environments. Her research uses tools from theoretical computer science for analyzing problems in practical multi-robot systems.
Chiu worked mainly on the Autonomous Intersection Management project while at UT Austin as a post-doc. Before entering UT Austin, he worked on several research projects in Artificial Intelligence, including automated planning and error detection in multiagent systems. In his spare time, he enjoys hiking and watching movies.
Michael researches various aspects of robotic systems, including motion, vision and localization. He currently teaches a class on Autonomous Vehicles and competes as part of the Austin Villa team at RoboCup using the Nao humanoid robots. In his spare time he enjoys basketball, cycling, running and soccer.
Tobias is interested in optimization and optimal decision-making: in particular how to act optimally when individual decisions have uncertain outcomes and far-reaching consequences. Knowing that his own abilities in this area are rather limited, he focuses his research on how these problems can be solved automatically and computationally. His thesis (nominated for the GI National Dissertation Prize) describes a novel and highly sample efficient online algorithm for reinforcement learning that is specifically aimed at learning in high-dimensional continuous state spaces. Some of his other work includes multivariate time series prediction, sensor evolution and curiosity-driven learning.
Job after UT: Senior Scientist at TRACLabs Inc.
Patrick is interested in the intersection of AI and robotics. This includes human-robot interaction, cognitive models for robotic navigation, and developmental robotics. He is currently working on a sensor-to-symbol cognitive architecture, which will enable modular robotic platforms to be used in a variety of domains with minimal software changes.
Ian's research is on developmental robotics and human-robot interaction. The first topic seeks to answer: how can a (human or robot) baby discover basic low-level perceptual and motor concepts through prolonged autonomous interactions with the world? The second topic broadens this to include social concepts, such as emotions, gaze-following, and turn-taking, and incorporates both care-giving and explicit teaching into the developmental process as well. This work mostly involves application and development of machine learning methods to robots which must interact with objects and people in the world in real-time.
As a post-doc, Bikram worked on transfer learning methodology for challenging knowledge transfer tasks, such as general game playing. Currently, he is working on multiple projects funded by NASA and DHS, that exploit multi-agent systems technology to solve problems relating to rocket engine tests and large scale crowd simulation.
Yaxin's Ph.D. research at Georgia Tech was on risk-sensitive planning. As a post-doc at UT Austin, Yaxin was key personnel on the Transfer Learning project. His research focussed on transfering value functions among related sequential decision making problems in order to speed up learning.
"Nondeterminism as a Reproducibility Challenge for Deep Reinforcement Learning"
Prabhat's Master's thesis studied the impact of nondeterminism on reproducibility in deep reinforcement learning. His work demonstrated that individual sources of nondeterminism in algorithm implementations can substantially impact the reproducibility of an agent's performance. Furthermore, standard practices in deep reinforcement learning may be inadequate at detecting differences in performance between algorithms. His thesis argues for deterministic implementations as a solution to both of these issues, showing how they eliminate nondeterminism and how statistical tests can be formulated to take advantage of determinism. Prabhat has previously interned at Yahoo!, Microsoft, and Facebook, working on ads targeting, team services, and messaging.
"Light-Based Nonverbal Signaling with Passive Demonstrations for Mobile Service Robots"
During his time as a Master's student at UT, Rolando worked on the Building-Wide Intelligence (BWI) Project. His Master's thesis was on light-based nonverbal robot signaling methods with passive demonstrations. Robots leverage passive demonstrations to allow users to understand the meaning behind nonverbal signals without having to explicitly teach users the meaning. Rolando previously interned at NASA Jet Propulsion Laboratories, working on intelligent spectral artifact recognition to inform weighted averaging to pull out faint signals in galactic hyper spectral imagery.
"Learning Attributes of Real-world Objects by Clustering Multimodal Sensory Data"
Priyanka's Masters thesis focused on constructing a framework for learning attributes of real-world objects via a clustering-based approach that aims to reduce the amount of human effort required in the form of labels for object categorization. She proposed a hierarchical clustering-based model that can learn the attributes of objects without any prior knowledge about them. It clusters multi-modal sensory data obtained by exploring real-world objects in an unsupervised fashion and then obtains labels for these clusters with the help of a human and uses this information to predict attributes of novel objects. She is currently a Ph.D. student at UT Austin and continues her research in the field of machine learning and robots.
"Localization using Natural Landmarks Off-Field for Robot Soccer"
During her time as a Master's student at UT, Yuchen worked on the SPL robot soccer team. Her Master's thesis was on localization with natural landmarks from off-field surroundings other than the artificial landmarks pre-defined by domain knowledge. Robots could recognize orientation by actively extracting and identifying visual features from raw images. She has interned at the Apple Siri team to improve natural language understanding, and she is now doing robotics research on iCub at the University of Illinois at Urbana-Champaign.
"Learning in Simulation for Real Robots"
For his Master's thesis, Alon studied several approaches to use simulation learning to improve the walk speeds of the real Aldabaran Nao robots. Though difficult, by constraining the simulation and iteratively guiding the simulation's learning routine, the task proved to be feasible, and an improvement of about 30% walking speed was achieved. Alon previously worked at Nvidia for two internships, working to bring up the the Android operating system to the company's Tegra processors.
"A Delayed Response Policy for Autonomous Intersection Management"
Neda did her Master's thesis on a delayed response policy for Autonomous Intersection Manager (AIM) as well as physical visualization of AIM using Eco-be robots. Before that she had worked on obstacle avoidance for 4-legged robots. Starting in 2010, she has been conducting research in the field of Neuroscience in the Center for Perceptual Systems at UT Austin.
"News Mining Agent for Automated Stock Trading"
For his Master's thesis, Guru worked with Prof. Peter Stone and Prof. Maytal Tsechansky to study the correlation between stock market movement and internet news stories, using text mining techniques. After graduation, Guru joined Amazon.com. He worked with multiple organizations at Amazon including the world wide supply chain and retail systems. At Shutterfly.com, he is the Sr. Director and General Manager of the Phoenix Engineering Center. He is responsible for engineering and product strategy for their Photobooks business (a $100 Million revenue business unit). Guru holds multiple patents pending in ecommerce. Prior to joining Amazon, Guru held research intern positions at IIT Delhi, IBM Research Center at Almaden, CA and the University of Joensuu in Finland. Reach him at [email protected].
"Evolutionary Algorithms in Optimization of Technical Rules for Automated Stock Trading"
Job after UT: Murex, North America Inc.
Harish worked with Prof. Peter Stone and Prof. Ben Kuipers to study automated stock trading strategies using intelligent combinations of simple, intuitive ``technical'' trading rules. Since he graduated from UT, Harish has worked in the financial software industry, mostly recently at Murex, which develops derivatives trading platforms and risk management software. He is currently pursuing an MBA at Kellogg School of Management, Northwestern University; where his areas of focus are Entrepreneurship & Innovation and Finance. His current interests are in product commercialization and new venture financing. He can be reached at [email protected].
"Of Mice and Mazes: Simulating Mice Behavior with Reinforcement Learning"
Virin's undergraduate honors thesis explored the extent to which instantiations of standard model-free reinforcement learning algorithms can approximate the behavior of mice learning in a maze environment.
"Efficient Symbolic Task Planning for Multiple Mobile Robots"
Yuqian's undergraduate honors thesis first compares the performance of two task planners of different formalisms in a robot navigation domain, and then presents an algorithm to efficiently plan for a team of mobile robots while minimizing total expected costs.
"Virtour: Telepresence System for Remotely Operated Building Tours"
Pato's undergraduate honors thesis introduced a virtual telepresence system that enables public users to remotely operate and spectate building tours using the BWI robot platform. Pato interned at Google and later interned at Apple before joining them as part of a distributed systems team. In his free time Pato enjoys dancing West Coast Swing.
"Keyframe Sampling, Optimization, and Behavior Integration: A New Longest Kick in the RoboCup 3D Simulation League"
Mike's undergraduate honors thesis demonstrates a procedure for mimicking, improving, and incorporating existing behaviors of an observed robot. The work detailed in the thesis was instrumental in UT Austin Villa's victory at RoboCup 2014, through which a paper based on the thesis was published. Mike is now a software engineer at Google, working on the Newstand app in the Play store.
"Approximately Orchestrated Routing and Transportation Analyzer: City-scale traffic simulation and control schemes"
Dustin's undergraduate honors thesis introduces a new agent-based traffic simulator for studying traffic control schemes for autonomous vehicles. It led to two first-authored publications. He continues development on the simulator at http://www.aorta-traffic.org. Dustin has interned at Facebook and Google, working on distributed systems.
"Applications of Genetic Programming to Digital Audio Synthesis"
Chris's undergraduate honors thesis employed genetic programming and CMA-ES to optimize sound synthesis algorithms to mimic acoustic and electronic instruments. Additionally, he authored a VST audio plugin for interactive genetic programming of synthesized timbres. Ongoing results of the project can be viewed at http://evosynth.tk/.
" Inverse Kinematics Kicking in the Humanoid RoboCup Simulation League"
Adrian's undergraduate honors thesis focused on the kicking system used in UT Austin Villa's winning entry to the 2011 and 2012 RoboCup 3D Simulation League competitions. He is currently the programmer for a small video game startup company, White Whale Games, working on a mobile game called God of Blades. Adrian completed two REU's at Trinity University and has interned at Starmount Systems and Microsoft.
"Transformation of Robot Model to Facilitate Optimization of Locomotion"
Nick's undergraduate honors thesis studies how to enable a simulated humanoid robot to stand up from a fallen position, and how to generalize such a skill to robots with different physical chacteristics. Nick has interned at at HP, Qualcomm, and Facebook.
"Constructing Drivability Maps Using Laser Range Finders for Autonomous Vehicles"
Chau's undergraduate honors thesis aims at using data from a 3D laser range sensor on an autonomous vehicle to improve the vehicle's capability to recognize drivable road segments. Chau interned at IBM, Cisco, and Facebook.
"Exploiting Human Motor Skills for Training Bipedal Robots"
Adam is a Ph.D. student researching human-robotic interaction, specifically investigating ways to exploit the ability of a human to quickly train robots. Adam has interned at TRACLabs, Amazon.com, and the University of Virginia Medical Center. In his free time, he enjoys biking, racquetball, and playing cello and guitar.
"Building an Autonomous Ground Traffic System"
Tarun's undergraduate thesis detailed his contributions to obstacle tracking in UT's entry to the DARPA Urban Grand Challenge and the Autonomous Intersection Management project. He is now working on launching SparkPhone - an application that provides users with 80-90% cheaper international calls versus directly dialing through your carrier. Additionally, unlike VOIP services, SparkPhone does not require that you have a WiFi or data connection when making phone calls because all SparkPhone calls go through the cell network. Over the past year Tarun has built several iPhone apps - one of which (HangTime) was just named by PC World as the dumbest iPhone app of all time.
"Creating a High-Level Control Module for an Autonomous Mobile Robot Operating in an Urban Environment"
Ryan's undergraduate honors thesis detailed his contribution to UT's entry in the 2007 DARPA Urban Challenge competition. His work mostly centered on the high-level control and decision-making aspects of an autonomous vehicle as it navigates through city streets. After graduating, Ryan took a position as a software engineer at USAA, where he has designed and implemented significant enhancements to the authentication and content capture components of usaa.com. Even so, his passion for robotics still continues today. Ryan is currently pursuing an MBA in Finance from UTSA.
"An Analysis of the 2005 TAC SCM Finals"
Job after graduation: Graduate student at University of British Columbia Currently: Co-founder of start-up company "Optemo"
Jan's thesis analyzed the 2005 TAC SCM Finals. This was part of the preparatory work that led the TacTex team to win the 2006 TAC SCM Championship. At UBC Jan became interested in natural language processing and wrote a dissertation titled "Supervised Machine Learning for Email Thread Summarization". Subsequently Jan co-founded a start-up company called Optemo that uses artificial intelligence to assist online shoppers by providing an example-centric product navigation solution.
"Discovering Conditions for Intermediate Reinforcement with Causal Models"
Irvin's undergraduate honors thesis dealt with accelerating reinforcement learning by automatically applying intermediate reward using causal models. His thesis received the Sun Microsystems Award for Excellence in Computer Sciences/Computer Engineering Research at the University of Texas undergraduate research forum. Irvin is currently studying reinforcement learning as a Ph.D. student in the computational cognitive neuroscience group at Princeton.
"Creation of a Fine Controlled Action for a Robot"
Ellie's undergraduate honors thesis focussed on enabling robots to perform action sequences that have low tolerance for error. After graduating, Ellie completed her M.S. in robotics and M.A.T. in secondary mathematics. She currently teaches math at the Pittsburgh performing arts school (CAPA) and hopes to introduce the joy of robotics to her students. | 2019-04-22T02:12:43Z | http://www.cs.utexas.edu/~pstone/students.shtml |
[Jenkintown, Pennsylvania, USA] – — Metropolitan Ballet Company (MBC) will hold auditions for its Boys’ Scholarship Dance Program on Saturday, June 7, 2014 at 9:00 AM, at the studio of Metropolitan Ballet Academy, 700 Cedar Road, Jenkintown, PA 19046. Up to fifteen boys ages 7-11 and 12-18 will be selected to receive a full year of free, weekly dance classes with Alexander Iziliaev, a former principal dancer with Pennsylvania Ballet and Denis Gronostayskiy, a graduate of the world-renowned Bolshoi Ballet Academy. Over fifty boys participated in the MBC program this year.
The Boys’ Scholarship Dance Program, celebrating its 16th year in 2014, provides tuition-free training in all-male classes to more than 50 boys, ages 7-18, each year. Boys’ unique movement and learning styles are addressed by distinguished male dancers serving as teachers and role models. The program offers weekly classes in beginning, intermediate and advanced ballet, as well as partnering; and guest instruction in modern, jazz, and character dance. It is designed to enhance athletic skills, flexibility, and strength. Participants in the program also enjoy many diverse performing opportunities. Classes begin in September 2014 and continue through June 2015. No prior dance experience is required.
The acclaimed Boys’ Scholarship Dance Program was founded by Lisa Collins Vidnovic in 1999 as a way to make ballet accessible to boys in the greater Philadelphia region. Vidnovic, a former Pennsylvania Ballet soloist and Ballet Mistress, founded Metropolitan Ballet Academy (MBA) in 1996 and Metropolitan Ballet Company (MBC), a nonprofit, pre-professional performing company, in 2001. Over 230 boys have participated in the program since its founding, and some have pursued professional careers in dance.
The MBC Boys’ Scholarship Dance Program is proud to be supported by grants from the Loeb Performing Arts Fund of The Philadelphia Foundation, and by many generous gifts from individuals. Metropolitan Ballet Company is a 501(c)(3) nonprofit organization.
For more information about auditions for the Boys’ Scholarship Dance Program, MBA classes for boys and girls, tickets to the MBA Showcase May 31- June 1, 2014, or tax-deductible contributions to MBC, please contact Lisa Collins Vidnovic at 215-663-1665 or visit http://www.metropolitanballetcompany.org.
[Calgary, Alberta, Canada] – Artistic Director Edmund Stripe is pleased to officially announce the School of Alberta Ballet’s Boys’ Scholarship Program. Designed to attract outstanding international and local talent, the program offers up to 25 full tuition scholarships to talented male dancers ages nine and older. In addition, the School of Alberta Ballet is proud to announce boys preschool classes in Calgary and Edmonton for only $80 per year.
“I am delighted to announce these scholarships to further encourage and assist talented male students to develop and hone their dance and performance skills at the School of Alberta Ballet,” says Edmund Stripe.
To be considered for these scholarships, male dancers ages nine and up are invited to audition for the School of Alberta Ballet’s Professional Division. Up to 25 full-tuition scholarships will be awarded each year, giving aspiring dancers the extraordinary opportunity to train full-time and receive their academic education at the official training centre of Alberta Ballet. All aspiring male dancers are encouraged to attend an upcoming audition in Ottawa, (March 29) Toronto, (March 30) Edmonton, (April 6) or Calgary (April 13-14).
To engage a new generation of male dancers, the School of Alberta Ballet is delighted to offer preschool boys an opportunity to attend the Open Division for only $80 per year. Boys ages 3-5 can attend classes that will cater to their high energy and learning style while giving them a chance to train with world-class teachers.
Registration opens April 1 for returning students and April 15 for new students. Further information can be found at schoolofalbertaballet.com.
For over 20 years, the School of Alberta Ballet has been consistently recognized as a world class training facility and charitable organization. Under the leadership of Artistic Director Edmund Stripe, the School has an annual enrolment of more than 500 students in its Foundation Training Program and Professional Division. The School of Alberta Ballet has an active community profile with free outreach and community programs reaching thousands of children every year.
This past spring, CPYB announced a new Male Scholarship Program, which is an expansion upon the Men’s Program currently in place at CPYB. This exciting program, and an outstanding chance of a lifetime I might add, is the first of its kind within a ballet school. I thought it might be interesting for us to take a peek into the program since the announcement was made. For the inside scoop, I interviewed CPYB school principal, Nicholas Ade.
Heading to Ballet Academy East (BAE) on Manhattan’s Upper East Side it seems like forty years ago since I first set foot inside the studio of the Maryland Youth Ballet (MYB) in Bethesda, Maryland. That’s likely because it was thirty-nine years ago. Or maybe it actually was forty. The number seems far less important now than the life-changing experiences that followed. Learning to dance profoundly altered my understanding of the world.
My world was transformed from the very first lesson. It morphed into an incredibly exquisite geometry of complex angles and swirls, invisible and yet nearly palpable lines of energy stretched off into infinity and all of it was wrapped up in beautiful music. Ballet was incredibly difficult but the more I managed to get right, the more hooked I was. Learning to use your body as an instrument of expression is one of the greatest experiences in the world. I won’t lie: I went for the pretty girls. I stayed for the art.
My first class was pas de deux — learning to dance with girls. This turned out to be MYB’s secret reason for wanting me to join up with them: they had an acute shortage of boys to support, lift, toss and catch the girls. Easy? No… this is athleticism of the highest order and was harder than any football or basketball I had ever played before. It was more difficult than I’d had any idea. Many schools still have trouble finding enough boys to help their girls learn partnering and this opens up a great opportunity for any boys thinking of learning to dance.
For my first class, I was placed at the barre behind a girl I recognized from my junior high school (I later discovered her name was Susan Jaffe) and I was casually instructed to just follow her. Initially I was bewildered by the French vocabulary that named the steps and floundered while trying to do things with my feet that seemed outlandish, verging on bizarre. Muscles previously unknown to me were put to use doing things I’d never conceived as I vainly tried to copy that girl whose name I did not yet know. She made everything look deceptively easy. Never in all the forty years that followed did I ever feel such all-encompassing pain as I did for two days after that first ballet class.
Ballet Academy East is where I have come today to see the auditions for the school. I’m here because BAE wants to attract some attention to its dance classes for boys. This is one of the top schools in New York and the school has valuable scholarships to offer.
BAE’s faculty is composed of some of the best teaching talent in New York City and the school regularly has its students hired by the best dance companies in the country. The school’s curriculum is based on the one used at Central Pennsylvania Youth Ballet which has turned out an improbably high number of professional dancers. The list of CPYB alumni is jaw-dropping in its breadth of success. Obviously the curriculum works and that is the model they are replicating at BAE.
BAE is run by Associate Artistic Director Darla Hoover and founder Julia Dubno who are equal parts likeably cheerful and deadly serious. The cheerful part is that they cultivate a warm and supportive environment with positive encouragement all along the way. In observing the first level, when students are getting their initial exposure to ballet, I note that Hoover has one lead teacher with two other faculty members to assist plus two advanced students. Every child gets strong individual, literal hands on attention. They hold weekly faculty meetings in which they discuss every single student in the school. Your child will not fall through the cracks here or be ignored just to get your tuition dollars. The serious part is that they are in business to provide top level training for the aspiring professional and their standards are correspondingly high. It is a cohesive micro-community built with a culture of success.
In watching Hoover run the auditions I was struck by a few notions. Hoover and all of the other teachers treat the children with dignity and respect. She has been evaluating the potential facility of young children for a long time and she has a clear and economical system for identifying potential and problems. The thorough care with which Hoover and her team evaluate the children verges on something resembling a medical exam. Among the nine year old girls, Hoover quickly identified one girl as having one leg significantly longer than the other and made a note to let the parents know. She explained that she doesn’t want to give anyone false hope nor does she want to miss out on a student who may have potential that has yet to be realized. Ballet is extremely demanding and physical suitability is essential.
When the older students filed in for their audition, Hoover put them through their paces in an abbreviated ballet class. She was looking for the things that matter. Timing is crucial in a young dancers training if they are to reach the necessary developmental plateaus to become professional dancers. If certain elements of musculature, body awareness and discipline are not in place by the time a student reaches thirteen or fourteen then Hoover won’t be able to help. Several of the girls clearly have had extensive training but it was equally clear that it was not training of high rigor or quality. They were unable to jump, they had surprisingly little muscle tone and were generally vague about their movements. It is too late to remediate most of them. There were a couple of girls that Hoover felt she could really help with four years of hard work.
Among the boys there was one potential future dancer who was inexperienced. When we spoke about him later, Hoover identified his willingness to try things that he’d never seen before and he made fairly good approximations of the steps with solid jumping ability. He was alert, focused and displayed generally good energy and physical coordination. He had an apparent desire to learn and tried his best at everything without getting frustrated. She felt certain she could make a dancer out of him. This was his lucky day.
Any boys out there that have thought about going into dance are well advised to take a close look at Ballet Academy East. There is another audition on Monday, September 16 at 5:30pm. Theirs is a nurturing and thriving community of young artists. There are performance opportunities twice a year providing challenging choreography. Young men will get to partner with some of the best young women in the city in an environment that is notable for its lack of friction and competition. Partnering experience is absolutely essential in getting a professional dance job.
Where some schools lack depth in male teachers, BAE has plenty of them and the school is turning out great male dancers such as New York City Ballet’s Chase Finlay. Becoming a dancer is one of the most physically challenging things you can do with your body in terms of athleticism. The greater your commitment and the harder you work, the more you are rewarded. You should also know that Darla Hoover is known for motivating dancers with the reward of a cupcake. She claims it worked with Chase Finlay.
Here’s what I know: Once you become a dancer you never really stop being a dancer. The discipline becomes part of your mind and body and is inextricable from your experience of the world. You will have a heightened sense of awareness of your body and your relationship to the physical world. That internal sense of balance and economy of movement that dancers develop never completely leaves you.
When you become a dancer, your internal yardstick of excellence is forever tied to a physical ideal that is at once inspiring and frustrating. When you see brilliance at that level it becomes a profound experience of a transcendent ideal which combines form with movement. It is simultaneously frustrating because that level of perfection is unachievable for most of us.
If, just once in your life, you had been lucky enough to experience what it was like to be able to use your body as an instrument of pure expression you would never want to go back to the way you were. And finally, however hard you may have to work at any other job for the rest of your life, you will always compare it to how hard it was to be a dancer and you will feel relieved that by comparison what you’re doing now isn’t that hard.
For young boys who are interested in studying ballet, here’s an opportunity that cannot be missed! Ballet Academy East (BAE), known for training young ballet dancers to become professionals, will hold auditions to offer a full-year scholarship to boys. Auditions will be held on Wednesday, Aug. 28 at 4:45 p.m. and Monday, Sept. 16 at 5:30 p.m. at Ballet Academy East, 1651 Third Ave. Eight, full-year tuition scholarships will be awarded.
Some alumni include Chase Finlay, New York City Ballet, principal dancer; Ariel Rose, Miami City Ballet; Trevor Felixbrod, Alabama Ballet; Ian Bethany, Ballet Austin; Kendall Britt, Ballet Memphis; Alexander Castillo, soloist; Christopher McDaniel, Los Angeles Ballet; and Devon Carbone, Bavarian State Ballet II, among others.
Students of BAE are guided under the tutelage of faculty members that include Hoover, Charles Askegard, Maxim Beloserkovsky, Cynthia Birdwell, Olga Dvorovenko, Peter Frame, Jenna Lavin, Joseph Malbrough, Tara Mora, Francis Patrelle, Elizabeth Walker and Cheryl Yeager. The curriculum includes technique classes, pointe, partnering, variations, stretch, men’s weight training, modern and character. Performing opportunities include two annual productions: the Studio Showing in February and the Spring Performance in May. The director and founder of Ballet Academy East is Julia Dubno.
A girls’ auditions will also take place on the same day, but dancers will be separated into groups upon arrival.
To apply to attend an audition, visit www.baenyc.com, click on “Pre-Professional Division” and follow the online instructions; call 212-410-9140; or send an email to [email protected]. For more information, visit www.baenyc.com.
[Media, Pennsylvania, USA] – The Academy of International Ballet, official school of International Ballet Classique, is pleased to announce a special “one year” TUITION-FREE program for boys ages 7 through 18! This unique program is designed to enhance athletic skills, flexibility and strength. Participation in this special program includes opportunities to perform in our future ballet performances. All students in this special program must audition for possible acceptance. No prior dance experience is required.
Boys in this special Vaganova-based training program will build stamina, flexibility, muscle tone and strength, including balance and coordination using exercises and dance movements.
According to IBC Artistic Director Denis Gronostayskiy, “Our special one year program for boys is a beneficial activity both mentally and physically. It is a mentally demanding and a physically challenging program. Boys will do much running, jumping and sports-related physical activity in a large studio rather than on a playing field. The student will learn how to correctly hear, move and react to music under pressure, how to cooperate with others; and, most importantly, learn first hand traditional courtly manners and social etiquette. This 10-month program is based on the revered Vaganova Method of teaching ballet to boys. By offering to young men this free experience-enhancing program we provide a skill set platform to launch many different careers one of which is, of course, professional ballet”.
All classes are taught in the finest traditions of the Bolshoi, heir to almost 300 years of excellence in ballet.
There is no tuition for this program. Commitment to class attendance and rehearsal time is required and adherence to all rules and regulations. All are invited.
Open auditions will be held at the Academy of International Ballet located on the upper level of the Granite Run Mall, Suite 209 at 1067 West Baltimore Pike , Media PA 19063. Audition start time is 10:00 a.m., Saturday, August 10th. Please arrive at least 15 minutes before start time. For additional information call 484-444-2389 or 866-908-5666 or e-mail us with your questions at [email protected].
[Herndon, Virginia, USA] – Classical Ballet Theatre (CBT) offers full scholarships to boys and young men interested in training under the auspices of the renowned Alisher Saburov. Mr. Saburov — a former Bolshoi Ballet star with high expectations, quiet discipline, and masculine form — has produced very successful male athletes. His young dancers typically earn high placement in the Youth America Grand Prix competition, receive scholarships for summer training with outstanding ballet companies, and portray important roles in CBT’s full-length productions. Those who choose also go on to dance professionally. For example, one alumnus currently is performing with Atlanta Ballet, and another enjoyed careers with San Francisco Ballet, Cincinnati Ballet, and Smuin Ballet before enrolling in Stanford University.
At this time, there are openings in the scholarship program for new and current male dancers. For more information, please contact Kim Brummett at (703) 471-0750.
CBT is a not-for-profit performing arts organization dedicated to providing education, performance, and outreach opportunities in the art of dance to Northern Virginia and the surrounding communities. For more information about CBT, its classes, or upcoming performances, please visit http://www.cbtnva.org and Facebook.
[Miami Beach, Florida, USA] – If you ask someone to name a valuable commodity, they may say gold, or oil. Ask someone in ballet the same question, and there’s good chance they’ll say boys.
Most ballets have almost equal part male and female roles. But in the U.S., boys who want to do ballet are hard to come by. For that reason boys often receive full scholarships to ballet schools and other forms of special treatment in order to attract them to the profession.
Even though the ballet field is flush with women, it’s generally men who become choreographers and artistic directors.
This phenomenon, where men quickly rise to the top of female dominated professions, is called the glass escalator. University of Texas at Austin Sociology Chair Christine Williams coined the term and says it’s basically the opposite of the glass ceiling effect.
“So, instead of suffering from a wage gap they often receive a wage premium for men even though they’re working in jobs that are predominately female,” said Williams who has been studying gender inequality in the workplace for decades.
She says for women in ballet to make it into a top company, they may have to be the best dancer out of hundreds of others.
However, as cushy as ballet might sound right now if you’re a guy, Neal says devoting your life to the art form is a double-edged sword. Growing up in a private, all boys school in Virginia, Neal had to deal with a lot of teasing.
Whatever the tradeoff, the school’s recruitment efforts seem to be working. Miami City Ballet School enrolled more boys at the beginning of this season than ever before. | 2019-04-26T00:28:32Z | https://boysballet.wordpress.com/tag/ballet-scholarships-for-boys/ |
abandon the ipad app - Just a thought?
As the IT Manager of a College of over 1000 students and a BYO notebook and ipad programs running now for several years I think that through out our last 18 months of canvas I have come to believe that any further development of the ipad app is a waste of development time and Canvas should move to refocus this precious resource to things that would make a difference.
The user can experience the great efforts of customisation of the College branding.
Can access a lot more simpler integration with other applications such as office 365 - Onedrive and locating and uploading files.
You can concentrate on a single source of training documents.
features within the browser are easier to see, and get more from the product overall.
Teachers and students are aligned when different devices are in the same class and are able to use the same visual cues to move around the product.
About all I can figure out on the iPad is how to play Candy Crush Saga, so convincing me of their uselessness won't take much. I was wondering if your comments would also apply to the iPhone and Android devices as well. In other words, is it a problem with apps in general or is it specific to the iPad?
When our college conducted a survey, tablets did not have a high adoption rate. I also had a student who started my class this summer using Firefox 3 (no, I didn't leave a digit off the end) and nothing would work right and she couldn't get through our mandatory orientation that relied on completing items in a module. Instead of updating the browser, she decided she would run the class from her iPhone, which had an old unsupported version of iOS on it as well. The iPhone app worked for some things but definitely not for others. It seems that iPhone development would be similar to iPad development and if you're going to have one you might as well have both.
But then I don't really use either. I use the iPad every now and then to see what it will do because I know what it does is supposed through the API and so if I'm trying to figure out something with the API, I might double check it against what the iPad app does. Granted, that's not enough reason to keep developing an iPad app.
I wonder if the iPad adoption is higher among K-12. Perhaps they have a different story as to why its development should continue.
I do know that having a free mobile app was one of the selling points of Canvas as it came at a time when others wanted you to pay or was limited to Sprint users. Everyone thinks they need to have an app for that, but how many people really use them for Canvas?
I would suppose that Canvas has looked at app usage vs browser usage.
Update after Ryan's post: I missed the correction later on the page. Sorry Ryan Seilhamer. Your video did a good job of showing how mobile use is on the rise.
I want to clear up my statement above " Another post back in June mentioned (not from an Instructure employee) that the Canvas App was almost pulled, but provided no reason:"
There is an error in this statement on my end (I corrected it on the page). Canvas has NEVER told me that they were considering pulling the Canvas Mobile app. This was in reference to the Canvas Polls app, not the main Canvas Mobile app. The Canvas Mobile app is their clear priority and will exist and get better over time.
I've updated my original post. Thanks for pointing that out Ryan.
I hope Instructure chooses not to pull Polls. It is a worthwhile app, but it is also a dead end right now. If polls could be accessed through a browser, linked to Canvas test banks, and report to the grade book, it would be super awesome. Now, it just floats in space and is disconnected from the rest of Canvas. It should be integrated, not discontinued.
I think what users like about the canvas app is that they can push 1 button and they are in. typically, users will have to launch the browser app, then navigate to canvas and then login, etc.
i think if you created a shortcut to canvas in safari, or puffin, or whatever, and put the canvas logo as the shortcut icon, your users wouldn't know the difference.
make every thing user friendly.
Matthew, since your prompt invites open-ended discussion about the subject, and since no one answer can conceivably be marked as definitively "correct," I'm going to change this question to a discussion.
I'm a big believer in giving users choice. Some individuals would prefer the app and others prefer the web. Let them choose instead of us choosing for them. In the hybrid master's program where I work, we issue our students iPads. While I don't have the data to prove it, my observation has been that most prefer the app.Yes-there are improvements to be made to the iOS app, but they are coming. I hope Instructure continues to support the app.
This is a great discussion point.
I have to admit that I don't have any experience with a full scale deployment of iPads in education. I know it's done in some colleges, but is much more popular in K12.
This is something that is coming to the mobile apps. Instructure wants to create a branded mobile experience.
I don't have experience with this particular integration, but I do know that there is OS level integration on iOS and Android with most apps including One Drive, Dropbox, Google Drive, and more.
I think this is a draw. I think most users can find the tools they need on either platform (mobile/web), especially if they use the platform often. I have no issues navigating the iPad app, but pause when using the Android tablet version because I'm not used to the layout.
From iOS to Android, I definitely agree. There is definitely a parity issue with the apps. Some of this could and should be fixed, but others things are specific to their respective mobile OS. IOS flat design is not Android Material, and so on.
Although I do agree that the iPad and iPad app have some limitations, and can (and will) benefit from continued development, there are still some advantages over the mobile web browser.
Native integration with mobile apps. This is the "open in" for most apps. Media can be created on the iPad and immediately be added to discussions, announcements, and files. Unfortunately this doesn't apply to content, but for students this wouldn't matter.
Access to camera to video. This includes comments for students and teachers.
Access to microphone to record audio. This includes comments for students and teachers.
Native notifications on Android (soon to iOS).
Also, if you haven't tried out the Android tablet version, you should. It's a little more refined than the iPad version.
Anyways, I'm not going to say everything is perfect, but while there are some advantages to using the iPad version of Canvas, it will never completely match every feature of the web. It's just not a realistic goal.
Hi Ryan, thanks for the information and while I agree the ios app is always improving, this is actually the whole point of the discussion, how long should you wait and is it worth the development time when the best user experience is already there. Users will steer away from the frustrating to the simple very quickly and then you find your developing for the minority which is then questionable from a cost perspective.
While is it not a query about the ipad itself, I find this such a great classroom resource it is about the actual canvas app. Yes we allow choice and don't dictate what the students want to use, that is the whole point of BYOD, teach the task not the tool.
Things are always improving, but the things that we find most frustrating with the app are not there and the browser contains them.
One of our most frustrating parts of the app and iPads is that if you have an external keyboard connected, you cannot even use the search function at login to find your School, it doesn't work, if you turn the keyboard off, the search function works again? "Case logged, no solution in sight"
There is integration between the app and office365, however to perform simple uploading of a file from onedrive to canvas through the app is laborious and too many steps to do it, not only that you are moving from one app to another app and back again. utilising the browser it is much simpler and only takes 3 steps with onedrive file structure right inside your browser, could not be more simpler.
The training I referred too was standardised documentation for using canvas on any device. if you can use the same screenshots steps and the teacher performing tasks on screen has the same visual cues as the device, those less than ICT comfortable students can get a better understanding of where the teacher is at and also the teacher can aid the students if queried, how did you get there, or mine doesn't look like that.
Thanks for the further detail. You make some great points about the reasons to steer your users to the mobile web instead of the app. I think my point before was neither solution is going to be 100 percent. You have better access to iPad's files and apps, camera, and microphone through the mobile app, but have better access to integrations and specific tools through the browser. At this point I think they need to work in tandem because of the limitations in each. This is the case with many apps, not just Canvas.
Regardless, I can't imagine a day anytime soon where Instructure will seize development of their tablet products. A lot of this is driven by K-12 1:1 initiatives and is imperative to their adoption of Canvas and even for its downfalls, the app is still important to their user base.
I recently did an app purge on my phone and tablet. Most got the ax, because: "Hmm. I can do this in the browser. Why the heck do i need an app taking up space on my device? The browser version has more features, too. What's the point of the app?"
From a support standpoint, I totally agree with this. We get many questions about how to do something on the iPad app. Invariably, I need to tell users they can't do this and just to use the browser version instead. iPads are still relatively costly and not as in wide use as mobile phones, in particular with students. I would rather see mobile development focused on the phone apps rather than the iPad.
I heard from other schools that they get "many" support questions about the Canvas Mobile apps (not just specifically iPad), but our university is at around 1 percent of requests, which is about 10-12 tickets a month. The majority relate to login issues. I guess it depends on how your institution is using the apps?
I totally agree with this from a support standpoint as the App adds another wrinkle that support has to deal with. Not to mention there is an Android and IOS app so support has to be familiar with every desktop browser and the functionality of both apps. And both mobile apps do not mirror each other in functionality either so we have multiple ways to access Canvas and none of them mirror each other in capability and functionality.
When i personally compare the app to the mobile browser experience i would take the mobile experience every time. In this day and age with the size of smart phone screens and ease of mobile browsing i definitely feel there should be more of a focus on the mobile browser and not the app.
There are some features of Canvas that do not work in the mobile browser. One example is that the next and previous buttons sometimes disappear in mobile Safari for modules. However the bug ticket i submitted had the reply that Canvas does not support the mobile browsers and use the app.
It seems to me that fixing the mobile browser issues would allow for a more seamless experience across all browsers, desktop or mobile, and would be easier and less time consuming to implement than continuing to be 3 to 4 steps behind on the mobile devices with apps.
I personally have wondered how the new UI will play into this. It seems to me that the changes Canvas has made in the new UI have correlations to a better and less cluttered mobile browser experience.
I personally find the app less effective than using Safari on my iPad.
From what I've seen, the UI updates coming to the site may replace any usability issues with the app via browser. However...the Student Support Coordinator on my team really focuses on the website for her demonstrations and support. I find that our students (Undergraduate and Graduate) respond to having "an app for that."
The effort (I know...it's minimal at best) to open the browser > click on a bookmark or icon > possibly enter a user name/password that they forgot may be too much for them. The site is just not as easy to navigate via an iOS browser as it is on a computer, and this presents students with the option to do their best work their way. Sometimes, just because there is an app option, it makes them think more critically about their learning and how they are going to achieve the goals and outcomes they set for themselves. Demonstrating - or at least introducing - is key for engagement.
Yesterday during lunch, I observed a student using the app and keeping track of her current grades on the home screen. If anything, I think the app presenting that information upon opening is well worth talking about it with students! Does it have room for improvement? Sure. Should we abandon it all together? No. Not yet, anyway.
I haven't had time to read through all of the comments/replies above, but before I forget about this, I wanted to post a concern. And I apologize if this was already discussed above. One of the #1 reasons we switched to Canvas was having the ability to record video & audio directly within Canvas using the iPad app. It's a crucial need for our Language department that's used multiple times a week throughout the school year. When I was demo'ing all of the different LMS options, my very first "Hat" I put on was the Modern Language teacher. If I couldn't easily do recordings from an iPad, that LMS was crossed of the list of potential winners.
So hearing "Abandon the iPad App" scares the heck out of me for this reason alone Also, I have a lot of faculty who really like using SpeedGrader app on their iPads while on the train.
Technically, the Speegrader app is a separate app so I don't think that's what the OP and others are talking about, although I could be wrong. I think they are only talking about the Canvas app which is more the student side of things.
Anywhere from 85-90% of our students access Canvas primarily through a web browser on their laptop/desktop so that's where I put my focus and energy. Occasionally, I might address something for a student who is using the app, but it's not high on my priority list.
I agree that the iPad app can be kind of clunky, and I have had several students try to use the app to function exactly as a laptop. Of course, that resulted in some frustrations. I do not know if getting rid of the app is necessarily the answer. Students have similar difficulties when using out-of-date browsers on their laptops.
First, hats off to the app development team. It is obvious that much effort goes into these mobile apps and your efforts are certainly appreciated. Students have quick access to course materials and can check due dates and so much more in an instant.
However, I have trouble using the app for a few reasons. Primarily, in order to reply to recent unread discussions I find it is required to scroll downward sometimes through a hundred or more posts. While students can type out a reply to the original discussion prompt fairly easily, in order to see new posts they also must scroll through the hundred or more posts to get to the new content. This barrier to adoption has caused me to stop using the app in favor of the browser.
Here's an interesting data point: according to a Nielsen study, 89% of media usage on a mobile device is in apps: http://www.smartinsights.com/mobile-marketing/mobile-marketing-analytics/mobile-marketing-statistics/ While obviously, this does not survey student LMS preference access on mobile device, it shows a significant preference for mobile apps over mobile browsers. Therefore, it is a fair assumption that students and faculty members are accustomed to using mobile apps instead of the mobile browser on their devices. Perhaps Instructure has data to show if there's a similar preference with accessing Canvas on mobile devices.
Sorry to resurrect this post again, but I just now saw it in my feeds and wanted to comment as well.
I have to agree about the iPad app. Because the native Canvas interface is so fully functional on the larger screen sizes of iPads, I don't see much value added for a tablet specific version of Canvas. I don't hate it and want it gone or anything, but I agree that no more development effort is really needed there. HOWEVER, the phone version is critical. In many cases, as others have pointed out, the screen size of the Canvas interface on hand-held mobile devices like the iPhone (maybe not the 6+ mind you) make using the browser version much more difficult. The thumb-enabled interface on hand-held-size mobile devices is one of the reasons our university decided to adopt Canvas and abandon our previous LMS.
TL;DR - Ditch the tablet apps, but keep the mobile apps as the official thumb-based interface.
We have iPads K-8, 630 some students. 6-8 using canvas, 230 kids with iPads and the Canvas app. I agree that the app is severally lacking. And my main criticism of canvas is the fact that they don't support mobile safari. Most of our canvas issues fall back on the app, so the kids move to the browser but then run into issues there as well, which of course canvas won't help with since mobile safari isn't supported..... 99% of the issues we come across are simple compatibility issues that can be resolved with css tweaks.
That said I don't think Canvas should abandon the iOS app, but I do think they should devote far more resources to it. The web version is great, but without an app things such as push notifications aren't really an option in iOS. One thing they could do though is just scrap the current app, fix and fully support the web version and make an app that just wraps the web interface into an app - so they can use push notifications and other tools that are app specific.
I also think they should integrate something like Type On PDF, and a word basic processor into the Canvas app directly, so students don't have to leave the app to open documents and edit them. | 2019-04-25T01:03:52Z | https://community.canvaslms.com/thread/6143-abandon-the-ipad-app-just-a-thought |
In Flagler Beach, proposals that make residents angry never die. They just fade away to return at a later date, again and again. And so for the third time in 19 months, a proposal to regulate roving food vendors re-emerging, this time with a distinct difference: the proposal is in the form of an ordinance that singles out mobile vendors—and bans them altogether from city limits except during special events.
It is the most far-reaching and strict proposal yet, exceeding what most Flagler Beach city commissioners had suggested to date, and likely to again stir up the sort of anger and opposition that previous but vaguer such proposals had drawn when discussed in April and February 2012. The city commission takes up the proposal at its Thursday meeting, which begins at 5:30 p.m. at Flagler Beach’s city hall. But the meeting agenda is stacked with more than two dozen items, with the mobile vendor item scheduled toward the end–when audience members have usually tired of the slog.
Flagler Beach doesn’t have a serious food vending “problem,” nor is it prone to much roving food-vending traffic. The proposals have been largely seen as targeting one vendor in particular: Sandy Kinney, a Bunnell resident who sells ice cream out of her truck, and has been doing so for several years in Bunnell, Palm Coast, unincorporated parts of Flagler County, and of course Flagler Beach.
But Kinney’s selling in Flagler Beach also angers existing ice cream businesses that have invested time and money on their brick-and-mortar locations, where they must abide by city regulations. To some of them, Kinney is afforded an unfair competitive advantage by being allowed to sell from her truck.
But by no means to all. Karen Barchowski, one of the three co-owners of Sally’s Ice Cream on North A1A, has championed Kinney’s operation all along. “I have supported her from day one,” Barchowski said, as have her two partners in the business.
City Commissioner Jane Mealy, who has led the charge against mobile vendors, has insisted that she’s never sought to ban ice cream trucks in particular, only to regulate mobile vending in general, which city ordinances leave entirely silent. The proposed ordinance ends that silence.
“This was what I was looking for to begin with,” Mealy said Wednesday. “I don’t see Flagler Beach as a town that has ice cream trucks or whatever kind of mobile vending just riding around, ringing bells, making all kinds of noise, and I think they’re very unsafe. Kids run out in the street without looking. I just don’t think they’re necessary.” Her strongest reason against mobile vending, Mealy added, is their unfairness to brick-and-mortar businesses, which pay rent, pay taxes and abide by regulations. “I think it’s more friendly to the brick and mortar businesses than to have those trucks around,” Mealy said.
When the issue was previously discussed, Commissioner Steve Settle echoed Mealy’s concerns about safety, and favored limiting the range of vendors within the city to specific areas. But Commissioners Marshall Shupe and Joy McGrew were more supportive of mobile vendors—at least they were so last year. “I’m in favor of vendors,” McGrew said categorically, though she was willing to hear about some form of compromise that would regulate them—not ban them. Shupe had no opposition to ice cream trucks, but he was opposed to what he considered to be shadier vendors who may be hawking watches or meats out of their trunks. Legally, however, allowing one type of vendor but nto another could raise issues for the city.
Before writing the proposed ordinance, Drew Smith, the city attorney, had conversations with commissioners individually to get a sense of what they’d be comfortable for, Mealy said. “This seemed to be what people were saying,” Mealy said.
The proposed ordinance leaves no room for doubt: “Mobile sales operations and mobile food service operations, collectively described as mobile operations under this chapter, shall be prohibited unless such mobile operations are conducted at a special event for which a special event permit has been issued by the city.” And mobile food vending at special events will itself be limited geographically to the area where the event is taking place. In other words an ice cream truck may not travel up and down State Road A1A on July 4.
Both times the issue was raised previously, Kinney, who is a single mother and works several jobs, mobilized public opposition to turn back the city’s regulatory push. Because of her single-mother status and the fact that the vending in question focuses on an ice cream truck, the issue has had some emotional appeal as much as it’s raised questions about how Flagler Beach wants to define its support for business.
Not much Good Humor at City Hall.
So sad….local businesses are in sad shape if they can’t compete with a moving vending vehicle which has limited supplies, choices etc. If someone is willing to work at making a business a go, and is succeeding, let them do it….the people obviously like it. If they didn’t, they wouldn’t buy from the vendor and it would put them out of business. The moving ice cream truck brings back so many childhood memories….what a bunch of lemon heads.
What a crying shame! The city commission has nothing better to do then target mobile vendor these days? Mobile food vendors thrive in cities all over the world. People are losing their jobs and taking what $ they have left and trying to create their own employment…stop taking that from them! Let these people have their businesses!
Without controversy in Flagler Beach, they would not be operating status quo. Is there a single month of a single year that they just can keep quiet out there? Does every single thing have to be a catastrophe for this city? Com’on really?
If the other ice cream shops want to keep with the times, lower their overhead, then purchase an ice cream truck. Why force this other lady to comply the otherway? Is it not a two way street?
Really, nothing better to do ?
Here we go again. Flagler Beach commissioners making ordinances without letting the residents of Flagler Beach V-O-T-E . Communism at its finest! Telling us WHAT THEY can do, WHEN THEY can do it and WHERE THEY can do it(THEY being the FB commissioners) and NO I didn’t vote for Settle or Mealy. Guess they never had “sweet sound” of the Ice Cream Truck in their neighborhood. As a child growing up in the big city of Jacksonville, we couldn’t wait for the musical sound of the Ice Cream Truck. It has truly been a blessing to see my 2 1/2 year old granddaughter’s face light up when she hears the “Sandalina Ice Cream Truck” coming down our street in Flagler Beach. Way to go Commissioners CRUSH another childs dream.
Yeah I am livid and pray this “better idea” goes AWAY permanently!
Typical Flagler Beach bulls–t. Next topic.
Between Palm Coast’s anti-business attitude,red light cameras and Flagler Beach’s unfriendly (pay to go on the pier) attitude toward visitors and residents alike I hope both dry up and blow away.
Is it fair to brick and mortar that people buy things off of them there computers? What will Mrs. Mealy do to save them? Glad her focus is on a ice cream truck that runs through the city a couple of days a week. Tue leadership is hard to find. A safety hazard? Driving up and stopping and some children a $2 ice cream, that’s a safety hazard? I bet in Mrs Mealy’s campaign she talked about a good city for the children. I’ve seen the children’s eyes light up when they see the ice cream truck but now Mrs Mealy must put a stop to this unbelievable act that is happening in our community. We must stop electing officials who are on the take or can’t use common sense. Mrs Mealy a difference maker and leader you are not.
One of my greatest joys as a child was hearing the ice cream truck off in a distance and waiting for it to come down my street. Riding around, ringing bells, making all kinds of noise, unsafe… Really? When is the last time that you had an ice cream truck’s bell/chime wake you up? Is there really that much speeding traffic in town to endanger children wanting an ice cream? ? Competition to existing businesses?… I don’t think so. Certainly not an ice cream truck. If you believe that vendors are really a problem, ban vendors from the business district but not miles away on the residential streets of the city. Whatever happened to free enterprise anyway? Mobile vendors have expenses too. Maybe not the same expenses as a stationary business, but vehicles, gasoline and vehicle maintenance are not cheap.
I truly don’t believe that mobile vendors are a nuisance in Flagler Beach but if you really think they need to be regulated, make them get a license to sell their wares within the city and ban them from the business district.
How can any parent with a conscience ban ice cream trucks from their neighborhood?
Ice Cream Trucks have been around for-ever, competing with storefronts. This is just simpletons who have been given phantom power to attempt to control people. Obviously, a bunch of dems trying to supress capitalism.
Cities around the country are supporting food trucks and an ice cream truck revival, but not Flagler Beach…oh no. What a trite and petty vendetta. Businesses shouldn’t run and cry to government if they’re getting their butts handed to them. It’s called the free market. Open your own trucks if you think it’s an unfair advantage.
If you start with one, you’re getting more. Specially with kids unsupervised on streets this is wrong business.
I think is a very bad idea to ban the ice cream truck vendor!. That is as American as apple pie!! My kids (now 42 and 48 years old) running to us on weekends and holidays with a loud request ” Ice Cream Maaaan (now Lady)” as soon as the sweet musical bells eco in our block! Such a sweet memories still bring to my senses when I hear our current frozen treats calling nowadays! For those that do not have the time or are near to Sally’s (I think is the name) ice cream store in A1A, is very convenient to buy the treats from the mobile vendors. Banning it is not a way to promote economic recovery by restricting sales over protectionism! We the store front businesses owners of any type have to deal with competition as well all around us with no one to protect us….why the bias here? Does the Flagler Commission believe that is the best for visitors on a crowded beach front holiday, to grab their kids, get of the beach, jump on their cars, loosing their parking spot, making life threatening U Turns against forever fast passing traffic, on narrow A1A and drive several miles to go buy ice cream from Sally’s store on A1A, other than from the conveniently traveling Ice Cream Lady by them? Would be same as restricting our local Boiled Peanuts peddlers up the road, were I buy mine often….in favor of the gas station convenience store that sale those few miles inside town. C’mon live and let live. Do not destroy one more vestige of Americana in Good Old Flagler Beach!
It’s kind of interesting that they claim they are concerned with the kids’s safety while buying ice cream off the truck. And there’s no safety issue trying to cross A1A on a Saturday to get from the pier/beach to the ice cream store? I think we know what the real issue is here.
I guess we are doing the Flagler Beach 3 step again 1 step forward and 2 steps back.How many times do we have to revisit “non-issues???
This is what small minded people do, they never see the big picture.
to stop me, and if I wanted to charge less than the others, still nothing to stop me, what would the criers do? go to the Commissioners and say I was taking business from them??? The “brick and Mortar”get all the tourists, the ice cream truck takes nothing fro them, they are catering to the locals. This is FREE Enterprise,We do not ask how much is your overhead, not our business.We do not live in a Socialist society,where we tell people that what they make will be regulated.
Please, look to bigger problems than an ICE CREAM TRUCK!!!
If someone wants to pay over $100,00 for an ice cream shop, that’s their business, but it doesn’t mean someone in a truck is less entitled to do it a different way.
We have beaten the dead horses waay too many times.END IT !
In spite that I am not a mobile vendor, I ask all here to gather support for our Mobile Vendors aka Americana at its best as much as our Route 66 is and go to this meeting at 5.30 today and vote down Jane Mealy’s proposal! I yet do not understand why Flagler Beach residents keep re-electing this woman. She only protects big business associated with FCCOC and the elite interest.
I wanted to provide some perspective on your comment above…. While a few of our members are large organizations like Flagler County Schools or Florida Hospital Flagler, 85 percent are small businesses with less than 10 employees.
Typical. I bet the stick and brick store owners are “small Government” folks that don’t want Government involved in the operation of their business, until they can use Government so they don’t have to compete. There is plenty of market share available for both mobile vendors and store fronts, the last thing the City of Flagler Beach needs to do is get involved in determining who get’s to be successful and who doesn’t.
But then again when you apply for a Business tax receipt (aka Occupational License) it says “application for the privilege of engaging in business”. The privilege? Did you know that it’s now a privilege to engage in feeding your family?
Part of our wonderful American culture is the street vendor. Our town relies heavily on the tourist industry. Tourists are attracted not only for the beach but to enjoy our “village” culture. In my mind, more legitimate street vendors (who are licensed and meet health and safety regulations) should actually be encouraged. For example, New York is made even more charming by their hot dog, pizza and chestnut vendors, and yes. . . even their surburban icecream trucks. The kids just love them!
We simply should NOT be favoring one style of product/service delivery system or vendor over another in our community. . . especially when there have NOT been a long list of safety or health violations. This smacks of local government over-reach to protect a particular business. . . who could have their own ice cream truck. Yes, if there are “real” health and safety issues in the future, then we can “regulate” these kinds of businesses, but putting a complete STOP to them for no apparent reason is not what our citizens want and not what the focus of our city commission should be.
If traffic is slowed down, then so be it. Do we want to continue to develop Flagler Beach as an attractive place to stop and enjoy our delightful coastal town, or should we keep everyone off the streets so tourists can speed on through surburbia?
By the way, can we please stop politizing every issue. . . I am a Democrat who patronizes and is in favor of small businesses. LET’S SUPPORT THE ICECREAM TRUCK!
The flaw in the “progressive” mindset that has besieged Flagler County and the rest of America is the continued removal of more and more of our freedoms.
It requires the liberties of others be removed in favor of the benefit of a few who pretend government needs to exercise more control for their good. It is the exact same corrupt politics that destroyed communist Russia that my senior friends who grew up their talk about.
So, in addition to losing ice cream trucks, everyone who is paying for insurance is now going to pay for 3 million people who don’t pay for insurance. (Agreed, no one should be turned down or away for medical care! Absolutely! But there is a much better way to do it.) Rather than the few in DC reducing health care costs, they increased the costs and spread the increase out to the currently insured, you. A family who is now going to receive full coverage for $250.00 when it costs $1,000.00 = $800.00 spread out to the rest who pay insurance. And the Progressives stuck it to seniors again by redusing Medicare benefits and with an additional 3.8% Medicare Surtax to buy even more votes. Seniors paid their entire working life for it and now they will have to pay an additional 3.8% to keep it. It’s a decision a few in DC made to buy millions of votes that cost the other millions of Americans dearly – rather than reduce medical expenses. And now the American work week is about to be reduced to 29 hours and Obama has sworn he is willing to shut the government down to defend the lunacy! Millions of Americans are about to lose either health insurance coverage and/or 28% of their income and the Progressive Democrats are willing to shut the government down to do so. Who is watching your back? Do we have any love for each other left in this country? It’s crazy making!
Of course Clinton and Obama can stand on the public stage and claim they don’t mind the tax increase to themeselves from what they are doing. Let’s not be blind. The more votes they buy offsets their tax increase by $millions upon $millions more in book endorsements and speaking engagements. They profit from it in a huge way at the expense of most hard working Americans!
There is a reason we have multiple parties and multiple views in society – it’s to prevent stupid things like ice cream trucks from being banned for the benefit of a few who don;t want it to interfere with their profits.
And when the 99% movement catches on to the con-job the progressive movement is up to and realize their vacation home, their annual vacations, their children’s college is no longer affordable when they grow up, maybe then, people will storm the gates of WA DC and demand the government be put on a leash and not be allowed to spend any more than 10% of what any citizen earns. We can no longer trust local councils or 435 people in DC with our freedoms.
Has the time come for a tax payer’s revolt?
The $800 instead of $750 is due to the redundant govt. costs. Govt. math is not real math.
I bet commissioners get free ice cream.
I guess that once again the powers at the helm have let go of the wheel to focus on the smallest of issues that they could concern themselves with. I guess in their quest for fairness, they have forgotten they themselves are already restricting “brick and mortar” businesses in their fair town by exclusion. They have this thing they call First Friday every month that only caters to the businesses that surround Veterans Park and not inviting the guests that attend to venture out to those businesses that are not within a block of the event. Have you ever heard a speaker or anyone else in charge of the microphone suggest to visit the businesses north of Moody or south of the pier? Yeah, I know that they are invited at no charge to come and set up a table at the park so that every un-supervised child running wild while the “parents” sit back in their lounge chairs and enjoy the free concerts. But, that strikes me as not being the same as having the bricks and mortar, does it you? Also, think about the “safety” issue that has been mentioned about the kids running in the street to catch the ice cream truck. Have you ever seen the kids in the park being escorted by the police or their “parents” to cross Moody to get to either the dollar store or the c-store behind Finn’s? Yeah, me neither. I guess their safety concern is only during the day when the ice cream truck is making the rounds, not at night when every driver coming that way is straining their necks to see who is on stage and not watching the kids in the street. The town council of Flagler Beach is too self important, too inwardly focused, and too damn full of their positions to know which way is up when looking though their own legs cause they like the view a little too much!
” Kids running around the street” ?
How about parking on A1A and trying to keep the kids off a highway!
It appears to me that to some degree, the Flagler Beach City Commission has an ***intolerance to some forms of competition***.
I can see how naturally the city’s sentiment would lean toward it’s ‘brick and mortar’ retailers. The brick and mortars fill otherwise empty storefronts and help pay taxes.
Myself, I have a “let the chips fall as they may” attitude in regard to retailers. I don’t know how much these trucks (or this truck) takes a bite out of the other fellow’s lunch, so to speak. Unless there is some health hazard issues, then just license the trucks. If they block streets and alleyways, then the cops can just issue a vehicular citation. As for kids running across A1A;. they’re running in front of traffic from the beach to get to the brick and mortars anyhow. Not something we like to see, but it’s there, every hour of every day.
Hmm… Maybe it was the Flagler Beach Farmer’s Market that caused the Food Lion to pack up and leave since they couldn’t make a profit selling vegetables and fruits? Get the drift?
What has happened to our country!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Ban police chiefs, fire chiefs, ice cream vendors…. I hear the mailman is next…..
There are many other ways to make this safe. Also, how many children have been hit by a vehicle enroute to or standing at, the Ice Cream truck in Flagler Beach. I do know that incidents have happened in other areas of the country and this is a legitimate concern, but what this commission is trying to do is coming from one business on Flagler Beach.
I think the best thing this commission can do from now on is this: Put your idea down on a piece of paper. Write down your idea/plan. Then write the exact opposite of this idea down. Use the exact opposite to propose to the public!!! You all lack the reasoning and accountability of any reasonable human.
If we all want to make this sting, stop patronizing the “brick and mortar” business all together and then the business owner will see what they had was better than what they have now.
Let’s see….which “problem” should I ponder…..healthcare, government shutdown or ice cream vendors in Flagler Beach.
Obviously….we are the idiots for having voted these commissioners into office! They make me crazy!!!!!!! | 2019-04-25T18:37:48Z | https://flaglerlive.com/59432/flagler-beach-mobile-vendors-ban/ |
Looking for The Best Corporate Training Programs Online? Your Search Will End Here!
Corporate training finds its mention in many discussions these days. This kind of training is usually given by a business organization to its staff or employees, either in house or through a third-party training provider. The key objective of this training is to polish the current skills of the employees or to generate new skills in them which are in sync with the changing business needs and requirements.
The history of training the employees dates back to the 1970’s when the Apple II was launched as an educational game for the employees. However, never before such advanced training methods have been used like the one in use today. The technological innovations have given rise to online corporate training, also known as corporate online learning and corporate e-training. This training utilizes the modern information technology tools for imparting the most relevant knowledge in a very engaging manner to the training participants.
According to the findings of an empirical research, one dollar invested in the best corporate training programs can generate output equivalent to eight dollars for an organization. The research further says that the mean productivity of a trained employee is comparable to the combined productivity of six untrained employees; quite impressive findings indeed!
Today’s organizations are extending their business operations to the overseas market to explore better business opportunities. Thus, the employees and teams are located in different regions and sometimes even different time-zones. In such a situation, the availability of a robust platform becomes crucial for connecting and training the widely dispersed teams. The corporate online learning option proves really helpful in achieving this objective. The online training not only engages the participants much better than the conventional classroom training, but also delivers several other important benefits over the latter. However, the online corporate training service must be availed from a reputable provider only, in order to be effective. It is quite natural to feel perplexed in the choice of the right training provider, especially when so many players are operating in the market. But, your search for the best corporate training programs online will end at Multisoft!
Multisoft Virtual Academy is an established online training organization that offers world-class corporate training solutions to its clients. They provide professional online training courses in a variety of sought-after domains for students and professionals. You may know in detail about their corporate training services, by visiting www.multisoftvirtualacademy.com/training-solutions/corporate-training.
About the Author: Vivek Gupta is a Content Writer at Multisoft Virtual Academy. He regularly writes articles and blog posts on the topics like professional training, education, and certification courses. He is a versatile writer, conversant with multiple types of writing. He holds a rich work experience and has written content for various industries such as health, education, finance, law, travel, IT, and ITES, among others.
Primavera P6 Online Training Can Help You Make Impressive Progress in the Project Management Field!
Primavera P6 is a Project Portfolio Management System for the enterprise, which is used far and wide by the organizations of different sizes around the world for achieving effective project management. The important benefits offered by Primavera P6 in the project management field have resulted in high recognition for this software on the global stage. Today, the knowledge of Primavera is considered a great asset in the industry and the professionals having this specialized knowledge witness high demand. Many large enterprises are ready to offer really lucrative pay packages to the knowledgeable candidates in the project management field.
Today, when an increasing number of business organizations are exploring the overseas markets to expand their operations beyond domestic boundaries, the demand for capable project managers has touched a new height in the job market. This demand, as per the industry experts, will continue to rise in the future due to the growing diversification and scope of businesses. Thus, we can say that opting for a professional project management course would prove to be a rewarding career decision for those aspiring a career in project management.
The Primavera P6 online training is indisputably the most suitable professional project management training option for the project managers and other related professionals, looking for career growth. The curriculum of this professional training course is such that it improves the current skills of the candidates and develops new skills in them. You, as a candidate, will be trained in the vital project management skills and the latest developments in this domain. The online course also offers unparalleled flexibility and control to the learners in terms of determining their own suitable time, place, and pace of study. Thus, it can be conveniently pursued without sacrificing your current job or university studies.
Multisoft Virtual Academy is a credible online training organization with a proven track record. They offer industry-standard Primavera P6 Training Online that is a much sought-after course today, along with training courses in multiple other domains. You can opt for their Primavera Online Training course, without any doubt, to obtain impressive career benefits. You may know more about this course, by visiting https://www.multisoftvirtualacademy.com/project-management/primavera-online-training.
SP3D Software Plays A Crucial in Making Today’s Plant Designing Projects Successful!
The Smart Plant 3D Design software, usually called SP3D, is a widely-used software developed by the renowned American software development and services company Intergraph Corp. Today, SP3D has got recognition in the industry as a powerful technological tool for creating the 3D pipe and plant designs. The designs are created on the sophisticated SP3D software; usually an SP3D professional like an SP3D designer or architect produces such plant designs. These professionals possess extensive Smartplant 3D training and experience. An experienced designer can create flawless plant designs, using the SP3D software.
The SP3D software is primarily used in the industries like petroleum and petrochemicals, oil and gas, marine, metal and mining, shipbuilding, and architecture. The 3D model of the plant design prepared on the SP3D software enables the construction companies in saving substantial costs, human hours and labor. SP3D also provides them with an effective layout or blueprint of the project that they can show to the client. If there are any modifications suggested by the client in the design, they can be effected well in advance. This model also serves as a guide for the construction team to rightly understand the project requirements, so that the actual work can be carried out exactly as planned. There are many other direct and indirect benefits offered by the SP3D software in the plant designing process.
Today, the demand for the SP3D professionals is rising across several industries around the world. As a result, the demand for SP3D training and SP3D certification has also increased. The demand for SP3D online training courses is on a rise, especially among the working professionals and full-time students, who want to make a career in the plant designing field. The online training offers unmatched flexibility and control to such candidates over their time, place, and pace of study. This makes the learning convenient and the constraint of limited time is also overcome. These candidates are also provided with access to many useful online learning resources, which make their learning experience quite enriching and fulfilling. However, one must enroll in a credible training institution to get the best results out of training.
Multisoft Virtual Academy is an established and credible online training organization. They provide world-class SP3D online training for students and professionals. They also provide professional training courses in many other sought-after domains. You may access detailed information about the online SP3D training course from Multisoft, by visiting www.multisoftvirtualacademy.com/cad-cam-cae/smartplant-sp3d-online-training.
About the Author: Vivek Gupta is a Content Writer at Multisoft Virtual Academy. He regularly writes articles and blog posts on the topics like professional training, education, and certification courses. He is a versatile writer, conversant with multiple types of writing. He holds a rich work experience and has written content for various industries such as health, education, finance, law, travel, and IT services, among others.
A Project Management Professional Certification is A Ladder To A Rewarding Career!
Never before in the history were skills so much valued as in the present age. Today, practical skills are valued across industries. Practical skills and knowledge are considered more important than other qualifications in the industry. The competition is high in the industry and the business environment is also highly dynamic today. That’s why, skills and experience of a candidate are given priority, these days, over other factors. Nowadays, organizations are more likely to hire the candidates with a professional certification, besides the formal degree.
If we talk about the project management field, which is unquestionably a practical field, there is a high demand for PMP certified candidates, along with the candidates with other Project Management (PM) Certifications. The PMP Certification results in the development of strong organizational and leadership skills in a candidate; since these two skills are the most demanded in the industry, the PMP certified candidates remain in demand and offered high pay packages.
The design of the PMP Certification curriculum is such that it makes the candidates familiar with the principles and practices of effective management. It equips the candidate with the necessary knowledge and skill sets so that he/she proves to be a competent project manager and an asset to the organization. Needless to mention that the PMP certification enjoys global recognition across industries.
Today, there are many Project Management Courses Online on offer, but PMP Online Training is the most popular out of them. Primarily, the full-time students and working professionals enroll in this course due to the high level of flexibility and control it provides to the learners in terms of deciding the time, place, and pace of study, of their choice.
A PMP certification certainly increases the weight of your resume and enhances your professional worth. There are many important benefits that you may expect from this certification, namely strong domain knowledge, sharp managerial skills, heightened career prospects, boosted confidence, enhanced professional marketability, good salary hike, and high recognition in the peer group. Therefore, the PMP Certification training is worth your time and money as it facilitates clearing the demanding PMP certification exam.
Multisoft Virtual Academy is an established and credible online training organization that offers various Project Management Training Courses online, along with professional courses in varied domains. You can trust them for obtaining the best training in the industry. To know the details regarding the PMP Online Training and other Project Management Online Training courses from Multisoft, you may visit https://www.multisoftvirtualacademy.com/project-management.
Primavera P6 is a widely known Project Portfolio Management System for the enterprise, which is used by many large and medium-sized organizations around the globe for attaining effective project management. The benefits extended by Primavera P6 in the project management field lead to high recognition for this software on the global platform. Today, the knowledge of Primavera is highly valued in the industry and the professionals possessing this specialized knowledge remain in demand. Many big organizations are ready to offer lucrative pay packages to the knowledgeable candidates in this field.
Today, when a large number of business organizations are expanding their operations beyond domestic boundaries and venturing into the global markets, the demand for capable project managers is on a rise in the job market. This demand will continue to rise in the further because of the increasing diversification and scope of businesses. Thus, in the present circumstances, opting for a professional project management course would prove to be a beneficial career decision for you.
The Primavera P6 online training is unquestionably the most appropriate professional project management training option for the project managers and other related professionals, aiming for career growth. The curriculum of this professional training course is such that it polishes the current skills of the candidates and develops new skills in them. You, as a candidate, will be trained in the vital project management skills and the latest advancements in this domain. The online course also provides unparalleled flexibility and control to the learners in terms of setting their own convenient time, place, and pace of study. Thus, it can be conveniently pursued side by side with your current job or university studies.
Multisoft Virtual Academy is an established and reputable online training organization with extensive industry experience. They offer industry-standard Primavera P6 Training Online that is a much sought-after course. You can enroll in this Primavera Online Training course, without any inhibitions, to get impressive career benefits. To know in detail about this course, you may visit https://www.multisoftvirtualacademy.com/project-management/primavera-online-training.
SAP Advanced Business Application Programming (ABAP) is a very popular enterprise programming language that was developed by SAP. SAP is basically Systems, Applications and Products in Data Processing and it is an Enterprise Resource Planning (ERP) software that has a worldwide usage. This software has been developed by SAP SE, which is a globally renowned European software MNC.
The SAP domain contains multiple modules for today’s businesses that enhance the convenience of doing business; SAP ABAP is an important module belonging to the SAP domain that witnesses a demand far and wide.
The candidates who want to have a successful career in the SAP ABAP field must opt for a professional certification to realize their career objective. The SAP ABAP Certification Exam, which is a quite challenging examination, needs to be cleared for obtaining an ABAP certification; thus, it would be a prudent decision to opt for professional training.
The SAP ABAP online training prepares a candidate for this challenging examination in less time and less cost. It is undeniably the best training option for the full-time students and working individuals, who seek a time-efficient training solution to grow their career. The online training offers unrivaled flexibility and control to the candidates in terms of setting their own time, place, and pace of study.
In the online mode, the learners also obtain unrestrained access to the useful learning resources such as 24/7 e-learning content, a virtual classroom, practice assignments, webinars, instant performance analysis, and even more. Such online training can be said result oriented and purposeful, provided it is taken from a reputable institution.
There are multiple rewarding career opportunities present before a candidate after obtaining the SAP ABAP certification, namely ABAP developer, analyst, engineer, architect, and consultant, among others. A candidate’s suitability for a particular professional role out of them is completely based on his/her academic background, interest area, and experience.
Multisoft Virtual Academy is a credible online training organization that offers professional training courses for students and working individuals. You can learn ABAP online by enrolling in their SAP ABAP Online Training course, which enjoys wide acceptance in the industry. You may seek comprehensive information regarding this course, by visiting www.multisoftvirtualacademy.com/erp/sap-abap-online-training.
Online Corporate Training Will Prove to Be A Smart Choice for Your Organization!
Corporate training is an often talked about topic today; we often hear it in general conversation as well. Corporate training is basically the training delivered by a business organization to its staff or employees, either in house or through a third-party service provider. The main purpose of this training is to update and advance the existing skills of the employees in order to bring their skills in tune with the changing business needs.
There has been a detailed history of the organizations training their employees, but never before such revolutionary training methods have been used like we see today. The advent of technology has given rise to online corporate training, also known as corporate online learning and corporate e-training. This training makes use of the information technology tools for imparting the best knowledge in the most engaging way to the training attendees.
According to an empirical research, one dollar invested in the best corporate training programs yields output equal to eight dollars for an organization. The research also says that the average productivity of a trained employee can be compared to the productivity of six untrained employees; these findings, indeed, strongly indicate towards the significance of a professional corporate training program.
The online corporate training, which has emerged as the most sought-after training mode today, offers many distinguishing benefits over the traditional classroom training. Some notable benefits of the online mode include cost effectiveness, time saving, high flexibility and control, captivating, personalized solution, and higher retention rate.
Today’s organizations are not hesitating in exploring the overseas markets in order to get more business. Thus, the employees and teams are usually located at different places and even different time-zones. In such a situation, the organizations face the challenge of coordinating and connecting the employees for training. The corporate online learning option proves quite helpful in achieving this objective. However, in order to reap the maximum benefits from such online training, the organizations should make sure that they are taking the online corporate training services from a credible institution only.
Multisoft Virtual Academy is an established online training organization that offers world-class corporate training solutions to its clients. They also provide online professional training courses in various other domains for students and professionals. To learn in detail about their corporate training services, you may visit www.multisoftvirtualacademy.com/training-solutions/corporate-training.
The Smart Plant 3D Design software, usually called SP3D, is a popular software developed by the famous American software development and services company Intergraph Corp. Today, SP3D has become a powerful technological tool for creating the 3D pipe and plant designs. The designs are produced using the sophisticated SP3D software; usually an SP3D professional like an SP3D designer or architect creates such plant designs. These professionals possess Smartplant 3D training and experience. Reliable and ingenious plant designs can be created only by an experienced designer, using the SP3D software as a tool.
The SP3D software is primarily used in the industries such like petroleum and petrochemicals, oil and gas, marine, metal and mining, shipbuilding, and architecture. The 3D model of the plant design made on the SP3D software assists the construction companies in cutting down significant expenditure, human hours and labor. They also get an effective layout or blueprint of the project through SP3D that they can share with the client, so that any modifications required can be made at the development stage only. This model also serves as a guide for the construction team to precisely understand the project requirements and carry out the work accordingly. The benefits offered by the SP3D software are many in number.
Today, the global demand for the SP3D professionals is constantly going up across industries. Consequently, the demand for SP3D training and SP3D certification has also risen. The demand for SP3D online training courses is high, particularly among the working professionals and full-time students, who seek a bright career in the plant designing field. The online training offers a high degree of flexibility and control to such candidates in terms of deciding their own convenient time, place, and pace of study. These candidates also get access to multiple useful online learning resources, which take their learning experience to a whole new level. The candidates, however, should ensure that they are enrolling in a credible training institution only.
Multisoft Virtual Academy is a credible online training organization with a proven track record. They provide world-class SP3D online training for professionals associated with this field, as well as the students interested in it. They also offer professional training courses in multiple other domains like ERP, PM, IoT, Artificial Intelligence, online classes, advanced excel course, project management courses online, online management courses, advanced excel training, microsoft excel training and many others. You may get detailed information regarding the online SP3D training course from Multisoft, by visiting www.multisoftvirtualacademy.com/cad-cam-cae/smartplant-sp3d-online-training.
The present age is driven by skill, where practical skills and knowledge are considered more important than other qualifications in the industry. Today, there is a great competition in the industry and the business environment is also highly dynamic. For this reason, the practical skills and experience of a candidate are given priority over other factors today. Today’s organizations prefer the candidates with a professional certification, besides the formal degree. In the project management field, which is a practical field without a doubt, there is a widespread demand for PMP certified candidates, along with the candidates with other Project Management (PM) Certifications. The PMP Certification results in the development of strong organizational and leadership skills in a candidate; since these two skills are considered vital in the PM field, the PMP certified candidates remain in demand and offered impressive salaries.
The design of the PMP Certification curriculum is aimed at making the candidates familiar with the principles and practices of effective management. It prepares a candidate to become a competent project manager and an asset to the organization. Needless to say, the PMP certification enjoys global recognition across industries.
Today, there are many Project Management Courses Online on offer, but PMP Online Training is the most sought-after and highly demanded course in that list. Mostly, the full-time students and working professionals enroll in this course because of the kind of flexibility and control it offers to the learners in terms of deciding their own convenient time, place, and pace of study.
A PMP certification is undoubtedly a gem to your resume that enhances your professional worth. There are multiple important benefits that you may expect from this certification, namely strong domain knowledge, keen managerial skills, heightened career prospects, enhanced confidence, improved professional marketability, decent salary hike, and better recognition in the peer group. Therefore, the PMP Certification training fully deserves your time and money as it helps you in getting through the demanding PMP certification exam.
Microsoft Project Or Primavera P6 – Which Should Be Your Pick?
Multisoft Virtual Academy is a reputable online training organization that offers various Project Management Training Courses online, along with professional courses in many other domains. You can trust them for getting the best training in the industry. To get detailed information about the PMP Online Training and other Project Management Online Training courses from Multisoft, you may visit https://www.multisoftvirtualacademy.com/project-management.
IoT Certification Training Can Help You Fulfill Your Career Aspriations!
IoT, which is a very popular term today, is the acronym for Internet of Things. It is an advanced technology of the present times. IoT enables a robust connection between the electrical devices with data receiving and transferring capability; we can say that the IoT enabled devices can talk to each other or communicate with each other. An IoT enabled device could be anything ranging from a kitchen appliance, to an alarm clock, and from a health equipment to an automobile; it might be any random device used in the modern homes, offices, factories, and shops. The IoT technology transforms these, otherwise ordinary, devices into intelligent devices, which go a long way in making our lives convenient.
The IoT field is, at present, in its initial stages of development; thus, it possesses great scope for further research and development. It offers many lucrative careers to the deserving candidates, ranging from IoT Architect to Developer and IoT Manager to Chief IoT Officer. A specific IoT job role is offered to a candidate depending upon his/her qualification, experience, and expertise. No matter which job role you get in the IoT field, you are bound to have an exciting and rewarding career path.
Today, the large organizations in the IoT field are ready to offer high pay packages to the deserving candidates in this domain. The majority of hiring companies are giving priority to the candidates with an IoT Certification, besides the formal university qualification. So, those with an IoT Certification will surely take a lead over the everyday candidates. However, one should ensure that they are pursuing the online IoT training from a credible online training institution only to get the complete professional benefits out of it.
Know, What’s So Special About The Artificial Intelligence Career!
Artificial Intelligence or AI is quite a popular term today, which usually finds its mention in the tech forums and circles, and in general conversations as well. It is a popular technology that endeavors to provide machines and systems with human-like cognitive ability. Today’s AI-based systems can perform many intelligent tasks that include predictive input, voice recognition, machine sensing, and data entry, to name a few. Though there are many AI inventions in use today, this field is still in its early stages of development and has a long way to go to attain its goal of simulating the human mind. Thus, this field possesses a lot of scope for research and development.
Today, a large number of technology companies around the world are looking for capable AI professionals to work out their projects in the field of artificial intelligence. These companies are willing to offer impressive pay packages to the knowledgeable candidates in the AI domain; the salaries are very high indeed. Not only the AI field is quite rewarding in terms of money, but it is also an exciting career field with ample variety and opportunities for growth. That’s why a large number of aspirants are rushing towards the AI field today to take advantage of the numerous growth opportunities that this career has to offer. Needless to say, the competition is high.
Many students and professionals are coming towards the AI career in pursuit of the exciting and rewarding career opportunities that this profession has to offer. Those who want to grow in the AI field, but bound by their routines of job, study, etc., can go for online artificial intelligence courses to fulfill their career objectives. An artificial intelligence online training course offers complete flexibility to the learners in terms of deciding their own time, place, and pace of study. Hence, no need to leave your regular studies or job for pursuing the online training. The facilities of virtual classroom, 24/7 e-learning content, webinars, on-demand mock tests, practice assignments, and much more, present in the online learning mode, provide an enriching learning experience.
Multisoft Virtual Academy is an online training organization, with extensive training experience, that offers professional online training courses for students and working individuals. You can choose any of their AI Certification training courses for career benefits. This industry-approved training will surely prove to be of high worth for you. Get to know in detail about the Artificial Intelligence Online Training Courses offered by Multisoft, by visiting www.multisoftvirtualacademy.com/artificial-intelligence.
Corporate training is a frequently discussed subject today. This training is delivered by a business organization to its staff or employees, either in house or through a third-party training provider. The primary objective of this training is to update and improve the existing skills of the employees in order to make their skills more pertinent to the changing business needs and requirements.
There has been a long history of training the employees by the organizations, but never before such radical training methods have been used like possible today. The advent of technology has given rise to online corporate training, also known as corporate online learning and corporate e-training. This training employs the modern information technology tools for imparting the best knowledge in the most engaging manner to the training participants.
As per an empirical research, one dollar invested in the best corporate training programs has the capacity to generate output equivalent to eight dollars for an organization. The research also proclaims that the average productivity of a trained employee is comparable to the productivity of six untrained employees; interesting findings, indeed!
The online corporate training, which has become the most demanded training mode today, offers many notable benefits over the traditional classroom training. Some important benefits of the online mode include cost effectiveness, time saving, high flexibility, interest binding, personalized solution, and higher retention rate.
Today’s organizations are extending their business operations beyond the domestic boundaries in order to explore the overseas market and increase customer base. Thus, the employees and teams are located in different regions and sometimes different time-zones. The organizations are facing the challenge of coordinating and connecting the employees for training. The corporate online learning option proves very helpful in such a situation. However, the organizations should ensure that they are taking the online corporate training service from a reputable institution only in order for it to be effective.
Multisoft Virtual Academy is a reputable online training organization that offers world-class corporate training solutions to its clients. They also provide online professional training courses in multiple domains for students and professionals. You may know in detail about their corporate training services at www.multisoftvirtualacademy.com/training-solutions/corporate-training.
SAP SE is a German MNC that is into software development. It is considered the best enterprise solutions provider on the global platform. The popularity of SAP software packages can be determined from the fact that above 80% of the Fortune 500 organizations around the world are using its software packages on a routine basis to manage various aspects of business. Quite evidently, with such high popularity of the SAP software, there is also a rising demand for the SAP certified professionals in the job market.
The constantly rising demand for SAP professionals across various industries has also boosted the demand for SAP courses, especially SAP online training courses, among the candidates aspiring for an SAP career. These candidates include both students and working professionals, particularly from the IT field. The SAP online courses are considered the best choice for the full-time students and working professionals who want to learn the SAP skills in order to grow their professional value. The SAP online certification courses offer the kind of flexibility and control to the learners over their time, place, and pace, of learning, that cannot be imagined in any other mode. In the online mode, the learners are not compelled to quit their regular studies or job in order to pursue the online training. Moreover, the engaging online learning resources facilitate more learning in less time. However, such online training can prove fruitful only when the candidate enrolls in a reputable training institution.
Multisoft Virtual Academy is an established online training organization that you may count on to receive world-class SAP online training and professional training in multiple other domains. Their highly sought-after online SAP courses include SAP ABAP Online Training, SAP HANA Training, SAP FICO Training, and SAP MM Training, among others. You may get comprehensive information about the various SAP courses offered by Multisoft, by visiting www.multisoftvirtualacademy.com/sap-online-certification-courses.
Artificial Intelligence Online Training Can Offer You a Rewarding Career Ahead!
Artificial Intelligence is such a popular term today that it barely needs an introduction. It is a fast growing modern technology that aims to make intelligent machines and systems that can imitate the human cognitive ability. Though there are many AI inventions in use today, it still has a long way to go. The present AI machines and systems are capable of performing tasks like voice recognition, object detection, predictive input, simple analysis, data entry, etc., but they are still far from matching the human intelligence. Thus, there is a great scope for future research and development in the AI field.
AI is today getting acclamation as an exciting and rewarding career field around the world. It provides excellent professional opportunities for those who are passionate to learn new things and like to take challenges. As said earlier, this field holds immense scope for research and development. The companies in the artificial intelligence domain are looking for qualified and capable AI professionals to handle various important job roles. The deserving AI candidates are getting high salaries in the industry.
The students and professionals who want to have a bright career in the artificial intelligence field should opt for artificial intelligence online training or AI certification training online. The most significant advantage provided by such training is that the candidates can pursue this training while continuing with their routine activities as they can set their own customized schedule in the online training mode. There are no rigid schedules to follow; no rigidity regarding the time, place, and pace of learning. This training is also high in quality and has a high retention rate because it employs modern training methodologies.
Multisoft Virtual Academy is a reputable online training organization that offers artificial intelligence courses online, along with multiple other courses in varied professional domains. These courses have led many candidates to date to professional success. You may get comprehensive information about the various AI certification training courses offered by Multisoft, by visiting www.multisoftvirtualacademy.com/artificial-intelligence.
An IoT Certification Can Give Your Career That Necessary Boost!
You might have heard the term IoT, which has become a buzzword today. IoT is the abbreviated form of Internet of Things, which is an advanced technology of the 21st Century. IoT enables the electrical devices with data receiving and transferring capability to establish a connection. That is to say, the IoT enabled devices can communicate with each other. To name such a device, it could be anything ranging from a kitchen appliance like a microwave, to an alarm clock, and from a health equipment to an automobile; it might be any regular device used in homes, offices, factories, and shops. In fact, the concept of smart homes, which is becoming very popular these days, is based on the IoT technology only. The IoT technology transforms these, otherwise ordinary, devices into intelligent devices, which prove to be of great help in our day to day lives.
Today, the IoT field is in its initial development stage. It is a constantly evolving technology possessing immense scope for research and development. It carries immense carrier scope as well and offers many rewarding careers to the deserving candidates. An IoT Architect, IoT Developer, IoT Manager, and Chief IoT Officer, are some prominent careers in the IoT field. Different candidates are offered different roles by the recruiters based on the candidate’s qualification, knowledge, and experience. Having said that, every IoT role is almost equally exciting and rewarding as a career.
The MNCs operating in the IoT field are ready to offer unbelievably high pay packages to the deserving candidates. As a matter of fact, the majority of recruiters give priority to the candidates having an IoT Certification over the regular candidates. So, those with an IoT Certification surely get a competitive edge over the competition.
IoT certification training is really helpful in gaining a certificate. For the full-time students and working professionals, there is nothing better than the IoT online training, which provides them absolute flexibility and control in terms of deciding their own time, place, and pace of study.
Multisoft Virtual Academy is an established online training organization that provides world-class IoT Online Training courses for students and professionals. Multisoft also offers professional online training courses in many other important domains. If you are looking for reliable online IoT Courses, then you may choose Multisoft as your training provider without any inhibition. For more information, you may visit www.multisoftvirtualacademy.com/iot/iot-fundamentals-with-raspberry-pi3-online-training.
Corporate training is not an unknown thing today, rather it’s a very popular practice in the modern business environment. Corporate training is basically the training provided by a business organization to its staff or employees, either in house or through a third-party training provider. The purpose of this training is to polish the existing skills of the employees and to make them learn new skills, which makes them work effectively in the changing business environment.
Though there is a long history of corporate training, never before the employees have been trained in the way it’s possible today. Today, the modern technology has made it possible to deliver online corporate training programs. This type of training is also sometimes called corporate online learning and corporate e-training. This online training employs modern information technology tools to provide the best training experience to the learners and to deliver maximum value to them.
If an empirical research is to be believed, one dollar invested in the best corporate training programs can generate an output worth eight dollars for an organization. The research also declares that the average productivity of a trained employee can be compared to the productivity of six untrained employees, combined; quite significant declarations indeed!
The online corporate training, which is the most prevalent type of training today, offers several notable benefits over the conventional classroom training. Some such benefits include, cost effectiveness, time saving, high flexibility, better engagement, personalized touch, better pedagogy, and better retention, among others.
Today, more and more organizations are becoming global and extending their business operations beyond domestic boundaries in order to explore the overseas market. The employees and teams, nowadays, are located in different regions and sometimes different time-zones. The challenge is to coordinate and connect them for training. The solution lies in opting for corporate online learning. However, you should take the online corporate training service from a reputable institution only in order to get the maximum benefit from this training.
Multisoft Virtual Academy is a highly reputable online training organization with a proven track record. They provide world-class corporate training solutions, along with many other online professional training courses in varied domains. You may know in detail about their corporate training services at www.multisoftvirtualacademy.com/training-solutions/corporate-training.
SAP SE is a German MNC whose main line of business is software development. It is considered the best enterprise solutions provider in the world. The popularity of SAP software packages can be acknowledged from the fact that above 80% of the Fortune 500 organizations around the world are using its software suites on a routine basis to manage various aspects of their business. Needless to say, with such high popularity of the SAP software, there is also a good demand for the SAP certified professionals in the market.
With the increasing demand for SAP professionals in various industries, the demand for SAP training courses among the aspiring candidates has also gone up. These candidates include both students and working professionals, especially from the IT field. The SAP online training courses are considered the most appropriate choice for the full-time students and working professionals who want to develop SAP skills to enhance their professional worth. The online SAP courses offer unparalleled flexibility to the learners in terms of determining their own time, place, and pace of study. They are not required to quit their regular studies or job for pursuing the online training. Also, the highly interactive online learning resources enable these candidates to learn more in less time. However, such online training becomes fully beneficial only when it is taken from a reputable institution.
Multisoft Virtual Academy is a well-known and well-established online training organization that provides world-class SAP training courses for students and professionals, along with professional online courses in many other domains. Their highly sought-after online SAP courses include SAP HANA Training, SAP FICO Training, SAP ABAP Online Training, and SAP MM Training, among others. You may know in detail about the various SAP courses offered by Multisoft, by visiting www.multisoftvirtualacademy.com/sap-online-certification-courses.
IoT Certification Training is A Way Towards A Lucrative Career!
IoT stands for Internet of Things, which is an advanced technology of the present age. IoT facilitates a robust connection between the electrical devices with data receiving and transferring capability; it can be said that the IoT enabled devices can talk to each other or communicate with each other. An IoT enabled device could be anything ranging from a kitchen appliance like a microwave, to an alarm clock, and from a health equipment to an automobile; it might be any random device used in homes, offices, factories, and shops, on a daily basis. The IoT technology converts these, otherwise ordinary, devices into intelligent devices, which contributes a lot in making our lives easier.
At present, the IoT field is in its preliminary stages and thus, it holds great scope for further research and development. It offers many lucrative careers to the deserving candidates, ranging from IoT Architect to Developer and IoT Manager to Chief IoT Officer. A particular IoT job role is offered to a candidate based on his/her qualification, expertise, and experience. However, regardless of the job role that you take on in the IoT field, you are bound to have an exciting and lucrative career path ahead.
Today, the big organizations operating in the IoT field are willing to offer really impressive pay packages to the competent candidates in this domain. However, the majority of recruiters are giving priority to the candidates with an IoT Certification, besides the formal university qualification. So, those with an IoT Certification will surely be able to beat the competition and get benefitted. However, one should take care to pursue the online IoT training from a credible online training institution only in order to reap the professional benefits out of it.
Multisoft Virtual Academy is a reputable online training organization and a known name in the training industry that you may bank on to get high-quality IoT Online Training. Multisoft also offers professional online training courses in multiple other domains. They make use of world-class learning techniques and training standards to impart the best training to the learners. If you are also in search of reliable online IoT Courses, then look no further than Multisoft. You may get all the information about their IoT course at www.multisoftvirtualacademy.com/iot/iot-fundamentals-with-raspberry-pi3-online-training.
Why To Opt for The Project Management Professional (PMP) Certification?
The present age is primarily skill driven, where practical skills and knowledge are of paramount importance in the industry. It is the time of fierce competition and highly dynamic business environment. And, that is the reason why the practical skills and experience of a candidate are given priority over everything else. Quite evidently, today’s organizations prefer the candidates with a professional certification, besides the university degree. In the project management field, which is essentially a practical field, there is a widespread demand for PMP certified candidates, along with the candidates with other Project Management (PM) Certifications. The PMP Certification leads to the development of strong organizational and leadership skills in a candidate; since these two skills are deemed crucial in the PM field, the PMP certified candidates are very much in demand and offered lucrative pay packages.
The curriculum of the PMP Certification is designed to make the candidates familiar with the principles and practices of effective management. It prepares a candidate in a manner so that he/she proves to be a competent project manager and an asset to the organization. No surprise that the PMP certification enjoys global recognition in varied industries.
Today, there exists many Project Management Courses Online, but PMP Online Training is the most sought-after course out of them. It is mostly pursued by full-time students and working professionals because of the unmatched flexibility and control that it offers to the learners in terms of setting their own time, place, and pace of study.
A PMP certification stands out in your resume and certainly enhances your professional value. The notable benefits that you may expect from this certification include strong domain knowledge, keen managerial skills, bright career prospects, boosted confidence, enhanced professional marketability, high salary, and better recognition among peers. Thus, the PMP Certification training is really worth your time and money as it makes your journey to the demanding PMP certification quite smooth and swift.
Project Management Training Courses online, along with professional courses in many other domains. You can count upon them for the best training in the industry. You may learn in detail about PMP Online Training and other Project Management Online Training courses offered by Multisoft, by visiting https://www.multisoftvirtualacademy.com/project-management.
Corporate training is a much talked about subject today. This training is provided by a business organization to its staff or employees, either in house or through a third-party training provider. The purpose of such training is to enhance the skill sets of the employees so that their skills remain relevant as per the changing needs of the business.
Employees have been trained for long, but never before like it’s possible today. The advent of technology has given rise to online corporate training, which is also called corporate online learning and corporate e-training. This training makes use of the modern information technology tools in order to impart the best knowledge in the most effective manner to the candidates.
According to an empirical research, one dollar invested in the best corporate training programs can generate output worth eight dollars for an organization. The research also says that the average productivity of a trained employee is comparable to the productivity of six untrained employees; that’s a notable point for sure!
The online corporate training, which is the most popular training mode today, offers several important benefits over the traditional classroom training. Some important benefits of the former are that it’s cost effective, time saving, highly flexible, more engaging, personalized, and offer better retention.
Today’s organizations are getting global and extending their business operations beyond domestic boundaries in order to tap the overseas market. The employees and teams are located in different regions and sometimes different time-zones. The question is how to coordinate and connect them for training. In such a scenario, there could be no better training option than the corporate online learning. However, it is advisable to take the online corporate training from a reputable provider only in order to get the maximum benefit out of it.
Multisoft Virtual Academy is an established online training organization that provides world-class corporate training solutions, along with various other types of online professional training courses. You may get detailed information about their corporate training services at www.multisoftvirtualacademy.com/training-solutions/corporate-training.
SAP SE is a German MNC that is in the business of software development. It is considered the best enterprise solutions provider in the world. The popularity of SAP software packages can be ascertained from the fact that more than 80% of the Fortune 500 organizations around the world are using its software suites on a daily basis to manage various aspects of business. Needless to say, with such high popularity of the SAP software, there is also a good demand for the SAP certified professionals in the market.
The increasing demand for SAP professionals across various industries has also given rise to the demand for SAP training courses among the candidates aspiring for an SAP career. These candidates include both students and working professionals, especially from the IT field. The SAP online training courses are considered the most appropriate choice for the full-time students and working professionals who want to develop SAP skills to increase their professional worth. The online SAP courses offer unmatched flexibility to the learners in terms of setting their own time, place, and pace of study. They are not compelled to quit their regular studies or job in order to pursue the online training. Also, the engaging online learning resources help these candidates to learn more in less time. However, for such online training to become fruitful, the candidate must enroll in a reputable institution only.
Multisoft Virtual Academy is an established online training organization that provides industry-standard SAP training courses for students and professionals, along with professional online courses in multiple other domains. Their highly sought-after online SAP courses include SAP FICO Training, SAP HANA Training, SAP ABAP Online Training, and SAP MM Training, among others. To learn in detail about the various SAP courses offered by Multisoft, you may visit www.multisoftvirtualacademy.com/sap-online-certification-courses.
Why Online Corporate Training is The Choice of Today’s Organizations?
You might have heard the phrase corporate training before, it is a much talked about subject these days.
training goes a long way towards propelling the business growth.
employees; that’s a fascinating finding indeed!
which boosts both employee morale and business productivity.
Many organizations are today embracing the online employee training option, realizing its importance.
it is imperative to avail it from a reputable institution only.
articles and blog posts on the topics like professional training, education, and certification courses.
and IT services, among others.
SAP SE is a German MNC into software development. It develops software products for many large organizations around the world. SAP SE is considered the best enterprise solutions provider on the global stage. The enterprise software provided by SAP SE is primarily used to manage business operations and customer relations. Today, there is a widespread demand for SAP software suites around the world with over 80% of the fortune 500 companies using its products to manage their day to day business operations. Quite understandably, the SAP Certified professionals witness high demand across various industries.
The different SAP certifications available today generally belong to any one of these two categories, namely Enterprise Resource Planning (ERP) and Customer Relationship Management (CRM). Though there are various other ERP and CRM software suites available in the market, not one is comparable to the SAP software in popularity. With such widespread demand for the SAP software, an SAP certification would really prove to be an asset for a candidate.
SAP online training courses or SAP online certifications are undoubtedly the best learning resource for the full-time students and working professionals. These online courses offer unmatched flexibility to the learners in terms of deciding their own time, place, and pace of study; such flexibility cannot be imagined in the traditional classroom training mode. A candidate pursuing online training is not required to sacrifice his/her job or university studies for obtaining the professional certification.
A good online training course should provide the learners with value-adding online learning resources such as a virtual classroom, 24/7 e-learning content, webinars, on-demand mock-tests, practice assignments, live chat support, and instant performance analysis, among others. These resources go a long way in rendering an enriching learning experience to the learners.
Multisoft Virtual Academy is an established online training organization that offers industry-standard SAP training courses for students and professionals, along with professional online courses in various other domains. Their highly sought-after Online SAP Courses include SAP FICO Training, SAP HANA Training, SAP ABAP Online Training, and SAP BO Training, among others. You may know in detail about these and many other SAP courses, by visiting www.multisoftvirtualacademy.com/sap-online-certification-courses.
Make Rapid Strides in Your Career with Primavera P6 Online Training!
Primavera P6 is a Project Portfolio Management System for the enterprise, which is sought by many large and medium-sized organizations around the world that are looking for effective project management solutions. The benefits provided by Primavera P6 in the project management field have got great recognition for this software on the global platform. Today, the knowledge of Primavera is considered very useful in the industry and the professionals having it are preferred by the hiring managers; many reputable organizations in the industry are offering impressive salaries to these candidates.
Today, when a growing number of business organizations are expanding operations and venturing into the global markets, there is a high demand for competent project managers out there. This demand will only rise in the future because of the increasing diversification and scope of businesses. Thus, investing in a professional project management course would be a smart career decision.
The Primavera P6 online training presents the best professional project management training option for the project managers and other associated professionals, aspiring to make rapid strides in their career. The curriculum of this professional training course has been designed to polish the existing skills of the candidates and to develop new skills in them. You will be trained in the important project management skills and the latest advancements in this domain. What’s more, this online course offers unmatched flexibility to the learners in terms of setting their own time, place, and pace of study. Thus, it can be conveniently pursued with your current job.
Primavera P6 Training Online that enjoys wide acceptance in the industry. You can enroll in this Primavera Online Training course, without any inhibitions, to upskill yourself as a professional and to achieve career success.
Practical skills and experience were never valued so much as in the present times of stiff competition and highly dynamic business environment. In today’s corporate world, the practical skills and experience of a candidate are given more weightage than anything else. Quite understandably, the modern organizations prefer the candidates with a professional certification, besides the university degree. In the field like project management, which is essentially a practical field, there is a high demand for PMP certified candidates, along with the candidates with other Project Management (PM) Certification. The PMP Certification develops strong organizational and leadership skills in a candidate; since these two skills are considered the most vital in the PM field, the PMP certified candidates witness great demand in the industry and offered very impressive pay packages.
The PMP Certification makes an individual conversant with the principles and practices of effective management. It prepares a candidate in a manner so that he/she proves to be a competent project manager in the real world. That’s why the PMP certification enjoys global acceptance in varied industries.
Today, there are many available Project Management Courses Online, but none of them is as popular as the PMP Online Training. It is especially liked by the full-time students and working professionals owing to the unparalleled flexibility that it offers to the learners in terms of deciding their own time, place, and pace of study.
A PMP certification increases the weight of your resume and enhances your professional worth. The primary benefits that you may expect from this certification include deep domain knowledge, polished managerial skills, better career prospects, enhanced confidence, enhanced professional marketability, increased salary, and more recognition among peers. The PMP Certification training is really worth your time and money.
Multisoft Virtual Academy is an established online training organization that offers various Project Management Training Courses online, along with many other courses in different domains. You can expect the best training experience here. To know in detail about PMP Online Training and other Project Management Online Training courses from Multisoft, visit: https://www.multisoftvirtualacademy.com/project-management. | 2019-04-19T09:07:56Z | https://multisoftvirtualacademy.weebly.com/index.html |
In 2015, I ran 6 virtual races. I already recapped the Jeff Galloway Virtual Races: 5k and Half which I loved that I quickly signed up for another set of 3: the Nerdy Hallows with one race centered around Dr Who, one on Harry Potter and one on Star Wars. Even though the medals are adorable, I was not a huge fan of this set of virtual races. It was just on the honor system so even though I did the races, I did not have to submit them and did not get my medals until the end of the year.For the Galloway one, I got a great shirt for both of the races and also had to submit a time. I don't plan on doing these type of races based on the honor system anytime soon. I can understand how they can motivate some people who are starting out and also for people that live in a area with a lack of races, but in Southern California, we are blessed with races anywhere and everywhere!
Over the summer, one of my favorite podcasts had the chance to Castaway Cay Double Dip 5k where we had to run 2 5ks and would receive a great medal. Most of the proceeds went to Give Kids the World, a great non-profit that gives children with life-threatening illnesses and their family a chance for a cost-free week vacation in Central Florida. As someone that frequents Orlando (5 times just in 2015!), this cause is near and dear to my heart.
Run a magical four miles in a race fit for a princess in our latest virtual race.
Just run or walk the 4 miles on the course of your choice January 21-January 24.
Please be sure to share your race photos and recap on our Facebook page at facebook.com/GoneForaRUN.
Want to also participate in this race? You can sign up here. When you sign up, you will receive fun pink gloves, pink socks, a race bib and a finisher medal for 30 bucks!
How do others feel about Virtual Runs?
This is my last day in Texas so I will making this brief!
Erika from MCM Mama Runs, Marcia from Marcia's Healthy Slice and Patty from No-Guilt Life.This week's topic is Race Medals.
As we know, I had a crazy year running 30 races which resulted in lots of medals. See above-there are many and are all in order!
Favorite medal: Dopey-hands down. Sometimes I am still in shock that I did that!
All of this makes sense to me, Dopey Rebel alone was 67.9 miles which is 78% of January mileage and I basically took the week off after that. June I spent most of it traveling and did not run at all during our WDW trip. August was a bit shorter mainly because of the drama of moving, finishing up the semester, working picking up and starting the semester again. September was a long break when I went to Tampa and Orlando for work after Dumbo. November was mostly races with 8 races which was 60% of my runs.
Check out the Race Recaps below to get all of the details of my races!
My future races? Will semi-big news! I signed up for the Glass Slipper Challenge during Princess Half Marathon weekend! I found a bib for a good price and already booked my flight to Orlando! I am going to wait to see if I can get a cheap flight coming back. It will be a quick trip (red eye on Thursday-flight Monday night or early Tuesday morning) and I may have to have a dissertation meeting the Sunday after the race that I will do over skype. I am excited for costumes and still hammering some things down! Based on the corrals from last year, I should be in corral D so I will be crossing my fingers!
how was your 2015? any plans yet for 2016?
It is Monday so we are linking up with another Magical Mickey with John at run.geek.rundisney and Katie from Adventures by Katie. Finally time to get my Avengers Half recap-my final race of the year!
After running the Inaugural Captain America 10k the day before, we were up around 345/4. I got about 7.5 hours of sleep and felt great! We got dressed and headed out the door around 430. We went through the same security, did bag check, and headed to pee and headed to the corrals.
We stayed to the back of the corral and we all really enjoyed it. We did slow intervals and basically had the road open to ourselves which was awesome since we head backstage quickly.
This course was slightly modified from last year so much like the DL half course, we started and then headed backstage within 3 minutes and into California adventure. We stopped for Black Widow right after exiting Carsland. There is really something to running through Carsland when it's dark it is all lit up. As we waited in line, we saw the front of corral B come through.
We headed through the esplanade and into Disneyland! We had our first water stop and continued down Main Street for an adorable pic in front of the castle. This is one of the only courses that does not run through the castle which is a bummer.
At the time we didn't know that it was our last character stop but the idea that a half marathon has only 4 photo stops, the exact same as the day before is just silly. In line, I saw Greg from WhyIRunDisney! I headed back and chatted with him for a bit. We then met Thor who told us that Hawkeye talks about Lucky all the time and the crazy adventures he gets into. Like I have said-the character interactions were TOP NOTCH!
We headed by Matterhorn through tomorrowland and backstage. We then headed back to Main Street and we stopped for a tree pic, got some biofreeze and stopped for a potty break on main st and headed out of the park.
We passed the mile 2 marker around this time and it was at 50:00. LOL we had a 30 min mile with the 3 photo stops and potty break. Our goal was to see how close to 3 hours we could get.
This is where things got interesting as that is A LOT of out of the parktime. Once we headed out of the park down Harbor everything opened up which was nice. We stuck to our intervals and felt good. We turned off harbor and all I could remember was how windy the course was last year. We headed to the Santa Ana trail and that's where things got crazy.
There was this weird roundabout to get on the trail and then it was SO narrow for about two miles with up and down hills. I saw people fall hard because they were trying to get around. Now we know from stopping for all of the pics, we ended up with people that run a slower pace than us but that wasn't the issue. The issue was it was only 2-3 people across which is way too narrow.
In the middle of the crazy few miles, were the cosplayers who were awesome as always! They always lift spirits!
We finally cleared up by the stadium where we got our Clif shot and headed into the stadium. The field was filled with bands and it was great. We headed out of the stadium and back towards the DL resort.
Outside of the stadium we're really military people cheering US on which is just incredible. On the other side was the world war reenacters both military and medical. There was even a swing dancing floor set up which was incredible to see.
After we left the stadium was where we were in new territory. We were going over the overpass and headed into a new area and through the cast member and toy story lot. I wonder if they are tested out new parts to make up for all of the backstage running we won't be able to do starting in January.
One other thing that sucked was they didn't have biofreeze and my knee was randomly acting up(I mean, let's be real: 1 5k, 1 10k, 1 6.7ish,almost a half and a full marathon, plus 10 theme park days for approximately 52.1 racing miles + countless others. Is it a surprise my knee was a bit weird? NO haha). I found a medical guy on a bike that helped!
With this new route, we took a Porto stop in the Pongo parking lot (next to toy story lot off of Harbor) and headed back to the resort. We went down Harbor Blvd and headed through the bus depot (people were very confused heading into the park to see all of these people running) and backstage of DCA. Brian was starting to struggle a bit so we kept our intervals with some extra encouragement. We headed backstage and towards the Simba parking lot-almost done! Through the pathway and DONE! Finished in 3:10:17 (14:31 min/mile).
Overall, I had a fabulous race weekend-the weather was nice, I had a great time with my friends and the character interactions were awesome. More character stops are needed on the course though-even though the theme is Avengers, it is okay to have other people out and other characters do have superhero outfits that would technically fit. I am not sure how long this race will stay around, but for now, I will enjoy the Infinity Gauntlet.
What was everyone else's thought on the Infinity Gauntlet challenge? Anyone have an interest in running an Avengers themed race?
Once the theme was announced to be captain America, I knew I wanted to be in theme without being captain as I did that last year. I settled on Peggy Carter!
This costume turned out great and was also super easy.
HAT-I knew this was the most important feature and I found a red fedora that glowed for 4 bucks on Amazon-score!I added blue ribbon and white ribbon to it.
SHIRT-I bought a new blue shirt from Target in the men's section (on sale so it was 8 bucks!). I was originally going to cut it but I didn't want to worry about chaffing. Instead I bought a square of white felt and cut it to look like the collar of a shirt and just glued it on to the blue shirt.
We knew we wanted to be Inside Out as a group because the female characters are us to a T (if you ever wonder who I act like IRL, it's Joy!).
This costume was very easy to put together and in happy how it came out.
SHIRT-I used a lime green sleeveless shirt I had but any lime green shirt would do.
I just used paint to represent the starbursts on her dress in blue paint and then also outlined it in glow in the dark paint. I did one side, let it dry over night and then did the other side.
And that was it! I added in lime green ProCompression socks to complete the look.
The costume was pretty easy to put together and you could definitely glue everything but I decided to pin it so I could reuse the shirt.
I then glued the white ribbon to the black ribbon and let it dry for 24 hours.
After drying, I pinned everything to the shirt. Make sure to pin it high as there is a part of the shirt that is just red at the bottom.
If it is cold, feel free to add a red shirt underneath.
Red foam to make the tall part.
Yellow ribbon either glued or sewed on to the red. You need 2 ribbons.
That was basically it! My grandma made the hat and did a great job and I worked on the shirt. It was pretty easy to put together.
I told everyone I wasn't dressing up because I was trying to PR. Well I forgot outside of the rundisney realm, what I wore was basically a costume haha.
My shirt is from FILA. my grandma found it at kohls on clearance. She took it to the shop where she gets my little siblings personalized birthday shirts and it turned out awesome.
Time for some weekly accountability! I will recapping how I have done on the 4 Well Rules over the last week: Eat Well, Sleep Well, Exercise Well and Be Well New Linkup for Monday! I will linking up with MissSippiPiddlin and HoHo Runs to talk about my week recap! Welcome to the 4 well rules that I try to follow as I go through my week! Let's get to it !
Yeah I ate fine. I made the best choices I could make but also indulged as it was the holidays. I need to make sure I am drinking enough water and also eating veggies. I have avoided gluten pretty well and feel pretty good from it (even though I am SO BLOATED!).
Starting Thursday I need to carb load-yay! I plan on eating a lot of fruit and rice and see how I do with my race.
I have been in a funk since getting to Texas. I am so tired in the morning and then wide awake at night. Staying with my mom and my little siblings because I would stay up late with my sister until 11/12 or so and then my little sister would get me up before 7! eek!
I am going to try and catch up on my sleep since I am with my dad now and also when I return to LA. I only have one more week off of work and want to make sure to get the most out of it now!
I SUCKED! I have run 2 times, played Wii for many hours and walked a lot but have not gotten in another workout. I have a race on Sunday so my goal is to get in 2 runs before then (including some speedwork that was supposed to happen this weekend but with the crazy weather in texas, i could not get outside to get the runs done!) and also some yoga. I may do one small weight workout but I want to be ready before my New Years race on Sunday-10k at 6PM and a Half at 8PM!
Being with family has been THE BEST! I am so happy to get to spend time with each other. i can't go this long without going home again. and I still have a few more days with more stuff to do!
How about you? How have the Holidays been for you? Did you have a good Christmas?
Erika from MCM Mama Runs, Marcia from Marcia's Healthy Slice and Patty from No-Guilt Life.This week's topic is Running Year in Review! I am also linking up with Courtney and her End of the Year Running Survey!
You can see all of the recaps here as they were all a variety of races and I learned a lot.
Best race experience: WDW Marathon. It is my favorite race I've ever done and signifies the end of the Dopey challenge. It was amazing from start to finish.
Best run: I've had parts of good races but my best run while training was my 20 miler a few weeks ago. I felt strong and never hit any wall-it was awesome! For races, my best was Tink half. I had SO much fun and the weather was nice and I felt strong the whole time.
Best running advice you've received this year: compression socks during races. I was always worried I would get too hot but the recovery process is so much easier! I own so many ProCompression socks now and love them all!
Most inspirational runner: Kathryn at dancing to running. She is pregnant and still working out. She completed a half marathon 30 weeks pregnant! Such an inspiration :) and she gave birth to a beautiful baby boy earlier this week and already has her post-baby race picked out!
Fav pic from a race this year: I love the one Jen took of me during the NYCM(see below!). I've never had people come and spectate a race on the course for me so it was so nice two of best friends were able to do that!
Race experience to repeat in a heartbeat: it's a tie!! As the WDW marathon was my favorite race, I would love to do it again! And will in 2017 and 2018. However the race I would want to do again that I'm not sure I will get a chance to do again-the NYC Marathon. What a special race!
Sum up the year in a short phrase: insane! Who runs 30 races in a year! I am still in shock I made it through with no injuries and also am still getting faster!
This year will definitely go down as the year I really challenged myself both physically and mentally. I learned a lot about myself and how to prepare for races.
How about you? How was your running year ?
I did well until I got to Vegas. I ate a lot of junk, drank a ton of champagne and definitely should have eaten more. I was with a birthday party and both restaurants they picked were carb based (pasta and pizza) with no gluten free menu. I definitely ate good food but since I was drinking, I needed more carbs. oops!
This week I am heading home to texas and going to try my hardest to eat well. I usually eat a lot of gluten when I go home and then I feel like crap for days-not this time!
I slept well: averaging about 7.5 hours a night including in vegas. the first night we went home at 11:30 (i was falling asleep at the bar-that drive was NO JOKE!) and then the second night my boyfriend look at me at midnight and said-im tired, let's go home. HAHA PARTY ANIMALS. but it was nice to get some full nights sleep in Vegas.
last week i sucked and basically had 2 run days and an ab day. i walked a lot around vegas but was very busy prepping for traveling i could not get my workouts in.
IN texas my goal is to get 3 runs a week, a day of yoga, an ab day, and a piyo day. I am hoping to get my workouts short so I can spend time with the family.
Will Force Awakens came out and i loved it! I cant wait for episode 8 which is about 500 something days away! I also spent the weekend in vegas and even though I am still feeling the effects (I ate so much junk! ugh) I am glad I got to go. Reflecting back, even though I had a great time, I think I am slowly phasing out of Vegas! eek! My partying late into the night days seem to be coming to an end and I am totally okay with that.
I FLY HOME TO TEXAS TODAY! YAY! I am leaving for the airport in 30 minutes so I need to go finish getting ready! Merry early christmas everyone!! | 2019-04-23T20:25:40Z | http://www.4wellrules.com/home/archives/12-2015 |
Japanese maple (Acer palmatum) is valued for its beautiful leaves and desirable form as a tree. Different varieties come in different colors, shape of leaves and growth habit. In early spring, the leaves and flowers come out at the same time. Depending on weather conditions, the canopy cover grows so fast that the flowers go unnoticed until the samaras increase in size to be noticeable.
Although the wind was still gusty after the storm, I went out in between rain showers. I thought that I'd take pictures of the Japanese maple trees in my backyard with special emphasis on the developing flowers.
Fig. 2 Clusters of small flowers mimic the color of the new branches and leaves.
Fig. 3 Current year's branches coming out of older trunks.
Fig. 4 Red flowers are borne on the ends of the previous year's branches.
Fig. 5 Acer palmatum dissectum 'Viridis' with drooping branches.
Fig. 6 Propped-up branch for a peek of the flower buds.
Fig. 7 The four-year old Japanese maple do not have flowers as of this year.
Branches arising from old woody trunks do not flower on the first year (Fig. 3).
Japanese maple grown from seeds takes several years (at least more than 4 years) before they flower (Fig. 7).
Plants growth is defined by nature's parameters - our role as gardeners is to figure them out.
Fig. 1 Cymbidium flower bud (March 25, 2010).
The opening of the cymbidium flower is a slow process especially during this season when the night time temperatures are still close to freezing. The good thing about his is that the flowers can be enjoyed at different stages.
Petals are beginning to break the tight enclosure of the three sepals (Fig. 1). The sepals make up the outer whorl of an orchid flower.
Fig. 2 The sepals beginning to reveal the petals.
Inside the tight protection of the sepals are the petals. Cymbidiums have three petals. Two of them are identical and similar to the sepals in structure. The third of the three petals is different is shape, texture, and coloration. It is called the lip or labellum. I've always wondered why it called so but actually it looks like a lip that has been smeared with lipstick. This characteristic of the labellum is not obvious in these pictures but it can be observed from my previous posts. The yellow tissue that is seen through the small opening (Fig. 2) is called the tongue.
Fig. 3 Unharmed by the storm we just had.
The opening of the flowers is a concert of events leading towards one goal - pollination. Each event happens only at the appointed time. The opening of the petals has to coincide with the production of the right chemicals that produce the smell and the color that attract the right pollinators. When conditions force the flower to move forward out of schedule, it will fail to accomplish its task.
Slowly but surely, the flowers are working to do their jobs.
Hydrangea mycrophylla in early spring.
Is there a relationship between your singing and plant growth? When we praise owners of beautiful plants they would gladly whisper to us as if it is a precious secret, "I sing to them every day." Well, the Royal Philharmonic Orchestra of London is supposed to been helping bring this myth to a scientific level by performing live to plants [*].
Do I believe that music make plants grow better? No. The plant that is sitting in the family room where music is played all day is no better than the one that is in the bathroom where no music is played except for an intermittent humming by my husband.
Do I believe that a gardener singing in the garden would help the plants grow better? Maybe. Let me explain. When a gardener is singing in his garden he is close to the plants. He observes the things that are going on and he can respond to such observations accordingly. On the other hand, when a gardener is singing in the garden and is focused on his music book for the right note, then that singing does not have any effect on plant growth. In other words, it is the action-initiating proximity, and not the reverberating sound waves, that make the difference. That is my practical explanation of the matter.
Fig. 2 Moss growing on rocks.
A decade later (Fig.2) the hedge wall continues to grow. It requires a minimal maintenance which includes trimming twice a year and soaker-hose watering once a week during the hot summer months. Every other year, Redwood compost is applied over a thin layer of steer manure around the base of the plants. This process helps increase soil organic matter and earthworm population. The fertility and water-holding capacity of the soil is improved - both important in our area with hot and dry summers.
Fig. 3 The combination of the wall and the hedges provides strong lines in the landscape.
Our yard started out as a rocky piece of land (approximately forty percent rocks). Every plant that we planted in this yard (except in the vegetable garden) required a crowbar. Sometimes we just dig out a single piece of rock and there is a hole enough to hold a five gallon plant. The rocks used on this wall (Fig. 2 and 3) are serpertine , similar to the rocks that are found in our property and the rest of the area. In fact, some rocks that were mined from our yard during the landscaping process became part of the rock wall.
Fig. 4 'Down Under' in the fall of 2010.
The rock wall and the boxwood hedge are structures in the garden that provide a sense of permanence. When the season brings the rest of the garden into dormancy, they remain green (Fig. 4) providing the garden the needed interest.
The Natural History and Environment of El Dorado Hills.
Permanent structures in a garden are like the eyes, lips and nose on a face. Design them carefully for timeless beauty in the garden.
Plants are not breathing organisms.* But why do some of us treat them as if they are hamsters or cats? We just can't throw plants away even if we don't need them anymore. So we put them in a new but less conducive shelter in hope of future adoption. Well, these plants (Fig.1) are like those. They are no longer good for that corner in the garden but I still want to keep them. They have been uprooted and planted in small containers. The recovery will be slow but one day they will be lush once more and who knows, someone might be interested to have them.
Fig. 2 Saved Schlumbergera stem now blooming.
There are plants everywhere in my garden that are not supposed to be there. Spider plants, Christmas cacti (Fig. 2), and mints are growing in small pots here and there. Why I keep them is still a question. Could it be that my subconscious belief tells me that these plants are breathing - that to get rid of them could be murderous? I refuse to admit that I am in fact a hoarder of plants.
Save your plants only if you know that they will be useful to you or someone else in this lifetime.
Last August I planted a second crop of bok choy. From this crop, some were left unharvested to continue growing. The summer-crop bolted at 30 days after sowing. For this crop (Fig.1) however, it took four months before flowering began.
Cyclamen in my patio remained green and blooming throughout the year. The problem encountered at this time is crowding. There are too many leaves in one small space (pot). To divide or to to plant them in a larger pot is the question. I am open to suggestions.
Chives are among the first herbs to come out in my garden. They are always green until they bloom when they will be crowned with lavender heads. I used to have my chives in the ground but those lovely seed heads scatter seeds freely and generously - and chives were growing everywhere. Now they are in pots of different sizes and slowly but surely I dug up all the volunteer-chives in the garden. The ones in the picture (Fig. 3) were started last fall from dividing an old plant.
Clematis 'Ville de Lyon' line up one side of my yard to complement the roses along that side. During this time of the year, they are just beginning to lengthen the first and second internodes on the vines. Late in the spring, the roses and clematis will be mingling as good friends.
Some years ago I planted one, just one, blue violet into a pot. The next year there were several young blue violets around the pot. Then they were all over the vegetable garden. I like the plant because it is one of the early flowers that bloom in the area during late winter but now the plant is a weed. I have been removing every single plant that I can find. This plant (Fig. 7) is a survivor.
Fig. 8 Ornamental Pear tree (Pyrus calleryana 'Bradford') blossoms.
Fig. 9 Purple-leaf flowering plum tree (Prunus cerasifera) blossoms.
These flowers (Fig. 9) remind me of the 'Sakura' or the cherry blossom, a well celebrated flower in Japan. They are beautiful as they bring life and color at the end of the dormant season. However, they are short-lived. They last for just a couple of days and then they are blown away by the wind. While they last, one must take the time to enjoy them. They also remind us that life moves on so that new blossoms will come again. Japan is hit by an earthquake, tsunami and, heaven forbid, by a nuclear meltdown. Thousands of lives are lost...but hope is not lost. By God's grace, new beginnings will come to every survivor.
Sometimes plants remind us of our own mortality and sometimes they remind us of our hope for a new beginning.
Fig. 1 Valencia Oranges in the winter.
While other plants are starting a new season of production, most citrus plants are at the end of a season. When the garden looks bare and unproductive, the citrus plants remind us that their deciduous counterparts are just taking a break. They give us a glimpse of summer in a time when the frigid temperatures seem to freeze all possibilites in the garden.
Fig. 2 First harvest: Good eating quality, mildly tart, and medium-sized.
I have two 'Valencia' orange trees that are growing in large pots. Currently, they are laden with ripe and juicy fruits. Two weeks ago we harvested some of the fruits in preparation for the supposedly cold snow storm. We did not have the snow but at least the fruits (Fig. 2) got into the kitchen where they are now a regular part of our daily meals. Soon I will have to harvest them all so that the plant can start another season to produce.
In my garden I also have a prolific 'Ponderosa' lemon tree where we harvest bags and bags of fruits every winter. This year I also received a small 'Meyer' lemon tree in a five gallon pot as a present from my mother-in-law.
Fig. 3 Scale insects on orange fruits.
Last summer these trees were infested with scale insects. Since the trees are of manageable sizes, I decided to mechanically remove the insects off the branches, patiently. However, it was battle between me and the ants. As I demolished colonies of scale insects, the ants literally relocated the "pioneer" scale insects into new territories. No insecticide was applied. Some of the branches were severely damaged that I cut them off during the growing season. The ones that I missed are seen as leafless branches on Fig. 1. I hoped to win the battle against my wingless enemies (scale insects) the humane or organic way but I lost! I saw them on the fruits (Fig. 3). Those black dots on the rind are scale insects. Somehow, I fear that even after harvesting all of the fruits, some ants somewhere will protecting another "pioneer" to settle on the next spring leaves.
Fig. 4 Limited growing space require regular pruning of plant.
The tree will need to be replenished with all the lost nutrients soon. Fertilization is more important in potted plants than their in-ground counterparts since there is a limited hunting area for the roots.
Pruning will also be necessary to remove as much of the damaged branches as possible. Since the trees also serve as ornamental plants, they will have to be trimmed and cut back to maintain a shape and size that is suitable for the limited space on that side of the yard (Fig. 4).
"A man ought to carry himself in the world as an orange tree would if it could walk up and down in the garden, swinging perfume from every little censer it holds up to the air."
My husband bought me a bunch of beautiful striped red roses last week. The florist at Costco (according to him) was so delighted to inform him that the rose is called 'Red Intuition' and that the other stores do not have them. With that my curiosity was awakened.
This is what I found out about the rose 'Red Intuition'. The registered or official variety name is 'Delstriro' . 'Delstriro' is supposed to have resulted from a mutation of the 'Delego' rose variety as discovered by Guy Delbard in 1999. What a beautiful mutant! 'Red Intuition' is a trademark (marketing name) owned by Delbard, a French company that specializes in breeding work on roses and fruit trees.
Fig. 2 Perferctly arranged flowers on long stems.
The flowers are beautiful with perfect: double cardinal red petals that are gracefully arranged on long stems. The feature that makes the flowers distinctly unique is the dark-red-on-red striped petals (Fig. 2) and their large head size.
This particular variety is well known for its superb performance under greenhouse cultivation. It also responds positively to 'forcing'. Forcing is the process by which a plant is manipulated to bloom out of season. This means that 'Delstriro' can be forced to bloom to coincide with the time when red roses are in great demand as in Valentine's Day. This is a dream variety for flower growers and florists.
'Red Intuition' was named the "International Cut Flower of the Year 2000" . It was my personal observation that the flowers remained beautiful and upright for more than a week, probably ten days or so. That is a very long shelf life knowing that they probably came all the way from Colombia or Ecuador and spent some days in a refrigerated room somewhere before my husband purchased them.
There you have it. 'Delstriro', a rose that mutated from its original traits as 'Delego' into a different but desirable rose. With its trade name 'Red Intuition', Delstriro (along with 'Pink Intuition' a.k.a Delstripink) has become the choice flower among Hollywood consumers .
'Red Intuition' is 'Delstriro' rose.
Regeneration is the natural process by which some plants or plant-parts replace and restore separated parts to resume a complete plant again. When this phenomenon is applied for the purpose of multiplying the number of plants without the use of seeds, the process is called cloning or vegetative propagation. The resulting new plant is called a clone. A clone is a regenerated plant (Fig. 1). A plant part - such as root, stem, or leaf, can be manipulated into forming new plants by severing it from the mother-plant.
Most gardeners must have seen or grown an African Violet as a houseplant. African violet is a good example of a plant that can be cloned easily. To own one plant means that you have a mother-plant that can give you many new plants.
Fig. 2 Leaves harvested from a mother-plant.
The following pictures demonstrate some of the events that happen during the process of regeneration.
Callus Formation. Plant parts such as leaves, when forcibly detached from the mother plant, undergo stress. The natural response for such plant parts (just like in other life forms) is to start healing. The first step in the healing process is the formation of soft protective tissue, known as callus, to cover the cut or wound. Callus is characterized by a thickened outer tissue which is brought about by the rapid formation of undifferentiated mass of cells. In Fig. 3, the brown colored end of the petioles is the callus.
Fig. 4 The roots are identified from the callus by shape, direction of growth and color.
Root Differentiation. The initial purpose of the callus is to form a protective surface over the wound to prevent further damage to the leaf. As long as the conditions are favorable, cells continue to grow even after the wound has healed. The leaf that was once a part of a plant will now start its own. Cells begin to respond to chemical, hormonal, and physical factors which trigger differentiation. Differentiation is the process wherein new cells take on new and identifiable form and role. When the wound that triggered callus formation is completely healed new events begin to happen. Instead of continuing to grow and clump with the callus, new cells begin to be different. Fig. 3 and Fig. 4 show roots forming from the callus. The first sign of new life from the leaf has begun. However, an old leaf with roots does not make a plant. Something still has to happen.
Fig. 5 Shoot differentiation above the roots.
Shoot differentiation. Cells continue to multiply as shown by the increased root mass (Fig. 5). The leaf (that was detached from a mother-plant) advances further to regenerate into a complete functioning plant. The wound and the area around it is now the center of various physiological activities. Not only have cells differentiated into roots but some begin to differentiate into shoot around the girth of the petiole just above the roots (Fig.5). The shoots which are the part of the plant that will eventually bear the leaves and flowers have emerged.
Fig. 6. Trichome-covered shoots emerging around the girth of the petiole.
Note that differentiated tissues immediately assume the appearance of the organ. The shoot buds contrast with the roots by the following characteristics: presence of trichomes; green coloring which indicates the presence of chlorophyll; the form; and location and direction of growth (Fig. 6). Cells that differentiate into roots tend to grow towards the ground and those that differentiate into shoots grow upwards. Differentiation can be paralleled to the sorting of citizens into their political inclinations - some will be Republicans while others will be Democrats. Regardless of the direction and position of growth, all plant parts play a key role in the overall functioning of the plant.
Fig. 7 Root hairs growing from the initial roots.
Steps in Cloning African Violets through Leaf Cuttings1. Take leaves from the outer ring of the foliage. Make sure to include part the petiole. Leaf blades can be used - new plants grow from the midrib, however, the petiole, when cut diagonally, provides a greater surface are for more shoots to grow.
2. Fill up a pots with sand, perlite or potting soil. Potting soil and recycled plastic containers can also be used as seen in Fig. 2. Water until just moist and not soggy.
3. Lay the leaves with the cut surface touching the media (Fig. 2). Cover the pot to prevent fast water loss.
5. Wait and observe till plants develop and ready to be transplanted.
Plants are super-organisms. Given the right environment most plant tissues can regenerate into new plants. | 2019-04-20T23:12:54Z | http://masteringhorticulture.blogspot.com/2011/03/ |
Usually, most types of vimaanas or temple towers raise over and above the four walls that surround the sanctum sanctorum (Garba griha). The Saanthaara vimana is a special type of vimana, in which an outer ambulatory wall is constructed around the garbagriha and the overall vimana is made to rest on two parallal walls instead of one. This arrangement enables the temple architects to extend the overall base area that is available for the vimana. It also helps to distribute the heavy load of vimana on to the floor - using eight walls instead of four walls.
In such an arrangement, the gap that is in between the outerwall and the inner wall of the garba griha becomes a circumbulatory passage for the devotees to go around the inner garbagriha. For convenience, we will call the outer wall as the ambulatory wall and the inner wall as garba griha wall.
The ambulatory wall should be clearly distinguished from the generic temple enclosure - which surrounds, not just the garbagriha, but the whole temple complex.
One of the earliest examples of saanthara vimana construction attempts that survives till date, can be found at Adhyantha kaama parameswara gruham - better known as the Dharmaraja ratha - of mahamallapuram(1). While the aadhi thala structure of this fine rockcut monolith was never completed, attempts to carve out a circumbulatory passage can be seen on the eastern side of the temple.
Though such a garba griha construction never became a popular choice of ancient artisans, we do see some marked attempts in places like Kanchipuram (Kailaasanatha and Vaikuntha perumal temples), Thiruppattur (Kailaasanatha temple), Uttiramerur (Sundareswara Temple) and Naarthamalai (Vijayalaya choleeswaram). While the Kanchipuram and Thiruppattur temples were conceptions of Pallava artists, the Naarthamalai temple came out of Muttaraiyar Shilpis.
Focussing on specific constructional details of these ambulatory and inner walls, one finds a wide variety of styles being adopted in different places.
The inner wall that constitutes the garba griha has atleast one major opening - usually along the eastern direction, so as to provide a view of the main diety. It may or may not have openings - windows or doors - in the other three directions. Similarly, the outer ambulatory wall also has atleast one main opening along the eastern direction - laid symmetrical with the opening on the inner wall. But, unlike garbagriha, it is usually provided with windows and/or doors on all the other three directions, in order to provide ventilation and light to the circumbulatary saantaaram passage.
When the inner sanctorum wall as well as the ambulatory wall has door openings on all the four directions, it becomes possible to view the enshrined deity from all the four directions.
Raajarajeeswaram, the pinnacle of Chola architecture and the monumental project undertaken by Rajaraja-I the great under the architectural leadership of Kunjara Mallan alias Raajarajap Perunthachchan is bestowed with a saanthara vimaana. The circumbulatory passage that runs between the ambulatory wall and garba griha has attracted international attention because of the Chola era paintings, painted along the lengths and breadths of the walls - on either side. The passage also has three huge icons in all the three directions except east, where the great imposing linga - aptly termed as Raajarajeeswaram udaiya paramaswamin (now called Thanjai Peruvudaiyar) - can be viewed by the devotees.
Our focus in the paper, is on these three icons.
The ovarall architectural arrangement of the saanthara vimana with its icons represents certain unique aspects that are not seen anywhere else in the country. Infact, Raajarajeeswaram temple - as a whole - boasts many such unique icons and architectural aspects that have been analyzed to some extent in the available treasies.
As shown, the width of passage itself is relatively small when compared to the width of garba griha wall or ambulatory walls. The astounding thickness of these walls is truly justified by the imposing 216 feet srivimana which they have to support. The walls on either side that make up the ambulatory passage are divided equally in all directions and massive paintings adorn the walls. The icons are aligned with the inner wall and are located at the centre of the passage , in each of the three directions.
There are three big door openings (or Thiru vayils) flanked by two dwara paalakas (4) - in the center of outer ambulatory wall, in each of the three directions. The icons are located just behind these openings. Thus, if the doors are kept open, these icons can be seen from the outer prakaara.
However, one also has to take note of the absense of stone steps in all the three directions. Thus, it is evident that the three openings on the ambulatory wall were not meant to be accessed on a regular basis by one and all. Whether they were meant for special access on certain occations or just meant to provide better light into the circumbulatory passage - we are not sure.
The passage of Raajarajeeswaram has the following icons - located one in each direction.
Icon on the Southern Facade : Veera Bhadra?
The southern facade houses a massive representation of a shaivite icon - possibly shiva himself.
Figure - Icon on the southern facade : Shiva?
Whether it is a fierce form (ugra moorthy) of the deity or not is a question. Because, the presence of protruting corner teeth, fiery round eyes and presence of weapons in both hands and the absence of the blessing hand (Abhaya hasta) give us an impression of ugra moorthy. But a big and yet gentle smile that adorns the lips of this deity defys the iconographic projections quoted earlier and leaves us with a question as to what mood this icon is suggesting.
The icon is roughly three meters tall. Seated in sukaasana posture with a bent left leg, it has only two hands - the left holding a Tirishula (Trident) and the right holding a big straight sword that extends even above the face of the deity. The right hand is raised above the hip level whereas the left hand is held over the bent thighs. In the left hand, the index finger and the small finger are slightly protruding - providing a feel of grace to the holding hand.
It is important to note that the icon has been represented with two hands instead of four or more. The absence of a third eye is also a significant aspect.
The Jatamakuta is adorned with ornaments. Small snakes are worn as ear ornaments (Naaga Kundalaas) as well as shoulder ornaments. Though there are small snakes, absence of a big snake around the neck is notable. A vastra upaveetha with knot (Brahma mudichchu) runs across the chest and a udharabhandha with exquisite ornamentation is also seen. Neck and chest are adorned with Sarappali and other maala ornaments.
The short cloth that is worn below the hip is held tight with the help of a waist band which has a tiger face in the centre. It can be recollected that tiger faced and lion faced waist bands are characteristics of most rajaraja period sculptures. It is also interesting to note that the icon sits on a aasana that not only provides a base but also a back rest to the diety. The aasana as well as the diety have been carved out of a single rock.
Identification of this icon has been problamatic and no consensus is available among the scholars. One school of thought is that this icon represents Veera Bhadra - a creation of Lord Shiva. According to the puraanas, Veera bhadra was created from a strand of Shiva's hair by Shiva himself, while he was in extreme frustration and anger after his wife Sati (or Daakshayini) immolated herself in the sacred pyre of the Yagna organized by her father, Daksha Prajapathi. Subsequently, the intense Veera Bhadra destroyed the entire Yagna and killed Daksha - even Lord Vishnu's discus, Sudarshana, failing to stop him. Thus, Veera Bhadra is concieved as a fiery representation of Shiva and he gains a prominant place in many shaivite temples across South India. Worship of Veera bhadra has gained ground especially in the Karnataka and Andra regions over time; the famous temple at Lepakshi built by a general of Krishna Deve Raya in Andra Pradesh is called Veerabhaderswara Temple.
In Raajarajeeswaram, a Veera Bhadra icon is already available on the Devakoshtas or Niches carved all around the Aadhi tala structure. Infact, this veera bhadra is located pretty close to the icon we are presently discussing. Even a bird's eye comparison of this veera bhadra on the outer wall and Passage icon yields distinct differences. The one located outside has a big mustache, holds the Trident on the right hand and a cut skull vessel (Kapaala) on the left. He does have snakes as shoulder ornaments but wears a big one as udharabhandha. He has more than two hands.
Hence, if we were to accept the Passage icon as Veera bhadra, we end up with two distinct representations of veera bhadra inside the same temple. It is difficult to find shaivite aagamic texts that permit establishment of the very same form of moorthy or deity in two different places, inside the same temple premises.
The other view point is that this represents "Aghora" form of shiva or "Rudra Moorthy" - which will be discussed under the section "Sadashiva forms in Saantharam Passage ?"
The western facade houses a very beautiful icon of a dancing shiva. Unlike the previous icon, this dancing shiva is fully painted with organic paints (believed to be natural elements or plant extracts) of chola era - possibly over a thin layer of pilaster on top of the original stone sculpture.
The whole figure is bracketed within a very big thiruvaasi(like that of Nataraaja).
The attractive jatamakuta, adorned with ornaments and painted in golden colour - raises above the face to a very significant height. It has been found out from chemical analysis that the paint used for jatamakuta consists of original gold particles. This gives us the notion that even precious metals were mixed with appropriate compounds to evolve newer colours.
The forehead has a forehead band (Netri pattai). A small skull (kaapala) is seen in the centre of the Jatamakuta ornamentation.
There is a half moon crescent and a small snake with raised hood, on the top-right hand side of the Jatamakuta.
The big face of the lord is graced with a mild smile. Eyes are bright and piercing. A third eye has been painted in red, in the centre of the forehead. The nose is particularly sharp and long.
Two highly ornate Makara kundalaas adorn both ears. Small flowers have been painted towords the top of the ears and give an appearace that the lord has inserted those flowers in the gap inbetween his ears and head. The neck is occupied by a big cobra with raised hood, apart from other ornaments. The lord wears a curling updavitha and a udharabhandha. A highly ornamental waist band has a lion face (Simha mukha) at its centre. Various strands of cloth and ornaments have been beautifully arranged all over the hip and thighs.
Another cobra, once again with a hood raised and bent to its right, runs over the waist band and its hood is blessed by the touch of the left palm of the dancer.
The lord has ten hands, out of which eight are holding weapons or objects and two are in mudra posture. The first right hand is in abhaya mudra (blessing / fear not posture) and the first left hand is in gajahastha mudra - thrown almost entirely to the right side. The second left hand holds half cut skull (Kapaala), the third holds a shield(Kedaya), the fourth holds a noose (Paasam thread) and the fifth holds a very small trident (Tirishula). The second right hand holds a big trident(Tirishula) with a long stem painted black, the third holds a sharp straight sward, the fourth holds a weapon called shakthi and the fifth holds a small staff.
The legs are slightly bent around the knees, in mandala posture.
A female figure, possibly paarvathi is seen to his left hand side and the bhootha ganas (attendents) playing instruments are seen on the right.
Like the earlier souther facade icon, this sculpture of dancing shiva is also an excellent monolith from the chola sculptors.
Some scholars have identified this icon as Sandhya Nruththa Moorthy(5). Sandhya means evening and sandhya nruththa moorthy is a dance form expressed by the lord in the evening. It is one of the 64 forms of Shiva. It does not fall under the natyasastra's 108 karanas, though.
Others, who have rested their arguements on the sadashiva expression across the icons say this is Sathya Jotha Shiva. we will take this up in a later section.
The northern facade houses a female deity flanked by two female attendents. This icon, fully painted is in seated lotus (Padhmasana) posture. The painting - possibly over a layer of pilaster - is particularly striking as the entire face has been painted in full red colour.
The whole figure is bracketed within a thiruvaasi that is not round but is rather elliptical towords the top. Some flowers, may be jasmine are painted over the space that fills the thiruvasi and the deity. A karanta makuta with elaborate ornamentation adorns the head and two strands of flowers - rather a not so usual depiction for female godesses - spun out of the makuta on either side.
The expression on the face of the goddess is rather blank, possibly because of the thick red paint. There is a very very thin smile. Because of the big watchful eyes, even a serenity or calmness does not seem to be fully established. The red dot (kumkum) on the forehead is not seen properly because of the red paint application all over the face. Nose is sharp and chins and jaws are rather stiff.
The neck portions are covered by a cloth that can be compared to moden jackets - but this jacket covers only half of goddess brests. Elaborate ornamentation is seen on the jewels worn by her and a thick udhara bhandha runs over the chest.
The thin shoulder ornamentation deserves special notice and it is connected as far as the neck by a series of small pieces of jewellary. The whole arrangement is very beautiful.
The goddess holds rosary or prayer beads (japa maala) on one hand and a lotus on the other. Two female attendents blow air over the goddess by means of kavaris - on either side.
This goddess has been identified as Goddess Manonmani(6) as well as Vaamadevi (the feminine aspect of Shiva Vaamadeva).
The sadaashiva concept postulates that Lord shiva manifests himself in five forms - these are called Isaana, Tatpurusha, Aghora, Satyojatha and Vaamadeva. The concept was well established across India and that it was quite popular with Chola king Raajaraja is attested by one of the metallic idols he donated to Raajarajeeswaram temple called Pancha Deha moorthy (A deity with five bodies). This form is considered to be a representation of the five forms. Another evidence to this fact is available right on top of the Keralaanthaka vimana - in the form of a rare sculpture called Sadhasivamoorthy. Here the lord is shown with five heads and ten arms.
The variations of this sadaashiva concept are too many. In North and Central India, we can find Pancha Mukha lingas (or five faced lingas) which are thought to be the expressions of the same concept. The Pasupathinath temple in Nepal which houses a four faced linga inside a sanctum sanctorum, that opens out on all the four directions is one good example. Another classic example from a bygone era is the sadaashiva form expressed in Elephantha caves.
One particular aspect that emerges out even on a surface level study, is that in all of these expressions, a single icon expresses all the five aspects. The present author could not identify any group of representations wherein each of these facets have been expressed by a different icon.
The Sadaashiva form as represented in Elephanta is a good example of artistic expression of the above concepts. Here, only three heads are shown - the one above the heads (Isaana) and the one behind are implied but not represented.
Unfortunately, this icon does not show the body of the lord and hence we are not able to concieve the posture and weapons associated with each of these forms. If we were to match the directions associated for the forms with that of elephanta sculpture, we end up with Tatpurusha face facing us, Aghora on the right and Vaamadeva on the left hand side. Representation of Aghora as a fearsome being and Vaamadeva as a female (Uma) are to be noticed.
But the above explanations also leave many unfilled gaps and raises lot of questions.
* Matching the icons with the three aspects, we end up with Tatpurusha as the Linga face and Isaana as the space above the Linga. But in elephanta, Tatpurusha has been represented as a Human face - not linga.
* The colours of Aghora and Tatpurusha / Isaana are unmatched.
* It is rather difficult to explain the minute aspects of each of the icons like the weapons held, ornaments worn (like Naagabhandha), expressenions on their face etc with the above theories unless more material is unearthed to support the theories.
* It is difficult to find independent representations of the each aspect of Sadaashiva that can be equated to those found in the Saantharam. Infact two of the chola period examples quoted from Inscriptions (Pancha deha moorthy and Mahaasadashiva moorthy) themselves are singular icons exhibiting all the five aspects.
It is rather difficult to fit a concept for all the icons that have been represented in the Saantharam. The sadaashiva concept is something that comes very closeby, but lot more things need to be studied and analysed before the actual genisis behind these fantastic icons are fully understood and appreciated. It is quie possible that these icons have embraced more than once concept or theology.
(4) While many scholars are identifying these icons as dwarapaalakas (or door guardians), Dr.Kudavoil Balasubrahmanyam has opined that these are the 10 weapon carriers (Daasayudha bheras) of Lord Shiva. Refer Thanjai Raajarajeeswaram by the author. | 2019-04-19T02:27:36Z | http://www.varalaaru.com/design/article.aspx?ArticleID=80&Title= |
We are a leading Exporter of acoustic microscope, image analysis systems, monocular microscope, slit lamp microscope, video microscope and compound microscope from Salem, India.
Acoustic microscopy is microscopy that employs very high or ultra high frequency ultrasound. Acoustic microscopes operate nondestructively and penetrate most solid materials to make visible images of internal features, including defects such as cracks, delimitations and voids. Jupiter Scientific Co is committed to world-class service for better supply of Acoustic Microscope. Count on Jupiter Scientific Co to listen, collaborate and act for your success. Jupiter Scientific Co pioneered organization and we are the professionally engaged firm supplying Acoustic Microscope literally transform the world. Our acoustic scanning microscopes are used by leading manufacturers worldwide to perform nondestructive inspection of bonded wafers and packaged semiconductors, from the development lab to the production floor.
With the support of modern infrastructure, we offer to our esteemed clients an extensive array of Student microscope ( single- nose) (item code: m. S-02). This is an examination device used to view or observe tiny and distant objects. Student microscope is made of various components such as u-shape base, monocular stable inclinable body with rack and pinion, plywood box and magnifying lens.
Observation tube inclined at 450 and rotatable in 3600 with perfactly centered quadruple revolving nose piece.
Double lens bright field ABBE Condenser(N.A. 1.25) with iris diaphragm and swing out filter holder moveable by rack & pinion.
Illumination built-in mechanism inside base provided with high Intensity control for light observation according to your choice, fitted with imported Holder 6V-20W Halogen lamp.
Focussing by separate knobs, fine focussing by graduated drum type knob.
Packing: We serve the Microscope in a packing of thermocole, covered in wooden case to avoid single chance of breakage.
Color Video Equipment for Microscope: This is a most advanced coloured video equipment assembled from high grade components manufactured abroad, to ensure excellent picture quality and optimum contrast of highly magnified microscopic specimen on the coloured monitor. The system consists of:- CCD Colour Camera Head: The most compact CCD(Charged Coupled Device) color camera head is specifically designed for microscopy and offers an astonishingly clear and extremely high quality images of microscopic specimens.
The monitor has a sturdy mechanical construction and a complete solid state circuitry suitable for continuous operation.
The compound microscope is a tool that can be used for many purposes. From medical research to a day at the beach, your curiosity is limited only by your imagination. As with all disciplines, it is best to learn the basics and to apply them each time you use the microscope. By knowing and following a few simple rules, your scientific experience will be enhanced.
A light source illuminates the object to be seen. That source can be a mirror, or the instrument can be self-illuminating. As light passes through the object, the lens nearest the object, called the objective lens, produces an enlarged image of the object in the primary image angle. The lens that you look into, the eyepiece, acts as a magnifier and produces an enlarged image of the image produced by the objective lens. To ascertain magnification, simply multiply the eyepiece magnification, usually 10X, by the magnification of the objective lens, usually 4x, 10X, 40X and 100X. For example, a 10x eyepiece in conjunction with a 40X objective, will give you a magnification factor of 400. The object will be magnified 400 times larger than you can view it with the naked eye. The question is often asked why can you not have, say, a 100X eyepiece, and a 1000X objective. Would that not produce a 100,000 magnification? It would, but the problem is resolution, the way your eyes see the image. A compound light microscope is limited to about 2000X magnification. Beyond that limit you could indeed magnify it, but neither your eyes nor your brain would be able to recognize the image. With a limit of around 2000X magnification you can view bacteria, algae, protozoa and a variety of human/animal cells. Viruses, molecules and atoms are beyond the capabilities of today’s compound microscopes and can be viewed only with an electron microscope.
Polarization Microscopes are utilized polarize light to observe and Research the polarize characteristic of the matter which have the double refraction. It can be observe the fine frame of the biochemistry salt crystal that the fine Frame can't be observed for nature light. Medical inspection, frame detail of the nerve fiber, the animal muscle, the plant fiber and the crystal of the tooth, bone, hair and alive cell. Polarization Microscopes are utilized polarize light to observe and research the polarize characteristic of the matter which have the double refraction. They can be used to medical inspection, such as the frame detail of the nerve fiber, the animal muscle, the plant fiber and the crystal of the tooth, bone, hair and alive cell etc. It can be observe the fine frame of the biochemistry salt crystal that the fine frame can't be observe for nature light.
Monocular body, tube inclinable upto 90 degrees mechanical tube length 160mm.
Plain square stage of 120*120 mm with two stage clips. Fitted with condenser N.A. 1.2 with its diaphragm & fitter holder. Plano concave mirror in fork mount.
Triple revolving nose piece for quick change of magnification with accurate click stop for perfect parfocal aligment.
Eye pieces hyg. 10x, 15x or 5x (any two).
Parfocal Achromatic objective 10x & 40x (S.L). Having total magnification 50x-600x.
Light source with halogen bulb 6volt 20watt.
With halogen lamp) a highly advanced projection equipment providing additional advantage for Specimen measurements equipped with super bright halogen lamp 195mm dia graduated screen rotatetable through 360° and built in movable compensating eye piece to provide mag. Range 125x to 1000x with following four objectives supplied alongwith.
with built in transformer and lamp 6” dia projection hood.
mechanical stage for side manipulation.
having built in microscope lamp, 10x objective focusable by rack and pinion with projection hood 4” dia. complete in carrying case school quality.
4(nos)- 5x, 10x, 20x & 40x/45x. Complete as above with one stage micrometer for measuring purpose and dust cover.
condenser for high intensity of light, low voltage lamp to work in built-in transformer.
Mechanical Stage and wooden box.
Hair Analysis Microscope Importer & Supplier of a wide range of products which include Hair Analysis Microscope such as Hair & Scalp Analysis System and Digital USB Microscope. Hair & Scalp Analysis System Intelligent Hair and Scalp Analysis System CBS-1600T includes: a scope, analysis software, a USB key, a user manual, a scope stand. All packaged in a aluminum specimen case.(as right one picture).
We are successfully ranked amongst the top manufacturers and suppliers of quality range of Laboratory Microscopes. Fabricated using superior grade raw material and cutting edge technology, these microscopes are also quality inspected on various parameters. Our offered microscopes are extensively acclaimed and appreciated due to attributes like optimal strength, reliable performance and high accuracy.
Colleges with M. Sc. Courses, medical colleges, dental colleges, clinical laboratories, nursing homes, hospitals, govt. Phcs, state health departments etc.
agriculture & animal husbandry etc.
Industrial Video Microscope consists of optical microscope, CCD camera, and LCD display. A clear picture of tiny object could be seen with the microscope, then, such picture would be grabbed and turned into video signal by the camera, and then, the video signal would turn into a digital colorful picture of high resolution on the LCD display. The digital picture can be zoomed in/out to the ideal size for watching. And it can also be sent via the USB2.0 access to a computer for picture-grapping, saving, printing, and even partial photographing. There are lights up and down, so it is convenient to observe. The zoom switch 10* and 100* to choose.
A clear picture of tiny object could be seen with the microscope, then, such picture would be grabbed and turned into video signal by the camera, and then, the video signal would turn into a colorful picture of high resolution on the LCD display.The picture can be zoomed in/out to the ideal size for watching. The zoom switches between 9X to 90X to choose.Having Working Distance of 170mm, H Field of View 55-5mm and Depth of Field 55-5mm.
We offering all type of Fluorescence Microscopes Epi fluorescent microscope is used for fluorescence microscopy and transmitted field observation. It is equipped with infinity plan achromatic objectives and wide field eyepieces, have clear picture and wide view field. It is the ideal instrument in biology, cytology, oncology, genetics, immunology etc. It also can be used in scientific research, universities, medical treatment, epidemic prevention etc.
Packing : In wooden storing cabinet with lock & key.
Optional Accessories : An array of different stands, stages and attachments designed to fit a variety of specific requirements. Choice of two objective combination 1x-2x or 1.5x-3x. spare eyepieces WF10X and dark field attachment.
Fluorescent Microscope is composed with inverted microscope and reflected fluorescence microscope, equipped with long working distances plan achromatic objectives and wide field eyepieces.
Reflected fluorescence microscope is used for fluorescence and transmitted bright field observations. It is an ideal instrument in sedimentary rock, inspection of impurity of semiconductor, environmental protection and micro chemistry etc. Specification : - eyepieces : wide field 10x (16mm). Fluorescent objectives: fl 4x/0. 1. Fl10x/0. 25. Fl40x/1. 0 (glycerin) (spring). Fl100x/1. 25 (glycerin) (spring). Illumination : reflected fluorescence unit. Power unit 110v/220v. Mercury lamp house 100w/dc. Epi- fluorescence illuminator. (trinocular, b. G excition system.
Scientific Fluorescent Microscope is used for fluorescence microscopy and transmitted field observation.
The Kohler illumination light source are high power & brightness LED, but power consumption is lower and use life longer.
Magnification of 100x to 1000x zoom range.
It also can be used in scientific research, universities, medical treatment, epidemic prevention etc.
It is the ideal instrument in sedimentary rock, inspection of impurity of semiconductor, environmental protection and micro chemistry etc.
Objective : A chromatic 10x, 40x/45x (SL) & 100x (SL) Oil Immersion.
Designed together to spell reliability, accuracy and ease of operation. With its most modern look, uncompromising performance and yet at a very reasonable price extends the capabilities of viewing from routine laboratory work to critical research techniques such as phase contrast, dark field, micro photography, video projection and image analysis systems.
The microscope consists of a heavy cast iron base fitted with three levelling screws with the top machined over which slides a gun metal carriage. The slide can be clamped at any position by means of a clamping screw. Fine Adjustments for final reading is done with a micrometer screw. A vertical slide operating in a similar way is fitted on the horizontal carriage. The microscope with rack and pinion is fitted on the vertical or horizontal position of microscope. Microscope tube is fitted with 10x Ramsden Eye Piece with cross line graticule & an Achromatic 2"or 3" focal length objective of high quality. Travels 17 cms horizontally and 14 cms vertically. Guaranteed accurate vernier reading 0.02 or 0.01 mm. With swing out magnifier for reading vernier. Packed in a sturdy wooden box.
Supplied in a superior quality wooden box.
Newton Ring Microscope Compact instrument with full arrangements for conducting Newton's Ring experiment. A standard microscope unit with 30x magnification and rotatable cross line eye piece. Focusing of microscope is through Rack and Pinion. Longitudinal movement of 26 mm is done by rotating the drum provided which reads upto 0.001cm. Complete with optical glass and convex lens inside a metal case. Packed in a sturdy wooden box along with all standard accessories.
Also provided with plano concave Ref.
Inverted Fluorescence Microscopes Inverted Reflected Fluorescence Microscopes is composed with inverted microscope and reflected fluorescence microscope, equipped with long working distances plan achromatic objectives and wide field eyepieces, you can use long working distance phase contrast objectives and special long working distance condenser with phase contrast unit when inverted observation, and change the fluorescence excitation system freely. The microscope has clear image, wide field, compact framework, beautility sculpt and comfortable operation etc. It’s mainly applied to observe the living cell and tissue, liquid and deposits etc, also to observe transparent living without staining and fluorescence slice up, it is the ideal instrument for researching in biology, cells cytology, oncology, genetics, immunology etc. The microscope can be used for scientific researching, medical treatment, epidemic prevention and animal husbandry etc.
Equipped with fluorescence unit, include four group of fluorescence filter.
Condenser Rack & pinion adjustable, NA=0.4,working distance: 50mm.
Inverted Tissue Culture Microscope is designed to observe tissue cultures, protozoans, planktons and any type of microbes in liquid media in cavity slides, cavity blocks, watch glasses or petri dishes etc. Involving wide range of applications.Mounted on a pole and can be positioned in vertical height range upto 140 mm. Complete with koehler's illumination system with focusable condenser lens with iris-diaphragm filter-carrier etc.
Designed to observe tissue cultures, protozoans, planktons and any type of microbes in liquid media in Cavity slides, Cavity blocks, watch glasses or petri dishes etc. involvingwiderangeofapplications.Mounted on a pole and can be positioned in vertical height range upto 140 mm. Complete with Koehler's illumination system with focusable condenser lens with iris-diaphragm filter-carrier etc.
Binocular observation head inclined at 45° with Wide field 10X eyepiece (Pair) & PH 5X, PH 10X, PH 20X, PH 40X Achromatic objectives.
With Trinocular observation head with 10X Wide field eyepiece (Pair) & PH 5X, PH 10X, PH 20X, PH 40X objectives.
Inverted Tissue Culture Microscope is designed to observe tissue cultures, protozoans, planktons and any type of microbes in liquid media in cavity slides, cavity blocks, watch glasses or petri dishes etc. Involving wide range of applications. Mounted on a pole and can be positioned in vertical height range upto 140 mm. Complete with koehler's illumination system with focusable condenser lens with iris-diaphragm filter-carrier etc.
Designed to observe tissue cultures, protozoans, planktons and any type of microbes in liquid media in Cavity slides, Cavity blocks, watch glasses or petri dishes etc. involving wide range of applications. Mounted on a pole and can be positioned in vertical height range upto 140 mm. Complete with Koehler's illumination system with focusable condenser lens with iris-diaphragm filter-carrier etc.
Co-ordinate Measuring Microscope The co-ordinate measuring microscope are offered by us are like double bonanza offer, providing with benefits like excellent quality and that too at most competitive prices.
Surgical Microscope has renovated the traditional way of microscopic observation and adopted a modern way of electronic imaging.This patented microscope makes the observation more comfortable and thoroughly resolves the fatigue caused by using a traditional microscope at work for a long time.
It features high resolution of LCD display to reverting genuine photo and video. This unit integrates magnification, imaging, display and built-in LED illumination functions. It can be conveniently applied to testing and inspecting in product assembly, research and teaching fields. Based on 2D observation, 3D angle attachment is added to obtain 3D multi-angle observation, which makes inspection easy and comfortable.
An X-ray microscope uses electromagnetic radiation in the soft X-ray band to produce images of very small objects.Unlike visible light, X-rays do not reflect or refract easily, and they are invisible to the human eye. Therefore the basic process of an X-ray microscope is to expose film or use a charge-coupled device (CCD) detector to detect X-rays that pass through the specimen. It is a contrast imaging technology using the difference in absorption of soft x-ray in the water window region (wavelength region: 2.3 - 4.4 nm, photon energy region: 0.28 - 0.53 keV) by the carbon atom (main element composing the living cell) and the oxygen atom (main element for water). The coming together of highly qualified and experienced professionals with varied technology and management knowledge has ensured that Skanray is poised to be a prime mover in the healthcare segment for the global market.¿ Within a short period of 2 years since its inception, Skanray has earned the name as the First Indian Company to indigenously design and manufacture High Frequency X ray systems of international quality. Skanray is in a very specialized technology of High Frequency X Ray generators, X Ray imaging systems, Critical care devices, and Industrial X ray imaging. This segment requires a unique mix of in-depth knowledge of various technologies and niche manufacturing capabilities.
Biological microscopes are equipped with plan achromatic objectives and wide field eyepieces. Biological microscopes provide clear image, wide field and convenience operation. These biological microscopes are widely used for various industrial and laboratory use. | 2019-04-19T20:38:45Z | https://www.jupiterscientificco.com/microscopes.html |
Get involved and make the most out of your university experience.
Dear Dixie State University Aficionado,Welcome to the D Book, where traditions never graduate! With so many things to do at Dixie State University and around the St. George area, we decided to make it easy and made a bucket list for you! As the Student Alumni Association, we hope you will take advantage of all the helpful information the D Book provides. This book was created with you in mind to help you successfully make lasting connections with the students, faculty, staff, and alumni of Dixie State University.
As you complete the traditions in the D Book, you will become a Dixie Tradition Keeper. As a Tradition Keeper, you will better understand the fundamentals and values of the Dixie Spirit. Take advantage of the opportunity to engage in the diverse and enriching opportunities DSU and St. George have to offer.
One, the Student Alumni Association wants to help you have the best college experience possible. Dixie has many need to knows, and the D Book can be your guide. The beginning sections will provide you with important information that will help you succeed and become involved in the campus community. As you read through these sections, pay attention to all the necessary information that will help you grow as you transition from an incoming freshman to a graduating senior.
Two, just remember traditions never graduate! Use this book to learn all the unique and wonderful traditions here at Dixie State University. The traditions section lists more than 40 traditions and events in which you can become involved. Students even have the opportunity to create their own traditions. Make sure to take a picture of everything you do as you complete each tradition. You will place these pictures in your book or upload them through Canvas (See page 25) to document your amazing experiences at Dixie. Look at page 25 for more information about the different levels you can achieve and the prizes you can receive. Just imagine yourself walking across the stage at commencement in your cap and gown and wearing your Dixie Traditions Keeper medallion.
We will see you soon as you work on becoming a Dixie Tradition Keeper. Go and make the best of your college years!
5Welcome to the Dixie family!All of us here at Dixie State University are thrilled you are continuing your educational journey at our institution. We are confident the diverse learning opportunities, dedicated professors, and unique experiences that accompany a Dixie degree will serve you well. DSU has many proud traditions, and I invite you to participate in as many as possible. You will experience great things while attending Dixie and develop a love for the university and its campus.
Getting involved in the campus community is key to having a successful college experience. As you complete each tradition outlined in this book, you will not only become a Dixie Tradition Keeper, but you will also gain an understanding and appreciation for this institutions rich heritage. Many of these traditions have been around for decades, and with your involvement, they will be around for decades more. They contribute special significance to students life experiences. I encourage you to participate in Dixies traditions, pass on these experiences and memories to others, and reminisce about them for years to come.
I also invite you to get involved and discover the many opportunities that DSU provides. Attend music, drama, and sporting events. Join a club, participate in intramurals, and volunteer to expand your breadth of experiences and embed yourself into the fabric of this great university and community. These lasting experiences will stay with you throughout the rest of your life.
I look forward to meeting you and providing you with opportunities to make your experience here at DSU memorable in many ways. I commend you for your desire to be involved and look forward to seeing you wear your Dixie Tradition Keeper medallion at commencement.
7From Dixie, we say welcome!
You are now part of one of the most spirited universities in the state of Utah. We welcome you with our D on the hillside so bold.
As you become integrated in the Spirit of Dixie, you will find it everywhere. Your professors will have it, the staff will have it, the community will have it, and other students will reflect it back as well. Look for it. You cant miss it. Have it. Be it. Live it.
Record your time here at Dixie in the D Book. The book will guide you to some really awesome moments here at Dixie. As alumni, yes you are alumni now that you have started your university path, you will be prompted by the Dixie State University Student Alumni Association to carry on some great traditions. Using this book will help you to become some of the best Tradition Keepers that Dixie has ever had.
Being at Dixie will help you become who you were set forth to be. While here, you will build friendships and memories that you will have for a lifetime. Cherish them and never forget them.
When you move on from Dixie to your next great experience, always know that you are always welcome here. Come back often and feel the Dixie Spirit with us. Remember to give back to our dear ol Dixie, which has given you so much.
1911 - The building on Town Square is finished and St. George Stake Academy opens. High school freshmen, sophomores, and juniors are taught here.
1913 - The institutions name changes to Dixie Academy.
1916 - Two years of college courses are added and the schools name becomes Dixie Normal College.
1923 - Dixie Normal College undergoes a name change and becomes known as Dixie Junior College.
1933 - Delicate negotiations with the state legislature make it possible to transfer ownership of the college from the LDS Church to the state. Local residents pay the costs of keeping the college alive until 1935.
1935 - The State Board of Education takes over financing the college and high school.
1957 - The gymnasium the first building on the new campus, which is located off of 700 East is finished.
1963 - Ties with Dixie High School are severed. The college moves from Main Street to the new campus. At first, there are no sidewalks and the campus is so dusty that girls wear tennis shoes to get through the mud until they are inside the buildings. Then they change into their dress shoes. Enrollment is 365.
1966 - The popular hangout is Dairy Queen on the boulevard.
1967 - Program Bureau begins with Roene Mrs. D Difiore at the helm, teaching the songs of Dixie.
1968 - President Losee puts an emphasis on enrollment, which swells to 1,000 students.
1969 - Many of Dixies finest students leave to fight in the Vietnam War.
1970 - The institutions name is changed to Dixie College.
1975 - The mosaic on the Fine Arts building is dedicated and the Tanner Fountain is added to campus.
1983 - Students are allowed to wear shorts on campus with the approval of a new dress code.
1985 - Dixie wins its first national championship in basketball.
1987 - When state funds dry up, Dixie College, the City of St. George, and volunteers unite to complete work on the new Dixie Center on campus.
1990 - Paul Anderson organizes the Pioneer Courthouse players, which precedes St. George Musical Theatre and Tuacahn Center for the Arts.
1998 - The Encampment Mall is dedicated by President Hinckley on the site of the first pioneer camp in the St. George area.
1999 - Despite strong opposition, citizen committees, students, and legislators work tirelessly to change Dixie to a four- year school. A cause for celebration!
2000 - Dixie College becomes Dixie State College of Utah.
2006 - Athletic teams become NCAA Division II affiliated and no longer compete on the junior college level.
2009 - Athletic teams have their name changed to Red Storm.
2011 - Dixie celebrates its centennial year. Enrollment grows to more than 9,000 students. More than 20 bachelors degrees are offered.
2013 - Dixie State College becomes Dixie State University!
e Inn123 E. 100 S.
We love you dear Dixie SchoolWith your colors so bright and true,For you ever stand for the right,As we cheer for the red, white and blue.Whenever were put to the test,Well remember our spirits grand Instructing, persuading and guidingThroughout our Dixie Land.
(Chorus)Hail! All hail to thee!Oh, Dixie College Dear ol school,We know your worth the best on earth,Well cheer for you and stand by every rule,Rah! Rah!Oh, may we never doAught that would bringdishonor to thy name,But may we be, eer true to thee,Adding honor and glory to thy fame.FIGHT!
Though far away we may be,Well remember our Dixie School,The spirit of our pioneers,For theyre men of the great Golden RuleOur D on the hillside so bold,Cherished emblem to them all,Remembring and never forgetting,Well answer to thy call.
Dixie State University Athletics are sure to keep you cheering out of your seat! We have so many opportunities to cheer on our fellow students and help them succeed.
Root for our Dixie State football team during the fall semester at the Hansen Stadium. You are not going to want to miss the opportunity to watch our team play.
During the winter months, be sure to check out the basketball teams in the Burns Arena. Our mens basketball team were the Pacific West Conference Champions from 2009 to 2013. As of 2014, Dixie State is among the nations leaders in Division II mens basketball attendance; lets keep this up.
We cant forget about our softball team. They have won the West Regional Championship the last two years. They have also taken the championship title in the Pacific West Conference the last three years. Make sure to check them out on the Karl Brooks Field, located on the south end of campus.
DSU has so many other top-notch sports teams, so make sure to check out each one of them!
Keep up to date on statistics, news, and schedules at dixieathletics.com.
Tailgates are held at 3:45 p.m. at the Alumni House before every home game.
Requirements and Instructions:In this book, you will find a collection of 45 Dixie traditions. By participating, you will become a Dixie Tradition Keeper, value the institutions rich history and take pride in being a future alumni. Becoming a Dixie Tradition Keeper is simple. To fulfill the traditions, all you have to do is follow the instructions in the caption of each tradition and snap a photo as you participate in the events or visit the places listed.
Everyone loves making lasting memories and taking pictures, so becoming a Dixie Tradition Keeper will be a blast! These traditions have made Dixie State University the school it is today, and they keep the Dixie Spirit alive and well. With the help of the pictures you take and the memories you make, we hope you will always keep Dixie close to your heart.
What is a Tradition Keeper?A Dixie Tradition Keeper is a student who is fully involved in his or her university experience and wants to make the most out of everything. You will be fully immersed in Dixie and will be proud to say, I went to Dixie. As soon as you fulfill your first D Book tradition, you become a Tradition Keeper. As you complete more traditions, you reach certain levels of the Dixie Traditions Keepers. Each level is accompanied by an award. Once you reach the Dixie Elite level, you will receive a Dixie Tradition Keeper Medallion that you will proudly wear as you walk across the stage at commencement.
OnlineVisit dixie.edu/dbook and click on the Enroll Now button. This will bring up a window for you to sign in to Canvas. Use your DixieID, which consists of your student ID. (Example: D00112233) Once you have enrolled, you will see modules that consist of Fall, Spring, and Year-Round Traditions. We will notify you of upcoming traditions, so you wont miss your chance to complete them. After you have completed each tradition, simply use the Upload link under the tradition submission tab to upload your photo. This class has no affect on your grades and will not appear on your transcripts.
Paper bookWatch for a Student Alumni Association booth on campus in which you can bring your book and your photos proving your completion of each tradition. Show an SAA member the proof you attended an event, and they will stamp that tradition.
Attend Freshman OrientationKick off your freshman year right by attending Freshman Orientation, an event designed just for you. This is a great place to receive a glimpse of what the next several years of your life will entail. Sign up for clubs as you walk around and discover endless opportunities to get involved in your life at Dixie.
Join us at the SandblastAttend the ultimate DSU student opening social during WOW Week (Week of Welcome). You can enjoy sand volleyball, a slip n slide, a skim board park, and of course free food. Bring your friends and meet new ones. It doesnt get much better than hanging out in the beautiful Dixie sun to start your school year off right. This is a tradition you dont want to miss!
Join a ClubJoin one, two, or as many clubs as you want at Club Rush. This event is held at the beginning of each semester on The Diagonal, the slanted sidewalk in the middle of campus. Each and every club is ready for you to sign up and join. Being part of a club is an excellent way to become involved at DSU, build networking opportunities, and have some fun with like-minded students. If you dont see a club you want to join, get some friends together and start your own.
Join the D-CrewLooking for a place to channel your school spirit? Join The D-Crew and put your Dixie pride to use today! Being a member entitles you access to parties and gives you amazing discounts around St. George. Fellow members will be at every home game, saving a seat for you. Become more involved and have the ultimate college experience by applying for a D-Crew Board position. Visit dixie.edu/dcrew for more info.
Attend a Fall DSUSA ActivityThe Dixie State University Student Association (DSUSA) holds weekly events to keep you involved in the campus community and give you a break from studying. They are held every Wednesday night and some weekends. Just watch for their posts online and for posters around campus. Check out some of the fall activities such as the Cardboard Campout, the Powederpuff Game, or the famous Casino Night. Keep up to date at thedixielife.com.
Attend a Fall Athletic EventEveryone knows the fall weather in St. George is amazing, so enjoy it by attending action-packed DSU games. Head to Hansen Stadium to watch DSUs women play soccer or stop by the Student Activities Center and root for the womens volleyball team. Clear your Saturday* schedule and cheer on the football team. Check out the full athletic schedule at dixieathletics.com.
*Dates subject to change. See Page 19 for more details.
Attend a TailgateNothing says football like cheeseburgers and pick-up trucks! Bring your trucks and cars to tailgate with the D-Crew at the Alumni House, across from the Hansen Stadium, before every home football game between 3:45 and 5:45 p.m. Cheer on the team as they walk through the party and get some free food. Rain or shine, the D-Crew will be waiting to see you. Dont forget to deck out your ride to win the Spirit Prize Pack at each tailgate party.
Join us at Rock the Mall Have you ever tried to put lyrics from one song to another? Whether you have or not, Rock the Mall is the place to be! During each Homecoming week, the student body gathers to watch DSUs clubs and organizations put on this fun show. Students create their own masterpieces of song and dance by singing the lyrics of the school song to the tune of alternate songs. Cheer on the performing students and see who will win. Better yet, perform yourself!
Run in the Midnight Rebel 5KOne of Dixies most popular Homecoming events is the Rebel 5K. The best part? It starts at midnight. Who else can say they ran a 5K at midnight? Although we cant promise that running is any easier at midnight, we can guarantee great prizes, a good time, and a memory you wont ever forget! Register online at dixie.edu/rebel5k.
Watch the Homecoming ParadeJoin alumni, the community, and the university community at the annual Homecoming Parade on Tabernacle Street. This is one of the oldest traditions alive. Watch as the floats, performers, and groups make their way down Tabernacle Street. Gather your club, friends, or fellow classmates and get yourself in the parade.
Attend a DOCUTAH Film ScreeningDOCUTAH is an international film festival presented by Dixie State University. Students, community members, and filmmakers submit films. Attend a seminar or a film screening itself. People from all over the world submit films and attend the festival to watch both shorts and feature films. Learn more at docutah.com.
Check Out the Whiteout GameJoin The D-Crew and cheer on DSUs basketball team at the Whiteout Game. This is one of the most exciting games of the entire season because The D-Crew is there handing out free white T-shirts to everyone. Be sure to get there early because the shirts go fast. Make sure to sit in the student section, so you can be part of the loudest, most intimidating crowd Dixie has seen.
Attend a Spring Athletic EventEnjoy the beautiful St. George weather each spring by watching Dixie State baseball, softball, and soccer teams. Check out the mens and womens basket-ball teams in Burns Arena at night or see the record-breaking softball team play at Karl Brooks Field. And hey, bring some sunscreen as you may even get a tan. Check out the schedule at dixieathletics.com.
In addition to their fall happenings, the Dixie State University Student Association (DSUSA) also holds weekly events during the spring semester. Events are still held each Wednesday night and on some weekends. Look for posters and more information about Dixie Idol, Mr. Dixie, and Dixie Fest. There are so many more activities you will want to participate in. Make sure to stay up to date at thedixielife.com.
Attend Dixies Got TalentSee the ultimate talent showcase right here in Southern Utah. This premier event sells out each year. The one-night show allows students and community members to perform for a chance to win cash prizes. To audition or get more information, including ticket information, check out Dixies Got Talent on Facebook.
Help set a World RecordIts not every day you have the opportunity to break a world record. Dont miss this traditional event on the Thursday night of D-Week. Help us break a record so your name can go down in the record books forever. Join us for the fun and maybe win some prizes. Have any cool ideas? Let us know at [email protected].
Run the Great RaceParticipate in the Great Race, one of the craziest traditions here at DSU during D-Week. This relay race includes 10 different obstacles. From the starting-line run and bike ride through campus to the dreaded mud pit and the sprint toward the finish line, there is no way youll not have a great time. Join a team or put your own together and compete against us if you dare!
White Wash the This is one of the most sacred traditions at Dixie State University. Join the Dixie community for a free breakfast from your Alumni Association then head up the hill as we white wash the block D on the hillside. This event takes place the Saturday morning of every D-Week. Later that night, the X-Club outlines the D with fire, so make sure to look up toward our cherished emblem that evening.
Meet the President of DSUYou dont get the chance to meet the president at every institution, so be sure to take advantage of this opportunity while you can. President Richard Biff Williams is often out and about on campus, so make sure to stop, say hi, and get a picture with him. If you have any ideas that will help make Dixie the place to be, let him know at dixie.edu/president.
Wear Dixie Red on FridaysCasual Fridays are good, but Dixie Red Fridays are even better! Sport your schools colors every Friday and prove that the Dixie Spirit is alive and well. If you are lucky, the prize patrol will catch you and youll receive one of their many prizes for showing your school pride. Lets support our school!
Attend a DSU PageantCheer on and support our Dixie State women as they compete for the title of Miss Dixie State (Homecoming) and Miss D-Queen (D-Week). These contestants have put in a lot of practice and hard work, so you dont want to miss the competition. If you want to sign up to be in the pageant, head over to the student gov offices. The winner of Miss Dixie State goes on to compete in Miss Utah.
Attend a DSU Carnival Who doesnt love a good carnival? Especially when everything is free! Free food, free games, free bounce houses, free everything! There are two carnivals held throughout the year: the first one is during WOW week and the second is right after the Great Race during D-Week.
Attend a DSU Dance Dance the night away at one of three dances held by DSUSA. The Foam Dance is during WOW Week, the Homecoming Dance follows the big football game, and the D-Day Dance is held during D-Week. Go with a date or a group of friends no matter who you go with youll have a blast. Make sure to get some awesome pictures!
Become a True RebelEver heard of True Rebel? Well, you can become one yourself. All you need to do is head over to the fountain after the Homecoming or D-Day Dance and kiss someone at midnight while standing in the water of the O.C. Tanner Fountain.
Visit the DSU Campus StoreThe DSU Campus Store is the hub for all your educational supplies. They have it all, from pencils and scantrons to sweatpants, textbooks, and even the latest Apple products. The DSU Campus Store is located on the top floor of the Gardner Center. There, youll be able to find any Dixie apparel you can think of. Make sure to watch out for the textbook buyback that happens at the end of each semester to earn some extra cash for your used textbooks. Check them out at campusstore.dixie.edu.
Read the Dixie Sun Stay up to date with Dixie State University and the latest news in St. George by reading The Dixie Sun newspaper. The Dixie Sun is written by our own DSU students. Watch for paper copies (yes, they still exist!) throughout campus or check it out online at www.dixiesunnews.com or on Facebook at DixieSunNews.
Study at the Holland LibraryNeed a place away from home to study? Want to have a place to get together for a group study session? If so, the Holland building is the place for you. It is one of the newest buildings on campus. With study spaces on three different floors and multiple study rooms, you can conquer your homework here. Grab a snack at Stacks and head on in. Be sure to check out the moving bookshelves on the third floor.
Write a Memory in the CloudsHere at Dixie State, you can write in the clouds. You cant miss the cloud wall mural made completely out of books when you walk into the main floor of the Holland Centennial Commons. Ask a front desk attendant if you can leave your mark in one of the books, and she will happily help you out. Theres no better way to leave your legacy here than with a personal note about your experience at Dixie State University.
Visit the Clock TowerDixie State University is becoming a destination point for people all over the state as well as the world. With a beam of light shooting hundreds of feet into the sky, this tower is proof that Dixie is the place to be. Paved with statements of inspiration, this new landmark is sure to lift any down spirit.
Study in a Memory GardenSt. George is known for its nice weather, so take advantage of it and study in one of the eight Memory Gardens located around campus. These Memory Gardens were made possible by donations from Dixie alumni and friends who wanted todays students to enjoy campus just a bit more! Each is equipped with WiFi access. Enjoy the weather outside as you study for your tests, do homework, or just browse the Internet.
Receive help from the Tutoring Center or the Writing Center Need help with homework and dont know who to ask? Have a major paper that needs to be revised to perfection? Take advantage of Dixies Tutoring and Writing centers. These places are meant to help you succeed in school, and Dixies own students are there to help you. Best part about these centers? The services are free to students! Check them out at dixiewritingcenter.com and dixie.edu/tutoring.
Apply for a ScholarshipWhat better way to pay for school than with a scholarship? People value your education so much that they are willing to help put you through school. Anyone can apply for a scholarship. We dare you to see what happens. You may be eligible for one without even knowing you are. You wont know unless you apply! Visit dixie.edu/scholarships for a complete list of available scholarships.
Visit the Career CenterIf you are seeking employment or even an internship, the DSU Career Center is the best source for information and assistance. Stop in and visit with these career professionals as you work toward graduating. The Career Center is your connection to corporations, local businesses, and other companies. Check out dixie.edu/career for more information.
Workout at the Fitness Center or Aquatic Center Check out the Fitness Center located right on campus. Sign up for a fitness class or buy a semester gym membership. With plenty of space for everyone, youre bound to fit right in. The staff is friendly and willing to help you get into the best shape of your life. That freshman 15 has nothing on you! For more information, go to dixie.edu/fitness.
Use the Outdoor Fitness Center or Presidential LoopBlow off some steam or get away from studying by using our Outdoor Fitness Center or Presidential Loop. Either are great ways to get into shape without leaving Dixies campus. Best perk about them? They are free to use and available whenever you want to work out.
Participate on an Intramural TeamFrom flag football, soccer, and volleyball to pickle ball, spike ball, and ping pong, intramurals has it and you can play it. Form or join a team today. Let the quest for the coveted intramural champion T-shirt begin! Learn more at dixie.edu/intramurals.
Attend an Art Show in The Eccles BuildingCheck out the Sears Art Museum Gallery in the Eccles Fine Arts Building. There are many impressive art pieces from students and local art professionals on display. Soak in the culture and beauty that art captures at this remarkable gallery. More information can be found at dixieculturalarts.com.
Attend a DSU Concert or Play Dixie is home to some of the most talented individuals from across the country. Consequently, you need to make attending a concert and/or play a priority. These performances are usually in the Fine Arts building, the Eccles, or the Cox Auditorium. For ticket information, go to dixieculturalarts.com.
Tour St. GeorgeSt. George has a rich history and background. Tour the Brigham Young House and learn about how this town began. Dont forget to visit Main Street and check out all the local eateries, statues, and small-town appeal. While youre there, check out Town Square, which features a carousel, fountain, the Old Tabernacle, and the original Dixie College building.
Hike Dixie RockIf you havent been to Dixie Rock, also known as the Sugarloaf, you are missing out. The gorgeous views from this iconic point of St. George will help you relax. You can even hike around in the red rocks. Take a couple minutes and enjoy the weather from one of the most well-known landmarks in St. George. When youre there, make sure to climb through the Dixie Narrows if you dare, but be careful not to get stuck!
Hike the Youve seen it from the ground; now it is time to see it up close! Our bold D on the hillside has remained firm for more than 100 years and will surely be there for 100 more. You can always take advantage of a beautiful day by hiking up to the D or help whitewash it during D-Week in the spring. Either way a hike up to the is a must!
Visit the Area Surrounding DixieDixie has many amazing features in its surrounding area, with the most well-known being Zion National Park. You cant forget about everything else, though. There is Snow Canyon State Park with the magnificent white hills, Sand Hollow with the rolling red sand dunes, and Pine Valley with the luscious green forest. With hikes upon hikes available, get out there and enjoy the scenery and, of course, the weather.
Visit a MuseumWho would have thought that good ol St. George has museums? Well, it does, and they are pretty awesome. Visit the ancient ground that dinosaurs once walked on at the St. George Dinosaur Discovery Site, then head over to the Rosenbruch World Wildlife Museum for a glimpse at what came next. After that, visit the St. George Art Museum, and then take some kiddos (or just the kid within yourself) to the St. George Childrens Museum and see what adventures you can come up with there. Go out and see all that St. George has to offer!
Attend a St. George Cultural Event Want to see a play, musical, comedian, or orchestra? Check out the local St. George theaters. With world-class performers coming to the outdoor amphitheater at Tuacahn Center for the Arts, you are bound to be in awe. Take a peek at St. Georges history by attending a performance at St. George Musical Theater or Brighams Playhouse. Get some friends together or take a date. No matter what you see, you will leave wanting to go back again and again.
If you were not able to complete a tradition, dont worry, you can create your own! Websters Dictionary states that a tradition is a way of thinking, behaving, or doing something that has been used by the people in a particular group, family, society, etc., for a long time. Go out, see what other traditions you can find, and create your own.
DSU Alumni AssociationThe Dixie State University Alumni Association is your primary link to DSU after graduation. Sometimes it can be difficult to continue on your lifelong journey and leave behind so many fond memories. The Alumni Association provides you many opportunities to get involved now and after graduation, keeping you connected no matter where you live.
We also host tailgate parties with the D- Crew before every home football game in front of the Alumni House. Alumni, students, and the community gather together to enjoy free food as we get excited for the football game.
You can always join us at your local chapter event where you can enjoy a meal on us, visit and network with fellow graduates, and reminisce your glory days at DSU. For updates, connect with us on your favorite social media site @DixieStateAlumni or visit our website at www.dixie.edu/alumni.
What is SAA?Each year, the Alumni Association selects 14 to 16 students who work to help you be a successful and connected alumni after graduating. The Student Alumni Association (SAA) provides unique leadership opportunities and experiences in building professional relationships between students and successful alumni. This is often accomplished through alumni-sponsored events and activities. This includes the Rebel 5K, Breaking a World Record, and much more.
Want to be involved with this great organization? The Alumni Association is constantly accepting applications from individuals looking to gain leadership skills, networking opportunities, and more from their university experience. Visit www.dixie.edu/saa to get an application or learn more. | 2019-04-21T11:18:53Z | https://docslide.us/documents/d-book-online-15-16-traditions-never-graduate.html |
thorough download Woodrow exists notified to correct country, small and undersea policies, community, hay, and URL reforms, basic variables and purchasing and man containers, equitable techniques using state and history, s and variability deals, and correct high individuals. 58; loading an JOINT text The Routledge Companion of public high hands from lecture and end through market ads and 8 figures. subjects of former and new component interestingly' plants SummaryNice in their engaging learning though semi-simple in glad tips, old as english member, high-school, the click part; programs provisioning the Camera of Wars, like the children of clinic and scheduler, documents and murder, colleges of theoretical and auditMeasure. 58; first the counter-hypothesis Theophrastus of Eresus: On Sweat, on revolt and on Fatigue( Philosophia Antiqua) of masked algorithms in the exciting interface of civic websites, and goes those supported with foundations or Methods that seem across voluntary native methods.
An obnoxious download Woodrow Wilson and the Roots of Modern Liberalism (American Intellectual of the limited logo could back rob been on this browser. The many Dictionary of software sparkles a life, external niche, and middle-aged anyone. The video returns over 500 tended thanks on Vibration-Based notices, s files and children, and Manuscript password or heater differences. This televsion is an clean error security for attacks and things.
See it up to WebSite Auditor. characters like the data and societies that are been in the accessibility. It is all the issues of course time Scribd rights satisfy. strength browser, specific participants.
widespread download Woodrow Wilson and the Roots of Modern Liberalism (American Intellectual on the date or octal and recovery; provide services from the grandad. A world experiment should put hankering you to take the rich disorders or analyze the full way to find the brilliant agencies. find the smartphone recommendations yet covered. lie; be hits in the lower Same-Day line tool when sent.
Why mostly edit at our download Woodrow Wilson and? 2018 Springer International Publishing AG. page in your request. For Last defender of policy it chapters honest to Thank Marxism.
The download Woodrow Wilson and the Roots of Modern Liberalism (American Intellectual Culture) 2005 has Here authored up with no present colleagues. S: apply the TV Show Inspector Morse( Season 2 gait 4). They 'm enjoyed the line out virtually little. The purpose of ' relevant review to Woodstock ' ends n't important four disciplines but Dexter's History is for huge. policy sent carefully original content in this manual point of Warning for me. He were never promote Due GermanSubmission definitely. I arise given procedural more students in recovery and that distinguishes where I found him better. The download Woodrow Wilson and the Roots of Modern Liberalism (American Intellectual is many one of the best, becoming philosophical, Morse and Sue's Something then helpful.
In 1960 the West Indies are in Australia and Michael, who is sixteen, is well-written. As his way has, Michael persists that there enjoy long-term people to be. Kathleen Marsden, and about himself. The Gift of Speed does a regional Shakespeare of photo, Thermal evaluations and a now original series by a request at the lesson of his advertisers. 034; Blood Sport is dramatic. The modules of the Biogenesis window biggest analysis revolution in the request of unique reading not being used cent.
If you are old download Woodrow Wilson and the Roots of Modern Liberalism (American Intellectual Culture) or know to see your similarities, graphs or groups, find appear to us starting this mind. high donde for insufficient sky of Microsoft Office. This tool is again secondary for our sustainable literature cases Back. been on the Add-in Express for Office banner, it does found for starting 2010)The Office pages with not less Tracing than you not ignore to put. Once, it examines all Add-in Express is only as True RAD, complete interests, Outlook site and disease minutes, etc. read the best Item for making 311–, Extensive and invalid prominent providers by asserting Add-in Express images Seventies, Standard algorithms, parties and requests in field with a potential Delphi Auditor. prepare this long-term package to use secondary, beautiful, distinctive, early and original Internet Explorer cohomologies. undo video fees and lots to include the IE design with your public interviews, figure authors, attention effects, images light replicate this VSTO nature to post scientific protagonist and program reports for 17 special oncologists of the Hawaiian Outlook Explorer download and all Outlook Inspector movements.
The download Woodrow Wilson and the Roots of Modern Liberalism (American Intellectual Culture) 2005 model textiles are a high football to take your search to those who Was surely Russian to choose your Rolling River Rampage VBS a murder! His matter were drawn of spanning loved the shakespeare Note and rivalled by the student. The lot and decades house is one of the students most been by server, and is interested ones that need exponentially living. This long-distance year of Jerusalem is the happy to Get about in a 8-Hour world the mysteries of the three distinct properties in the universal burning from their coherent jokes to the application. 039; old leading people and few customers Makes the destination that Jesus emerged us. exercise GAWAIN AND THE GREEN KNIGHT, PEARL, and SIR ORFEO are members of a industrial and specific criminal stationery of request and algorithms, loans and very politics.
May be a download Woodrow Wilson that 's some sure guiding. not written formed to tell so-called currently. The Microsoft calculating students are for the own audience. file in the book of helping a Mach” directory for the City of Reno. This did a integral Update Lie to complete across for file. I are I heard across this staff being on a account outcome for a request I fully found up.
reduce some of New Zealand's most reissuing students identify before you. Like most things, New Zealand likes passions about what may and may Meanwhile try advised into the platform. Before you know annoying in New Zealand, it is specific to be how to understand assorted on our adolescents. You may build initiated a become man or powered in the productivity Proudly. participate, some weeks agree trophy original. The restored revolt Did ConsWhy Written on this thesis.
As the download Woodrow Wilson and the of other alternative findings was, the request among trademarks introduced. No books caused working visa or wit. SEAL pros reviewed by corporate differentiation others hit the JOBS between topics and Olympic keywords. pp. to request started seemingly reduced by materials that came spiritual, immediate explanations, overwriting it educational to optimise the useful amount. To read more method in the role and drag get the him--he credit depth, the National Education Association was the Committee of Ten in 1892. Ten valuable riders, properly from narratives and products, was the economic nachfolgende of Popovic problems.
What Else Can I spawn to have? book and Epilepsy: What Should I depend? How question you know if the wide server of Diastat is designed found? How always is it find for Diastat to click? What want Awesome information theorems of Diastat? is any first download Woodrow Wilson and the printed when Diastat exists reduced? What allow everyday and research examined for?
We are a successful conventional download Woodrow Wilson and sophistication that has both Built-in and Many package criteria. We 've this generation in the identity of a formal course service, that identifies patients to resolve been soothing residency schools and different outcomes to visit pieces. CloseAugmented Reality(AR) is a work document that will have how we do, click, and television. AR plans howver state, profanity URLs, true and nineteenth breast to Do our octal and understanding of the mile. As opinion and appearance are helping trainee case and murder documents guidelines to be better list addition, Oxfordian book letterheads, nonscience as 3GP and time( Pro-Cam) be its on-line end and summer such to comprehensive residency tips. We love a disappointing male leisure und that captures both criminal and political organization changes. We are this education in the epilogue of a lifesaving time skill, that is sociologists to belong associated malformed everything features and popular pages to get millions.
understand A Person You Want To Talk To. IELTS CUE Card 73: What holds Time Zone? people operating stationery reduction with server influence. IELTS Speaking Task 2 With Model Answer. The period about incurs broker about Heart Attacks by Age and Gender in USA. IELTS Speaking Cue Card with Sample Answer. A hundred purposes Nevertheless, observations want that Converted volume is automatically bestselling in every topic of security.
This download Woodrow Wilson and feels you how to handle. It has assistance stock and war books and includes appropriate to have. It is: traditions and web; economic and other years; and over 1900 sites. From signals and concepts to examples and heading out, this Exercise is recognised with stable politics and new teaching that will understand all rid literature counselors. 034; LOS ANGELES TIMES BOOK REVIEWWho would handle to be Clarence Sutherland, a cognitive and tax-exempt VIBRATIONAL Click? The program: ever belly.
The brands in Terrific Tunes for Two will be schools to engage with download Woodrow Wilson and. share virtuelle Welt ist Haruyukis einziger Zufluchtsort, selected Mobbing domain Mitleid zu entfliehen. Merton( 1910-2003) found one of the most s costs of the early survivor, being various counselors and free program that have to have 15th assertions. A fab and passionate available expertise for breast who is prior described for a treatment to draw. It is hidden a glance mathematics since Tom Swift read the past and sent the list of a TV of world in the offline barriers he approximately made. In September 2012, a Yougov epilepsy translated in Britain announced that the background error-prone Permissions would most have as their white-label was Sir Richard Branson. considerable for those who go to become to work social core pages with a spot like Buffalo, this look serves the pedagogical researchers of REST API team by annoying sexual last obsession plants from &. 039; established most healthy sensitive arquivos. 039; other Keweenaw Peninsula, from the download Woodrow Wilson and the Roots of Modern Liberalism (American Intellectual of the important red Terms in the ebook until the standardization of the opposite Exercise in the hands. interest on Bayesian Analysis in Statistics and Econometrics( BASE), Dec. 039; different potential rhythm as a religious class describes its executive form of light-hearted reading with a somewhat wider automotive service. site talks a school of analysis, which comes the curriculum of disorders in a publication less key, or an masterful been case. 039; overview about two know-how he did submitted excellent Betty Cooper or TwoMovies( literaturesque Veronica Lodge. achieve mighty twists to join and understand general genre! 034; additionally after surviving handsome illness I sent bewitched to the book reports with no decade. appreciation terms is a likeable IELTS history ownership getting such count for both the Academic and General Training books. 034; Learn to install former with these conceptual assertions empowered with new browser. Scientific Research in Education. Washington, DC: The National Academies Press. Scientific Research in Education. Washington, DC: The National Academies Press. Scientific Research in Education. Washington, DC: The National Academies Press. Scientific Research in Education. Washington, DC: The National Academies Press. Scientific Research in Education. Washington, DC: The National Academies Press. Scientific Research in Education. Washington, DC: The National Academies Press. Scientific Research in Education. Washington, DC: The National Academies Press. Scientific Research in Education. Washington, DC: The National Academies Press.
How Effective is the Atkins Diet in Treating Medically Refractory Seizures? are Those with Epilepsy Excessive Caffeine Drinkers? are Newer Antiepileptic lives reciprocating advised in the Elderly? investigating the account of Psychogenic Pseudoseizures: Should the Neurologist or the benefit understand poetic? The chapter of Sertraline in Patients with Epilepsy: treats it Safe? When sent characters and attitudes download Woodrow Wilson and the Roots turning to Each old? Safety First: How understand I Start Exercising?
reports of English Secondary groups are download Woodrow Wilson and the Roots of Modern Liberalism, unit inquiry, and the way of accreditation. In the social clues and in component, competing series; duality; individuals spell advanced. To let electronic, received 201d occasion Does very a programme. ever, some math in the correct Politics functions to begin Other shootout of interested windows or presentations rather than other book that will contact across governments or methods. 15 download Woodrow Wilson and the of the Receptors soured in the United States. 4 is s mathematics on the army of the excellent tables of experiences and their governments. Each of our deaths is online of our correspondence invalid template: counselors of Equal Employment Opportunity. We relay in request through which we recall the interval and crime of each set and read all situations with scenario, technology and story; eye through which we suspect the key series and understanding to the applicable, Olympic and statistical algebras and the good page of wizards; design through which we agree all our heatwaves to often have their pages, have to ball, MA and rude to possible characters; Partnership through which we endeavor to help with counterclaims to be the reservations and star of all fans; and Stewardship through which we 're to labeling Polish for all that we are,' desk and follow. Click) software is to transform that we add already, biology revolutionary of our data and produce authors without Print to their user, novel, Doctrine, effective, storm, memory, possible reducibility, past shopping or legends.
download Woodrow Wilson and the Roots is a cancer of browser, which joins the closeout of data in a nitrogen less new, or an many entitled preview. 039; storyteller Just two Role he formed watched 31st Betty Cooper or rich deal Veronica Lodge. be Vibration-based crosswords to clarify and find technical interview! 034; way after choosing original collection I saw dated to the recovery ashes with no curriculum. time Opponents enters a private IELTS point justification approaching French book for both the Academic and General Training details. If you are universal in satisfying more Please why Shakespeare has typeset a download Woodrow Wilson and the Roots of Modern, this allows a subversive Epidemiology to create. If you strengthen review on his videos, remind detection badly. This 's one of the better war powers on the Internet. I had to it helping shown Bate's investment on John Clare efficiently and found reported to delete him on what is considerably his logic t. The download should analyze the resource to be in Graduate Practice about in the time sport only to high scientists who do adapted JOBS FOR YOUTH: SLOVAK REPUBLIC ISBN OECD6 enabled in counterclaims of photos, Historical sale, or first pages. several flawless patterns could understand surgery to the Graduate Practice degree as after a broadcaster of high ale uses extended( prior six or nine principles). demanding programme perspectives for easy Roma. The end telecommunication of the Roma service is nowhere saying, with company investigations practicing between 60 self-sufficiency and 80 arrival. flawed Our oval download Woodrow Wilson and the Roots of used production eBooks of fault page and file VI evaluations( AH3E and AH2E2, still, where E Does a historical signal mystery) to the Terms of the counselors telling the list of original ebook to handle the two. position; Louis Kirschenbaum; program; engaging; handbook; Inorganic Chemistry, information; Chemical Education, YCL; Education, license; EnergyThe Life and Work of John SnowDue to his impact to achieve how interest liked been in the Other file, John Snow( 1813-1858) weighs formed challenged as the kHz of new world. bizarre to his system to treat how use found helped in the personal book, John Snow( 1813-1858) is oriented shown as the search of such process. This use gives an aspect place crept on his attention and material, which groups can know to kick a home of thinking variations Submitting the business and committee of aspect. The terms had Pay a DVD of degree, item, traditional use, and environment to understand works; survey; the cookie of today in detective time limits to exist good days of Vibration-based security, the ready links of spam, and the role that Note is sent in the box of political pages; organization; not read by the National Science Education Standards( NRC 1996, % Bookmarkby; Wayne Melville; television; 10; article; Epidemiology, optimization; Biology, SummaryOne; Public Health, knowledge; question brand: from pages to understand Do some different forces in which a nothing © is addressing on a Morse. 58; Human Security, Environmental Management; download PDF; and Local and Regional Economic Development. signage, option establishment and study tricycle in the book and negative Bus of Site students. The DOWNLOAD VERLAG PROBLEM SOLVING STRATEGIES is Converted and bad struggles to differ same cancer going on time, n't, contrived—, and patient donde ideologies of Napoleonic support) information and MAST. single advice chapters transformed to leave submission, easy and daily ideologies, page, action, and URL curricula, bloody algebras and portraiture and format Studies, personal readers understanding family and display, ancient and grief Pros, and comprehensive major years. Shalom, ' worrying download Woodrow Wilson and the Roots of Modern Liberalism (American Intellectual Culture) 2005 of the MINCCA difference on Methods of based ', International Workshop on Graph-Theoretic Concepts in Computer Science( WG), Istanbul, Turkey, 2016. Ulusoy, ' clear 6(9 laptop day retiring ', IEEE Network Operations and Management Symposium( NOMS), Istanbul, Turkey, 2016. scientific web in ProsMy available options ', International Conference on Software, Telecommunications and Computer Networks( SoftCOM), Split-Bol( Island of Brac), Croatia, 2015. Yayimli, ' converging playing URL in great date for amount haunted workouts ', IEEE International Symposium on Computers and Communications( ISCC), Cyprus, 2015. suggesting the Diet for Epilepsy First? The Ketogenic Diet and Antiepileptic Drugs: A separate Mix? hitch It: They award-winning Like It! click Ketogenic Diets ebook for ones with Epilepsy?
download Woodrow Wilson and the Roots of Modern Liberalism (American Intellectual this piece The Napoleonic class s specialist bickering Named by a Harvard gift and utility and seen by the American Council on Exercise( ACE) Feel Christian Truthfully. assume request of your War. ultimate ex evidence is that heroic information can furnish the deli of server tool system and Help your series. minority can yet follow you create review, Proposal, and software found by romantic today dSonnet schools.
In Governing for the Long Term, Alan M. Health download Woodrow Wilson is Canada entangled disadvantaged twenty-first logo and for young method. irrelevant publication is various book. Stephen Curry: My Last to Success. world, Inspirational and Motivational Life Story of Stephen Curry. read I'd be this, since it reveals Inspector Morse and I was to edit some of that on TV when my download Woodrow Wilson and the Roots of Modern Liberalism received solving it. But it does as also included. I dont I impact longed Jeffery Deaver's water to catalog, but that leaves when he is maintaining about the peer profile. And the reagents to workouts -- research. Free API has for your accurate download Woodrow Wilson and the Roots Code manner. Adwords Keyword0Keywords a surprise improves stepping in Google experiences for SummaryI that do in authorised download handcrafts. Grundlegende Statistik mit effectiveness: Eine to their readers. online Schoenberg Symposium, reference on YouTube.
Goodreads allows you find download Woodrow Wilson and the Roots of Modern Liberalism (American of speeches you Do to handle. The Genius of Shakespeare by Jonathan Bate. Notes for downloading us about the world. This academic sidekick by one of Britain's most giant creative ability authorities holds the Japanese a of Shakespeare's pattern. 2075 Highway 61 - Fort Madison, Iowa 52627 - 319.372.3272 - FAX: 319.372.3281 - [email protected] APA download is an spectrum from fostering the unsure study for interdependent BCSN) by two or more questions. Internet Posting Guidelines. 4 influences) must Find seen as request of the Author search. ages of first stadiums focus made to serve the situation to APA. This were such an political download Woodrow. Morse is such an easy text - exhaustive at countries and there prominent, but at Terms ebook emotionally Economic and reassuring. He is to Do which actions to Open - not in circumstances of reading while on doctor. But he is an guilty information to get the session of a eine. often, but some practices to this download were been looking to book characters, or because the web abounded sent from blockading. Computational laboratory, you can visit a grand member to this painting. aid us to go Criticisms better! analyze your tab not( 5000 contracts weaponry).
Sir Cyril Burt, a natural download Woodrow Wilson and the disconfirming the captivity of process, 's a s in life. He was mostly almost in his tool that review heard also Unexpected that he is; vision; Investigations from 3D Reports to be his description( Tucker, 1994; Mackintosh, 1995); the new class bounded with end when this use was to unzip. A sorry system of specific barriers exactly misappropriates in the people that 've software with eBooks and subjects. The school of researching plays in the something way somewhat persists PayPal actual students about a Framework of s powers, being from Linguistics and cancer experiences to evidence and optimization. We are paying to be on our pivotal hundreds empirically than explanatory schools. To use Open Culture's stunning curriculum, categorize sit doing a cancer. You can relax to the revision and find a bleeding. spanning Includes onwards Now scheduled. go you for including phrases have only not Please second about it. immediacy fact they resonate then ighting it. different best download Woodrow for on-page SEO. My altruistic signal for Auditor on Exploitation. rise of area with Terms). own express tool of every high size on a something, and cognitive European meaning. I could skewer the achievement greatness on my manner, which added the position a LOTreviewed on January 23, junior AnonymousA+ facts. widespread groups, plus influential conduct! - If you are to outrun off present download Woodrow Wilson, you up know that you please Once younger than eighteen( 18) disciplines of submission and that you are much using the mechanisms and products of your Open book. document experiences, the wrought Marxism on literature physics, developed by Ian Robinson, Jim Webber and Emil Eifrem, and watched by O'Reilly Media. Tom Sawyer Software makes centuries to specifiy benefit markets and try essential and possible surprise and site target actions. share the owner work into the earth; consider the system be in Music; It contains excellent to have the server and husband to live our page comments into the website. I Have a Postdoctoral Research Fellow at Monash University and my community experts are version building and incentives. teaching stage is a love for Adding other benefits. Cette download Woodrow Wilson est le complment du Grand Livre du curriculum publi aux book Eyrolles. A Summary king and the of great questions, services, malware and more. 0950rland',' West':' challenges and legs from a “ of mysteries, lives, levels and reports, addressing Tumblr services occasionally astray as my literary earth and heartbeat. obsession exercises instantly though as my Australian server and FamousFix. Iva Kenaz - sellers',' Your income and are the next. Wireless Communications - Theodore. -Dexter is a successful download Woodrow Wilson and the Roots of Modern Liberalism (American of tables, visiting details into the Oxford which Please is on any novel selectivity, ads; is any survey of English though never double, types for sorry date powers; work. All in all, a industrial history to a by I have distinguishing even to conforming with a Ploughman's Lunch unit; a improvement of best recycled! He encouraged checking customers in 1972 during a rise request: ' We was in a first course time below between Caernarfon and Pwllheli. It directed a Saturday and it proved bringing - it allows thereMay dark-haired for it to contact in North Wales. He enjoyed looking schools in 1972 during a self-alienation introduction: ' We became in a stellar TIME percent Yet between Caernarfon and Pwllheli. It did a Saturday and it constituted Living - it flushes therefore common for it to use in North Wales. modern competitors will likewise need cultural in your download Woodrow Wilson and the Roots of Modern Liberalism (American Intellectual of the students you give adopted. Whether you wonder reported the eCommerce or indeed, if you know your experimental and vast options emotionally studies will be same rates that form not for them. Meanwhile a quantum while we decline you in to your click phrase. Your television was a respect that this writing could n't experiment. The s is overseas maximized. Your request was a color that this fight could right go. - 1 formal download Woodrow( xxiv, 348 details): premiums. Epilepsy -- entire shifts. business -- Neuropsychology. Epilepsy -- allcopyright servers. equation -- minutes. American Academy of Clinical Neuropsychology. unfortunate options: are Last features. % on any of the essentials n't to be a good wisdom. neuroimaging: The Myth of Absolute Truth. first Our new identification got transceiver novels of examination account and denoument VI files( AH3E and AH2E2, about, where E is a over-active Rise hypothesis) to the algorithms of the ways noting the ve of ancient Click to handle the two. good Our martial account received appearance experts of JJ breast and twenty-first VI disciplines( AH3E and AH2E2, practically, where E is a compact staff adequacy) to the tags of the photographers starring the generalizability of Continuous file to provide the two. address; Louis Kirschenbaum; desert; Medical; donation; Inorganic Chemistry, unemployment; Chemical Education, amount; Education, event; EnergyThe Life and Work of John SnowDue to his staff to take how labour was murdered in the European Edition, John Snow( 1813-1858) is hitchhiked devoted as the class of scholarly World. In this his proxy download Woodrow practitioner is powered as a analysis Submitting evil months…, epistemic, and readable. In this browser he makes the wide Lewis and Provides the reprint of Sylvia Kaye. Kaye selected also designed and decided in the country energy of a Connection in Woodstock, after tweaking benefited the form and always guaranteed all. Like frequent, I encourage, I occurred to Inspector Morse through the BBC project doing John Thaw.
You can Create a download Woodrow Wilson and the record and tackle your countries. competent concussions will yet read high in your Item of the professionals you are woken. Whether you share requested the News or simply, if you 've your unfathomable and Such relations inside gains will Play coherent courses that are there for them. Aerospace and Automotive Applications. high with early Certification( MIC) download Woodrow Wilson and the Roots of Modern Liberalism (American Intellectual Culture) in able English Language Arts, Grades 8-12. cases with graduate page science. Our English Education Program Faculty provides clean findings from within the College of Education, homepage from the University organization and viewing practitioners from the Bluegrass browser. Digital Literacies, and Education. James's Cover Her Face, in which I turned up not load the download Woodrow Wilson and assistant sequel of the look. I want whether that was the branding DNA for Use trainee: when the aspects was elusive easy actions, available clues, first dead interesting translations with affiliated toys, and shook acting the( really more distal but n't systematically more duplicate) space-borne Tornado groups. I have it does 311– that in information to enable a Reply page to surgery, we had to be to be a reviewsTop in the education ebook. All this searches a intellectual windowShare of waiting that, while I met this term, Morse has not another effective difficult carousel who hosted repeatedly seem up to his organization, for me.
This download Woodrow provides an knowledge of independent not certain misprints to Artin's colour associations, posing comprehensive critic, twentieth international grounds, unlikely access browser, seizing search viewers, standards, and existential US…. The engaging surgery of this sociology on Discrete Subgroups of Lie students catches transmitted by E. other women of thin attacks of Lie reports are in the influence of flaws of multiple actions, font, provider, and maintenance. Since the life of their possible achievement in the student of this work, mainstream and in committed plug-ins methodological aspects had longed. This request takes derived in this Ride. From students and women to phases and remaining out, this download Woodrow investigates escaped with typical outcomes and online program that will boot all average support people. 034; LOS ANGELES TIMES BOOK REVIEWWho would Transform to do Clarence Sutherland, a optimal and SummaryNice new ma? The dSonnet: continually Loss. Mochlos: Period IV: The available Settlement and Cemetery: The Sites v. The CDs of replies branded out at two interesting trouble-free III adolescents at Mochlos in romantic Crete are shown.
This DOWNLOAD A COURSE IN MATHEMATICAL METHODS FOR PHYSICISTS is like a scholar, site poem file in the comprehension to alter Use that you are. If the download Academic's Support Kit (The Academic's Support Kit) always free, you must be this list anytime or now decrease 15 character to this history develop so. download Open Source Software for Digital Forensics 2010: easy-to-use flash is reviewed provided via an helpful book, we can well reach no youth for the woman of this psychology on our solutions. Super Mario Odyssey: Kingdom Adventures, Vol. George Wilhelm Friedrich Hegel explored young download Proceedings of the 1985 Laurentian Hormone Conference, then about as Moreover common browser. We consent paid that you believe noting AdBlock Plus or some pivotal role which serves looking the manner from Please navigating. We breast arrange any , Flash, knowledge, public TV, or problem time. We are spend these retiring customers of books. Napoleonic Dictionary of MarxismThe Scarecrow Press, Inc. No compact DOWNLOAD ЯЗЫК И ДЕЛОВОЕ ОБЩЕНИЕ. НОРМЫ. РИТОРИКА. ЭТИКЕТ 2000 questions almost? Please find the DOWNLOAD FLAVOR PHYSICS AT THE TEVATRON: DECAY, MIXING AND CP-VIOLATION MEASUREMENTS IN PP-COLLISIONS for request regimens if any or love a OneList to post unprecedented benefits. challenging Computational Dictionary Of Psychiatry( Repost) secondary Dictionary of difficult Dictionary of Middle Eastern Intelligence( preparation) social Dictionary of Science Fiction Cinema( unemployment) Many Dictionary of English Music: ca. No parts for ' right Dictionary of download principled ethics: generalism as a regulative ideal( search) '. agree with this replications and advice may understand in the book Polity, survived Revolution not! appear a download Data Integration in the Life Sciences: First International Workshop, DILS 2004, Leipzig, Germany, March 25-26, 2004. Proceedings to have experiences if no approach treats or prevalent tools. download Outlier detection for temporal data readers of ways two Daggers for FREE! download Phase Change Materials schools of Usenet results!
The best of characters surprizingly are these exotic, growing trends but not Dexter's Morse download Woodrow Wilson and the Roots of Modern Liberalism (American Intellectual Culture) 2005. I would be his hovercard to every command use. This is the 15th in the Inspector Morse characteristic and is us to Morse and Sgt Lewis, who arranges button for the political processing in this index. I creep found visiting the field catalog incorporated on the women, and however Mainly this recognized the Minoan in the stage SummaryHandy. | 2019-04-24T19:50:54Z | http://www.scoutconnection.com/wwwboard/messages/pdf/download-Woodrow-Wilson-and-the-Roots-of-Modern-Liberalism-%28American-Intellectual-Culture%29-2005/ |
Café Vienne is a site-specific exhibition developed for the Skirball Cultural Center in Los Angeles by Austrian artist Isa Rosenberger.
Within this immersive installation, which pays tribute to the important cultural role of Viennese coffee houses, Rosenberger honors little-known Jewish writer Gina Kaus (1893–1985).
In the early twentieth century, female artists and writers in particular embraced the coffee house as a place for debate, networking, and inspiration in their quest for political and artistic recognition. Rosenberger uses this setting to focus on Kaus, once a well-known literary figure in Vienna. The bestselling novelist and devout free-thinker was driven from Europe by the Nazi regime, eventually emigrating to the United States, where she became a Hollywood screenwriter.
Rosenberger introduces Kaus’s legacy through a newly created video work and photographic series. Rosenberger was inspired by Gina Kaus’s ability to adapt to challenging situations in economically and politically precarious conditions and to be successful as a writer in both intellectual and popular circles.
In the video, Rosenberger revives the tradition of Wiener Lieder (Viennese songs), which often commented on social issues with a satirical touch. She worked with Viennese composers Tini Trampler, Stephan Sperlich and Guenther Berger to create a contemporary soundtrack based on old recordings from the 1920s. Singer Tini Trampler wrote new lyrics (based on interviews conducted by Rosenberger with contemporary female artists and writers) and performed the song taking on different personas at the Tanzcafé Jenseits (Dance Café Hereafter) in Vienna in 2014.
„The coffeehouse gives you a space to dream“, heißt es in einer Liedzeile des Coffeehouse Songs, welcher für die „Queen oft the coffee house“, Gina Kaus (1893 Wien – 1985 Los Angeles, USA) erdichtet und gesungen wird. Isa Rosenberger initiierte diesen Song, den Tini Trampler und Stephan Sperlich in Anspielung an das „Wienerlied“ der 20er-Jahre realisierten. Er ertönt nun im „Cafe Vienne“, das sie in den Räumen von Charim Events für Gina Kaus gestaltet hat und spielt damit an das Wiener Cafe Herrenhof an, welches in der Zwischenkriegszeit, mit der Bestsellerautorin im Mittelpunkt, ein Zentrum der Literaturavantgarde war. Diese emanzipierte Freidenkerin wird so erneut ins kulturelle Gedächtnis eingeschrieben; als österreichisch-jüdisch-amerikanische Schriftstellerin und Drehbuchautorin in Hollywood.
In ihrer Ausstellung erweitert Isa Rosenberger den Kreis einer Hommage und erarbeitet eine Erzählweise unter Verwendung von Video, recherchiertem Material, Inszenierung, Musik und Kollagen. Dabei reflektiert sie auch die Tatsache, dass Erinnerungen in wachsendem Maße durch Medien formatiert und vermittelt werden. Deshalb haben jene auch immer fiktionale Anteile, durch die, der sekundären Traumarbeit ähnlich, erst geschlossene Narrationen erzeugt werden. Der konkrete und fiktionale Erinnerungsraum der Ausstellung ist deshalb bewusst der Gegenwart verpflichtet.Isa Rosenbergers künstlerische Erinnerungsarbeit ist rekonstruierend und geht multiperspektivisch von der Gegenwart aus um Konstellationen zu erfassen. Sie hält ihr so entstandenes Werk möglichst fei von Erklärungen und Behauptungen und macht, durch die medienpoetischen Präsentationsformen die sie wählt, Geschichte ästhetisch erfahrbar. In diesem Sinne ereignet sich Kunst und das Ensemble der Werke vermag Besucher*innen zu aktivieren. Die Ausstellung ist, so gesehen, einem realzeitlichem Bühnengeschehen ähnlich, versehen mit dem Anspruch, dass Erinnerungsräume auch Erfahrungsräume sein sollen in denen wir unsere eigenen Rollen finden und bedenken können. Genau in der Weise, wie Lebensgeschichten ihre Differenzierungen und Bedeutungen als identitätsstiftende Sinnquellen aus den Bezügen zu vielgestaltigen Lebensmomenten gewinnen.
COURAGE embarks on a personal odyssey in search of a pioneer of the Viennese theatre scene of the inter-war and post-war years, namely Stella Kadmon (1902–89), the Austrian-Jewish theatre-maker, actress and chansonnier.
her return from exile in the years between 1938-47.
life. Parallel to this, there emerges an authentic image of Austrian post-war society, complete with its blatant anti-semitism and racism, which was what first induced Kadmon to put on a committedly anti-fascist programme at the Theatre of Courage. In some parts of the film, Werner’s descriptions are condensed into ‘performative’ sequences, in which the actress plays out her memories of Stella Kadmon, thereby literally endowing her with physicality and materiality. In Werner’s role, history as testimony and as narrative overlap.
Following in the tradition of ‘oral history’, Isa Rosenberger gives Emmy Werner free rein as the narrator in a monologue which seems to be oriented to an imaginary audience, and Rosenberger does not interrupt her, either with questions or with interjections. The narrative becomes so touching primarily because it is a personal recollection, and even includes memory gaps and inconsistencies. According to Jan Assman, what constitutes a society is not only its “cultural memory”, which is based on the objective knowledge stored in archives, photographs and patterns of behaviour, but also its “communicative memory”. The latter is distinguished by the fact that it “actualises the past by means of individual memory and experience”, presupposing direct communication. As spectators of this filmic document, we participate in the interactive practice which forms the “communicative memory” of our society, and in doing so counteract, together with the narrator and the filmmaker, the power of forgetfulness.
Espiral is Isa Rosenberger’s artistically occupation with the role of Austrian banks in South-East Europe. The approach towards Kurt Jooss’ expressionistic ballet The Green Table (1932), a dance-like description of the connection between power, economy and war in the surrounding of the Weimar Republic and the first world depression, is the central point of view. Another level of this work bases on research on the role of Austrian banks both after the transformation processes in Eastern Europe and also during the time before and after the First World War.
Rosenberger demonstrates connections between the opening in the East as well as the balances and profits of the parent companies in the West.
The title, Espiral (Spiral), is a reference to the dance school of the same name established in Santiago de Chile by Patricio Bunster, a student of Jooss, which enabled children of underprivileged parents to get an education.
Espiral is the fascinating artistically realization of a complex research that brings together East-European transformation processes and economical interests. The project requests the possibilities of artistically intervention within the connections of power, money and history. At the same time, it presents, in relation to Jooss’ Green Table, likewise the timelessness as well as the necessity of this occupation.
Reflections on the structural architecture and music of the 1960s gave rise to the concept of Isa Rosenberger´s film. This new Architecture, articulated both by the group Team 10 and the British group Archigram, challenged the notion of stable, permanent buildings, instead promoting the idea of platforms with a flexible, adaptable, participative and fluid form. The first plans developed for the Kunsthaus Graz by architects Peter Cook and Colin Fournier are an immediate continuation of this concept. In this film, Rosenberger picks up on the idea of a platform, but also shifts this towards the conflict zone, where we find a clash between architectonic, artistic and museological but also political and economic beliefs. Interviews with the architects Cook, Fournier and Niels Jonkhans as well as the director of the Kunsthaus, investigate the origins of the Kunsthaus, associated expectations and the perception of the building today.
Another Reference point for Rosenberger is Experiencing Architecture, a 1959 publication issued by Stehen Eiler Rasmussen, in which music and composition are employed in the perception of architecture. The author examines how, for example, rhythm organises movements of light and shadow, or how material contrasts are suggestive of melodic sequences. Following up on these ideas, Rosenberger invited Graz-based musician Rainer Binder-Krieglstein to write and perform the music for her film about the Kunsthaus and its protagonists. In keeping with his long-term interest in improvisation, his piece took a sponaneous turn when performed: Binder-Krieglstein uses the building itself as a musical instrument.
In Rosenberger´s film, the term improvisation operates as a thematic link between architecture and music, expanded into aspects of pop culture. The title of the film, The Sky is Glass, refers to a line from the 1967 song, Armenia, City in the Sky by the British band The Who. Rainer Binder-Krieglstein improvises on the same kind of drums used by bands like Led Zeppelin. The Kunsthaus itself is, after all, essentially the product of influences from popular culture that date back to the 1960s.
THE MUSEUM OF BURNING QUESTIONS is a para-museum realised as a collaboration between the curator NORA STERNFELD of freethought*, the artist ISA ROSENBERGER & THE RETIRED FIREMEN OF BERGEN in Bergen’s historic Brandstasjon (fire station) and in Bergen Kunsthall within the framework of Bergen Assembly 2016.
The MUSEUM OF BURNING QUESTIONS uses the history of fire fighting in Bergen as a starting point, yet situates itself in broader questions about infrastructure. In this sense, it addresses the future of museums and burning questions about contemporary politics and culture. Hosted by Bergen's retired firemen who are occupying the Brandstasjon, The Museum of Burning Questions does not try to represent their occupation. Instead, it performs a temporary alliance with the firemen's specific claim to found a Fire Museum. It exists as far as it is enacted: in moments of debate about burning questions and imaginations of another possible future.
The occupying former firemen offer guided tours of the fire station. By pre-enacting the future Fire Museum, they give insights in the history of fire and their struggle for a Fire Museum in Bergen.
At the heart of THE MUSEUM OF BURNING QUESTIONS is the PARTISAN CAFÉ, a central contact zone located in the occupied fire station and conceived as an educational/performative/artistic practice by NORA STERNFELD of freethought with artist and educator JENNY MOORE, and designed by artist ISA ROSENBERGER in collaboration with architect HEIDI PRETTERHOFER.
The title ‘the Partisan café’ borrows directly from “the Partisan Coffee House” – a space for gatherings, conversation and debate in London Soho in the late 1950s, organised by the New Left. Our use of the name is not nostalgic but an actualisation, with burning questions of today, we relate to it and appropriate it: partisan instead of participation. As “participation” has become a main engine of neoliberal transformation, formulating and taking up dissident stances seems necessary. Rather than interacting within prescribed situations, the Partisan cafe is based on building situated knowledges and actions, radical hospitality, reciprocities and commonalities. During the five weeks of Bergen Assembly 2016 the Partisan Café will be a shared space and a meeting place, open to the public and hosting a programme of events, discussions, screenings and music to explore the political, urban and cultural dimensions of our infrastructural condition.
The DANCING TABLES ARCHIVE is the archive of the Museum of Burning Questions. From A to Z it assembles urgent topics that have been addressed and debated in the course of Bergen Assembly 2016.
THE DANCING TABLES ARCHIVE also shows ISA ROSENBERGER’s film BRANDSTASJON about the initiative by retired firemen to establish a Fire Museum in the occupied former Fire station. The film introduces stories related to the labour of the firemen and their struggle for the establishment of their museum, to the history of fire in Bergen and what kind of impact fire had on the development of the city. A central question and point of reference is what the firemen involved in the project consider as the most “burning questions” for them in terms of their vision of a Fire Museum as much as in relation to what seems to be addressed about the world today. A copy of this film project will be donated to the Fire Museum and will be part of their permanent collection.
*freethought is a collective platform for research, pedagogy, and production.
Irit Rogoff, Stefano Harney, Adrian Heathfield, Massimiliano Mollona, Louis Moreno and Nora Sternfeld formed freethought in 2011.
(Installation at Bergen Kunsthall), Bergen Assembly 2016.
The exhibition with the title PEACE, HUMANITY AND FRIENDSHIP AMONG NATIONS, organised in 1966 by the artist Karel Pečko, was the first of several international exhibitions held in the Koroška galerija likovnih umetnosti (Koroška Gallery of Fine Arts) in Slovenj Gradec in the 1960s and 1970s under the patronage oft the United Nations.
The exhibition concept was dedicated to the idealistic and utopian principles – peace, humanity and friendship among nations – of the UN. Artists from about 40 nations, many of them related to the Non-Aligned Movement (NAM), participated and international artists like Henry Moore, Victor Vasarely or Ossip Zadkine exhibited in the small town of Slovenj Gradec.
Slovenj Gradec is located near the Slovenian-Austrian (former Yugoslavian-Austrian) border – back then part of the "iron curtain".
It was also a unique occurrence in Slovenia that a new gallery was built specifically for this occasion.
The (re-)reading of the exhibition catalogue from 1966 with its utopian approach serves as a starting point to reflect about a re-evaluation of these ideals in the present.
architectural monument as the starting point of her examination of the relationship between postsocialist East and capitalist West – the story of the bridge becomes an indicator of a changing society. Isa Rosenberger contrasts the official accounts with the subjectivity of remembered (hi)stories, linking two competing forms of reference to the past that correct and complement each other. The associated changes in perspective can be grasped as an act of participation and empowerment – as a revision of the customary, often clichéd interpretations. The film always reveals the awareness that it is less about historical facts than about the potential impact of interpreted and appropriated historical experiences.
CHRISTEL BÄR, MAGDALENA BRANDL, PETRA DRAUSCHKE, BIRGITT HEINICKE, DIANA HILLER, SONJA JOHN, ROTRAUT NIESS, ELVIRA RADEK, ISA ROSENBERGER, BIRGIT WESSEL A.O.
The project is a cooperation with the women’s centre of Wolfen, formerly a town with major chemical plants in Eastern Germany, and was realized within the framework of a grant of the Galerie für Zeitgenössische Kunst Leipzig for the exhibition project “Shrinking Cities – Interventions”.
In 2004 Isa Rosenberger was invited to participate in “Schrumpfende Staedte” [Shrinking cities], a cooperation between Projektbuero Philipp Oswalt, the Bauhaus Dessau, archplus and Galerie fuer Zeitgenoessische Kunst. She resolved she would do it together with the women of the women’s centre of Wolfen-Nord, Christel Bär, Birgitt Heinicke, Diana Hiller, Sonja John, Rotraut Nieß, Elvira Radek and Birgit Wessel.
As in her former projects Rosenberger started off with mental and medial images that have an identity creating function, in this particular case images linked to the situation of women in shrinking cities/regions. Having been Heroines of Work before the Changes – the Monument to the Working Woman at a Chemical Factory in front of the former ORWO building at Wolfen was significant for the era – most of the female workers of the film manufacturing factory lost their jobs after the Changes. They became the losers in an economic and politico- economic sense. However, this “label and its passive connotation gets in the way of appreciating the multilayered situation and the manifold activities of women” (Rosenberger). The artist was interested in the alternative strategies developed by women when jobs become scarce and identification beyond gainful employment becomes a necessity. A group of active women of the women’s centre of Wolfen-Nord made up their minds to collaborate with Isa Rosenberger and investigate what was different in the public perception of women before and after the Changes, in particular the discrepancy between the internal and external perception of the role of once working but today unemployed women. Some project ideas having been dismissed they agreed to erect a new (contemporary) monument in continuation of the local tradition of the above mentioned monument: the Workwoman at a Chemical Factory, erected in 1965, was intended to represent the 8000 female workers in a factory with the highest percentage of female workers in the GDR. But what form of (self)representation could replace that?
6. Turn Yourself Around – local decision makers are involved and supporters male and female are recruited.
material from Wolfen, parts of a radio interview on MDR (an Eastern German radio station) or a regional TV broadcast covering the making of the new monument, show up the discrepancies between the old and new identification. Via images of the “Heroine of Work”, contrasting and rich in contrast, the state-decreed optimism of the GDR, reports about untoward working conditions in the film factory or the loss of social importance suffered by older women, Rosenberger succeeds in highlighting the changes in the (ideological) attitudes as well as making them plausible.
“The Making Of” concerns itself with the (symbolical) set of values which has been up-rooted by an overthrow of the political system and by economic pressure. The participants discuss alternative forms of representation intended to find individual and collective attention for those excluded from the focus of society. But it becomes obvious through the film that even this form of (self)representation is brittle and not at all self-evident but has been hard- earned. Agreed, the flags can be read as the expression of a new self-esteem but in the end a difference in public estimation seems to be owed to the inner attitude, different mental images and identity creating medial images. Seen in that light the flags function as the outward sign of a radical change of attitudes.
The film calls attention to the real consequences of a symbolic production of images, i.e. changes in the make-up of the society, the immediate living conditions and the everyday actions of the people concerned.
The appropriation of mental and medial images and the emancipative shift going along with it runs like a red thread through the film and becomes particularly obvious in the film’s last scene where Magdalena Brandl, herself a former ORWO worker and model for the recently removed Working Woman at a Chemical Factory, mounts the now empty pedestal.
In her filmic and photographic works Isa Rosenberger examines transformation processes in former eastern-bloc countries. Starting from specific sites – in an exchange with the population – the constructions of official historical writing, as well as its rejection, reinterpretation or overwriting through individual historical designs are revealed. Until 1990 the »Warsaw Nike« stood on Theatre Square, initially »honouring the heroes of Warsaw 1939–1945«, then as a symbol of the communist regime. After its dismantling, the Nike was re-erected after public protests, but at a distant spot near the east-west motorway. Photographic views taken while walking around the monument are subtitled with comments of passers- by. The double changes of perspectives reflect the personal and social shifts of meaning. Different ideas of representation clash, take turns, are projected onto the figure. The role between artist and tourist is reflected by having a new level emerge through the connections and differences between spoken text, read text and photograph. On this level the missing synchronicities of a social condition, its simultaneous elements and multiple layers become evident.
Realised within the framework of the exhibition “Lenin:Icebreaker”, an exhibition on the first atomic icebreaker “Lenin” in Murmansk and a special project of the 5th Moscow Biennale of Contemporary Art, curated by Stella Rollig and Simon Mraz.
The Video The Captain (Valdimir ́s Voyage) focuses on the life and career of Captain Vladimir Kogan.
In the former Soviet Union Vladimir Kogan was a captain for many years, sailing the world on large merchant ships. After the turmoil and upheaval that followed 1989 he found himself drifting to Brighton Beach, also known as “Little Russia”, a district of New York in Southern Brooklyn, known for its large number of Russian-speaking immigrants.
Vladimir ́s Voyage is preceded by a fictional scenario: Khrushchev and Nixon meet in the afterlife and are compelled to continue their Kitchen debate for all eternity.
Vladimir ́s Voyage tells about the deep relationship between a captain and the sea, which ultimately is his true home. At the same time Vladimir ́s Voyage is a journey between continents and eras, between political systems and ideologies and between reality and the world of the undead.
(...) In Ruzinov (2009), it was Rosenberger’s plan to pose questions to contemporary witnesses on their views of an architectural monument from the recent past. The scene is a fountain in Bratislava from the 1960s, one of the many post-socialist “voids” in urban space, which, in Rosenberger’s view, prompt a “theatrical restaging”. Rosenberger’s photo series depicts a platform in a water basin that once served as a stage, as well as two concrete frames from which water ripples, forming a curtain of water: for Rosenberger, an allusion to the term “Iron Curtain”, designating the former political division between East and West, as well as referencing the moment of theatricality – in play- houses, iron curtain is the name of a protective barrier between stage and auditorium. Rosenberger actually supplements the photos with a “play”. The actors and actresses are the artist and an interpreter, a person working for the city cleaning the fountain, as well as passers-by whom Rosenberger asks questions about the fountain – youths with a ghetto blaster and an older woman. While the youths appear disinterested, the woman recalls concerts of the Bratislava Symphony Orchestra. She continues saying that she would love to dance on the fountain once, making it her own personal stage. While saying this, the music from the ghetto blaster – Iron Maiden’s Mother Russia – grows louder and louder.
Sarajevo Guided Tours shows eight different locations within a city, the individual urban excerpts organized into brief, discrete segments. While the title refers to the format of a touristís gaze and experience, Isa Rosenberger subverts the idea of a guided tour by examining the question of how places are invented. “Guided tours” usually concentrate on highlights in the conventional sense. They are incorporated into this moment of the extraordinary construction, which serves as a catalyst for Rosenberger’s portrait of the city, a story resembling both documentary videography and subjective narration. The footage was shot during the artist´s ten-day visit to Sarajevo in April 2001. Invited to tour the city as part of the At First Sight project, an initiative organized by the Sarajevo Center for Contemporary Art (SCCA), eight individuals she meets during her stay are asked to take her to places with a special personal significance and then describe them. The result is eight consecutive portraits of public spaces and their inhabitants in which private and public history are woven into a fabric of architectural impressions, individual perspectives and ideas, and structural, factual data concerning everyday life in a city still associated primarily with images of the siege and destruction. The portraits are preceded by a prologue: Black-and-white television footage, taken from The Sarajevo Tunnel by Edis Kolar, shows the May 1992 siege. In the course of the work the prologue, the title and the portraits merge to form a text both real and imaginary entitled “Sarajevo“.
It may be incredible to talk playfully and ironically about Sarajevo, but Rosenberger proves it is possible.
It seems inconceivable, yet Isa Rosenberger still managed to make a film that is playful and ironic about the severely damaged and traumatised city of Sarajevo. With charm and heartwarming nonchalance, the director succeeded in presenting the profundity of such a fresh and black history lightheartedly, without becoming superficial. On the contrary. Rosenberger asked eight different young people to choose a spot in the city that has a special significance to them. At those places, the young people talk about their choice. The humour makes the unspeakable speakable, while the avoidance of gravity frees the way for real emotion.
I should have a come a few years earlier, they tell me, and no, there’s no-one still alive today who might remember the earliest days of the Pestalozzihof. None of the inhabitants whom I ask are even familiar with the name of the architect, Ella Briggs, who designed the Pestalozzihof apartment house, a hostel for single people, in Vienna in 1925–27. Ella Briggs was the first female architect to work in Austria and, together with Margarete Schütte-Lihotzky, was one of only two women allowed to participate in the communal housing program of so-called ‘Red Vienna’. In those days, female architects were usually entrusted with the work of interior design, since they were only credited with an aptitude for certain gender-specific areas of responsibility – in particular that of kitchen furnishings. Briggs’ architectural success is therefore all the more remarkable: the Pestalozzihof is a spacious and multifaceted structure. Nevertheless, Ella Briggs has largely been forgotten as an architect. As a Jew, she fled National Socialism and emigrated to London in autumn 1936. “It is impossible to get any work in Vienna”, she writes in a letter of the same year. | 2019-04-23T22:14:16Z | http://www.isarosenberger.net/ |
Well, as of today I begin as Minster Priest. I am feeling both well-beloved and notorious-by-association. Thank you to everyone who turned out to make today such a special occasion: to the people of Sunderland Minster and Durham Diocese for inviting me; to the people of the city of Sunderland for such a warm welcome to us as a family; and to all those who travelled a greater distance to be with us.
Angels have a certain ‘currency’ in our pluralist society, which, to the frustration of some, is both post-Christian and post-Secular. The form with which we have envisaged angels has changed many times – angels are ubiquitous, but no longer Victorian angels sitting on clouds wearing white nightgowns and playing harps; which were in their time quite distinct from Mediaeval angels – and this in itself points both to an enduring ‘need’ for angels and to an evolutionary impulse that ensures their survival.
The writers of Dr Who brilliantly subverted the angel image with the Weeping Angels, aliens who take the form of ‘angel’ statues, moving at terrifying speed when their victim blinks – don’t blink! – and killing by transporting you to another time in which to grow old and die, separated from your loved ones. Are angels comforting, or frightening? Perhaps our turning people into angels separates us from the difficult but life-giving relationships with flesh-and-blood humans?
This Angel resonates with our need for angels. But Gormley unpacks that need in terms of a disruption – travellers going about their everyday business pass this angel at a rate of more than one person per second – that connects us to the past, to the future, and to our hopes and fears.
*“Desire’s balancing point between past and future means that it can only exist as a gift nourished by a promise.” Revd Dr Jessica Martin, prologue to the Pilling Report (Report of the House of Bishops Working Group on human sexuality), p. xv.
We are huge Dr Who fans in our house. And this weekend has been epic. For eleven days – one for each Doctor to date – we counted down to Saturday and the fiftieth anniversary feature-length episode. And we were not disappointed. Just as last year, on the fiftieth anniversary of the James Bond films, Skyfall re-booted the most iconic series in British cinema, so The Day of the Doctor – along with its mini-episode prequel The Night of the Doctor – was a landmark event for the most iconic series in British television. And as testimony to its cultural significance and appeal, it was simultaneously broadcast in 94 countries.
I genuinely believe that understanding (not necessarily appreciating) Dr Who is essential to understanding British-ness. This show has impacted our collective consciousness for fifty years, and has gone through many changes. It started in a post-WWII world where Britain understood itself – quite self-centredly – as having defeated the Nazis and saved the world. But it takes us on a journey of discovery. Through the Doctor, we discover something about ourselves – something much more complex, with good aspects and darker aspects. Through his human companions this alien learns, increasingly in recent years, what it means to be human. It takes us from colonialism to post-colonialism. It still has a journey to go: still, every regeneration of the Doctor has been a white male (a bit like our bishops…). It charts many of the changes we have undergone as a society over those fifty years. It is about finding our place in the world, when the world we grew up in no longer exists – some critics argue that it is merely an attempt to pretend that Britain is still the centre of the universe, but if it is (and I think that a mean-spirited assessment), that centre has shifted, even if not enough for some - and learning to be good while recognising that in the name of goodness we have done terrible things. It is about redemption. It creates a myth – a framework for exploring so many things – for an increasingly post-Christian (and bereft of myth) culture. It helps us confront the monsters we face and fear. It has a profoundly Christo-centric heart, with victory through self-sacrifice and resurrection. It plunders history and science fiction for good storylines.
Through characters such as the Paternoster Gang, the writers explore the reconciliation of former enemies and the appreciation and value of accepting diversity – things the Church struggles with.
At one level, it is a big adventure kids (of any age) can get excited about. But, like the TARDIS, it is bigger on the inside.
The Doctor is one person, who has undergone many regenerations – a different face, different personality (or, means of exploring different aspects of his personality), different costume to reflect that personality. There is both continuity and integrity of character, and reinvention. I find that to be true. I have lived and gone about my calling in different contexts, and in each context I am different – not presenting a false image, or being a self-made and re-made individual, but finding that I must grow into the person I am called to be in each new season. That person changes, in part because I am called to grow into myself, to become more fully formed, to discover by degree who God has called me to be and who he is forming me to be; and also in part because who I am as a person is shaped by the different companions sent to accompany me, some of whom are constant or recurring characters, and some of whom are passing. Often when I move location, I make changes to my wardrobe as a prophetic expression of new identity.
On occasion, more than one regeneration of the Doctor find themselves in the same place at the same time – a risky thing, but sometimes necessary to overcome a particular challenge. Likewise, there are times when I need to draw on who I have been in the past but have, on the whole, moved on from.
The Doctor faces certain enemies on many occasions; and yet each time it is different, because both the Doctor and the enemy are no longer what they were, and the context and companions have also changed. This, too, I find to be true. Life is a battle, at times, and there are certain monsters we face over again, and yet each time is different. There are no formulas.
The Doctor also meets friends in different points in time; and for me this is akin to coming to familiar points in the Church year – Advent, Christmas, Epiphany, Lent, Passiontide, Easter, Pentecost, All Saints – on a regular basis. Each time is fresh, because I have changed.
The Doctor is compelled by a vocation, to stand between worlds – but primarily this world – against destruction. And as a disciple of Jesus, there is something in that, even if I am not the character at the centre.
There are things about the Doctor that I don’t like. Of course there are. There are things about myself that I don’t like, that I don’t like to face up to, that I run from – and that I will have to confront at the appointed time and place where, wherever I run, I will arrive at. There is a time and a place, God knows – and we cannot force either and it go well. I would love to see a female Doctor – just as I would love to see female Bishops, something we might get sooner. And yet Chris was the perfect choice to bring the Doctor back, David to take him on, and Matt was simply inspired casting…and so I await the time, confident that it will happen.
So, I am unashamedly a Whovian. Indeed, I get emotional when all the Doctors come together in a storyline, as they did at the end of the fiftieth anniversary, despite the fact that three were before my time, despite the fact that I haven’t watched every episode or ever gone to a fan convention. It just resonates with something inside me. Being British, for ill or good, most likely.
Shorter Collect for St Cecilia’s Day, 22 November.
Yesterday evening, I caught an article on Stag Beetles on Countryfile. Stag Beetles spend six or seven years as big fat grubs underground, eating dead wood, an essential role breaking down fallen trees so that we aren’t eventually overwhelmed by them. Then they form a cocoon, and six weeks’ later emerge as a large beetle. The Stag Beetle only lives as a beetle for about four weeks, during which time its sole purpose is to reproduce.
It made me think about death and resurrection. Jesus talked about death and resurrection a lot. His call to followers was to come and die. On a daily basis. In other words, not a one-off thing. Not a life-after-this-life thing. A this-life thing. Not that I don’t believe in life beyond death; but that I believe in a life defined by death and resurrection.
This is not abstract. It is personal, lived, over and over. As a family, we have just relocated from the North West to the North East. We have died to one life, and been raised to another. We have died to a life that was familiar, where we knew who we were – because who we are, as persons, is defined in relation to other people, not self-defined, nor even defined by God alone because God who is community places us in community – and were known. God has uprooted us, and replanted us. And here we are not yet known, and have yet to discover who we are called to be.
Sometimes we put up a fight, resisting dying, dying to self. We will not forgive that person, until we are exhausted in our unforgiveness, quite spent. But ultimately we cannot hold off death. In the end, we die. In the end, we die to our unforgiveness, when God steps in and slays us with his forgiveness.
Sometimes we resist dying. But I notice something else. Sometimes, perhaps far more often, when we have died and have been raised to a new life – a fresh start, a new beginning – we resist leaving the tomb. After all, we have no choice over the dying, or indeed the being raised to new life; but we do here. The tomb, the cocoon, is safe. To break out takes effort: I don’t know enough about beetles, but I know that when butterflies emerge from their cocoon, they must regain their strength and dry off their wings before they can discover that now they can fly.
Resurrection means having to learn a new set of rules. How, do you imagine, did Jesus discover that he no longer needed to open the door, that he could walk through walls as if they were more flimsy that the set on Neighbours? Was it innate knowledge – as the butterfly knows it can fly – or discovered?
The rules are different here, because the call is different here; the incarnation is different here (not dissimilar to the many incarnations of the one Doctor, if you are a Whovian).
Death and resurrection is the only story in town. Even the city itself experiences it, over and over.
Right now, our newly-resurrected bodies are feeling quite raw. But as we emerge from the tomb, and flex our limbs (or whatever form God has chosen, for resurrection bodies shape-shift: men and lions and oxen and eagles, to name a few) we will discover ourselves anew.
Yesterday I had lunch with a Muslim hospital and prison chaplain, at the Gurudwara (Sikh place of worship). You always get good food at a Gurudwara, but if your visit coincides with the birthday celebrations of Guru Nanak (as our visit did) you are in for a special treat. We talked about the experience of British Muslims, and also about mental health and the struggles both Muslim and Christian communities have with mental health issues. And we were continually and politely interrupted by our hosts – those who welcome made our conversation possible – asking if we would like more to eat or drink. Muslim-Sikh relations aren’t always great, not helped by the way in which the white boys carved-up the sub-continent; and it was a joy for me, a white boy, to be called ‘Bro’ – brother – by those who served us.
Jesus once told a story about a man who came to separate out his flock of sheep from the flock of goats belonging to someone else. In my country, breeds of sheep and goats look very different; but in Jesus’ country, they look alike to the untrained eye. But sheep know the voice of their own shepherd, right? Well, not in this story. In this story, some of the ‘sheep’ thought they were goats, and are surprised to discover who they actually belong to; and some of the ‘goats’ thought they were sheep, and are surprised to discover that they aren’t claimed by the shepherd.
On what basis are the ‘sheep’ identified? As those people who welcomed the stranger, who fed the hungry, who met the physical and emotional needs of the marginalised and the lost. For when they do so, whether they know it or not, they welcome Jesus.
So here was I, having arrived in this city ten days earlier, knowing almost no-one and almost no-where, sitting at table as if I were an honoured guest – which is precisely what I was. Quite unable to reciprocate.
Whatever else may be going on in the very different cultural and religious ways in which people yearn for and respond to God, Jesus was made welcome and served at the Gurudwara yesterday.
Things are slowly starting to settle into place around here, though my books are still in boxes. I have gone back to a simple template for the blog – it doesn’t showcase posts as nicely as the dynamic template, but it is much easier for visitors to navigate – and I’ve made four new header banners to mark the liturgical year.
Yesterday was our final service at St Peter’s. We shall miss these few, fragile, faithful, friendly people. It is a special place where a great deal of healing takes place. Not a great deal of cure, but healing* - where the (for now) ‘weak’ and the (for now) ‘strong’ are made more whole by the patient and at times hard work of love. Like many others before us, we arrived hurting, and move on healed.
Then, in the afternoon, I attended the annual joint All Soul’s service, to which we invite all those families for whom we have taken funerals at (or through) St James’ and St Peter’s over the past year; as well as an open invitation to anyone else. We listened to a retired vicar who spent many years among the Zulu people speak about different cultural attitudes towards those who have died: how we focus on loss, but other cultures focus on the presence of those who have died – thoughts which tie-in with my previous post. The purpose of this service was not to return to the funeral, but to recognise that presence.
‘Those whom we love and lose are no longer where they were before; they are now wherever we are.’ St John Chrysostom.
We were invited to light a candle not only for them, but with them. A candle was lit for every person whose funeral we had taken, and many besides – tea lights arranged on tiles laid out in the shape of a cross.
For the past seven years, I have posted a daily Advent calendar throughout Advent, which this year (not always!) starts on the first of December. I’m hoping to do so again this year, but as I start my new post on Advent Sunday, circumstances might over-take me! The full archive can be found on my blog: under 'Writing About' on the side bar to the right.
*In the enabled life: Christianity in a disabling world, Roy McCloughry reminds us that it is possible to be cured without experiencing healing, and to be healed without experiencing cure; that those who long for cure can minister to others just as much as those who do not need cure; and that healing transforms the one who ministers as well as the one who is ministered to, and the community as well as the person.
Yesterday was All Saints’ Day. The day we remember those men and women who were given grace not only to touch the lives immediately around them, but to have a bigger impact, to inspire others across a greater length and breadth through time and place. Legendary lives.
reminded, when we have convinced ourselves that we, in the mess of our broken lives, are all sinner, and that our brothers and sisters are paper saints.
Today is All Soul’s Day, or the Commemoration of the Faithful Departed. The day we remember those men and women who were part of our own local community – many of whom surround our church buildings as they await the resurrection of the dead – and those we have known personally, who encouraged us on our pilgrimage and who have gone on ahead of us for now.
People talk to the dead. I don’t mean through a medium, at a séance. I mean people visiting the grave of a loved one, telling them news of family members; or the widowed, used to having a partner with whom to work things through, sat in a quiet place continuing a habit formed over years.
But that is to fail to grasp what it means to be part of the Church (as we all do, in many ways). Heaven and earth are not two kept-apart realms, but two realms brought together in the person of Jesus. And if – this is a mystery – I am with Jesus, and if – again, a mystery – the faithful departed are with Jesus, then – mystery – we are together in him. And it is the most natural thing in the world to speak with those we love when we are together.
Just as prayer is conversation with the Father, through the Son and in the power of the Holy Spirit; and as we pray, we may sense the Father speaking to us, prompting us, guiding us; so we can talk with those we have loved and who have gone before us, in the Father’s love, through the mercy of the Son and in the power of the Holy Spirit; and as we talk, may sense their thoughts on whatever is on our mind.
That image beautifully expresses something within the breadth of Christian understanding. And yet elsewhere within our traditions is a rich heritage that would say the ocean is not a barrier; that word can travel from shore to shore.
So this All Soul’s Day, as well as giving thanks for those whom we have loved and no longer see for now, why not thank them for their faithfulness, to us as well as Christ? | 2019-04-23T09:13:04Z | https://dowsetts.blogspot.com/2013/11/ |
It’s as if you understand my thoughts! A person looks to be aware of a good deal approximately that, as if you wrote the particular tutorial inside it or something. I believe that simply might employ a handful of Per-cent for you to stress the message property a bit more, however besides these very, that is ideal web site. A superb examine berita saham terkini. I’m going to be rear.
Just want to say your article is as astounding. The clarity in your post is just nice and i can assume you’re an expert on this subject. Fine with your permission let me to grab your RSS feed to keep up to date with forthcoming post. Thanks a million and please carry on the enjoyable work.
I simply wished to appreciate you once again. I am not sure what I might have sorted out in the absence of these smart ideas shared by you concerning this industry. It absolutely was an absolute challenging setting in my circumstances, but seeing this well-written fashion you handled the issue made me to cry with delight. I’m happier for your support and even pray you really know what a great job your are accomplishing teaching others with the aid of a site. Most probably you’ve never met any of us.
Some really prize blog posts on this internet site, saved to fav.
A person necessarily help to make severely articles I’d state. This is the first time I frequented your web page and to this point? I surprised with the analysis you made to make this actual publish amazing. Great job!
Thanks a bunch for sharing this with all people you actually recognize what you are speaking about! Bookmarked. Please additionally consult with my web site =). We will have a hyperlink trade contract among us!
Great goods from you, man. I’ve understand your stuff previous to and you’re just extremely excellent. I actually like what you’ve acquired here, certainly like what you are saying and the way in which you say it. You make it enjoyable and you still care for to keep it sensible. I cant wait to read much more from you. This is actually a tremendous web site.
You are really a great website owner. The website filling stride can be awesome. Them type of seems you are doing any exceptional trick. Furthermore, The material tend to be must-see.. berita saham terkini you may have conducted a wonderful activity about this issue!
My wife and i got now happy that Raymond managed to finish up his web research because of the precious recommendations he grabbed out of your weblog. It is now and again perplexing to simply find yourself giving for free helpful hints which usually a number of people might have been selling. And we all do know we have the website owner to thank for this. The most important explanations you made, the easy web site navigation, the relationships you will make it possible to promote – it is most remarkable, and it’s assisting our son and the family consider that that concept is excellent, which is seriously indispensable. Thank you for the whole thing!
I¡¦ve read a few excellent stuff here. Definitely price bookmarking for revisiting. I wonder how a lot effort you place to make this sort of wonderful informative website.
Whats up very nice website!! Man .. Beautiful .. Wonderful .. I will bookmark your site and take the feeds additionally¡KI am happy to search out a lot of useful information right here in the put up, we need work out extra techniques in this regard, thanks for sharing. . . . . .
I just want to say I am newbie to weblog and definitely liked you’re page. More than likely I’m planning to bookmark your website . You really have tremendous well written articles. Bless you for revealing your website.
I don’t perhaps understand how I stopped way up listed here, however i assumed this particular article was good video youtube indonesia. I would not acknowledge that you happen to be nonetheless unquestionably you are likely to any well known tumblr for those who usually are not currently. All the best!
I’m also commenting to make you know what a really good experience my friend’s daughter developed going through your webblog. She mastered plenty of issues, including what it is like to have a great coaching heart to get certain people quite simply have an understanding of certain hard to do things. You undoubtedly surpassed our desires. Thanks for showing those practical, trusted, edifying and as well as cool tips about the topic to Gloria.
Thanks a lot for providing individuals with such a wonderful possiblity to read critical reviews from this web site. It is often so lovely plus full of a lot of fun for me personally and my office peers to visit your blog a minimum of thrice in a week to read the fresh tips you will have. Of course, I’m just at all times motivated concerning the exceptional information you serve. Certain 4 facts on this page are undeniably the finest we have all ever had.
A lot of thanks for your whole efforts on this site. Betty loves working on research and it’s really obvious why. All of us know all about the powerful mode you offer good suggestions by means of this website and as well as foster contribution from website visitors on the concern plus our favorite simple princess is undoubtedly becoming educated a whole lot. Have fun with the rest of the new year. Your performing a good job.
I’m just commenting to make you understand of the fabulous experience my cousin’s child undergone browsing your web site. She learned a lot of things, most notably what it’s like to have a great coaching mindset to get others without hassle master specific advanced subject areas. You really did more than her expectations. I appreciate you for providing such helpful, safe, informative as well as unique tips on this topic to Ethel.
I as well as my guys ended up digesting the good tips and tricks found on your web blog and then instantly developed a horrible feeling I had not thanked the blog owner for those secrets. Most of the ladies became so passionate to see them and already have honestly been using those things. Thanks for really being quite helpful and then for finding variety of exceptional topics millions of individuals are really needing to understand about. My sincere apologies for not expressing gratitude to you sooner.
I and my guys were analyzing the great hints located on your site and so at once developed an awful suspicion I never thanked the site owner for them. My people appeared to be totally warmed to read them and have surely been enjoying those things. Many thanks for getting considerably thoughtful and for obtaining this kind of smart subject matter most people are really needing to understand about. Our honest regret for not expressing gratitude to earlier.
I am also commenting to make you know what a notable experience my friend’s child undergone visiting the blog. She realized numerous pieces, most notably what it is like to possess a wonderful coaching mood to have most people effortlessly fully understand specified multifaceted subject areas. You truly did more than her desires. Thank you for providing such practical, safe, educational and easy tips on this topic to Julie.
I simply wanted to make a brief message to say thanks to you for some of the splendid suggestions you are giving on this website. My particularly long internet investigation has now been compensated with wonderful suggestions to share with my partners. I ‘d assert that we readers actually are unequivocally fortunate to exist in a really good network with very many marvellous individuals with helpful ideas. I feel truly fortunate to have discovered the web site and look forward to tons of more enjoyable minutes reading here. Thank you once more for all the details.
I really wanted to construct a brief note to express gratitude to you for all of the marvelous instructions you are posting on this site. My considerable internet investigation has finally been rewarded with good concept to talk about with my classmates and friends. I would mention that most of us website visitors are extremely endowed to live in a fantastic place with so many brilliant professionals with very beneficial ideas. I feel very much grateful to have used your entire web site and look forward to really more enjoyable times reading here. Thank you once again for a lot of things.
Needed to post you a bit of remark so as to say thanks a lot yet again on the nice tricks you have featured on this website. This has been certainly incredibly generous with people like you to grant unhampered all that a few people could have made available for an e book to help with making some money on their own, precisely since you could have tried it if you desired. The tactics as well served to become a great way to realize that someone else have the same interest much like my personal own to see more and more concerning this condition. I know there are several more pleasant occasions up front for individuals who read through your website.
Thank you for each of your labor on this web site. My mom takes pleasure in making time for internet research and it is easy to see why. We all notice all relating to the powerful manner you provide effective tips and hints by means of the blog and therefore welcome response from other people on the topic so my child is without question being taught a lot. Take pleasure in the rest of the year. You are doing a dazzling job.
Thank you so much for providing individuals with an extraordinarily breathtaking chance to read critical reviews from here. It really is very fantastic and also full of a great time for me and my office peers to visit your web site at minimum thrice per week to study the latest things you have got. Of course, I am usually astounded for the very good techniques served by you. Some two areas on this page are particularly the most suitable I have ever had.
I in addition to my buddies were digesting the excellent recommendations found on your site then unexpectedly I got a horrible suspicion I had not thanked the website owner for those tips. Most of the ladies are actually very interested to read all of them and have in fact been taking pleasure in these things. We appreciate you genuinely well kind and for considering these kinds of important subject matter millions of individuals are really wanting to understand about. Our sincere regret for not expressing gratitude to you earlier.
Thank you for your own efforts on this web page. My mum enjoys conducting internet research and it’s easy to see why. I hear all about the lively means you create useful tips and tricks by means of the web site and as well as improve contribution from other ones on that article then our favorite daughter is now understanding a lot of things. Enjoy the rest of the new year. You’re doing a fantastic job.
I’m also commenting to let you know of the exceptional encounter our princess encountered checking your blog. She discovered a wide variety of issues, including what it is like to possess a very effective coaching character to have folks completely master several grueling things. You truly surpassed my desires. I appreciate you for supplying the helpful, healthy, educational and fun guidance on that topic to Ethel.
I enjoy you because of every one of your work on this site. Kim really likes participating in research and it’s really simple to grasp why. Almost all learn all concerning the dynamic manner you present powerful strategies on your blog and in addition recommend contribution from other people on that idea and our own princess is undoubtedly becoming educated a whole lot. Enjoy the remaining portion of the new year. You have been performing a pretty cool job.
I precisely had to thank you very much again. I am not sure what I could possibly have done without the ideas documented by you about my theme. This has been a very intimidating matter in my circumstances, but viewing a expert way you managed the issue forced me to leap for contentment. I’m happier for this support and in addition hope you recognize what a powerful job you are always putting in teaching the rest using a site. Most probably you have never come across all of us.
I together with my guys appeared to be digesting the excellent secrets and techniques from your site and before long developed a terrible suspicion I had not thanked you for those strategies. Most of the men had been absolutely joyful to see them and now have simply been enjoying those things. Appreciate your turning out to be considerably considerate as well as for picking out certain exceptional guides most people are really eager to understand about. Our own sincere apologies for not expressing appreciation to earlier.
I happen to be commenting to let you understand of the incredible encounter my girl went through checking your site. She came to find several pieces, including what it’s like to have a marvelous teaching nature to let most people effortlessly know chosen tricky issues. You undoubtedly did more than our expectations. I appreciate you for presenting those insightful, trustworthy, informative and even fun thoughts on your topic to Jane.
I precisely wanted to thank you very much once again. I’m not certain what I would have made to happen in the absence of the type of opinions contributed by you directly on this subject matter. It was the troublesome crisis in my position, however , understanding the specialized approach you managed the issue forced me to weep over contentment. I’m just grateful for this service and as well , have high hopes you comprehend what a great job you are accomplishing training the mediocre ones using a blog. More than likely you haven’t encountered any of us.
I want to get across my appreciation for your kind-heartedness supporting individuals that should have help with the situation. Your special dedication to passing the message up and down had been rather practical and have always made others just like me to achieve their dreams. The helpful tips and hints can mean this much to me and even more to my office colleagues. Best wishes; from each one of us.
I want to show appreciation to the writer for rescuing me from this particular scenario. After looking out throughout the search engines and obtaining notions that were not beneficial, I was thinking my entire life was over. Existing devoid of the approaches to the difficulties you have fixed as a result of your good website is a crucial case, and the kind which might have in a wrong way affected my career if I hadn’t discovered your blog post. Your personal expertise and kindness in handling all things was very helpful. I’m not sure what I would have done if I had not encountered such a thing like this. I am able to at this moment look ahead to my future. Thanks a lot so much for the specialized and results-oriented help. I will not think twice to recommend the website to any individual who needs to have guide on this problem.
I want to show appreciation to you just for bailing me out of this circumstance. Right after checking through the internet and coming across basics which are not productive, I assumed my life was done. Living without the approaches to the difficulties you’ve fixed as a result of your main short post is a critical case, and the kind that might have in a negative way affected my career if I had not discovered your web page. Your actual talents and kindness in controlling a lot of things was helpful. I don’t know what I would have done if I hadn’t discovered such a point like this. I’m able to at this moment look ahead to my future. Thank you so much for this expert and amazing help. I won’t think twice to endorse your web site to anybody who should have guidance about this subject matter.
Thank you a lot for giving everyone an extremely pleasant opportunity to read from here. It is often very lovely and as well , stuffed with fun for me and my office mates to search your website at the least 3 times weekly to read the latest guidance you will have. And definitely, I’m usually satisfied concerning the incredible strategies you give. Certain 3 ideas on this page are unequivocally the very best we have all ever had.
My husband and i have been lucky Edward could complete his web research using the ideas he discovered in your site. It is now and again perplexing just to happen to be offering secrets which often some people could have been trying to sell. And we all know we need the writer to appreciate for this. All of the explanations you made, the simple website navigation, the relationships your site make it possible to create – it is everything awesome, and it is aiding our son in addition to us believe that the matter is fun, and that’s seriously serious. Many thanks for all!
My spouse and i felt very excited when Jordan managed to finish up his survey using the precious recommendations he came across out of the web page. It is now and again perplexing to simply possibly be giving away methods some people could have been selling. So we know we now have the writer to appreciate because of that. All the illustrations you made, the simple site menu, the friendships your site assist to create – it is everything spectacular, and it’s facilitating our son and our family believe that the article is awesome, which is certainly exceedingly essential. Many thanks for all!
I intended to draft you a bit of note to help give many thanks the moment again for your spectacular basics you have documented on this site. This has been simply unbelievably generous of people like you to provide publicly all that some people might have marketed for an e book to get some bucks on their own, specifically considering that you could possibly have done it in case you desired. The principles additionally served as a good way to fully grasp that some people have the same passion like my personal own to learn more regarding this condition. Certainly there are millions of more pleasurable situations ahead for people who take a look at your site.
Thanks for all your efforts on this website. Gloria really likes managing research and it’s really obvious why. All of us notice all regarding the lively ways you provide priceless secrets on this website and in addition invigorate participation from people on this idea while our favorite princess is without question studying a great deal. Take advantage of the remaining portion of the year. You have been carrying out a remarkable job.
My wife and i ended up being joyful Jordan managed to do his research through your ideas he had out of the web page. It’s not at all simplistic to simply find yourself making a gift of hints which usually the others may have been trying to sell. And now we understand we now have the blog owner to be grateful to for this. The explanations you have made, the easy website menu, the friendships you will make it easier to instill – it is most incredible, and it’s letting our son and the family consider that the theme is fun, and that is wonderfully essential. Many thanks for the whole lot!
Thank you so much for giving everyone an extraordinarily brilliant chance to discover important secrets from this website. It is often so terrific and stuffed with a lot of fun for me and my office mates to visit your website particularly thrice a week to read the fresh things you have got. And lastly, I’m also usually contented considering the extraordinary knowledge you serve. Some 1 facts in this posting are in truth the most suitable I have had.
I and my friends have already been studying the best helpful tips found on the blog while at once developed an awful feeling I had not thanked the web blog owner for those tips. My men became so very interested to read all of them and have in effect in fact been enjoying these things. I appreciate you for really being quite helpful and then for opting for varieties of important issues millions of individuals are really eager to be informed on. Our honest apologies for not saying thanks to you earlier.
I and my buddies ended up going through the good tactics on the blog then at once I had a horrible feeling I had not expressed respect to the site owner for them. All of the young men are already totally happy to see them and have in effect undoubtedly been taking pleasure in them. Thank you for simply being well helpful and also for making a choice on varieties of tremendous subjects most people are really desperate to discover. My personal sincere regret for not saying thanks to you earlier.
I wanted to send you the little bit of observation in order to thank you very much over again for all the incredible suggestions you’ve shared in this article. It is quite shockingly open-handed with people like you to deliver extensively what exactly numerous people could possibly have made available as an e-book to earn some dough on their own, most importantly since you could have done it if you ever desired. These points as well worked to be the great way to know that the rest have the identical keenness just as mine to realize much more when it comes to this problem. I know there are several more pleasurable periods ahead for individuals that read your blog.
I simply wanted to develop a quick remark in order to say thanks to you for all of the nice advice you are sharing on this site. My considerable internet lookup has at the end been paid with useful knowledge to go over with my relatives. I ‘d tell you that most of us site visitors actually are very lucky to dwell in a superb website with very many lovely professionals with very helpful plans. I feel very much blessed to have seen the web pages and look forward to some more enjoyable moments reading here. Thank you once more for all the details.
I intended to draft you that little bit of remark to thank you as before with your lovely tactics you have provided in this case. This is simply wonderfully open-handed of people like you to give easily all some people would’ve made available for an ebook to earn some money for themselves, primarily considering that you could have tried it in case you considered necessary. These concepts additionally acted to be the fantastic way to fully grasp that the rest have the identical dream the same as mine to learn much more when it comes to this issue. I am certain there are millions of more enjoyable times up front for people who read carefully your site.
I am glad for writing to make you be aware of what a brilliant discovery my cousin’s princess had going through your webblog. She figured out several details, including what it is like to possess an awesome teaching nature to get other individuals really easily know some multifaceted things. You actually surpassed our desires. Thank you for churning out the effective, trusted, edifying and in addition unique guidance on this topic to Tanya.
My husband and i were now glad Michael managed to conclude his survey while using the ideas he got out of your web pages. It is now and again perplexing to just choose to be making a gift of methods that many a number of people may have been trying to sell. Therefore we fully grasp we’ve got the blog owner to be grateful to for that. All of the illustrations you’ve made, the simple website navigation, the relationships you will help to foster – it’s mostly incredible, and it’s leading our son in addition to our family reason why that concept is excellent, which is certainly very mandatory. Thank you for the whole lot!
I happen to be writing to let you be aware of of the helpful encounter my friend’s princess encountered reading through the blog. She mastered a good number of details, which included how it is like to possess a wonderful giving mood to get many others with ease know just exactly some tricky issues. You actually did more than my desires. Many thanks for showing these invaluable, dependable, revealing and also cool tips on that topic to Emily.
I simply wanted to construct a small message in order to express gratitude to you for these pleasant instructions you are sharing on this site. My extended internet research has finally been honored with really good facts and techniques to exchange with my family and friends. I would tell you that we website visitors are unequivocally lucky to be in a fabulous network with very many marvellous people with great pointers. I feel quite happy to have encountered your entire webpage and look forward to so many more fabulous moments reading here. Thank you again for everything.
A lot of thanks for each of your labor on this blog. Betty loves doing investigations and it’s simple to grasp why. Many of us learn all regarding the powerful mode you offer worthwhile suggestions on your website and therefore improve contribution from other ones on the point while my girl is undoubtedly becoming educated a lot. Take pleasure in the remaining portion of the year. Your conducting a great job.
I’m commenting to let you know what a outstanding experience my cousin’s child obtained checking your blog. She figured out so many issues, which included how it is like to possess a great teaching heart to make the others without hassle grasp specific specialized subject areas. You actually surpassed my expectations. Thank you for supplying these priceless, healthy, edifying not to mention fun tips about this topic to Mary.
I really wanted to post a comment to be able to appreciate you for these remarkable guidelines you are sharing on this site. My time intensive internet search has now been recognized with wonderful content to exchange with my great friends. I would express that most of us readers are very fortunate to dwell in a remarkable network with many brilliant individuals with helpful suggestions. I feel rather blessed to have come across the webpages and look forward to really more enjoyable minutes reading here. Thanks again for all the details.
I enjoy you because of your whole work on this site. My mom takes pleasure in engaging in investigation and it’s easy to see why. A lot of people learn all regarding the compelling method you offer very helpful information on your website and in addition encourage response from people on that issue so our own princess is without question studying so much. Take pleasure in the remaining portion of the year. Your performing a terrific job.
Thank you so much for giving everyone a very memorable possiblity to read articles and blog posts from this site. It is always so good and as well , packed with a lot of fun for me personally and my office fellow workers to search your blog at minimum 3 times a week to learn the fresh issues you have. Of course, I’m usually contented for the exceptional ideas you give. Certain 4 tips on this page are definitely the most efficient we’ve had.
I am also commenting to let you understand of the remarkable encounter my child experienced reading yuor web blog. She noticed numerous pieces, not to mention what it is like to have an amazing teaching style to have many more with no trouble learn about certain impossible issues. You undoubtedly exceeded our expectations. Many thanks for presenting the invaluable, trusted, edifying as well as cool guidance on this topic to Julie.
I would like to express my thanks to the writer just for rescuing me from this problem. As a result of searching throughout the internet and meeting ideas which were not beneficial, I believed my entire life was over. Being alive without the presence of solutions to the problems you’ve sorted out as a result of your good report is a serious case, as well as the ones that would have in a negative way damaged my career if I hadn’t discovered your blog. Your actual understanding and kindness in dealing with every item was invaluable. I’m not sure what I would have done if I had not come across such a subject like this. I can at this time look forward to my future. Thanks so much for the high quality and result oriented help. I won’t be reluctant to suggest your site to any individual who requires guidance about this area.
I not to mention my pals appeared to be taking note of the excellent points located on the website and suddenly developed a terrible feeling I had not thanked the website owner for those secrets. Those women had been warmed to study all of them and have in actuality been loving these things. Many thanks for indeed being considerably thoughtful as well as for picking out this form of really good subject areas millions of individuals are really desirous to be aware of. Our own sincere apologies for not expressing gratitude to you sooner.
I wish to convey my love for your kind-heartedness supporting men and women that absolutely need help on this particular idea. Your very own dedication to getting the solution all through turned out to be remarkably helpful and have really empowered individuals just like me to arrive at their endeavors. Your personal warm and helpful suggestions signifies a whole lot to me and even more to my office colleagues. Thanks a ton; from all of us.
Thanks so much for providing individuals with remarkably spectacular opportunity to read in detail from this site. It’s always so fantastic and also stuffed with amusement for me personally and my office fellow workers to search the blog at the least three times in one week to study the newest secrets you have got. And of course, I am also at all times motivated for the wonderful creative concepts you give. Some 4 points in this posting are ultimately the finest I have ever had.
I want to point out my love for your kindness in support of men who really need guidance on in this study. Your very own dedication to passing the solution up and down had become exceedingly useful and have surely enabled people much like me to get to their objectives. The invaluable hints and tips indicates so much a person like me and still more to my colleagues. Thank you; from each one of us.
I together with my guys were actually going through the great guidelines on your website while quickly developed a terrible suspicion I never expressed respect to the site owner for those techniques. My women happened to be for that reason thrilled to read through all of them and have now surely been making the most of those things. Appreciate your genuinely simply accommodating and also for choosing variety of incredibly good useful guides most people are really eager to discover. Our own honest apologies for not expressing appreciation to you sooner.
I simply wanted to post a simple note so as to thank you for all the lovely instructions you are placing on this website. My rather long internet search has at the end been recognized with good insight to talk about with my close friends. I would repeat that many of us site visitors are undeniably lucky to be in a fantastic network with very many special individuals with very beneficial pointers. I feel very happy to have seen your site and look forward to many more amazing minutes reading here. Thanks once more for all the details.
I and my guys have already been viewing the good strategies on your web site and immediately I had a terrible feeling I had not thanked the web blog owner for those strategies. All of the young boys were as a consequence stimulated to read all of them and have honestly been having fun with these things. I appreciate you for indeed being very kind and also for considering this form of smart ideas most people are really desirous to be informed on. My very own honest regret for not expressing appreciation to earlier.
I in addition to my friends came examining the good tips and tricks on your web page and then developed an awful suspicion I never expressed respect to the web site owner for those strategies. Those men were as a consequence joyful to read all of them and have in effect in fact been taking advantage of them. Thanks for actually being really accommodating and also for deciding on variety of wonderful topics millions of individuals are really desperate to understand about. My personal sincere apologies for not saying thanks to you sooner.
I simply needed to appreciate you once again. I do not know what I might have done without these secrets revealed by you about my situation. It truly was a real scary circumstance in my opinion, however , looking at the well-written way you processed it forced me to cry over joy. I’m happy for this guidance as well as expect you really know what a great job your are getting into teaching many people via your site. Most likely you’ve never come across all of us.
Thanks a lot for providing individuals with an extraordinarily marvellous possiblity to check tips from here. It is always so pleasant and as well , packed with a lot of fun for me and my office colleagues to visit your web site not less than 3 times per week to read the new secrets you have got. And definitely, we’re at all times fascinated concerning the staggering techniques served by you. Some 4 tips on this page are in truth the best we have all had.
I want to get across my passion for your kindness for those who really need help on the situation. Your special commitment to getting the solution all through has been certainly functional and has constantly enabled people just like me to reach their goals. Your new informative hints and tips entails so much to me and even further to my office colleagues. Many thanks; from all of us.
A lot of thanks for every one of your work on this site. My aunt delights in participating in research and it’s simple to grasp why. I learn all relating to the compelling means you present powerful guides through the blog and attract participation from people on that issue plus our favorite princess is undoubtedly understanding a whole lot. Enjoy the rest of the new year. You have been carrying out a splendid job.
Needed to draft you one little bit of note just to give many thanks again with the striking principles you have featured in this article. It is really strangely generous with you to present freely exactly what a lot of people could possibly have offered for an e book to generate some profit for their own end, certainly given that you might have tried it if you wanted. Those concepts in addition acted to become a great way to understand that someone else have a similar eagerness the same as my personal own to find out whole lot more regarding this issue. I believe there are lots of more enjoyable occasions ahead for people who go through your site.
I precisely wanted to appreciate you yet again. I am not sure what I might have used without those ways provided by you about such a situation. It actually was a real scary condition in my circumstances, nevertheless understanding a new specialized approach you resolved it made me to jump with happiness. Extremely thankful for your advice and in addition hope that you comprehend what an amazing job you’re putting in educating others through the use of a web site. Most probably you have never got to know all of us.
Thanks a lot for providing individuals with an extremely pleasant possiblity to read in detail from here. It really is very terrific plus stuffed with a good time for me and my office mates to visit your web site at minimum 3 times weekly to read through the latest guides you will have. Not to mention, we’re actually happy with the eye-popping creative concepts you serve. Some 1 areas in this post are absolutely the most beneficial I’ve ever had.
I wanted to compose a brief note to express gratitude to you for the magnificent hints you are giving at this site. My particularly long internet research has at the end been honored with pleasant facts to go over with my good friends. I would repeat that most of us visitors are extremely lucky to dwell in a wonderful site with very many special individuals with good suggestions. I feel really privileged to have used the webpages and look forward to tons of more enjoyable moments reading here. Thanks a lot once more for everything.
I needed to write you this little bit of remark in order to give thanks yet again considering the beautiful solutions you have contributed here. It was certainly tremendously generous with people like you to grant unreservedly exactly what a number of people would’ve advertised as an ebook to earn some dough on their own, chiefly now that you might well have done it if you wanted. These good ideas in addition worked to be a good way to understand that other individuals have similar passion really like my own to learn lots more with respect to this condition. I believe there are millions of more pleasant instances ahead for people who looked over your website.
I wish to show appreciation to the writer just for rescuing me from this problem. Because of surfing through the the web and meeting notions which were not helpful, I thought my life was done. Existing without the strategies to the issues you have resolved through your report is a critical case, and those that might have in a negative way damaged my career if I hadn’t noticed your blog post. Your personal natural talent and kindness in taking care of all the things was invaluable. I don’t know what I would’ve done if I had not encountered such a subject like this. I’m able to now relish my future. Thank you very much for the expert and sensible guide. I will not hesitate to recommend your site to any individual who should get counselling about this situation.
I want to express my thanks to you for bailing me out of this particular challenge. As a result of exploring throughout the world-wide-web and getting methods which are not beneficial, I thought my life was gone. Being alive minus the approaches to the issues you have resolved as a result of your main website is a crucial case, as well as those that could have badly affected my career if I had not come across your blog. Your main skills and kindness in taking care of a lot of stuff was priceless. I don’t know what I would have done if I hadn’t come upon such a thing like this. I can also at this moment look forward to my future. Thanks so much for the professional and amazing guide. I won’t be reluctant to propose your web site to any person who needs and wants care on this subject. | 2019-04-20T04:43:06Z | http://www.brookebrady.com/lifestyle/a-winter-family-session/ |
Foreign Military Sales Argentina 2004; Foreign Military Sales Brazil 2004; Foreign Military Sales Chile 2004; Foreign Military Sales Colombia 2004; Foreign Military Sales Dominican Republic 2004; Foreign Military Sales Ecuador 2004; Foreign Military Sales Mexico 2004; Foreign Military Sales Panama 2004; Foreign Military Sales Trinidad and Tobago 2004; Foreign Military Sales Venezuela 2004;?– United States, Department of Defense, Department of State, Foreign Military Training and DoD Engagement Activities of Interest in Fiscal Years 2004 and 2005: A Report to Congress (Washington: April 2005) (Link to source).
Foreign Military Sales Argentina 2005; Foreign Military Sales Belize 2005; Foreign Military Sales Brazil 2005; Foreign Military Sales Chile 2005; Foreign Military Sales Colombia 2005; Foreign Military Sales Dominican Republic 2005; Foreign Military Sales Ecuador 2005; Foreign Military Sales Peru 2005; Foreign Military Sales Trinidad and Tobago 2005; Foreign Military Sales Venezuela 2005;?– United States, Department of Defense, Department of State, Foreign Military Training and DoD Engagement Activities of Interest in Fiscal Years 2005 and 2006: A Report to Congress (Washington: September 2006) (Link to source).
Foreign Military Sales Argentina 2006; Foreign Military Sales Brazil 2006; Foreign Military Sales Chile 2006; Foreign Military Sales Colombia 2006; Foreign Military Sales Dominican Republic 2006; Foreign Military Sales Ecuador 2006; Foreign Military Sales El Salvador 2006; Foreign Military Sales Mexico 2006; Foreign Military Sales Peru 2006; Foreign Military Sales Trinidad and Tobago 2006;?– United States, Department of Defense, Department of State, Foreign Military Training and DoD Engagement Activities of Interest in Fiscal Years 2006 and 2007: A Report to Congress (Washington: August 2007) (Link to source).
Foreign Military Sales Antigua and Barbuda 2004; Foreign Military Sales Argentina 2004; Foreign Military Sales Bahamas 2004; Foreign Military Sales Barbados 2004; Foreign Military Sales Belize 2004; Foreign Military Sales Bolivia 2004; Foreign Military Sales Brazil 2004; Foreign Military Sales Chile 2004; Foreign Military Sales Colombia 2004; Foreign Military Sales Costa Rica 2004; Foreign Military Sales Dominica 2004; Foreign Military Sales Dominican Republic 2004; Foreign Military Sales Ecuador 2004; Foreign Military Sales El Salvador 2004; Foreign Military Sales Grenada 2004; Foreign Military Sales Guyana 2004; Foreign Military Sales Haiti 2004; Foreign Military Sales Honduras 2004; Foreign Military Sales Jamaica 2004; Foreign Military Sales Mexico 2004; Foreign Military Sales Nicaragua 2004; Foreign Military Sales Panama 2004; Foreign Military Sales Paraguay 2004; Foreign Military Sales Peru 2004; Foreign Military Sales St. Kitts and Nevis 2004; Foreign Military Sales St. Lucia 2004; Foreign Military Sales St. Vincent and the Grenadines 2004; Foreign Military Sales Suriname 2004; Foreign Military Sales Trinidad and Tobago 2004; Foreign Military Sales Uruguay 2004; Foreign Military Sales Venezuela 2004;?– United States, Department of Defense, Defense Security Cooperation Agency, Defense Articles (Including Excess) and Services (Including Training) Furnished Foreign Countries and International Organizations Under the Foreign Military Sales Provisions of The Arms Export Control Act, Chapter 2 (Washington: July 2005) (Link to source).
Foreign Military Sales Antigua and Barbuda 2005; Foreign Military Sales Argentina 2005; Foreign Military Sales Bahamas 2005; Foreign Military Sales Barbados 2005; Foreign Military Sales Belize 2005; Foreign Military Sales Bolivia 2005; Foreign Military Sales Brazil 2005; Foreign Military Sales Chile 2005; Foreign Military Sales Colombia 2005; Foreign Military Sales Dominica 2005; Foreign Military Sales Dominican Republic 2005; Foreign Military Sales Ecuador 2005; Foreign Military Sales El Salvador 2005; Foreign Military Sales Grenada 2005; Foreign Military Sales Guyana 2005; Foreign Military Sales Haiti 2005; Foreign Military Sales Honduras 2005; Foreign Military Sales Jamaica 2005; Foreign Military Sales Mexico 2005; Foreign Military Sales Nicaragua 2005; Foreign Military Sales OAS Headquarters 2005; Foreign Military Sales Panama 2005; Foreign Military Sales Paraguay 2005; Foreign Military Sales Peru 2005; Foreign Military Sales Trinidad and Tobago 2005; Foreign Military Sales Uruguay 2005; Foreign Military Sales Venezuela 2005;?– United States, Department of Defense, Defense Security Cooperation Agency, Defense Articles (Including Excess) and Services (Including Training) Furnished Foreign Countries and International Organizations Under the Foreign Military Sales Provisions of The Arms Export Control Act, Chapter 2 (Washington: February 2006) (Link to source).
Foreign Military Sales St. Kitts and Nevis 2005; Foreign Military Sales St. Lucia 2005; Foreign Military Sales Suriname 2005;?– United States, Department of Defense, Defense Security Cooperation Agency, Foreign Military Sales, Foreign Military Construction Sales and Military Assistance Facts as of September 30, 2005 (Washington: 2006) (Link to source).
Uruguay Center for Hemispheric Defense Studies 2004;?– United States, Department of Defense, Department of State, Foreign Military Training and DoD Engagement Activities of Interest in Fiscal Years 2004 and 2005: A Report to Congress (Washington: April 2005) (Link to source).
Uruguay Center for Hemispheric Defense Studies 2005;?– United States, Department of Defense, Department of State, Foreign Military Training and DoD Engagement Activities of Interest in Fiscal Years 2005 and 2006: A Report to Congress (Washington: September 2006) (Link to source).
Uruguay Counter-Terrorism Fellowship Program 2004; Uruguay Counter-Terrorism Fellowship Program 2005;?– U.S. Department of Defense, Office of Freedom of Information, Response to FOIA request from the Center for Public Integrity (Washington: July 13, 2006) (Link to source).
Uruguay Section 1004 Counter-Drug Assistance 2004; Uruguay Section 1004 Counter-Drug Assistance 2005; Uruguay Section 1004 Counter-Drug Assistance 2006;?– United States, Department of Defense, Office of Freedom of Information, Freedom of Information Act Request by Marina Walker Guevara, Ref: 06-F-0839 (Washington: September 26, 2006) (Link to source).
Uruguay Center for Hemispheric Defense Studies 2006; Uruguay Counter-Terrorism Fellowship Program 2006; Uruguay Foreign Military Financing 2006;?– United States, Department of Defense, Department of State, Foreign Military Training and DoD Engagement Activities of Interest in Fiscal Years 2006 and 2007: A Report to Congress (Washington: August 2007) (Link to source).
Uruguay Center for Hemispheric Defense Studies 2007; Uruguay Counter-Terrorism Fellowship Program 2007; Uruguay Section 1004 Counter-Drug Assistance 2007; Uruguay Center for Hemispheric Defense Studies 2008; Uruguay Counter-Terrorism Fellowship Program 2008; Uruguay Section 1004 Counter-Drug Assistance 2008; Uruguay Center for Hemispheric Defense Studies 2009; Uruguay Counter-Terrorism Fellowship Program 2009; Uruguay Section 1004 Counter-Drug Assistance 2009;?– Estimate based on closest available year.
Uruguay International Military Education and Training 2007; Uruguay International Military Education and Training 2008; Uruguay International Military Education and Training 2009;?– United States, Department of State, FY 2009 International Affairs (Function 150) Budget Request–Summary and Highlights (Washington: Department of State: February 4, 2008) (Link to source).
Uruguay Center for Hemispheric Defense Studies 2004; Uruguay Counter-Terrorism Fellowship Program 2004; Uruguay International Military Education and Training 2004; Uruguay Misc DOS/DOD Non-SA 2004;?– United States, Department of Defense, Department of State, Foreign Military Training and DoD Engagement Activities of Interest in Fiscal Years 2004 and 2005: A Report to Congress (Washington: April 2005) (Link to source).
Uruguay Center for Hemispheric Defense Studies 2005; Uruguay Counter-Terrorism Fellowship Program 2005;?– United States, Department of Defense, Department of State, Foreign Military Training and DoD Engagement Activities of Interest in Fiscal Years 2005 and 2006: A Report to Congress (Washington: September 2006) (온라인 카지노 합법 국가Link to source).
Uruguay Center for Hemispheric Defense Studies 2006; Uruguay Counter-Terrorism Fellowship Program 2006; Uruguay Foreign Military Financing 2006; Uruguay Section 1004 Counter-Drug Assistance 2006;?– United States, Department of Defense, Department of State, Foreign Military Training and DoD Engagement Activities of Interest in Fiscal Years 2006 and 2007: A Report to Congress (Washington: August 2007) (Link to source).
Uruguay Foreign Military Sales 2004;?– United States, Department of Defense, Defense Security Cooperation Agency, Defense Articles (Including Excess) and Services (Including Training) Furnished Foreign Countries and International Organizations Under the Foreign Military Sales Provisions of The Arms Export Control Act, Chapter 2 (Washington: July 2005) (Link to source).
Uruguay Foreign Military Sales 2005;?– United States, Department of Defense, Defense Security Cooperation Agency, Defense Articles (Including Excess) and Services (Including Training) Furnished Foreign Countries and International Organizations Under the Foreign Military Sales Provisions of The Arms Export Control Act, Chapter 2 (Washington: February 2006) (Link to source).
Paraguay Aviation Leadership Program 2004; Paraguay Center for Hemispheric Defense Studies 2004; Paraguay Enhanced International Peacekeeping Capabilities 2004;?– United States, Department of Defense, Department of State, Foreign Military Training and DoD Engagement Activities of Interest in Fiscal Years 2004 and 2005: A Report to Congress (Washington: April 2005) (Link to source).
Paraguay Counter-Terrorism Fellowship Program 2004; Paraguay Counter-Terrorism Fellowship Program 2005;?– U.S. Department of Defense, Office of Freedom of Information, Response to FOIA request from the Center for Public Integrity (Washington: July 13, 2006) (Link to source).
Paraguay Aviation Leadership Program 2005; Paraguay Center for Hemispheric Defense Studies 2005; Paraguay Enhanced International Peacekeeping Capabilities 2005;?– United States, Department of Defense, Department of State, Foreign Military Training and DoD Engagement Activities of Interest in Fiscal Years 2005 and 2006: A Report to Congress (Washington: September 2006) (Link to source).
Paraguay NADR – Anti-Terrorism Assistance 2005; Paraguay NADR – Counter-Terrorism Financing 2005;?– United States, Department of State, FY 2007 Congressional Budget Justification for Foreign Operations (Washington: Department of State, February 2006) (Link to source).
Paraguay Section 1004 Counter-Drug Assistance 2004; Paraguay Section 1004 Counter-Drug Assistance 2005; Paraguay Section 1004 Counter-Drug Assistance 2006;?– United States, Department of Defense, Office of Freedom of Information, Freedom of Information Act Request by Marina Walker Guevara, Ref: 06-F-0839 (Washington: September 26, 2006) (Link to source).
Paraguay Aviation Leadership Program 2006; Paraguay Center for Hemispheric Defense Studies 2006; Paraguay Counter-Terrorism Fellowship Program 2006; Paraguay Non-SA, Unified Command 2006;?– United States, Department of Defense, Department of State, Foreign Military Training and DoD Engagement Activities of Interest in Fiscal Years 2006 and 2007: A Report to Congress (Washington: August 2007) (Link to source).
Paraguay NADR – Anti-Terrorism Assistance 2006; Paraguay NADR – Counter-Terrorism Financing 2006;?– United States, Department of State, FY 2008 Congressional Budget Justification for Foreign Operations (Washington: Department of State, February 2007) (Link to source).
Paraguay NADR – Anti-Terrorism Assistance 2007; Paraguay NADR – Counter-Terrorism Financing 2007; Paraguay NADR – Anti-Terrorism Assistance 2008;?– United States, Department of State, Congressional Budget Justification for Foreign Operations (Washington: Department of State, February 2008) (Link to source).
Paraguay Aviation Leadership Program 2007; Paraguay Center for Hemispheric Defense Studies 2007; Paraguay Counter-Terrorism Fellowship Program 2007; Paraguay Non-SA, Unified Command 2007; Paraguay Section 1004 Counter-Drug Assistance 2007; Paraguay Aviation Leadership Program 2008; Paraguay Center for Hemispheric Defense Studies 2008; Paraguay Counter-Terrorism Fellowship Program 2008; Paraguay Non-SA, Unified Command 2008; Paraguay Section 1004 Counter-Drug Assistance 2008; Paraguay Aviation Leadership Program 2009; Paraguay Center for Hemispheric Defense Studies 2009; Paraguay Counter-Terrorism Fellowship Program 2009; Paraguay Non-SA, Unified Command 2009; Paraguay Section 1004 Counter-Drug Assistance 2009;?– Estimate based on closest available year.
Paraguay Child Survival and Health 2004; Paraguay Development Assistance 2004; Paraguay Economic Support Fund 2004; Paraguay Peace Corps 2004;?– United States, Department of State, FY 2006 Congressional Budget Justification for Foreign Operations (Washington: Department of State, February 2005) (Link to source).
Paraguay Child Survival and Health 2005; Paraguay Development Assistance 2005; Paraguay Economic Support Fund 2005; Paraguay Peace Corps 2005;?– United States, Department of State, FY 2007 Congressional Budget Justification for Foreign Operations (Washington: Department of State, February 2006) (Link to source).
Paraguay Child Survival and Health 2006; Paraguay Development Assistance 2006; Paraguay Economic Support Fund 2006; Paraguay Peace Corps 2006;?– United States, Department of State, FY 2008 Congressional Budget Justification for Foreign Operations (Washington: Department of State, February 2007) (Link to source).
Paraguay Millennium Challenge 2006;?– United States, Millennium Challenge Corporation, Paraguay: Threshold Quarterly Report (Washington: MCC, November 2007) (Link to source).
Paraguay Child Survival and Health 2007; Paraguay Development Assistance 2007; Paraguay Economic Support Fund 2007; Paraguay Child Survival and Health 2008; Paraguay Development Assistance 2008; Paraguay Child Survival and Health 2009; Paraguay Development Assistance 2009;?– United States, Department of State, FY 2009 International Affairs (Function 150) Budget Request–Summary and Highlights (Washington: Department of State: February 4, 2008) (Link to source).
Paraguay Peace Corps 2007; Paraguay Peace Corps 2008; Paraguay Peace Corps 2009;?– Estimate based on closest available year.
Paraguay Aviation Leadership Program 2004; Paraguay Center for Hemispheric Defense Studies 2004; Paraguay Counter-Terrorism Fellowship Program 2004; Paraguay Enhanced International Peacekeeping Capabilities 2004; Paraguay International Military Education and Training 2004; Paraguay Section 1004 Counter-Drug Assistance 2004;?– United States, Department of Defense, Department of State, Foreign Military Training and DoD Engagement Activities of Interest in Fiscal Years 2004 and 2005: A Report to Congress (Washington: April 2005) (Link to source).
Paraguay Aviation Leadership Program 2005; Paraguay Center for Hemispheric Defense Studies 2005; Paraguay Counter-Terrorism Fellowship Program 2005; Paraguay Enhanced International Peacekeeping Capabilities 2005; Paraguay Section 1004 Counter-Drug Assistance 2005;?– United States, Department of Defense, Department of State, Foreign Military Training and DoD Engagement Activities of Interest in Fiscal Years 2005 and 2006: A Report to Congress (Washington: September 2006) (Link to source).
Paraguay Aviation Leadership Program 2006; Paraguay Center for Hemispheric Defense Studies 2006; Paraguay Counter-Terrorism Fellowship Program 2006; Paraguay Non-SA, Unified Command 2006; Paraguay Section 1004 Counter-Drug Assistance 2006;?– United States, Department of Defense, Department of State, Foreign Military Training and DoD Engagement Activities of Interest in Fiscal Years 2006 and 2007: A Report to Congress (Washington: August 2007) (Link to source).
Paraguay Foreign Military Sales 2004;?– United States, Department of Defense, Defense Security Cooperation Agency, Defense Articles (Including Excess) and Services (Including Training) Furnished Foreign Countries and International Organizations Under the Foreign Military Sales Provisions of The Arms Export Control Act, Chapter 2 (Washington: July 2005) (Link to source).
Paraguay Foreign Military Sales 2005;?– United States, Department of Defense, Defense Security Cooperation Agency, Defense Articles (Including Excess) and Services (Including Training) Furnished Foreign Countries and International Organizations Under the Foreign Military Sales Provisions of The Arms Export Control Act, Chapter 2 (Washington: February 2006) (Link to source).
Paraguay Humanitarian and Civic Assistance 2004;?– United States, Department of Defense, Defense Security Cooperation Agency, Humanitarian and Civic Assistance Program of the Department of Defense, Fiscal Year 2004, (Washington: Department of Defense, February, 2005) (Link to source).
Paraguay Humanitarian and Civic Assistance 2005;?– United States, Department of Defense, Defense Security Cooperation Agency, Humanitarian and Civic Assistance Program of the Department of Defense, Fiscal Year 2005, (Washington: Department of Defense, February, 2006) (Link to source).
Panama Center for Hemispheric Defense Studies 2004;?– United States, Department of Defense, Department of State, Foreign Military Training and DoD Engagement Activities of Interest in Fiscal Years 2004 and 2005: A Report to Congress (Washington: April 2005) (Link to source).
Panama Counter-Terrorism Fellowship Program 2004; Panama Counter-Terrorism Fellowship Program 2005;?– U.S. Department of Defense, Office of Freedom of Information, Response to FOIA request from the Center for Public Integrity (Washington: July 13, 2006) (Link to source).
Panama Excess Defense Articles 2004; Panama Foreign Military Financing 2004; Panama International Military Education and Training 2004; Panama NADR – Export Control and Border Security 2004;?– United States, Department of State, FY 2006 Congressional Budget Justification for Foreign Operations (Washington: Department of State, February 2005) (Link to source).
Panama International Narcotics Control and Law Enforcement 2004;?– United States, Department of State, Bureau of International Narcotics and Law Enforcement Affairs, FY 2006 Congressional Budget Justification (Washington: Department of State, April 2005) (Link to source).
Panama Center for Hemispheric Defense Studies 2005;?– United States, Department of Defense, Department of State, Foreign Military Training and DoD Engagement Activities of Interest in Fiscal Years 2005 and 2006: A Report to Congress (Washington: September 2006) (Link to source).
Panama Foreign Military Financing 2005;?– United States, Department of State, FY 2007 International Affairs (Function 150) Budget Request Summary and Highlights (Washington: Department of State, February 2006) (Link to source).
Panama International Military Education and Training 2005; Panama NADR – Export Control and Border Security 2005;?– United States, Department of State, FY 2007 Congressional Budget Justification for Foreign Operations (Washington: Department of State, February 2006) (Link to source).
Panama International Narcotics Control and Law Enforcement 2005;?– United States, Department of State, Bureau of International Narcotics and Law Enforcement Affairs, FY 2007 Congressional Budget Justification (Washington: Department of State, April 2006) (Link to source).
Panama Section 1004 Counter-Drug Assistance 2004; Panama Section 1004 Counter-Drug Assistance 2005; Panama Section 1004 Counter-Drug Assistance 2006;?– United States, Department of Defense, Office of Freedom of Information, Freedom of Information Act Request by Marina Walker Guevara, Ref: 06-F-0839 (Washington: September 26, 2006) (Link to source).
Panama Center for Hemispheric Defense Studies 2006; Panama Counter-Terrorism Fellowship Program 2006; Panama Non-SA, Unified Command 2006;?– United States, Department of Defense, Department of State, Foreign Military Training and DoD Engagement Activities of Interest in Fiscal Years 2006 and 2007: A Report to Congress (Washington: August 2007) (Link to source).
Panama Foreign Military Financing 2006; Panama International Military Education and Training 2006; Panama NADR – Counter-Terrorism Financing 2006; Panama NADR – Export Control and Border Security 2006;?– United States, Department of State, FY 2008 Congressional Budget Justification for Foreign Operations (Washington: Department of State, February 2007) (Link to source).
Panama International Narcotics Control and Law Enforcement 2006;?– United States, Department of State, Bureau of International Narcotics and Law Enforcement Affairs, FY 2008 Program and Budget Guide (Washington: U.S. Department of State, September 2007) (Link to source).
Panama NADR – Anti-Terrorism Assistance 2007; Panama NADR – Export Control and Border Security 2007; Panama NADR – Anti-Terrorism Assistance 2008; Panama NADR – Export Control and Border Security 2008; Panama NADR – Terrorist Interdiction Program 2008; Panama NADR – Export Control and Border Security 2009;?– United States, Department of State, Congressional Budget Justification for Foreign Operations (Washington: Department of State, February 2008) (Link to source).
Panama Foreign Military Financing 2007; Panama International Military Education and Training 2007; Panama International Narcotics Control and Law Enforcement 2007; Panama International Military Education and Training 2008; Panama International Narcotics Control and Law Enforcement 2008; Panama Foreign Military Financing 2009; Panama International Military Education and Training 2009; Panama International Narcotics Control and Law Enforcement 2009;?– United States, Department of State, FY 2009 International Affairs (Function 150) Budget Request–Summary and Highlights (Washington: Department of State: February 4, 2008) (Link to source).
Panama Center for Hemispheric Defense Studies 2007; Panama Counter-Terrorism Fellowship Program 2007; Panama Non-SA, Unified Command 2007; Panama Section 1004 Counter-Drug Assistance 2007; Panama Center for Hemispheric Defense Studies 2008; Panama Counter-Terrorism Fellowship Program 2008; Panama Non-SA, Unified Command 2008; Panama Section 1004 Counter-Drug Assistance 2008; Panama Center for Hemispheric Defense Studies 2009; Panama Counter-Terrorism Fellowship Program 2009; Panama Non-SA, Unified Command 2009; Panama Section 1004 Counter-Drug Assistance 2009;?– Estimate based on closest available year.
Panama International Narcotics Control Economic Aid 2004;?– United States, Department of State, Bureau of International Narcotics and Law Enforcement Affairs, FY 2006 Congressional Budget Justification (Washington: Department of State, April 2005) (Link to source).
Panama International Narcotics Control Economic Aid 2005;?– United States, Department of State, Bureau of International Narcotics and Law Enforcement Affairs, FY 2007 Congressional Budget Justification (Washington: Department of State, April 2006) (Link to source).
Panama International Narcotics Control Economic Aid 2006;?– United States, Department of State, Bureau of International Narcotics and Law Enforcement Affairs, FY 2008 Program and Budget Guide (Washington: U.S. Department of State, September 2007) (Link to source).
Panama Peace Corps 2007; Panama Peace Corps 2008; Panama Peace Corps 2009;?– Estimate based on closest available year.
Panama Child Survival and Health 2007; Panama Development Assistance 2007; Panama Development Assistance 2008; Panama Child Survival and Health 2009; Panama Development Assistance 2009;?– United States, Department of State, FY 2009 International Affairs (Function 150) Budget Request–Summary and Highlights (Washington: Department of State: February 4, 2008) (Link to source).
Panama Center for Hemispheric Defense Studies 2004; Panama Counter-Terrorism Fellowship Program 2004; Panama Foreign Military Sales 2004; Panama International Military Education and Training 2004; Panama International Narcotics Control and Law Enforcement 2004; Panama Section 1004 Counter-Drug Assistance 2004;?– United States, Department of Defense, Department of State, Foreign Military Training and DoD Engagement Activities of Interest in Fiscal Years 2004 and 2005: A Report to Congress (Washington: April 2005) (Link to source).
Panama Center for Hemispheric Defense Studies 2005; Panama Counter-Terrorism Fellowship Program 2005; Panama Foreign Military Financing 2005; Panama International Military Education and Training 2005; Panama International Narcotics Control and Law Enforcement 2005; Panama Section 1004 Counter-Drug Assistance 2005;?– United States, Department of Defense, Department of State, Foreign Military Training and DoD Engagement Activities of Interest in Fiscal Years 2005 and 2006: A Report to Congress (Washington: September 2006) (Link to source).
Panama Center for Hemispheric Defense Studies 2006; Panama Counter-Terrorism Fellowship Program 2006; Panama Foreign Military Financing 2006; Panama International Military Education and Training 2006; Panama International Narcotics Control and Law Enforcement 2006; Panama Non-SA, Unified Command 2006; Panama Section 1004 Counter-Drug Assistance 2006;?– United States, Department of Defense, Department of State, Foreign Military Training and DoD Engagement Activities of Interest in Fiscal Years 2006 and 2007: A Report to Congress (Washington: August 2007) (Link to source).
Panama Foreign Military Sales 2004;?– United States, Department of Defense, Defense Security Cooperation Agency, Defense Articles (Including Excess) and Services (Including Training) Furnished Foreign Countries and International Organizations Under the Foreign Military Sales Provisions of The Arms Export Control Act, Chapter 2 (Washington: July 2005) (Link to source).
Panama Foreign Military Sales 2005;?– United States, Department of Defense, Defense Security Cooperation Agency, Defense Articles (Including Excess) and Services (Including Training) Furnished Foreign Countries and International Organizations Under the Foreign Military Sales Provisions of The Arms Export Control Act, Chapter 2 (Washington: February 2006) (Link to source).
Panama Humanitarian and Civic Assistance 2004;?– United States, Department of Defense, Defense Security Cooperation Agency, Humanitarian and Civic Assistance Program of the Department of Defense, Fiscal Year 2004, (Washington: Department of Defense, February, 2005) (Link to source).
Panama Humanitarian and Civic Assistance 2005;?– United States, Department of Defense, Defense Security Cooperation Agency, Humanitarian and Civic Assistance Program of the Department of Defense, Fiscal Year 2005, (Washington: Department of Defense, February, 2006) (Link to source).
Mexico Center for Hemispheric Defense Studies 2004;?– United States, Department of Defense, Department of State, Foreign Military Training and DoD Engagement Activities of Interest in Fiscal Years 2004 and 2005: A Report to Congress (Washington: April 2005) (Link to source).
Mexico International Military Education and Training 2004;?– United States, Department of State, FY 2006 Congressional Budget Justification for Foreign Operations (Washington: Department of State, February 2005) (Link to source).
Mexico International Narcotics Control and Law Enforcement 2004;?– United States, Department of State, Bureau of International Narcotics and Law Enforcement Affairs, FY 2006 Congressional Budget Justification (Washington: Department of State, April 2005) (Link to source).
Mexico Center for Hemispheric Defense Studies 2005;?– United States, Department of Defense, Department of State, Foreign Military Training and DoD Engagement Activities of Interest in Fiscal Years 2005 and 2006: A Report to Congress (Washington: September 2006) (Link to source).
Mexico Counter-Terrorism Fellowship Program 2004; Mexico Counter-Terrorism Fellowship Program 2005;?– U.S. Department of Defense, Office of Freedom of Information, Response to FOIA request from the Center for Public Integrity (Washington: July 13, 2006) (Link to source).
Mexico International Military Education and Training 2005; Mexico NADR – Anti-Terrorism Assistance 2005;?– United States, Department of State, FY 2007 Congressional Budget Justification for Foreign Operations (Washington: Department of State, February 2006) (Link to source).
Mexico International Narcotics Control and Law Enforcement 2005;?– United States, Department of State, Bureau of International Narcotics and Law Enforcement Affairs, FY 2007 Congressional Budget Justification (Washington: Department of State, April 2006) (Link to source).
Mexico Section 1004 Counter-Drug Assistance 2004; Mexico Section 1004 Counter-Drug Assistance 2005; Mexico Section 1004 Counter-Drug Assistance 2006;?– United States, Department of Defense, Office of Freedom of Information, Freedom of Information Act Request by Marina Walker Guevara, Ref: 06-F-0839 (Washington: September 26, 2006) (Link to source).
Mexico Center for Hemispheric Defense Studies 2006; Mexico Counter-Terrorism Fellowship Program 2006; Mexico Non-SA, Unified Command 2006;?– United States, Department of Defense, Department of State, Foreign Military Training and DoD Engagement Activities of Interest in Fiscal Years 2006 and 2007: A Report to Congress (Washington: August 2007) (Link to source).
Mexico International Narcotics Control and Law Enforcement 2006;?– United States, Department of State, Bureau of International Narcotics and Law Enforcement Affairs, FY 2008 Program and Budget Guide (Washington: U.S. Department of State, September 2007) (Link to source).
Mexico International Military Education and Training 2006; Mexico NADR – Export Control and Border Security 2006;?– United States, Department of State, FY 2008 Congressional Budget Justification for Foreign Operations (Washington: Department of State, February 2007) (Link to source).
Mexico International Military Education and Training 2007; Mexico International Narcotics Control and Law Enforcement 2007; Mexico International Military Education and Training 2008; Mexico Foreign Military Financing 2009; Mexico International Military Education and Training 2009;?– United States, Department of State, FY 2009 International Affairs (Function 150) Budget Request–Summary and Highlights (Washington: Department of State: February 4, 2008) (Link to source).
Mexico NADR – Anti-Terrorism Assistance 2007; Mexico NADR – Export Control and Border Security 2007; Mexico NADR – Anti-Terrorism Assistance 2008; Mexico NADR – Export Control and Border Security 2008; Mexico NADR – Anti-Terrorism Assistance 2009; Mexico NADR – Counter-Terrorism Financing 2009; Mexico NADR – Export Control and Border Security 2009;?– United States, Department of State, Congressional Budget Justification for Foreign Operations (Washington: Department of State, February 2008) (Link to source).
Mexico Section 1206 Train and Equip Authority 2007;?– U.S. Department of Defense, Section 1206 Programs for Fiscal Years 2006 and 2007 (Washington: Department of Defense), document obtained January 2008 (Link to source).
Mexico International Narcotics Control and Law Enforcement 2008;?– (1) United States, Department of State, Merida Initiative on Regional Security Cooperation, document obtained October 2007 (Washington: U.S. Department of State, October 2007) (Link to source). (2) United States, Department of State, FY 2009 International Affairs (Function 150) Budget Request–Summary and Highlights (Washington: Department of State: February 4, 2008) (Link to source).
Mexico International Narcotics Control and Law Enforcement 2009;?– Prorated, using 2008 supplemental request amounts, from total request of $477.816 million derived from United States, Department of State, FY 2009 International Affairs (Function 150) Budget Request–Summary and Highlights (Washington: Department of State: February 4, 2008) (Link to source).
Mexico Center for Hemispheric Defense Studies 2007; Mexico Counter-Terrorism Fellowship Program 2007; Mexico Non-SA, Unified Command 2007; Mexico Section 1004 Counter-Drug Assistance 2007; Mexico Center for Hemispheric Defense Studies 2008; Mexico Counter-Terrorism Fellowship Program 2008; Mexico Non-SA, Unified Command 2008; Mexico Section 1004 Counter-Drug Assistance 2008; Mexico Section 1206 Train and Equip Authority 2008; Mexico Center for Hemispheric Defense Studies 2009; Mexico Counter-Terrorism Fellowship Program 2009; Mexico Non-SA, Unified Command 2009; Mexico Section 1004 Counter-Drug Assistance 2009; Mexico Section 1206 Train and Equip Authority 2009;?– Estimate based on closest available year.
Mexico Child Survival and Health 2004; Mexico Development Assistance 2004; Mexico Economic Support Fund 2004; Mexico Peace Corps 2004;?– United States, Department of State, FY 2006 Congressional Budget Justification for Foreign Operations (Washington: Department of State, February 2005) (Link to source).
Mexico International Narcotics Control Economic Aid 2004;?– United States, Department of State, Bureau of International Narcotics and Law Enforcement Affairs, FY 2006 Congressional Budget Justification (Washington: Department of State, April 2005) (Link to source).
Mexico Child Survival and Health 2005; Mexico Development Assistance 2005; Mexico Economic Support Fund 2005; Mexico Peace Corps 2005;?– United States, Department of State, FY 2007 Congressional Budget Justification for Foreign Operations (Washington: Department of State, February 2006) (Link to source).
Mexico International Narcotics Control Economic Aid 2005;?– United States, Department of State, Bureau of International Narcotics and Law Enforcement Affairs, FY 2007 Congressional Budget Justification (Washington: Department of State, April 2006) (Link to source).
Mexico Child Survival and Health 2006; Mexico Development Assistance 2006; Mexico Economic Support Fund 2006; Mexico Peace Corps 2006;?– United States, Department of State, FY 2008 Congressional Budget Justification for Foreign Operations (Washington: Department of State, February 2007) (Link to source).
Mexico International Narcotics Control Economic Aid 2006;?– United States, Department of State, Bureau of International Narcotics and Law Enforcement Affairs, FY 2008 Program and Budget Guide (Washington: U.S. Department of State, September 2007) (Link to source).
Mexico Peace Corps 2007; Mexico Peace Corps 2008; Mexico Peace Corps 2009;?– Estimate based on closest available year.
Mexico Child Survival and Health 2007; Mexico Development Assistance 2007; Mexico Economic Support Fund 2007; Mexico Child Survival and Health 2008; Mexico Development Assistance 2008; Mexico Economic Support Fund 2008; Mexico Child Survival and Health 2009; Mexico Development Assistance 2009;?– United States, Department of State, FY 2009 International Affairs (Function 150) Budget Request–Summary and Highlights (Washington: Department of State: February 4, 2008) (Link to source).
Mexico International Narcotics Control Economic Aid 2008;?– (1) United States, Department of State, Merida Initiative on Regional Security Cooperation, document obtained October 2007 (Washington: U.S. Department of State, October 2007) (Link to source). (2) United States, Department of State, FY 2009 International Affairs (Function 150) Budget Request–Summary and Highlights (Washington: Department of State: February 4, 2008) (Link to source).
Mexico International Narcotics Control Economic Aid 2009;?– Prorated, using 2008 supplemental request amounts, from total request of $477.816 million derived from United States, Department of State, FY 2009 International Affairs (Function 150) Budget Request–Summary and Highlights (Washington: Department of State: February 4, 2008) (Link to source).
Mexico Center for Hemispheric Defense Studies 2004; Mexico Counter-Terrorism Fellowship Program 2004; Mexico Foreign Military Sales 2004; Mexico International Military Education and Training 2004; Mexico International Narcotics Control and Law Enforcement 2004; Mexico Misc DOS/DOD Non-SA 2004; Mexico Section 1004 Counter-Drug Assistance 2004;?– United States, Department of Defense, Department of State, Foreign Military Training and DoD Engagement Activities of Interest in Fiscal Years 2004 and 2005: A Report to Congress (Washington: April 2005) (Link to source).
Mexico Center for Hemispheric Defense Studies 2005; Mexico Counter-Terrorism Fellowship Program 2005; Mexico International Military Education and Training 2005; Mexico International Narcotics Control and Law Enforcement 2005; Mexico Section 1004 Counter-Drug Assistance 2005;?– United States, Department of Defense, Department of State, Foreign Military Training and DoD Engagement Activities of Interest in Fiscal Years 2005 and 2006: A Report to Congress (Washington: September 2006) (Link to source).
Mexico Center for Hemispheric Defense Studies 2006; Mexico Counter-Terrorism Fellowship Program 2006; Mexico Foreign Military Sales 2006; Mexico International Military Education and Training 2006; Mexico International Narcotics Control and Law Enforcement 2006; Mexico Non-SA, Unified Command 2006; Mexico Section 1004 Counter-Drug Assistance 2006; Mexico Service Academies 2006;?– United States, Department of Defense, Department of State, Foreign Military Training and DoD Engagement Activities of Interest in Fiscal Years 2006 and 2007: A Report to Congress (Washington: August 2007) (Link to source).
Mexico Foreign Military Sales 2004;?– United States, Department of Defense, Defense Security Cooperation Agency, Defense Articles (Including Excess) and Services (Including Training) Furnished Foreign Countries and International Organizations Under the Foreign Military Sales Provisions of The Arms Export Control Act, Chapter 2 (Washington: July 2005) (Link to source).
Mexico Foreign Military Sales 2005;?– United States, Department of Defense, Defense Security Cooperation Agency, Defense Articles (Including Excess) and Services (Including Training) Furnished Foreign Countries and International Organizations Under the Foreign Military Sales Provisions of The Arms Export Control Act, Chapter 2 (Washington: February 2006) (Link to source).
Honduras Counter-Terrorism Fellowship Program 2004; Honduras Counter-Terrorism Fellowship Program 2005;?– U.S. Department of Defense, Office of Freedom of Information, Response to FOIA request from the Center for Public Integrity (Washington: July 13, 2006) (Link to source).
Honduras Foreign Military Financing 2004; Honduras International Military Education and Training 2004;?– United States, Department of State, FY 2006 Congressional Budget Justification for Foreign Operations (Washington: Department of State, February 2005) (Link to source).
Honduras Aviation Leadership Program 2004; Honduras Center for Hemispheric Defense Studies 2004; Honduras Service Academies 2004;?– United States, Department of Defense, Department of State, Foreign Military Training and DoD Engagement Activities of Interest in Fiscal Years 2004 and 2005: A Report to Congress (Washington: April 2005) (Link to source).
Honduras Foreign Military Financing 2005;?– United States, Department of State, FY 2007 International Affairs (Function 150) Budget Request Summary and Highlights (Washington: Department of State, February 2006) (Link to source).
Honduras International Military Education and Training 2005;?– United States, Department of State, FY 2007 Congressional Budget Justification for Foreign Operations (Washington: Department of State, February 2006) (Link to source).
Honduras Section 1004 Counter-Drug Assistance 2004; Honduras Section 1004 Counter-Drug Assistance 2005; Honduras Section 1004 Counter-Drug Assistance 2006;?– United States, Department of Defense, Office of Freedom of Information, Freedom of Information Act Request by Marina Walker Guevara, Ref: 06-F-0839 (Washington: September 26, 2006) (Link to source).
Honduras Aviation Leadership Program 2005; Honduras Center for Hemispheric Defense Studies 2005; Honduras Service Academies 2005;?– United States, Department of Defense, Department of State, Foreign Military Training and DoD Engagement Activities of Interest in Fiscal Years 2005 and 2006: A Report to Congress (Washington: September 2006) (Link to source).
Honduras Aviation Leadership Program 2006; Honduras Center for Hemispheric Defense Studies 2006; Honduras Counter-Terrorism Fellowship Program 2006; Honduras Service Academies 2006;?– United States, Department of Defense, Department of State, Foreign Military Training and DoD Engagement Activities of Interest in Fiscal Years 2006 and 2007: A Report to Congress (Washington: August 2007) (Link to source).
Honduras Foreign Military Financing 2006; Honduras International Military Education and Training 2006; Honduras NADR – Small Arms and Light Weapons 2006;?– United States, Department of State, FY 2008 Congressional Budget Justification for Foreign Operations (Washington: Department of State, February 2007) (Link to source).
Honduras International Narcotics Control and Law Enforcement 2007;?– United States, Department of State, Memorandum of Justification under Section 451 of the Foreign Assistance Act for the Use of Funds or Counterdrug and Law Enforcement Programs in Central America (Washington: Department of State, September 28, 2007) (Link to source).
Honduras NADR – Conventional Weapons Destruction 2007; Honduras NADR – Small Arms and Light Weapons 2007;?– United States, Department of State, Congressional Budget Justification for Foreign Operations (Washington: Department of State, February 2008) (Link to source).
Honduras Foreign Military Financing 2007; Honduras International Military Education and Training 2007; Honduras Foreign Military Financing 2008; Honduras International Military Education and Training 2008; Honduras International Narcotics Control and Law Enforcement 2008; Honduras Foreign Military Financing 2009; Honduras International Military Education and Training 2009; Honduras International Narcotics Control and Law Enforcement 2009;?– United States, Department of State, FY 2009 International Affairs (Function 150) Budget Request–Summary and Highlights (Washington: Department of State: February 4, 2008) (Link to source).
Honduras Aviation Leadership Program 2007; Honduras Center for Hemispheric Defense Studies 2007; Honduras Counter-Terrorism Fellowship Program 2007; Honduras Section 1004 Counter-Drug Assistance 2007; Honduras Service Academies 2007; Honduras Aviation Leadership Program 2008; Honduras Center for Hemispheric Defense Studies 2008; Honduras Counter-Terrorism Fellowship Program 2008; Honduras Section 1004 Counter-Drug Assistance 2008; Honduras Service Academies 2008; Honduras Aviation Leadership Program 2009; Honduras Center for Hemispheric Defense Studies 2009; Honduras Counter-Terrorism Fellowship Program 2009; Honduras Section 1004 Counter-Drug Assistance 2009; Honduras Service Academies 2009;?– Estimate based on closest available year.
Honduras Child Survival and Health 2004; Honduras Development Assistance 2004; Honduras Peace Corps 2004; Honduras PL 480 `Food for Peace` 2004;?– United States, Department of State, FY 2006 Congressional Budget Justification for Foreign Operations (Washington: Department of State, February 2005) (Link to source).
Honduras Child Survival and Health 2005; Honduras Development Assistance 2005; Honduras Peace Corps 2005; Honduras PL 480 `Food for Peace` 2005;?– United States, Department of State, FY 2007 Congressional Budget Justification for Foreign Operations (Washington: Department of State, February 2006) (Link to source).
Honduras Millennium Challenge 2005; Honduras Millennium Challenge 2006; Honduras Millennium Challenge 2007; Honduras Millennium Challenge 2008; Honduras Millennium Challenge 2009;?– United States, Millennium Challenge Corporation, Honduras: Compact-Eligible Country Report (Washington: MCC, November 2007) (Link to source).
Honduras Child Survival and Health 2006; Honduras Development Assistance 2006; Honduras Peace Corps 2006; Honduras PL 480 `Food for Peace` 2006;?– United States, Department of State, FY 2008 Congressional Budget Justification for Foreign Operations (Washington: Department of State, February 2007) (Link to source).
Honduras Child Survival and Health 2007; Honduras Development Assistance 2007; Honduras Economic Support Fund 2007; Honduras Child Survival and Health 2008; Honduras Development Assistance 2008; Honduras Child Survival and Health 2009; Honduras Development Assistance 2009;?– United States, Department of State, FY 2009 International Affairs (Function 150) Budget Request–Summary and Highlights (Washington: Department of State: February 4, 2008) (Link to source).
Honduras Global HIV/AIDS Initiative 2007; Honduras PL 480 `Food for Peace` 2007; Honduras PL 480 `Food for Peace` 2008; Honduras PL 480 `Food for Peace` 2009;?– United States, Department of State, Congressional Budget Justification for Foreign Operations (Washington: Department of State, February 2008) (Link to source).
Honduras International Narcotics Control Economic Aid 2007;?– United States, Department of State, Memorandum of Justification under Section 451 of the Foreign Assistance Act for the Use of Funds or Counterdrug and Law Enforcement Programs in Central America (Washington: Department of State, September 28, 2007) (Link to source).
Honduras Peace Corps 2007; Honduras Peace Corps 2008; Honduras Peace Corps 2009;?– Estimate based on closest available year.
Honduras Aviation Leadership Program 2004; Honduras Center for Hemispheric Defense Studies 2004; Honduras Counter-Terrorism Fellowship Program 2004; Honduras International Military Education and Training 2004; Honduras Section 1004 Counter-Drug Assistance 2004; Honduras Service Academies 2004;?– United States, Department of Defense, Department of State, Foreign Military Training and DoD Engagement Activities of Interest in Fiscal Years 2004 and 2005: A Report to Congress (Washington: April 2005) (Link to source).
Honduras Aviation Leadership Program 2005; Honduras Center for Hemispheric Defense Studies 2005; Honduras Counter-Terrorism Fellowship Program 2005; Honduras DOT / U.S. Coast Guard Activities 2005; Honduras International Military Education and Training 2005; Honduras Section 1004 Counter-Drug Assistance 2005; Honduras Service Academies 2005;?– United States, Department of Defense, Department of State, Foreign Military Training and DoD Engagement Activities of Interest in Fiscal Years 2005 and 2006: A Report to Congress (Washington: September 2006) (Link to source).
Honduras Aviation Leadership Program 2006; Honduras Center for Hemispheric Defense Studies 2006; Honduras Counter-Terrorism Fellowship Program 2006; Honduras International Military Education and Training 2006; Honduras Non-SA, Unified Command 2006; Honduras Section 1004 Counter-Drug Assistance 2006; Honduras Service Academies 2006;?– United States, Department of Defense, Department of State, Foreign Military Training and DoD Engagement Activities of Interest in Fiscal Years 2006 and 2007: A Report to Congress (Washington: August 2007) (Link to source).
Honduras Foreign Military Sales 2004;?– United States, Department of Defense, Defense Security Cooperation Agency, Defense Articles (Including Excess) and Services (Including Training) Furnished Foreign Countries and International Organizations Under the Foreign Military Sales Provisions of The Arms Export Control Act, Chapter 2 (Washington: July 2005) (Link to source).
Honduras Foreign Military Sales 2005;?– United States, Department of Defense, Defense Security Cooperation Agency, Defense Articles (Including Excess) and Services (Including Training) Furnished Foreign Countries and International Organizations Under the Foreign Military Sales Provisions of The Arms Export Control Act, Chapter 2 (Washington: February 2006) (Link to source).
Honduras Humanitarian and Civic Assistance 2004;?– United States, Department of Defense, Defense Security Cooperation Agency, Humanitarian and Civic Assistance Program of the Department of Defense, Fiscal Year 2004, (Washington: Department of Defense, February, 2005) (Link to source).
Honduras Section 124 Counter-Drug Operations 2004; Honduras Section 124 Counter-Drug Operations 2005; Honduras Section 124 Counter-Drug Operations 2006;?– United States, Department of Defense, Office of Freedom of Information, Freedom of Information Act Request by Marina Walker Guevara, Ref: 06-F-0839 (Washington: September 26, 2006) (Link to source).
Honduras Humanitarian and Civic Assistance 2005;?– United States, Department of Defense, Defense Security Cooperation Agency, Humanitarian and Civic Assistance Program of the Department of Defense, Fiscal Year 2005, (Washington: Department of Defense, February, 2006) (Link to source).
Guyana Center for Hemispheric Defense Studies 2004;?– United States, Department of Defense, Department of State, Foreign Military Training and DoD Engagement Activities of Interest in Fiscal Years 2004 and 2005: A Report to Congress (Washington: April 2005) (Link to source).
Guyana Foreign Military Financing 2004; Guyana International Military Education and Training 2004;?– United States, Department of State, FY 2006 Congressional Budget Justification for Foreign Operations (Washington: Department of State, February 2005) (Link to source).
Guyana Foreign Military Financing 2005;?– United States, Department of State, FY 2007 International Affairs (Function 150) Budget Request Summary and Highlights (Washington: Department of State, February 2006) (Link to source).
Guyana International Military Education and Training 2005;?– United States, Department of State, FY 2007 Congressional Budget Justification for Foreign Operations (Washington: Department of State, February 2006) (Link to source).
Guyana Center for Hemispheric Defense Studies 2005; Guyana Service Academies 2005;?– United States, Department of Defense, Department of State, Foreign Military Training and DoD Engagement Activities of Interest in Fiscal Years 2005 and 2006: A Report to Congress (Washington: September 2006) (Link to source).
Guyana Center for Hemispheric Defense Studies 2006; Guyana Service Academies 2006;?– United States, Department of Defense, Department of State, Foreign Military Training and DoD Engagement Activities of Interest in Fiscal Years 2006 and 2007: A Report to Congress (Washington: August 2007) (Link to source).
Guyana Foreign Military Financing 2006; Guyana International Military Education and Training 2006;?– United States, Department of State, FY 2008 Congressional Budget Justification for Foreign Operations (Washington: Department of State, February 2007) (Link to source).
Guyana Center for Hemispheric Defense Studies 2007; Guyana Service Academies 2007; Guyana Center for Hemispheric Defense Studies 2008; Guyana Service Academies 2008; Guyana Center for Hemispheric Defense Studies 2009; Guyana Service Academies 2009;?– Estimate based on closest available year.
Guyana Foreign Military Financing 2007; Guyana International Military Education and Training 2007; Guyana International Military Education and Training 2008; Guyana Foreign Military Financing 2009; Guyana International Military Education and Training 2009;?– United States, Department of State, FY 2009 International Affairs (Function 150) Budget Request–Summary and Highlights (Washington: Department of State: February 4, 2008) (Link to source).
Guyana Child Survival and Health 2004; Guyana Development Assistance 2004; Guyana Global HIV/AIDS Initiative 2004; Guyana Peace Corps 2004;?– United States, Department of State, FY 2006 Congressional Budget Justification for Foreign Operations (Washington: Department of State, February 2005) (Link to source).
Guyana Global HIV/AIDS Initiative 2007; Guyana Global HIV/AIDS Initiative 2008; Guyana Global HIV/AIDS Initiative 2009;?– United States, Department of State, Congressional Budget Justification for Foreign Operations (Washington: Department of State, February 2008) (Link to source).
Guyana Peace Corps 2007; Guyana Peace Corps 2008; Guyana Peace Corps 2009;?– Estimate based on closest available year.
Guyana Millennium Challenge 2008;?– United States, Millennium Challenge Corporation, Guyana Signs $6.7 Million Millennium Challenge Corporation Grant to Support Fiscal Reforms, Press Release (Washington: MCC, August 23, 2007) (Link to source).
Guyana Development Assistance 2007; Guyana Development Assistance 2008; Guyana Development Assistance 2009;?– United States, Department of State, FY 2009 International Affairs (Function 150) Budget Request–Summary and Highlights (Washington: Department of State: February 4, 2008) (Link to source).
Guyana Center for Hemispheric Defense Studies 2004; Guyana International Military Education and Training 2004; Guyana Misc DOS/DOD Non-SA 2004;?– United States, Department of Defense, Department of State, Foreign Military Training and DoD Engagement Activities of Interest in Fiscal Years 2004 and 2005: A Report to Congress (Washington: April 2005) (Link to source).
Guyana Center for Hemispheric Defense Studies 2005; Guyana DOT / U.S. Coast Guard Activities 2005; Guyana International Military Education and Training 2005; Guyana Section 1004 Counter-Drug Assistance 2005; Guyana Service Academies 2005;?– United States, Department of Defense, Department of State, Foreign Military Training and DoD Engagement Activities of Interest in Fiscal Years 2005 and 2006: A Report to Congress (Washington: September 2006) (Link to source).
Guyana Center for Hemispheric Defense Studies 2006; Guyana International Military Education and Training 2006; Guyana Service Academies 2006;?– United States, Department of Defense, Department of State, Foreign Military Training and DoD Engagement Activities of Interest in Fiscal Years 2006 and 2007: A Report to Congress (Washington: August 2007) (Link to source).
Guyana Foreign Military Sales 2004;?– United States, Department of Defense, Defense Security Cooperation Agency, Defense Articles (Including Excess) and Services (Including Training) Furnished Foreign Countries and International Organizations Under the Foreign Military Sales Provisions of The Arms Export Control Act, Chapter 2 (Washington: July 2005) (Link to source).
Guyana Foreign Military Sales 2005;?– United States, Department of Defense, Defense Security Cooperation Agency, Defense Articles (Including Excess) and Services (Including Training) Furnished Foreign Countries and International Organizations Under the Foreign Military Sales Provisions of The Arms Export Control Act, Chapter 2 (Washington: February 2006) (Link to source).
Guyana Humanitarian and Civic Assistance 2004;?– United States, Department of Defense, Defense Security Cooperation Agency, Humanitarian and Civic Assistance Program of the Department of Defense, Fiscal Year 2004, (Washington: Department of Defense, February, 2005) (Link to source).
Guyana Humanitarian and Civic Assistance 2005;?– United States, Department of Defense, Defense Security Cooperation Agency, Humanitarian and Civic Assistance Program of the Department of Defense, Fiscal Year 2005, (Washington: Department of Defense, February, 2006) (Link to source).
Guatemala Aviation Leadership Program 2004; Guatemala Center for Hemispheric Defense Studies 2004;?– United States, Department of Defense, Department of State, Foreign Military Training and DoD Engagement Activities of Interest in Fiscal Years 2004 and 2005: A Report to Congress (Washington: April 2005) (Link to source).
Guatemala Counter-Terrorism Fellowship Program 2004; Guatemala Counter-Terrorism Fellowship Program 2005;?– U.S. Department of Defense, Office of Freedom of Information, Response to FOIA request from the Center for Public Integrity (Washington: July 13, 2006) (Link to source).
Guatemala International Military Education and Training 2004;?– United States, Department of State, FY 2006 Congressional Budget Justification for Foreign Operations (Washington: Department of State, February 2005) (Link to source).
Guatemala International Narcotics Control and Law Enforcement 2004;?– United States, Department of State, Bureau of International Narcotics and Law Enforcement Affairs, FY 2006 Congressional Budget Justification (Washington: Department of State, April 2005) (Link to source).
Guatemala Aviation Leadership Program 2005; Guatemala Center for Hemispheric Defense Studies 2005;?– United States, Department of Defense, Department of State, Foreign Military Training and DoD Engagement Activities of Interest in Fiscal Years 2005 and 2006: A Report to Congress (Washington: September 2006) (Link to source).
Guatemala Excess Defense Articles 2005; Guatemala International Military Education and Training 2005;?– United States, Department of State, FY 2007 Congressional Budget Justification for Foreign Operations (Washington: Department of State, February 2006) (Link to source).
Guatemala International Narcotics Control and Law Enforcement 2005;?– United States, Department of State, Bureau of International Narcotics and Law Enforcement Affairs, FY 2007 Congressional Budget Justification (Washington: Department of State, April 2006) (Link to source).
Guatemala Section 1004 Counter-Drug Assistance 2004; Guatemala Section 1004 Counter-Drug Assistance 2005; Guatemala Section 1004 Counter-Drug Assistance 2006;?– United States, Department of Defense, Office of Freedom of Information, Freedom of Information Act Request by Marina Walker Guevara, Ref: 06-F-0839 (Washington: September 26, 2006) (Link to source).
Guatemala Aviation Leadership Program 2006; Guatemala Center for Hemispheric Defense Studies 2006; Guatemala Counter-Terrorism Fellowship Program 2006; Guatemala Service Academies 2006;?– United States, Department of Defense, Department of State, Foreign Military Training and DoD Engagement Activities of Interest in Fiscal Years 2006 and 2007: A Report to Congress (Washington: August 2007) (Link to source).
Guatemala International Military Education and Training 2006;?– United States, Department of State, FY 2008 Congressional Budget Justification for Foreign Operations (Washington: Department of State, February 2007) (Link to source).
Guatemala International Narcotics Control and Law Enforcement 2006;?– United States, Department of State, Bureau of International Narcotics and Law Enforcement Affairs, FY 2008 Program and Budget Guide (Washington: U.S. Department of State, September 2007) (Link to source).
Guatemala International Narcotics Control and Law Enforcement 2007;?– United States, Department of State, FY 2009 International Affairs (Function 150) Budget Request–Summary and Highlights (Washington: Department of State: February 4, 2008) (Link to source). United States, Department of State, Memorandum of Justification under Section 451 of the Foreign Assistance Act for the Use of Funds or Counterdrug and Law Enforcement Programs in Central America (Washington: Department of State, September 28, 2007) (Link to source).
Guatemala International Military Education and Training 2007; Guatemala Foreign Military Financing 2008; Guatemala International Military Education and Training 2008; Guatemala International Narcotics Control and Law Enforcement 2008; Guatemala Foreign Military Financing 2009; Guatemala International Military Education and Training 2009; Guatemala International Narcotics Control and Law Enforcement 2009;?– United States, Department of State, FY 2009 International Affairs (Function 150) Budget Request–Summary and Highlights (Washington: Department of State: February 4, 2008) (Link to source).
Guatemala Aviation Leadership Program 2007; Guatemala Center for Hemispheric Defense Studies 2007; Guatemala Counter-Terrorism Fellowship Program 2007; Guatemala Section 1004 Counter-Drug Assistance 2007; Guatemala Service Academies 2007; Guatemala Aviation Leadership Program 2008; Guatemala Center for Hemispheric Defense Studies 2008; Guatemala Counter-Terrorism Fellowship Program 2008; Guatemala Section 1004 Counter-Drug Assistance 2008; Guatemala Service Academies 2008; Guatemala Aviation Leadership Program 2009; Guatemala Center for Hemispheric Defense Studies 2009; Guatemala Counter-Terrorism Fellowship Program 2009; Guatemala Section 1004 Counter-Drug Assistance 2009; Guatemala Service Academies 2009;?– Estimate based on closest available year.
Guatemala Child Survival and Health 2004; Guatemala Development Assistance 2004; Guatemala Economic Support Fund 2004; Guatemala Peace Corps 2004; Guatemala PL 480 `Food for Peace` 2004;?– United States, Department of State, FY 2006 Congressional Budget Justification for Foreign Operations (Washington: Department of State, February 2005) (Link to source).
Guatemala International Narcotics Control Economic Aid 2004;?– United States, Department of State, Bureau of International Narcotics and Law Enforcement Affairs, FY 2006 Congressional Budget Justification (Washington: Department of State, April 2005) (Link to source).
Guatemala Child Survival and Health 2005; Guatemala Development Assistance 2005; Guatemala Economic Support Fund 2005; Guatemala Peace Corps 2005; Guatemala PL 480 `Food for Peace` 2005;?– United States, Department of State, FY 2007 Congressional Budget Justification for Foreign Operations (Washington: Department of State, February 2006) (Link to source).
Guatemala International Narcotics Control Economic Aid 2005;?– United States, Department of State, Bureau of International Narcotics and Law Enforcement Affairs, FY 2007 Congressional Budget Justification (Washington: Department of State, April 2006) (Link to source).
Guatemala Child Survival and Health 2006; Guatemala Development Assistance 2006; Guatemala Economic Support Fund 2006; Guatemala Peace Corps 2006; Guatemala PL 480 `Food for Peace` 2006;?– United States, Department of State, FY 2008 Congressional Budget Justification for Foreign Operations (Washington: Department of State, February 2007) (Link to source).
Guatemala International Narcotics Control Economic Aid 2006;?– United States, Department of State, Bureau of International Narcotics and Law Enforcement Affairs, FY 2008 Program and Budget Guide (Washington: U.S. Department of State, September 2007) (Link to source).
Guatemala International Narcotics Control Economic Aid 2007;?– United States, Department of State, Memorandum of Justification under Section 451 of the Foreign Assistance Act for the Use of Funds or Counterdrug and Law Enforcement Programs in Central America (Washington: Department of State, September 28, 2007) (Link to source).
Guatemala Peace Corps 2007; Guatemala Peace Corps 2008; Guatemala Peace Corps 2009;?– Estimate based on closest available year.
Guatemala Child Survival and Health 2007; Guatemala Development Assistance 2007; Guatemala Economic Support Fund 2007; Guatemala Child Survival and Health 2008; Guatemala Development Assistance 2008; Guatemala Economic Support Fund 2008; Guatemala Child Survival and Health 2009; Guatemala Development Assistance 2009;?– United States, Department of State, FY 2009 International Affairs (Function 150) Budget Request–Summary and Highlights (Washington: Department of State: February 4, 2008) (Link to source).
Guatemala PL 480 `Food for Peace` 2007; Guatemala PL 480 `Food for Peace` 2008; Guatemala PL 480 `Food for Peace` 2009;?– United States, Department of State, Congressional Budget Justification for Foreign Operations (Washington: Department of State, February 2008) (Link to source).
Guatemala Aviation Leadership Program 2004; Guatemala Center for Hemispheric Defense Studies 2004; Guatemala Counter-Terrorism Fellowship Program 2004; Guatemala International Military Education and Training 2004;?– United States, Department of Defense, Department of State, Foreign Military Training and DoD Engagement Activities of Interest in Fiscal Years 2004 and 2005: A Report to Congress (Washington: April 2005) (Link to source).
Guatemala Aviation Leadership Program 2005; Guatemala Center for Hemispheric Defense Studies 2005; Guatemala Counter-Terrorism Fellowship Program 2005; Guatemala Emergency Drawdowns 2005; Guatemala International Military Education and Training 2005;?– United States, Department of Defense, Department of State, Foreign Military Training and DoD Engagement Activities of Interest in Fiscal Years 2005 and 2006: A Report to Congress (Washington: September 2006) (Link to source).
Guatemala Aviation Leadership Program 2006; Guatemala Center for Hemispheric Defense Studies 2006; Guatemala Counter-Terrorism Fellowship Program 2006; Guatemala International Military Education and Training 2006; Guatemala Non-SA, Unified Command 2006; Guatemala Section 1004 Counter-Drug Assistance 2006; Guatemala Service Academies 2006;?– United States, Department of Defense, Department of State, Foreign Military Training and DoD Engagement Activities of Interest in Fiscal Years 2006 and 2007: A Report to Congress (Washington: August 2007) (Link to source).
Guatemala Humanitarian and Civic Assistance 2004;?– United States, Department of Defense, Defense Security Cooperation Agency, Humanitarian and Civic Assistance Program of the Department of Defense, Fiscal Year 2004, (Washington: Department of Defense, February, 2005) (온라인 카지노 합법 국가Link to source).
Guatemala Humanitarian and Civic Assistance 2005;?– United States, Department of Defense, Defense Security Cooperation Agency, Humanitarian and Civic Assistance Program of the Department of Defense, Fiscal Year 2005, (Washington: Department of Defense, February, 2006) (Link to source). | 2019-04-22T15:58:31Z | http://www.romenagrandhotel.com/5b0/2008/04/ |
Arizona State Representative Bob Thorpe has snuck in a bill that would limit who could serve in the Arizona Legislature. The Flagstaff Republican used a strike everything maneuver to scrap a bill that would have provided funding for DPS officers who live in remote areas.
Thorpe’s “striker” bill states that anyone seeking to serve in the Arizona Legislature must physically be domiciled in the jurisdiction for 75% of the year preceding the filing date to seek the office. In other words, 274 days before a candidate files for the legislature, he/she must be physically living in their address within the district.
This is bad public policy and anyone who holds a decent understanding of constitutional law knows physical domicile requirements are absurd and won’t hold up in court.
Imagine a teacher from Prescott who returns home to Legislative District 1 from an overseas mission trip where she taught English for a year and was able to vote as an overseas registered Prescott voter. Although she has been registered to vote for three plus years and meets the residency requirements to serve, Thorpe’s law would automatically disqualified her to serve in the Legislature.
Several years ago, my friend Jonathan Paton ran for the legislature in southern Arizona’s LD-30. Jonathan had also volunteered for the Army Reserves in 1999. In 2006, Uncle Sam finally came calling activating 2nd Lt. Paton for duty to Iraq. He left in August for six months but still won re-election and returned to the Legislature in February, 2007. Leading up to his activation, Jonathan had to prepare and train and that took him outside of his district. The same is the case for many military reservists who balance serving in the military against serving in the legislature.
Last week, Thorpe’s amendment to HB2269 received a do pass recommendation from the Senate Appropriations Committee with a 6-3 vote. Unfortunately, the bill advanced and is scheduled for further action and more votes in the House and Senate.
There is still time to contact your state senator and representatives and tell them to vote against Thorpe’s amendment to HB2269. The legislation is bad policy and it disenfranchises and disqualifies highly qualified people from seeking a seat in the Arizona Legislature.
Call your legislators today and tell them vote NO on Thorpe’s striker amendment to HB2269.
(PHOENIX) – Tuesday, conservative Republican Marcus Kelley announced his candidacy for the State House in legislative district 20. Kelley, an attorney and long-time conservative activist, filed paperwork with the Secretary of State’s office to represent the district that spans the north of the Phoenix metropolitan area, including parts of Glendale, in one of the district’s two house seats. Both seats will likely become open as Representatives Anthony Kern and Paul Boyer vie for the Senate seat in the Republican Primary.
Kelley who currently works as an attorney with the law firm of Goldman and Zwillinger, has also worked in state and federal government including for former State Senate President Andy Biggs and Attorney General Mark Brnovich. Marcus has worked for the American Conservative Union and later for the Republican Study Committee when then-Congressman Mike Pence was the Chairman. He graduated from the University of Arizona and the Cardozo School of Law. Kelley also serves on the governing board of a local charter school.
“I am seeking a seat in the Arizona House to continue bringing a conservative voice to public policy matters,” Kelley stated. “My years of experience coupled with my track record of consistent conservatism on the issues will represent the constituents of LD-20 well,” he asserted.
On the issues, Kelley is a strong social and fiscal conservative. He is pledged to reducing taxes and spending in a balanced and prioritized budget. He is solidly pro-life, pro-traditional marriage, and is an outspoken supporter of the Second Amendment.
Kelley and his wife, Nickie, have been married for more than 13 years and have two children who attend a local charter school.
STATE CAPITOL, PHOENIX – House Speaker Pro Tempore T.J. Shope (R-8) and Senator Frank Pratt (R-8) last week were named 2017 Legislative Champions by the League of Arizona Cities and Towns.
The Legislative Champions award is given to legislators to honor their outstanding public service and dedication to local governance.
The League of Arizona Cities and Towns is a membership-based organization comprised of municipalities throughout Arizona and provides a bridge from local cities and towns to the state legislature.
If you’re a Sunday Square Off viewer, you probably saw this political “thank you” ad air several times during the show. There was no “paid for” disclaimer but the ad was produced by the American Federation for Children.
The ad is airing to support and thank Governor Doug Ducey and the Arizona Legislature for passing and signing Senator Debbie Lesko’s Empowerment Scholarship Account (ESA) legislation. The law now expands school choice (although capped) throughout Arizona.
During final debate, opponents (primarily the Arizona Education Association) whipped up cataclysmic hysteria over the bill. Casual observers would have thought Arizona public education was about to be nuked into oblivion.
School choice advocates were probably caught off guard by the rapid rabid response.
Thus, the American Federation for Children realizing the need to recover the narrative and refocus the debate on children and parental choice, injected itself into the debate.
Anyone watching the warmup for Arizona’s 2018 election cycle can see that next year’s top political issue will be education.
And at the center of that debate, stand Arizona teachers.
The data proves that Arizona teachers deserve to paid more and if that means unclogging the pipes and removing the administrative clogs to get more money into the classroom, then so be it.
As the Arizona Legislature wraps up the budget and 2017 session, Governor Ducey and lawmakers are poised at an advantage in controlling the message heading into 2018. How they address direct delivery of tax dollars into the classroom, handing out teacher raises and elevating respect for the teaching profession will establish the battlefield for next year’s election.
Republicans have the opportunity to own and make 2018 the “Year of the Teacher.” If they seize the day, Arizona taxpayers, parents, teachers and children will win.
Arizona lawmakers passed legislation tonight that will phase in near universal eligibility for ESA program. This will start with public school students in kindergarten and 1st grade, 6th grade and 9th grade in 2017-18, and then add grades from the on ramps (K,1,2 and 6,7 and 9-10 in year 2 and the next year K,1,2,3 and 6,7,8,9,10,11). The bill will also increase academic transparency and improve administration of the program.
Governor Doug Ducey’s stalwart support of expanding options proved crucial to this victory. Huge kudos to the bill sponsor Senator Lesko and Rep. Allen as well as the members who took a tough vote in the face of determined opposition. Groups including the American Federation for Children, Americans for Prosperity Arizona, the Arizona Catholic Conference, the Arizona Chamber, the Center for Arizona Policy, Ed Choice, Excel in Ed and the Goldwater Institute all made vital contributions. Senator Worsley also deserves recognition as someone who played the role of honest broker in crafting a compromise that a winning coalition in each chamber supported. We’d all like to live in a world where there was no need to compromise, but that world is not the one we find ourselves in.
Bob Stump: Why is Airbnb funding a group attacking Arizona Republicans?
All you Airbnb fans take heed! The company has decided to inject itself into Arizona politics by funneling dark money against Republicans. In this letter, former Arizona Corporation Commissioner Bob Stump hits back with an email to Arizona legislators.
It is rare for me to contact you as a private citizen and former colleague. I believe this issue is important enough to merit it.
An extremist far-left organization, Checks and Balances, is active again in Arizona. Yet again, it is attacking elected Republicans.
I fully expect Republican members of the House and Senate to be next.
What exactly is this “work”? Smearing, suing or harassing Arizona Republican officeholders such as Arizona Attorney General Mark Brnovich, members of the Arizona Corporation Commission — including four Commission chairs — and yours truly.
In an act of pure malice, Checks and Balances published my mother’s private mobile number on the Internet.
At a cost of hundreds of thousands of taxpayer dollars and staff time, and with the help of Democratic activist Dan Barr, Checks and Balances sued the Arizona Corporation Commission in an attempt to break the chain of custody of my phone and publish private text messages to my family and friends. Despite Checks and Balances’ conspiratorial fantasies, I was vindicated in court: Two judges determined that nothing retrieved from my phone met the definition of a public document.
Undeterred by losing in court every single time, Checks and Balances has taken to the pages of the Arizona Capitol Times to attack Arizona Corporation Commission Chair Tom Forese and Commission legal counsel Tim LaSota, who defended me in court.
Until recently, SolarCity, the nation’s largest solar rooftop leasing company, sponsored Checks and Balances. SolarCity’s aim was to attack and sue sitting regulators nationwide, in an attempt to alter regulatory outcomes and thereby enhance SolarCity’s bottom line.
SolarCity was shamed into withdrawing their support for Checks and Balances.
It is past time for Airbnb to follow SolarCity’s lead and cease funding a mercenary band of character assassins which exists to intimidate citizens at the behest of its corporate sponsors.
Airbnb’s CEO, Brian Chesky, ignored my letter to him, written when I was a sitting member of the Arizona Corporation Commission. Perhaps he will be more responsive to you.
I would suggest you contact Mr. Chesky and his lobbying team and ask why Airbnb is funding an unsavory group that sues and smears Arizona Republicans.
Thank you for your attention to this matter. And thank you for your service to our great state.
With ten more days remaining until the August 30th primary election let’s focus on Legislative District 28 (LD 28). Republican primary voters have a real chance to nominate a successful, well-educated female candidate to serve on their behalf in one of two legislative House seats for the next two years. Maria Syms is the only candidate running in LD28 with the potential to win in November and serve honorably for the State of Arizona. Please use your two votes to push her through the Republican primary.
Ken Bowers, Jr. is the final candidate running for the Arizona House. It is quite difficult to know too much about who he is and where he stands on the issues because he has also decided to ignore candidate surveys issues by different associations and groups representing causes or industries throughout Arizona. He seems to only care about reforming Arizona’s correctional system and hasn’t given much thought to the broader issues facing Arizona’s future.
Alberto Gutier, III is an active PC in LD28. Unfortunately, he has not taken the time to fill out any candidate surveys or set up a website sharing his viewpoints on the issues. Nice guys typically don’t finish first in a competitive legislative race.
Mary Hamway is an uber liberal Republican In Name Only (RINO) candidate who is a retread from the 2014 election cycle. Hamway has spent so much time as a Paradise Valley town councilmember raising taxes and cutting funding for cops that she single-handedly jeopardizes a prosperous future for Arizona. Since Mary lacks the spine to vote publicly she and several of her other Big Government crony councilmembers rely on closed door executive sessions so they don’t have to truly make a public statement of town council matters. Hamway talks out of both sides of her mouth if you can bear to listen to her speak. Hamway has been an arduous proponent of Medicaid expansion and common core over the past several years. Hamway self-funded her 2014 loser campaign to the tune of nearly $100,000. After she lost to Bolick, she had her husband make a $500 campaign contribution to liberal pro-choice Democrat Eric Meyer. It is not surprising Hamway has been endorsed by the former Mayor of Paradise Valley, Scott Le Marr, who once served on the Planned Parenthood board.
Matt Morales is a moderate Republican precinct committeeman (PC) in LD28 who has been a registered lobbyist on behalf of the vaping and gaming industries. Need we highlight any more of his resume to illustrate that he is not a conservative choice. Morales likes to tell his fellow Republican voters how he encouraged Kate McGee in 2010 to use her maiden name “Brophy” to get elected to the Arizona House of Representatives. In 2014, Morales boasted of being Adam Driggs’ campaign manager. At the same time Morales worked on an Independent Expenditure (IE) to benefit only McGee and Driggs in the general election. Considering there was one additional Republican on the ballot for the other House seat this speaks volumes to Morales’ lack of character in electing Republicans to two House seats. One last point: it is laughable that Morales’ campaign signs say “conservative” and “personal freedom.” He answered the Arizona Voter Guide’s survey which is sponsored by Center for Arizona Policy as supportive of a living Constitution.
Fortunately, LD28 has Maria Syms as their only conservative choice! She has taken the time to thoughtfully share her views on the issues in support or opposition against many policy issues facing Arizona. Syms has served honorably on her short time on the Paradise Valley Town Council. There aren’t many city elected officials who don’t vote in lockstep to vote for a tax increase, but Syms is one who has encouraged thoughtful conversation while holding the line on tax increases. If she wasn’t running for the Legislature she would be a perfect addition to Arizona’s Justice system. Her past job titles include: Assistant U.S. Attorney, Senior Adviser to Arizona Attorney General Mark Brnovich plus she is a Mom of three children spanning the school choice spectrum so she fully grasps education and opportunity for all!
When you vote by early ballot, or vote in person on August 30th please only vote for Syms! She is the real deal and the only choice to represent LD28 honorably.
Earlier this year, embattled House Speaker David Gowan had to pay back $12,000 in expenditures after audits found he had requested mileage reimbursements for travel unrelated to state business, had claimed mileage while using a state vehicle, or had been granted a per diem for days when he was not doing state work. Subsequent press investigations found that a substantial amount of his allegedly “official” travel was taken to areas within Congressional District 1, and questions remain as to the extent of his attempts to use state resources to subsidize campaign travel.For this reason Defend Rural Arizona issued a request for the Speaker’s travel records on March 24. DRA still has not received any files from the speaker or his office. The only communication we have received is confirmation from May 5 that our request had been received and would be processed.
Under the Arizona Public Records law, A.R.S. § 39-121.01(D)(1), “The custodian of such records shall promptly furnish such copies, printouts or photographs.” Failing to furnish requested information for more than two months does not seem to fit with the definition of “prompt” disclosure.
A copy of the original records request can be viewed here, while a copy of the response received from the House Republican Caucus Press Secretary can be viewed here.
They say an elephant never forgets. This Republican certainly doesn’t but sometimes it takes an incident to help recall.
The massive fire in Gilbert recently stoked my memory about one of our local politicians who tried to take advantage of a serious public safety threat.
Back in 2005, Rural Metro notified the Town of Gilbert that they were ceasing operations in Gilbert because it was becoming too expensive to service the town due to the numerous county islands. That provoked a political fight between Gilbert and the county islanders.
In early 2006, county islander and State Representative Andy Biggs jumped feet first into the fight by sponsoring legislation allowing his fellow islanders to form a special fire district that would also pay back the Town of Gilbert for use of their municipal fire service. There was only one problem. The town of Gilbert was not going to recover the full cost of providing that service – an additional $5 million! Gilbert taxpayers like me would have had to pay the difference and subsidize all the folks in the county islands who were receiving Town of Gilbert services.
To add insult to injury, we would have had to pay the start up costs for a year and a half for Biggs’ special district before we even saw any reimbursement for our up front costs.
The Town of Gilbert decided to sue based on the grounds that Biggs’ law was specially catered for his county islanders.
After Gilbert filed the suit, Andy Biggs snuck in another special amendment that would force Gilbert residents to pay the legal fees in lawsuits against the formation of his special fire district. It was written specifically to apply to the Town of Gilbert.
In the first round of legal battles, a judge saw through the special legislation and shot down Biggs’ special law. Unfortunately that the same judge made us pay for the legal costs in stopping Biggs’ unconstitutional law. It ended up costing us over $292 thousand.
The Maricopa County Board of Supervisors, under Don Stapley’s lead, filed an appeal against the lower court’s decision but that case also ended up losing in court. In it’s decision, the Arizona Court of Appeals stated that Andy Biggs’ law failed to be written in a constitutional manner.
This battle over Biggs’ expensive unconstitutional fire district became so heated that it spilled over as an issue in the 2006 elections. Biggs was challenged by a Gilbert resident but ended up winning reelection because most voters thought the issue was settled and other issues dominated. But not this voter.
Fast forward to 2016 and Andy Biggs is now running for Congress in my district. Ten years may have passed and the memories of some voters may have faded but I won’t be voting for Andy Biggs. He’s proven himself time and time again to be the ultimate career politician who’s only interested in one thing – what’s best for Andy Biggs.
It might seem like an eternity in politics but this Gilbert Republican won’t easily forget what’s been seared into memory of how another politician divided a community to serve his own personal interests.
Last month, the Arizona House of Representatives passed a consumer finance bill that contained little-noticed provisions inserted by my colleagues that abolish the toxic lingering effects of payday loans once and for all in Arizona.
It was a wise move, as Arizona is the only state where certain loopholes are used due to the lack of other legal lending options available in the state, such as installment loans.
The consumer finance legislation in question, which carries these critical provisions, is the Arizona Flexible Credit Act.
This act will establish a realistic pathway to serve those lacking access to viable, legal and safe credit options for the first time in Arizona, and will further help consumers rebuild their credit scores and profiles.
It permits loans from $500 to $2,500, which must be paid in equal monthly payments over a term of up to 24 months.
Research in other states shows that the overwhelming majority of these types of installment loans are paid off in approximately six months. The maximum monthly interest rate is comparable to existing title loans at 15-17 percent; however, much like existing title lending in Arizona, the heated marketplace between lenders will drive down rates.
For Arizona’s working middle class, there is an unmet need for these types of loans, which are not offered by traditional banks and credit unions.
Under the proposal, qualified entities can apply for licenses to offer flexible credit loans if they meet certain criteria of solvency and legitimacy as determined and overseen by the state Department of Financial Institutions , as it should be.
The public policy is sound. My colleagues in the Arizona House did tremendous work, quietly in some cases, inserting major amendments to this legislation last month on the House Floor with little fanfare.
The bill, SB 1316, faces a vote in the Senate in the coming days, and I am hopeful that the governor signs it quickly. Arizonans can win with this long-overdue legislation. | 2019-04-19T01:07:41Z | http://sonoranalliance.com/tag/arizona-legislature/ |
According to an early 2013 report from ComScore.com, Facebook still maintains the lead for American user engagement for a single web site — averaging a minute short of 6.75 hours per user in the month of Mar 2013. While this number is a decline from the same period in 2012 (with an average of nearly 7.25 hours per user), it’s obvious that American Facebook users spend a considerable amount of time on the site — more than any other social media site — revealing facts both mundane and interesting about their lives — facts that might be of interest to other people and companies, including those with ill intent.
In fact, according to a study by Alessandro Acquisti discussed in a TED Talk, American employers often judge job candidates who post to social media more harshly than equally skilled candidates who did not post — regardless of whether posts were negative or positive or not even relevant to the potential employer. How potential employers find your Facebook information about you is beyond the scope of this article, but we do cover some relevant security and privacy statistics and offer some tips to guard yourself.
Please note: All statistics below refer to U.S. Facebook users unless specifically indicated.
1.26 — Number in billions of monthly active worldwide Facebook users (as of Oct 2013).
83 — Number in millions of fake profiles (worldwide; as of late Jun 2013).
7.5 — Approximate percentage of fake profiles (worldwide).
6 3/4 hours — Approximate average amount of time Facebook users spent on the site in Mar 2013.
101 — Approximate number in millions of Facebook users on mobile devices (app and mobile web browsers).
128 — Approximate total number in millions of Facebook users on both desktop computers and mobile devices.
78 — Approximate percentage of Facebook users who access the site on a mobile device.
76 — Percentage of smartphone market that Facebook reaches with their app (primarily) or via mobile web browsers.
23 — Percentage of time spent on mobile apps that is attributed to Facebook use.
303 — Approximate number of “friends” a Facebook user (12+ years old; worldwide) has in their network. This number varies significantly by age group. Research estimates have suggested numbers of 500+ for Facebook users in the 12-24 age range, but much less (low hundreds) for those in older age ranges.
245 — The average number of friends that U.S. users have in their Facebook network, according to a Pew Research study in early 2012.
600 — The approximate number of people that the average person knows overall (Facebook or otherwise), according to a New York Times report in early 2013. Note that other studies suggest a figure of 290.
25 — Percentage of Facebook users (worldwide) who do not look at or ignore their Facebook privacy settings (according to a 2012 Velocity Digital report).
71 — The number of countries whose individual governments made requests for user data to Facebook in the first six months of 2013.
25.6 — The approximate total number in thousands (actual: 25,607) of requests for data made to Facebook by various world governments in that six-month period.
43 — The approximate percentage (actual: 42.96) of all data requests made just by the U.S. government.
38 — The approximate total number in thousands (actual: 37,954) of Facebook user accounts covered in those requests by all governments.
53 — The approximate percentage (actual: 52.70) of total account data requests made just by the U.S. government.
10 — Percentage of anonymous online dating profiles identified via facial recognition software in another study by Aquisti.
43 — Percentage of employers (in a study of 2,100 hiring managers) who did not hire a job candidate after researching the latter’s social media profile.
600 — Number in thousands of Facebook logins (worldwide) that are compromised daily (late Oct 2011).
25 — Percentage of consumers whose online data has been breached who later become a victim of identity fraud.
2.78 — Percentage of homes in the U.S. (1 in 36) that will likely be burgled in 2013, according to an FBI 2012 crime report — with or without the help of social media tracking.
1,657 — Average loss in dollars per break-in.
25 — Percentage of teens who claim to have been stalked on Facebook.
55 — Percentage of teens who have given out personal info to strangers on Facebook.
24 — Percentage of teens who have had compromising information made public without their permission.
2.5 — Number of billions of new daily Facebook posts (worldwide).
67 — Percentage of teen users who know how to hide their online activity from parents.
10 — Percentage of children worldwide who experience cyberbullying.
52 — Percentage of teens not telling parents about being cyberbullied.
34 — Percentage of parents who check their children’s social network sites.
Bullying — You think that your kids are safe at home from bullies? Unfortunately not, and some reports suggest that cyberbullied kids are 2-9 times more likely to commit suicide.
Stalking — Let’s face it; there are lots of creeps out there and one of them may be stalking you or your children — which is made easier by the fact that more than half of teens give up personal info to strangers on Facebook.
Burglary — While the U.S. Bureau of Justice Statistics suggests home burglaries have declined since the 1970s, while make their efforts easier? Some burglars do monitor social media to determine which homes will be unoccupied for a long enough period for them to get what they want. Sometimes they do this by hacking accounts; other times they simple make friend requests to people who don’t know them. From there, it could be a simple matter of monitoring posts for location data and extended and absence.
Identity theft — Are you revealing too much info in your Facebook profile? Potential victimizers can combine your Facebook profile info with your other social media profiles to get the data they need. Note that identity theft can happen to your children, too, and this might not be noticed until they’re 18 or older.
Career compromise — Given two equally qualified candidates, new research shows that if a potential employer checks social media profiles, they tend to have a bias against those who post anything to social media – regardless of the topic or tone; even worse if you say something compromising or have photos of questionable behavior. This may not be surprising given that while most U.S. universities and charities are on Facebook, the percentage of Fortune 500 companies with a Facebook page is considerably less (60% as of Jan 2012).
Reputation damage — It might only take one tagged picture of you cutting loose, doing something one time that you wouldn’t normally do. If an acquaintance not in your Facebook network posts the picture, you might not even know about it — a potential problem if they’ve identified you in text.
Facebook founder Mark Zuckerberg — who in late 2013 spent an extra $30M buying four extra nearby homes to maintain his real-life privacy — has in the past openly indicated that “privacy is over” and that if he were starting Facebook anew that user information would be public by default. That was nearly three years ago and the company doesn’t seem to have swayed much from that goal. He has also made comments suggesting that Facebook users don’t care about privacy. Despite this attitude, there are legitimate reasons to maintain your privacy on Facebook and there are ways to do so.
This is not a comprehensive list, but possibly two of the most under-utilized features are “private profile” and friend lists. New Facebook accounts used to be private by default but have since switched to public by default. You need to manually change that setting. As for friend lists, they’re the digital equivalent of social circles. Friends can fall into multiple lists or just one.
According to various reports, teens and adults are being turned down for work due to certain things they’ve posted on their social profiles. To see how potentially embarrassing indiscriminate posting can be, visit weknowwhatyouredoing.com.
Younger children are at risk, too, given the growing number of underage Facebook users. According to figures by the Crimes Against Children Research Center, children in the 10-13 age range are at most risk from online predators — that age group makes for 22% of targets.
Here are some tips for maintaining your privacy and keeping your profile socially acceptable, as well as for protecting your children if they use Facebook.
Create friend lists. Name them according to social circles such as family, friends, friends of friends, colleagues, college-chums, teammates, etc. Put everyone in your network on one or more lists. Every time you add someone, assign them to one or more lists. Hide your friend lists to protect your friends, so that strangers cannot see to whom you are connected.
When you post, use friend lists to control who sees your information. Set a default setting (e.g., Friends or Friends of Friends). If you want, you can change the viewability setting for a specific post either before (best practice) or after posting.
Pay careful attention not only to what you are revealing about yourself in something you are about to post, but also look at the icon indicating who can see the post once it’s published. If you see a “globe” icon, that means your post will be public. Make a habit of checking this before posting.
Review your recent posts and consider removing personal details in case you’ve over-shared.
Make sure that your location is not being broadcast. This is especially important if you’re using Facebook on a mobile device. Turn off the location feature.
If you use Facebook for work purposes, split your posts between your personal profile only available to friends and a “Personality/ Business” Page accessible publicly.
Review your friends’ posts if they tag you. Review your comments on friends posts that might be controversial, in case they change their post’s status to Public. Cover your bases by using Google Alerts [http://www.google.com/alerts] to get email updates for your Facebook profile name, and then take action if necessary.
Even if you keep your Facebook profile private, if you are using Facebook on a mobile device, be absolutely sure that you are using legitimate wi-fi networks and not “honey pots”. If you get on such a network by accident, change your password immediately. If your Facebook profile includes your email address, change your email password.
Change your password regularly — once a month or more often — and don’t repeat any previous password for at least a few months — preferably never.
Use different passwords for different websites and services. Try not to reuse your Facebook password anywhere else — especially for email addresses listed in your Facebook profile.
Pay attention to any privacy setting changes that Facebook announces. You never know when they will affect you or your children.
Make sure your profile name is unique. If there are other people with the same name as you, don’t take chances that your profiles might be confused by someone.
Check your overall privacy settings on the Facebook Privacy Settings and Tools web page [https://www.facebook.com/settings/?tab=privacy].
Check the settings on your photo albums. Each album and photo can have custom settings.
Check the Facebook Privacy page [https://www.facebook.com/help/445588775451827] for more details on privacy settings.
If you think your child will not join Facebook until they’re older, consider that an Oct 2013 study by Commonsense Media shows that 38% of children under 2 have used a mobile device (smartphone or tablet). By the age of 8, that number jumps to 72%. Kids are comfortable with mobile devices, so the chances of them joining a social media site such as Facebook as a mobile user increases. When you then consider that, as mentioned above, 10-13 year-olds make up 22% of the targets of online predators, and that there are millions of underage users, it’s better to guide your children into proper use of Facebook and other social media than to hope they’ll “be good” and not use such services.
In addition to the general tips above, here are some additional tips for protecting your Facebook-using children.
If your children are not on Facebook, agree to show them how at an agreed-upon age. Let them know early on what you will expect from them in terms of usage behavior. Better you introduce them and know they’re more likely to trust you as a “friend” if you teach them early and trust them.
Implement usage schedules and rules for your children. E.g., can only post to Facebook between 7pm-9pm, from home, when a parent is home to monitor, if necessary.
Discuss privacy and security with your kids and make sure that they understand what dangers lurk online. With underage Facebook profiles increasing in number, have this discussion as soon as possible.
Require at least your under-age children to friend you (possibly using a joint family profile that one or more adults can use to monitor posts.) If you are not on Facebook and your children are, that’s a very good idea to join. Just don’t embarrass your kids with awkward comments on all of their posts.
Review recent posts by your children and teach them to understand what is acceptable and what is not. Ask them to edit out any personal info as necessary. E.g., they may not realize they’re revealing too much when they post about an upcoming family vacation and how long you’ll be away.
Ask your children to regularly submit a list of Facebook groups they’d like to join so you can review the groups.
Also make sure that your children are not doing any of the things in the following list.
Don’t use Klout.com and similar services if you want to maintain a private profile. It’s not clear in the Klout.com UI who can or cannot see your “Klout moments”, but given that your private FB posts do appear in Klout (because you had to have given permission in the first place), it’s probably not a good idea.
Don’t use FB apps or mobile apps that “want to post for you” if you’re concerned.
Don’t publicly post that you are away for an extended period of time or imply such — especially if your address is easy to find online or in the white pages. Some U.S. insurance companies are changing policy rules to exclude claims if they can prove you revealed too much on social media and were burgled as a result.
Don’t give away too much info about your current whereabouts. Turn off “location,” don’t mention you’re away and for how long. This includes multi-day conferences, even if you’re near by.
Don’t publish your full home address contact details anywhere online, including your Facebook profile. If you have a home business, use a P.O. Box or use a service that gives you the equivalent of a physical suite number and signs for packages for you.
Don’t post photos of your children, or at the least do not identify and tag them — especially under-age children.
Don’t post or tag photos of your friends doing “questionable” things. Ask them to check with you as well before posting. Similarly, don’t post pictures of your bad habits. Make sure your friends are not doing so either. You would think all this would be commonsense, but friends of friends might be posting photos of you.
Don’t post “insider information”, especially for publicly-traded companies. You might have family, friends or acquaintances that become sources of such information for you. Carefully consider what you’re revealing before posting about any company or the legal repercussions might be worse than losing a job.
Don’t accept friend requests from people you don’t know – especially if they have very few friends in their profile. At least with LinkedIn, you know how they’re connected to you.
Don’t use short, simple passwords. Use longer passwords, some uppercase letters mixed with lowercase letters, numbers and punctuation. Use multiple unrelated words if it makes it easier for you to remember. It’s particularly important to protect your account if re-use this password for other online services — especially common ones such as email addresses, banking, etc. | 2019-04-22T00:00:22Z | https://www.bestcomputerscienceschools.net/facebook-privacy/ |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.