text
stringlengths
16k
189k
timestamp
stringlengths
20
20
url
stringlengths
15
841
Executive Summary of the Advertising Standards Authority rulings in the case between Identipet (Pty) Ltd, and GetMeKnown. Identipet (Pty) Ltd lodged seven complaints with The Advertising Standards Authority of South Africa against dishonest/misleading and false claims made in advertisements by GetMeKnown for their Chinese manufactured microchips and scanners, which appeared in print, on the Internet, and on their packaging. In two separate rulings (7 May and 31 August 2012), the ASA upheld the complaints and has ruled 100% in favour of Identipet. 1. GetMeKnown microchips are not ISO 11784/5 compliant – as claimed. GetMeKnown microchips are not ICAR approved, nor ICAR certified – as claimed. Important: ICAR headquarters in Rome confirmed that the microchips of GetMeKnown are not ICAR compliant (as claimed in the fraudulent certificate from GetMeKnown’s website). GetMeKnown scanners do not read FDX-A technology (which is the majority of the chips in South Africa) – as claimed. GetMeKnown microchips cannot track animals, – as claimed. The most serious lie in GetMeKnown claims, is their microchips have unique numbering. This claim has been firmly “kicked into touch” by the German arbitrator Dr. Huther, who described the code numbering as “senseless”. The serious implications of this lie, are that they are not ISO (nor ICAR) compliant as usually required internationally for registrations, export, insurance, medical aid etc. Their uniqueness certainly does not stand up in a court of law, and is a passport for duplication, identity theft and fraud! It is only as a result of Identipet’s vigilance which prompted the Advertising Standards Authority to investigate, and discount the blatant lies. GetMeKnown have now been ordered by the ASA to remove all these false, dishonest and misleading claims with immediate effect according to the ASA’s Procedural Guide and regulations. 7) Microchips / transponders can be tracked. ln essence, the complainant submitted that the respondent’s claims are false, and mislead people into expecting qualities and capabilities that are simply not applicable to the products. The relevant details of the complaint will be dealt with below. The respondent explained that it provides an ideal turnkey solution for pet owners, veterinary practices and farmers for pet identification. It volunteered to amend some of its claims (which will be dealt with below), and argued the merits in relation to the claims that it has unique microchip numbers, and that its products are “ideal for use”. Insofar as the references to “tracking” animals are concerned, it explained that its intention was to refer to “tracking” in the sense of keeping track of animals (for example farmers who keep track of ostriches when they come in for feeding). ln this sense, “tracking” is synonymous “identifying” as the term is often used in other industries that monitor stock and do not necessarily track and locate it like vehicle trackers. The example of furniture being allocated and identified was used. It also tendered a potential amendment of the claim, which will be dealt with below. The ASA Directorate considered the relevant documentation submitted by the respective parties. For the sake of convenience, the Directorate retained the numbering used at the top of this ruling to correspond with the relevant claims. 2) That its scanners / readers / receivers conform to ISO 11784/5 standards. While the respondent explained its rationale for making such claims, it also undertook to make it clear that its equipment is “compatible to rea ISO 11784/85 and FDX-B standards”, and that its microchip is ISO 11784/5 and FDX-B compatible to be read by all ISO [Compliant] Scanners”. The complainant took issue with the above claims on the basis that the products had not been manufactured or verified according to the relevant procedures to. Claim compliance with these ISO standards. The proposed amendments therefore appear to address the concerns raised insofar as these claims are concerned, because it no longer creates the impression that these standards have been met, but rather communicates that the respondent’s products can be used on equipment that meets such standards. The undertakings in this regard are therefore accepted on condition that the respondent amends all relevant claims with immediate effect within the deadlines stipulated in Clause 15.3 of Procedural Guide. 5) The claim that the respondents microchips / transponders are “ICAR” approved and have “ICAR Certification”. In essence, the complainant submitted that the respondent’s ID numbers for its chips do not match those issued by or approved by ICAR (International Certification for Animal Recording). Correspondence from lCAR in support of this was also submitted. The respondent explained that its microchips are produced by the same facility that produces ICAR certified microchips, but that these chips are simply programmed differently. It also denied ever claiming to be ICAR certified, but undertook to revisit the website to check for any possible misprints. In relation to the claim in general, it undertook to “… remove the ICAR phrase from our website [un]till our microchips are an approved range of codes from ICAR”. This undertaking equally appears to address the complainant’s concerns, and is therefore accepted on condition that any and all inappropriate references to ICAR are removed with immediate effect within the deadlines stipulated in Clause 15.3 of the Procedural Guide. 6) The claim that its scanners / readers / receivers operate at a frequency of 134.2KHz and 125KHz. The complainant conceded that the respondents readers operate on a frequency of 134.2KHz, as this corresponds with FDX-B microchips supplied by its supplier. However, the 125KHz frequency only applies to FDX-A microchips, which the respondent is currently unable to read. The complainant made the point that this fact was verified by the respondent’s suppliers in China. The respondent submitted that it will correct its material to display the correct frequency only. Only once it has implemented its long-range scanners will it use the appropriate frequency again. This undertaking appears to address the complainant’s concerns, and is therefore accepted on condition that the respondent effects the relevant changes with immediate effect within the deadlines stipulated in Clause 15.3 of the Procedural Guide. The Directorate also draws specific attention to the requirements of Clause 15.5 of the Procedural Guide, which effectively require advertisers to remove offending claims from all media irrespective of whether or not the complainant made reference to such media. The complainant disputed this on the basis that the reference to being “unique” implies that there are no other microchips in existence that has, or is capable of having, the same ID code or number. This is paramount in the security that the chip affords both animal and owner. He explained that microchips that are not ICAR registered and do not use a country code according to ISI 3166-1 are vulnerable to duplication. According to international authorities, proper identification depends, inter alia, on uniqueness of the relevant ID codes, as well as a properly maintained database to store such unique codes. The complainant submitted that the respondent has not implemented any of these safeguards. In this instance, the complainant specifically noted that “… the Respondent has severely breached the following highlighted sections of the ASA code …” The only section highlighted in a similar manner was the provisions of Clause 2 of Section il (Honesty). The Directorate therefore interpreted this to mean that this particular complaint was lodged only in terms of the provisions of this clause. While the provisions regarding Clause 4.2.1 of Section ll were printed in bold, they were not underlined in the same manner as those of Clause 2 of Section ll. lt was therefore not clear whether the complainant intended for the Directorate to consider these as welli. In any event, it stands to reason that if the claim was found to be exploiting consumer credulity, it would be misleading, and vice versa. The respondent agreed that other chips could be programmed to carry the same ID number, but explained that its database would immediately pick up any duplications, and therefore prevent duplicates from being registered on its own database. It added that there is no requirement in South Africa to subscribe to or comply with ICAR, and in reality, any person can allocate any ID number to its microchip, even within the ICAR range. Its reference to “unique” relates to the fact that its numbers are uniquely allocated and maintained on its database. It is not entirely clear from either the complaint or the response what the potential risk or harm in having duplicate microchips would be. It would appear, however, from the respondents website, that its claim and intended message is that a customer would purchase a chip, allocated with a specific 15-digit number, and have it implanted in his pet or livestock. This chip would then show up on a scanner, revealing the relevant number, which in turn can be used via a facility on the respondents website to track down the owner as well as some information about the relevant animal. The information supplied by the complainant (from the International World Small Animal Veterinary Association as well as a document claimed to emanate from “ISO TC23/SC19/wg N308rev3” suggests that microchip ID codes should be readable from any reader and that a unique number should be allocated. The recommendation is made that either a manufacturer code, or country code should be used, and if the former is preferred, the manufacturer should install and maintain a proper database. From the response received it would appear that this is exactly what the respondent has done; allocated its own “unique” numbers or manufacturers codes and maintained a database that stores this information. Accordingly, the references to “unique” numbers or ID codes are not dishonest in a manner that contravenes Clause 2 of Section il (or Clause 4.2.1 of Section Il of the Code for that matter). This aspect of the complaint is dismissed. “PT180 Series RFID Reader series offers three durable and versatile radio frequency identification (RFlD) reader models that are ideal for companion animal veterinary practices, pet rescue shelters and low-volume manual scanning operations. Additionally, they can serve as effective back-ups for animal identification and tracking management. They can read multiple FDX-B ISO 1784/5 compliant microchip/tag technology”. The complaint here is based on the knowledge that the respondent’s readers can only read PDX-B protocols or microchips, whereas the majority of chips available in South Africa are FDX-A. This renders the claim dishonest and misleading. When considering this matter, the Directorate was mindful of the provisions of Clause 4.2.2 of Section lll (Puffery). This effectively allows for value judgements and matters of opinion or subjective assessment to be used in advertising provided that it is clearly seen to be an opinion and not used to mislead about any aspect that is capable of objective assessments. Reading the claim in context, the Directorate is satisfied that it is presented as an opinion. Referring to its product as “ideal” does not suggest any type of superiority by objective comparison, and the Directorate is not convinced that a hypothetical reasonable person wouid attach such an interpretation to the claim. lt is also worth noting that the claim in its entirety is clearly contextualised in terms of FDX-B technology, and there is nothing suggesting that the respondents readers would aiso read FDX-A technology. For the above reasons, the Directorate is satisfied that this ciaim falls within the parameters of acceptable puffery, and is therefore not in contravention of the Clauses identified by the complainant. 7) That the respondent’s microchips / transponders can be “tracked”. The compiainant argues that the references to being “tracked” are patently faise, because the respondent’s devices do not contain a power source, meaning that no signai can be emitted, which in turn means it cannot be tracked. In reality, the respondent’s products are fitted with a capacitor, which is temporariiy powered by the RFID wave of a scanner or reader, aliowing it to be read at a distance of 7 to 1Ocrn. The respondent repiied that its references to being tracked are intended to mean “scan the chip with our reader and then enter the code into our database for identification”. it added that it would be willing to amend its term to “scan and identify” if the ASA were to determine that the word”‘track” has a meaning that does not correlate with the reality. Looking at the claim on the respondents website, the Directorate is inclined to agree with the complainant that the reference to being able to “track” animais would, in the mind of an ordinary consumer, likely be interpreted to mean that one would be able to track a lost animal much in the same manner as one would track a stolen vehicle or cell phone. This does not appear to match with the reality. As such, the Directorate has considered the respondent’s proposal of amending the claim to refer to “scan and identify”, and is satisfied that this appears to match the reality, and would address the complainants concerns. The respondent’s undertaking to amend the word “track” to read “scan and identify” is therefore accepted on condition that the amendment occurs with immediate effect and within the deadlines stipulated in Clause 15.3 of the Procedural Guide. The respondents’ attention is drawn to the provisions of Clause 15.5 of the Procedural Guide. Executive Summary: Dr. Huther ruled in favour of Identipet, and that the claims of GetMeKnown have not been substantiated. According to the provided documents IDENTIPET claims that GETMEKNOWN brings products in the market of which the published information is at least partly wrong. Details of the claims are written in the documents complaint No.3 and complaint No. 4. Answers to the claims are listed in a separate document. The ISO 11784 (code structure) and ISO 11785 (communication between transponder and reader) have been established in 1996 with the technologies HDX and FDX-B. Three old transponder types of FDX-A technology (Destron, Trovan, Rid2000) are named in the ISO 11785 Annex-B to be used for an interim period of 2 years to be able to sell their remaining stock. Some of these manufacturers have nevertheless tried to establish their technology as a standard to create a kind of monopoly situation in dedicated markets. Since 1998 the old technologies should not be used anymore. Unfortunately there was and still is a clear misleading information in the market, that these products are ISO. They are clearly not. The animal code (according to ISO 11784) to be displayed on a hand held reader contains 15 digits of which 3 are either the ICAR issued manufacturer code or the country code according to ISO 3166. As there is no country with a code above 899 the manufacturer codes are all in the 9XX range. The 12 following digits are either the unique Animal ID Code or the unique National ID Code. Where issued transponders contain a manufacturer code, the manufacturer is the responsible party for the guarantee of the uniqueness of the issued transponder code. Where issued transponders contain a country code, the country, specifically the National Authority, is the responsible party for the guarantee of the uniqueness of the issued transponder code and to also ensure duplication of transponder codes does not occur. As such, it is therefore not the responsibility of the manufacturer to provide this guarantee, but rather the country. The aforementioned points are of acute and particular interest in countries where the responsibility for the identification of various animal species is not assigned to an individual Ministry. The silicon chip has a minimum of 128 bit (according to ISO 11785) of which 64 bits are used for the code structure according to ISO 11784. The use of bit 1, the animal bit, bit 17 to 26, the country code bits and bit 27 to 64, the unique or National ID code are the relevant parts to look at. The bit 1 is not visible and has nothing to do with the animal code; it is a bit which is relevant for the behaviour of the reader. Nevertheless it is important that the animal bit is correctly set on 1 (bit 1 = 1) as there are industrial applications like the waste management industry in Germany which uses the standard ISO 11784 (bit 1 = 0) as well and the code only varies in the first bit. If in the animal transponder the bit 1 is not set on 1, this has consequences for the readers according to ISO 11785 and to ISO 24631-6. Readers according to ISO will both not display the code at all and then need to clearly indicate “no animal code” or the code is being displayed and it has to be clearly indicated “industrial code”. The bits 17 to 26 are dedicated to build the country code or the manufacturer code. The country code must be a valid code according to ISO 3166. The ISO 3166 shows the numeric codes for the UN letter codes for each country in the world. Ln. this table there are also numbers without any corresponding country, so no country information. For South Africa this is ZA or ZAF or 710. All three codes are equal and valid. For the manufacturers there is a distinguishing between manufacturers with full manufacturer code and the shared manufacturer code. In total we have 54 ICAR approved manufacturers with full manufacturer code and their manufacturer code range is between 987 and 934. In total we have 66 manufacturers with a shared manufacturer code which is 900, identical for all of them. To distinguish the manufacturers with a shared manufacturer code, they have been allocated an additional 3 digit code to be used in the animal ID code. This is the so called ICAR 900 allocation code. If the country code is used, the manufacturer with either a shared or a full manufacturer has to program the transponders according to the rules established by the National Authority. If no regulation for the use of the country code exists the manufacturer code has to be used. 999 is a test code, there is no guarantee for uniqueness, it is forbidden for commercial use. Each product type (transponder size i.e. 2, 12 x 12mm or 1, 41 x 9mm) have to have an own product code approved by ICAR and published on their website. At the time of the creation of the ISO standards 11784 and 11785 and of the EC regulations there was only laser programed silicon available. The ISO 11784 code was already unchangeably programed in the chip on wafer level. Today the majority of transponders are made of OTP silicon. The transponder is being built without programing the chip according to ISO 11784. The code shall be programed at any desired time of manufacturing or even after the manufacturing when the product is ready for use. Programming is only allowed for ICAR approved manufacturers. The wafer is the first production step of the transponder. Depending on the size of the silicon chip there can be up to 20.000 chips on one wafer. In former times with the laser programed silicon sorting of transponders or producing sequential numbers was not possible, better said not payable. This is the major reason why OTP silicon has been introduced. As the final ISO 11784 codes can be programmed at any time during or after production, the first obligation for the manufacturer is to lock the code after programming, which is a “sine qua no” for uniqueness. If this is not the case, the number can be altered at any time. Each OTP silicon chip has a so called UID, which is a laser programmed serial number made on wafer level which can never ever be altered. It is an obligation for a respectable manufacturer to read out the UID and store it together with the programmed 11784 code in the manufacturer database. This is the second obligation to guarantee uniqueness. This UID code is not dedicated for public use but it needs to be stored for each single transponder manufactured and programmed with an ISO 11784 code. The first three digits 111 do neither represent a manufacturer according to ICAR nor to a country according to ISO 3166, so the code in total is not an ICAR approved code. ICAR does not have numbering blocks and is the Registration Authority for ISO, so they always fulfill 100% the equivalent norms. The second part of the code (the 12 digits) does not give any information according to the manufacturer for the traceability of the product. This is what we call a senseless code. The correct code for Wuxi Fofia according to ICAR is a shared manufacturer code 900. The positions 4,5,6 of the code shown are 000 and the correct way for Wuxi Fofia is 032 after the shared manufacturer code. The rest of the numbers have to be 00 and then the range has to be in-between 0.000.000 to 1.999.999. The only correct transponder code looks like this: 900.032.000.000.000 – 900.032.001.999.999. The points 1-8 on page 2 are fully correct except point 8.1. as the link back to the country of manufacture is wrong whilst the link back to the manufacturer is of essential need. On page 3 there is information for the guarantee of uniqueness missing which I described in part 2 of this document, guarantee of uniqueness. The way it is written refers to the period of time when only laser programmed silicon was available. The describing on page 4 is not correctly understood, the product code for the 2, 12 x 12 mm glass tube transponder for Wuxi Fofia is 900018. This code is only an internal code and has nothing to do with the transponder number; the ICAR 900 allocation code is 032 for the 2, 12 x 12 mm glass tube. Nothing to be said to page 5,6,7,8. Page 9 is absolutely correct. Page 10 goes back to the uniqueness, which can only be guaranteed if the manufacturer is having a database in which the data of UID and the 11784 codes are stored together. A reader can only be called an ISO 11784/5 compliant reader if it reads both technologies HDX and FDX-B. As FDX-A is not part of the standard this technology has no importance for the naming of the reader. A reader which only reads either HDX or FDX-B has to be called: RFID reader for HDX or for FDX-B ISO 11784/5 transponders. Then the naming is absolutely correct, otherwise it is misleading. The time of trading a technology has no importance on ISO level. If a reader has to read several protocols, particularly if they are not ISO, this is to be regulated by a National Authority. Nevertheless it is logical for practical reasons that the readers offered in the South African market should at least read the technologies FDX-B and FDX-A. Today there is also a 12mm implant on HDX protocol available and HDX is part of the ISO 11785. The same problem could occur again. The question is not if a reader is ideal or not, the question is if it is conforming to ISO and which requirements in the National market are needed. It is not my task of validating if the wording of the respondent has given unfair advantage. My task is only to evaluate the ISO part. The answers to complaint No. 1 and 2 are not correct. “The Reader is compatible to read ISO 11784/5 and FDX-B standards” is wrong the correct saying is: the reader reads all FDX-B transponders according to ISO 11784/5. The term “microchip” for a transponder is wrong as the microchip is only part of the transponder, which has an antenna in addition and a surrounding material which needs to be Bio glass of the class 8625. Careful, there is a world patent by a German company and this glass is always green. When the glass is not from Schott and claimed to be class 8625, the provider needs to have a patent license or the glass is not Bio glass. The wording “Our Microchips is ISO 11784/85 and FDX-B compatible to be read by all ISO compliant scanners” is not correct, it needs to be said: “Our transponders are conform to ISO 11784 and to ISO 11785 FDX-B.” This is the general way of correct expression, but this is not true concerning the transponder numbers already analysed in complaint No. 3. The answers to complaint No. 3 is not sufficient, the requirements are described in the part 2 of the document, guarantee of uniqueness. The explanation is insufficient and does as such not guarantee the uniqueness above the transponder range except when the silicon is laser programed. ICAR is a world-wide officially accepted organisation and is the Registration Authority for ISO, so in charge to take care of the handling of the codes and the product certification and surveillance. Nobody needs to subscribe to ICAR. At the moment when a manufacturer is granted a manufacturer code by ICAR it is on behalf of ISO and each manufacturer has to subscribe several documents which the manufacturer Wuxi Fofia did as well. Subscribing these documents means to respect the guidelines and the rules. ICAR is not an organisation that has and needs National Authority; ICAR takes care of the procedures and is the monitoring body. ICAR is the organisation which has the power to withdraw a product code as well as a manufacturer code. The saying “that programing in the range used by lCAR” is wrong, it is correct to say the programing is made according to the ICAR issued manufacturer code and code range. The describing of guaranteeing uniqueness is misleading and false. It is possible to duplicate the ISO 11784 code, but the guarantee of uniqueness is the link to the serial number, the UID. It is absolutely irrelevant if someone is living in the US or SA, it is relevant if someone uses an ISO standard where he has got the permission to use it by the Registration Authority in a clearly described way. The respondent claims that their turnkey solution secures a unique microchip number. Unique in the sense of ISO means world-wide unique number, not only unique for the manufacturer in his database. When a manufacturer uses the ISO standard he has to be conforming to the rules. If the uniqueness is the turnkey solution then there must be a verifiable proof for it. The word “ideal” is certainly misleading in conjunction with the offered transponder codes. It neither is obvious that this range of transponder codes is programed with a valid country code according to ISO 3166 nor with a manufacturer code according to ICAR. Tracking in the identification market is related to the production as well as in the pharmaceutical industry. It means that the transponder can always be traced back to the manufacturer and at least to the first point of sales. What the respondent is talking about is identify and reunite lost and found animals. Indicating the frequency of 134, 2 kHz is the frequency of ISO 11785. Mentioning 125 kHz does not mean the reader is capable of reading FDX-A as 125 kHz is as well the typical frequency for LF industry applications. In the advertising it has to be expressed that it is 125 kHz FDX-A animal or FECAVA standard. if a technology is used then it has to be used in the way it is allowed, this is particularly the case within ISO. The ISO standards are developed and established to help consumers around the world. I strongly recommend a homologation procedure on a National level to be able to establish guidelines, consequences and penalties. ln this homologation document the coding as well as the readers to be used can be homologated. This might become part of another document. The fact of claiming guarantee of uniqueness has to be provable and if the manufacturer is based in China, it is relevant to have a company registered in the South African register of commerce to be able to have legal basis. If this company is not able to proof what they are claiming then a visit at the manufacturing plant is needed to inspect the database for verification.
2019-04-24T16:35:39Z
http://www.identipet.com/identipet-pty-ltd-scores-100-success-over-getmeknown-in-two-seperate-rulings-of-the-advertising-standards-authority-of-south-africa/
A Victorian Sci-Fi-Adventure set in the thrilling world of the famous roleplaying game Space 1889 - CGI free and filmed on location. 586 backers pledged €28,110 to help bring this project to life. The first two stretchgoals have been unlocked! Space 1889 will be filmed with improved equipment and in a real jungle. Now for Goal Nr. 3: The mobile etherflyer studio. On popular demand we will add a SLACKER BACKER option. Just take a look at the 10. update or visit https://www.patreon.com/orkenspaltertv and send us am PM here on Kickstarter or over there. Space 1889 – The Secret of Phobos (working title) is based on the successful tabletop roleplaying game Space 1889. It's going to be an old fashioned adventure flick in a Victorian sci-fi setting, merging historical reality with a bit of Steampunkt and Pulp. This low budget film will be made without the use of CGI – we will be using practical effects like models instead. It won't be shot in front of a green screen, but on location in deserts, old cities and jungles across Europe and beyond. It's going to be a good old adventure movie like back in the 80ies, when the monsters were made of rubber and the backgrounds were real. Running time and production value will depend on the success of this campaign. The money will be spent on fuel, props, décor, models and monster suits - as we already have high quality filming equipment, thanks to our job as video journalists. The story and script come from the authors of the tabletop game. The movie will be shot in different languages with actors from the UK, Germany and France and will be completely subtitled in English and German. If we raise enough money we will be able to dub the film in several languages. Space 1889 is THE original Steampunk roleplaying game, created by Frank Chadwick in 1988. Or rather: it's "Steampunk light" the way you might know it from the works of Jules Verne, which makes it easier to turn into a movie than typical Steampunk stories. In the world of Space 1889 the colonial powers of Earth – thanks to Thomas Edison's invention, the Ether Propeller - were able to conquer other planets of our solar system and make contact with the lords of the Mars channels and Lizardmen on Venus. The new edition of Space 1889 was funded thanks to a Kickstarter campaign by Clockwork Publishing some time ago. It's the ideal setting for adventurous stories in a streampunky sci-fi setting. Here's a short teaser for our film which at the same time is a pretty good introduction to the setting in general. In „Secret of Phobos“ you will, of course, get a short introduction to the world of Space 1889 in which Thomas Edison and Jack Armstron reached Mars with the help of their spaceship prototype nearly 20 years before the main story-arc begins. These two iconic characters will be important to the plot, but the main story is about a young female adventurer, Armstrong's niece. Together with her Martian butler and a young writer she gets caught in a huge conspiracy: her uncle's and Edison’s mistakes from the past make her a target for a dark cult and the last hope for a Martian princess. Our heroes' journey leads them from Venus back to Earth, to Mars and finally to Mars' eerie moon Phobos. It features ancient secrets, wild chases, dinosaurs, drama and and a well dosed portion of humor - as we are fully aware that this is a very low budget project and those shouldn't take themselves too serious. Dinosaurs are one of Space 1889's important elements – at least in the jungles of Venus. For a long time we wondered how to bring these creatures to life in a CGI-free film and in the end we decided to use an animatronic suit. If you don't know how they look look like, here's a link to a nice prank video. Those suits are pricy but it's worth it. With a little luck we will be able to pick up the suit at the factory in China personally. And this tour through Asia will be the topic of its very own documentary. This will give us the chance to use some breathtaking landscapes as background for Mars scenes we will shoot during the trip. At least two of the film's actors will accompany us to China, so this trip is part of the film's production but has not to be financed via this campaign. Mháire is playing the lead role: The female adventurer Will Armstrong. Not because she desperately wanted to, but because we talked her into it. In the German roleplaying scene, Mháire is very well known for her web show, her books and her modeling jobs. Mháire spielt als Abenteurerin Will Armstrong die Hauptrolle. Einfach, weil das logistisch am praktischsten ist und weil wir alle ihr sagen, dass sie das kann. Mháire dürften viele Rollenspieler durch ihre Show, ihre Bücher oder ihren Kalender kennen. Anselme is half French and half German and has played roles in various indie films and stage plays. He will play Michel Verne - the son of legendary author Jules Verne. Der Halbfranzose Anselm übernimmt die Rolle von Michel Verne, dem Sohn von Jules Verne. Er hat Schauspielerfahrung durch diverse Indie-Filme und seine Theaterzeit. Chris is an icon in the European LARP-scene with thousands of fans. She already played major roles in several fantasy films and plays a Martian Princess in Space 1889. Chris ist eine Ikone in der europäischen LARP-Szene mit Tausenden Fans. Sie hat bereits in vielen Filmen große Rollen gespielt und wird eine Marsprinzessin in Space 1889 geben. Nico alreday produced several low budget films such as The Dark Eye: Leuenklinge, Nerds of the Old Republic, two Discworld fan films or the found footage horror parody the Owling. Nico ist vermutlich derjenige, der euch gebeten hat, auf diese Seite zu gehen. Er macht Filme zu nerdigem Kram. Schon sehr, sehr lange. Z.B. DSA: Leuenklinge. Nerds of the Old Republic (für Buffed.de) oder mehrere Scheibenweltfanfilme. Patric is CEO of Clockwork Publishing and will reprise his role as an Officer of the German Kaiser (which is predestined to end up in a deleted scene). Same with his henchman Uli. Der Chef des Uhrwerk-Verlags und sein treuer Handlanger werden wieder ihre beliebten Rollen als kaiserliche Offiziere spielen und dann vermutlich nur im Bonusmaterial landen. Stefan is the chief editor for Space 1889 and co-created the film's story and script. Stefan is well known in Germany for his many works concerning the most successful German roleplaying game The Dark Eye, mobile rpgs, Cthulhu and many more. He is said to be one of the most creative roleplaying authors in Germany. Stefan ist der Chefredakteur für Space: 1889 und hat an der Story des Films und am Drehbuch mitgearbeitet. Er ist durch seine langjährige Arbeit als Autor und Redakteur für Das Schwarze Auge bekannt, dem größten und erfolgreichsten deutschen Rollenspiel. Außerdem hat er für Handy-Rollenspiele, das Cthulhu-Rollenspiel und Splittermond gearbeitet. Er gilt als einer der kreativsten deutschen Rollenspielautoren. These are the two composing teams that will contribute the score for Space 1889. Just click on their logos and listen to their demoreels. Die beiden Komponistenteams werden gemeinsam den Soundtrack für den Film liefern bzw. haben sogar schon diverse Tracks fertig. Klickt auf die Banner, um euch Demoreels anzuhören. Feline and Strange are a Steampunk band from Berlin, they will appear as a victorian band during the movie. Visit their website here. Die Steampunk-Band wird im Film einen Auftritt haben und ihn dadurch um einiges an Flair bereichern. Hier geht es zu ihrer Seite. Graphic and visual FX artist Patrick Wilk delivers all the fx we can't do with puppets and models. Visit his Website here. Shipping within Germany is free. Within the EU it will cost 10 Euros. To the USA and the rest of the world the shipping fee is 18 Euros. Versand innerhalb Deutschlands ist kostenlos. In EU-Länder kosten Verpackung und Versand 10 Euro, in die USA und den Rest der Welt 18 Euro. Space 1889 ist das erste Steampunk-Rollenspiel und stammt aus den 80ern. Es handelt sich aber um Steampunkt Light, wie ihr es von Jules Verne kennt – ist also leichter darstellbar als man vielleicht vermutet. In Space 1889 haben die Kolonialmächte dank Thomas Edisons „Ätherpropeller“ das Sonnensystem erobert und stehen in Kontakt zu den Fürsten der Marskanäle und Echsenmenschen auf der Venus. Space 1889 wurde in seiner Neuauflage mit modernen Regeln vor einiger Zeit vom Uhrwerk Verlag gekickstartert. Es ist das ideale Setting für abenteuerliche Steampunk-Sci-Fi Geschichten. Wenn ihr zur englischen Version (The Roleplaying Game) springt oder unter diesem Link, seht ihr einen kurzen Teaser für den Film, der gleichzeitig eine Einführung in das Setting darstellt und leicht verändert auch im fertigen Film landen wird. Space 1889 führt natürlich in das Setting ein, in dem die Entdecker Thomas Edison und Jack Armstrong 20 Jahre zuvor mit ihrem Raumschiffprototyp den Mars erreicht haben. Diese beiden ikonischen Charaktere sind Teil der Handlung, im Mittelpunkt steht aber eine junge Abenteurerin, Armstrongs Nichte. Gemeinsam mit ihrem marsianischen Butler und einem jungen Schriftsteller stolpert sie in eine große Verschwörung hinein: Die Fehltritte ihres Onkels und Edisons machen sie zur Zielscheibe für einen finsteren Kult und zur letzten Hoffnung für eine marsianische Adelige. Die Reise unserer Helden führt von der Venus zurück zur Erde, zum Mars und schließlich zu dessen unheimlichen Mond Phobos. Sie enthält uralte Geheimnisse, Verfolgungsjagden, Dinosaurier, Drama und eine gute Portion Humor. Wir sind uns darüber bewusst, dass dies ein Low Budget Film ist und er sich daher auch nicht komplett ernst nehmen sollte. Dinosaurier sind ein wichtiger Teil von Space 1889 – zumindest auf der Venus. Wir haben lange überlegt, wie wir die Viecher darstellen, damit es passt und haben uns für einen animatronischen Anzug entschieden. Dieser verschlingt durchaus einen Happen des Budgets. Er erlaubt uns aber auch einen weiteren Stunt: Wir können dieses Anzug mit etwas Glück im Werk in China abholen. Über diese Tour wird wiederum eine Doku entstehen und auf der Fahrt werden in atemberaubender Landschaft weitere Szenen für Space 1889 gedreht. Diese Anzüge sehen übrigens wirklich lebensecht aus, wie ihr zum Beispiel hier sehen könnt. Hinter dem Projekt stehen die beiden Autoren und Video-Journalisten Mháire Stritter und Nico Mendrek, auch bekannt als Orkenspalter TV. Sie sind Rollenspielexperten und haben jahrelange Erfahrung mit No oder Low Budget Filmproduktionen sowie durch Werbespots, Musikvideos, TV-Berichte und Reportagen mit Film- und Videoproduktion. Generell Sie sind extrem gut in der Rollenspiel- und Fantasy-Szene vernetzt und können daher auf viele Ressourcen und „Szene-Promis“ zurückgreifen, die diesen Film trotz des geringen Budgets erst möglich machen. Sie betreiben seit 6 Jahren einen erfolgreichen deutschen Kanal, in dem es um Rollenspiel, Crowdfunding und schräge eigene Filmprojekte geht. Zuletzt haben sie über die Plattform Startnext, die deutsche Version des Rollenspiels Numenera finanziert. Sie haben beim Kickstarter zum Space 1889-Rollenspiel die Videos beigesteuert, schreiben für Deutschlands erfolgreichstes Rollenspiel Das Schwarze Auge und haben das RPG zum Kult-Adventure Deponia entwickelt. Sie arbeiten momentan als freie Video-Journalisten, unter anderem für das deutsche öffentlich rechtliche Fernsehen, haben aber auch schon im Auftrag von Special Interest-Seiten wie PC Games Webserien entwickelt und als Autoren und Regisseure umgesetzt. Vor einigen Jahren haben sie dem RPG Das Schwarze Auge einen fast dreistündigen Fanfilm gewidmet, eine Arbeit, die Jahre in Anspruch nahm. Ein Showreel für unseren Produktionen gibt es hier (oder weiter oben im Text). Kann ich die DVD auch mit Poster bekommen? - Klar! Packt einfach noch 5 Euro auf den Pledge drauf und schreibt uns, dann schicken wir das Poster mit! Ich habe keinen BluRay-Player, hätte aber gern das ganze Zusatzzeug! Was soll ich machen? - Wir haben einen 2. 30-Euro-Pledge-Reward eingebaut, in dem die BluRay durch 2 DVDs ersetzt ist und bei dem ihr auch Poster und Bonusmaterial bekommt. Billiger lässt sich das leider nicht machen. Wenn ihr "größere" Pakete mit DVDs statt BluRay haben wollt, pledged einfach die Blu-Ray-Version und schreibt uns eine PM, wir notieren das dann und ihr bekommt das ganze Paket in einer DVD-Version. Dürfen auch Kinder in diesem Film mitspielen und kann ich für sie die Statistenrolle pledgen? - Ja, solange die Erziehungsberechtigen damit einverstanden sind, dürfen auch Kinder Rollen in diesem Film übernehmen. Gibt es das Abenteur auch als gedrucktes Heft und losgelöst vom 60er-Pledge - Nein, das Abenteuer gibt es nur als PDF, aber inzwischen auch gemeinsam mit dem digitalen Film für 25 Euro. Is there a DVD + poster option? - Sure! Just add 5 Euros to your pledge and send us a message and we will send you the DVD + poster. I don't own a bluray player but I'd like to get all the special stuff like deleted scenes. What should I do? - We added a second pledge reward at 30 Euros. You can get 2 DVDs instead of one bluray now. The deal includes the poster and bonus footage of course. Sorry we can't offer this one cheaper. If you'd like to get "bigger" deals with DVDs instead of the bluray just pledge for the regular version and send us a message. Are children allowed to play a role in the movie (200/600 Euros pledge) - Yes, they are. As long as their parents allow it of course. Is the 10 Euros pledge the only one that earns me a place in the credits? - No, everyone who pledged 10 Euros or more will be mentioned in the credits. Will the adventure module be available as a printed version and without pledging the adventure deal? - No, the adventure module is only available as a PDF but we created a new pledge reward at 25 Euros for digital download of the film and the pdf. We are a team of professional video journalists with our own filming equipment. During the last 15 years we produced lots of low budget film projects and even completely without money we were able to realize mammoth productions like a three hour The Dark Eye film. We have a lot of experience as authors and producers, we know how to tell stories and we are freelancers – which means we are not bound to „normal“ working hours. We are extremely well connected within the roleplaying scene which gives us access to a lot of resources. There is no doubt we WILL finish this film. The only question is how polished it will look and how long it's going to take. If this projects succeeds it should be possible to make this film in little more than a year. Or a year and a half, if we’re just barely making it. Wir haben in den letzten 15 Jahren schon viele Low Budget-Filmprojekte realisiert und auch völlig ohne Budget haben wir Mammutprojekte wie Leuenklinge abgeschlossen. Wir verfügen über langjährige Erfahrungen als Autoren und Filmproduzenten und sind als Freelancer nicht an feste Arbeitszeiten gebunden. Außerdem sind wir gut in der Szene vernetzt und können auf die Ressourcen vieler Fans zurückgreifen. Es gibt also keinen Zweifel daran, dass dieses Film fertiggestellt wird. Die Frage ist nur, wie hochwertig wird er und wie lange wird das dauern. Mit diesem Funding sollten wir es schaffen, das Projekt in etwas mehr als einem Jahr umzusetzen, etwas mehr, falls es knapp werden sollte. We will keep you up to date and we will be very thankful. Für einen Euro halten wir Euch auf dem Laufenden und ihr bekommt eine liebevoll formulierte Dankesmail samt schickem Wallpaper. We will send you a folded version of the movie poster and regular updates. Ihr erhaltet das Filmplakat in gefalteter Form und bekommt Updates und die Dankesmail. You'll get download links and we will put your name in the credits. Of course we will keep you up to date as well. Ihr erhaltet den Film als digitale Kopie, indem wir euch einen einmal gültigen Download-Link schicken. Außerdem werdet ihr im Abspann verewigt und bekommt Updates und die Dankesmail. You'll get the standard version of the movie on DVD. Ihr bekommt den Film auf DVD zugeschickt und könnt ihn euch ins Regal stellen (oder ansehen, je nach Stimmung). You'll get download links for these 2 products. (see 60 Euros deal for adventure details) Of course we will keep you up to date as well. As every deal from 10 Euros on this contains your name in the credits and updates. Ihr erhaltet den Film und das Abenteuer als digitale Kopie (siehe 60-Euro-Paket) indem wir euch einen einmal gültigen Download-Link schicken. Wie jedes Paket ab 10 Euro enthält auch dieses eine Namensnennung im Abspann und Updates. You'll get the film in HD on Blu Ray - and lots and lots of bonus content and the movie poster. Ihr bekommt die erweiterte Special Edition des Films in HD auf BluRay mit jeder Menge Bonusmaterial, Making Ofs und gelöschten Szenen. Dazu gibts ein Poster. You'll get the film on 2 DVDs - and lots and lots of bonus content and the movie poster. Ihr bekommt die erweiterte Special Edition des Films auf 2 DVDs mit jeder Menge Bonusmaterial, Making Ofs und gelöschten Szenen. Dazu gibts ein Poster. Diese Option haben wir jetzt nachträglich für alle eingebaut,die keinen BluRay-Player besitzen. Sorry, dass wir das nicht billiger anbieten können. You'll get all of the above plus the Soundtrack on CD. Für 45 Euro bekommt ihr das Special-Edition-Paket und ein CD mit dem Soundtrack des Films oben drauf. SE Blu Ray + Poster + OST + exclusive Adventure Module. You'll get all of the above plus an exclusive adventure module by Mháire Stritter. Das Special Edition Paket plus Soundtrack plus ein sehr exklusives Space 1889-Abenteuer von Mháire Stritter in PDF-Form. Das gibt es nur über die Kampagne zu bekommen. SE Blu Ray + Poster + OST + exclusive Adventure Module + Invitation to Premiere Party and Access to Forum. You will get all of the above and will be invited to a special forum where we show preview footage of the film and to the Premiere Party in the Southwest of Germany (we can't pay for your travel expenses, sorry). Entspricht dem Special Edition-Paket (also BluRay, OST, Poster, Abenteuer), aber ihr werdet außerdem zur Premierenparty eingeladen und erhaltet Zugang zu einem exklusiven Forum und Making Of-Videos. Wir können leider nicht für Reisekosten aufkommen. SE Blu Ray + Poster + OST + Adventure Module + PDF + Premiere Party/Forum +You will appear as an Extra in the Movie. Same as Premiere Party but with a small role for you in the movie (We can equip you with some costumes but not pay for your travel expenses of course). Entspricht dem Premieren-Paket, aber ihr erhaltet auch eine Komparsenrolle im Film. Wir können euch mit einem Kostüm ausstatten. Für die Anfahrt müsstet ihr allerdings selbst aufkommen. You will get the Premiere Party stuff and Mháire Stritter and the Clockwork Team will visit you at home (in Germany) or play via video conference (rest of the world) for an evening of Space 1899 roleplaying. You will get one of 8 highly limited autograph cards of Mháire in her role. Das Premieren-Paket, aber ihr bekommt außerdem Besuch von Mháire und dem Team (falls in Deutschland) und sie wird euch einen Abend lang Space 1889 leiten und eine auf 8 Stück limitierte, besondere Autogrammkarte da lassen. You will get all of the Premiere Party stuff and a small speaking part in Space 1889 The Movie. Alles, was ihr bei Premierenparty bekommt sowie eine kleine Sprechrolle im Film. You will get all the stuff from "Premiere Party" and we will send you one of the props especially crafted for the movie. Ihr bekommt das Premieren-Party-Paket und erhaltet eine der Requisiten aus dem Film. Ihr bekommt alles, was ihr von den obigen Leistungen haben wollt und das einzigartige Original-Skript, signiert vom Team. You get anything you want of the above - apart from the script - plus you get to name the ship of our heroes (as long as it is fitting). Ihr bekommt alles, was ihr von den obigen Leistungen haben wollt (ausser dem Script)und dürft entscheiden, wie das Schiff unserer Helden heißen soll (solange es Sinn ergibt und passt). You get anything you want of the above (apart from Edison or Armstrong) plus we will visit you (within the EU) and our Dinosaur will be your slave for a whole day! Ihr bekommt alles, was ihr von den obigen Leistungen haben wollt (ausser den Armstrong- und Edison-Paketen) und unser Dinosaurier steht euch für einen kompletten Tag zur Verfügung!
2019-04-26T00:18:48Z
https://www.kickstarter.com/projects/288270129/space-1889-the-secret-of-phobos-a-victorian-sci-fi?ref=category_location
TOM CREAN: A couple updates: Just where we're at, and then I'll get into the teams. Our big focus right now is we've got to continue not only to improve in everything but to really understand the urgency that we have to have defensively, and then culminating with defensive rebounding. One of the main reasons we've won 73 games over the last three years is because our rebound margin has been so good. Last year I think it was sixth in the nation, right. And we've lost some really good rebounders over time, but that doesn't mean that we can't become a really good team, and I thought we made‑‑ rebound the ball. We made some improvements the other guide inside of the game when we got physical and when we got aggressive and when we made contact first, and I think that's really, really important for this team that everybody has to do everything when it comes to the defensive end. We've always been a switching team. We've been a high deflection team, and I think the better job we do right now with being aggressive on the glass, the more aggressive we're going to be in half court defense, which is going to turn into more created turnovers and things like that that we need to get our running game going. It starts with defensive transition. There's no question about that. We've got to continue to understand the urgency of that. A guy like Yogi understands that. Nick understands that. The young guys, that takes time, and we don't want to wait until we've played this lightning speed team because we've played a couple of really fast guards and some high major guards with Parker and with Jones in the first game, and as we said to our team, Jones will be maybe one of the three fastest guys that come in here the entire year. Well, there's going to be some very fast teams that come in, and we've got to make sure we do a really good job of understanding that. We've got to get our close‑outs better, and our footwork is improving, and we've seen a lot of improvement since the summer, but it's got to improve at an even higher level, and then it's got to culminate with a defensive board. The things that you do the most, you have to be the best at. Running the court in transition both ways, and rebounding the ball on both ends of the court. It's got to come from guards. Our guard rebounds have really got to go up. The challenge is out to Yogi that he's got to improve not only his rebound numbers, which I'm not as concerned about rebound numbers as I am about rebound percentage and the defensive objecting and offensive rebounding percentages. Now, the guards, Yogi is never really going to be measured in the offensive rebound percentage, but the defensive rebounding percentage and where he wants to go as a player, nationally, and where we need this team to go, he's got to get his defensive rebounding percentage numbers up in that‑‑ we have start in the 10 to 12 percent range and then go up into the 13 to 15 percent range as the year goes on, and there's no better time than to get started with that right now, because when you get active and when you get five guys inside under the foul line and they're flying in and they're creating contact, there's going to be a lot of rebounds and there's going to be a ton of long rebounds. We're going to shoot threes. We've faced a lot of three‑point shooting, and we're not going to win all the 50/50 contests just by out‑jumping people. We're not big enough. But we have to win some of those by doing our work early, and I think you saw some improvements even in Yogi going from side to side on the court the other night. When he makes his mind up that he can be good at it, he's usually pretty good at it. So defensively we've got to continue to get better. Offensively we've just really got to understand spacing, and we're spending a lot of time on spacing and where we want to attack from. Don't leave until the ball hits here. Don't leave the corner early because we haven't hit the screen yet. Young guys always get in a rush, and the floor has a tendency to shrink rather than to enlarge, and for us to be at our best very, we've got to enlarge it. We've got to use the entire part of the half court. We can't shrink in, and we can't bring our steps in. We've got to stay truly committed to the spacing. There's two phrases we use a lot: Be committed to the spacing and finish your cut. In none of those areas does it mean jog or creep up, and the other thing we've got to really get better at is our Sprinting into screens. Our screening is improving, but our quickness into the screens has got to get better because I think that will increase our ability to get the ball into the paint, which will give us more open shots, and I think the ball movement has been pretty good. As we get better at making decisions and getting used to playing with one another, the turnovers are going to need to come down, but at the same time, our turnovers created have got to go up. We've got to create more turnovers. We're not necessarily a full‑pressure team yet. At some points in the season we'll have the ability to pressure the game more full or three‑quarter court is the plan, but right now we've got‑‑ because we have a shorter bench, we've got to make sure that we're committing to doing what it takes to win the game. That's where we're at right now. Jeremiah has been back in limited parts of practice with contact, which is good. Max, not sure yet if he'll still be on a minute limit, but we didn't practice Tuesday, but he practiced well yesterday. You're seeing the effects of really a strong rehabilitation program, great medical staff, and a committed young man in the way that Collin Hartman is back out there, and he deserves the credit because he's worked so hard to put himself back in that position. We'll just continue to improve. I'll open it up to questions about the two games, but as far as Devin, I was with Devin on Sunday, and a lot of the afternoon on Tuesday, Je'Ney Jackson was up there most of the day. We had a chance to go through his rehabilitation and go through his therapies and get a chance to see that. He's working extremely hard. He's in a great place as far as his medical care, just a tremendous place. He really couldn't have been in a better place when it initially happened with being here in Bloomington and with the doctors and nurses and care that he had, and it's certainly the same way right now up at the rehab hospital. They're outstanding. I don't have any other update on him other than that he's making progress and working very hard and doing everything that's asked of him, and he's having a lot be asked of him because he's been through a lot. His spirits are good. He's anxious to be back with this team as this team is anxious to have him back, but the most important thing that I keep telling him that he can do is be his very best there every day with what they're asking him to do and keep making progress, just like our team is making progress on the court, just like he was making progress on the court when he was here. He's got to make progress there in a whole other way. That's where we're at. Q. Expanding a little bit on the defensive rebounding you talked about, if the guards are going to have to rebound more, how does that change being able to go the other way, getting out in transition, which is a thing you've really liked to do the past couple years when you've had a really defensive rebounder like Noah? TOM CREAN: Well, I think if you look back at this team, Victor was a guard, very good rebounding guard, and our belief is that when you get a defensive board‑‑ there's some limitations to some. Everybody should know the bust‑out dribble, okay, but we're not real rule‑oriented on who gets the board, who they have to find. Just be gone. Now, a made basket we are, but on the missed basket, go, all right, take off and go. Now, if you're tentative, you don't put the ball out in front of you, those become issues. Those become back tips. Those become turnovers. That happened to us some last year. But when we get a defensive board, we're gone, and then our job is we have one man to beat, beat him, and if there's somebody ahead, throw it to him. We need to continue to understand, again, even on the break, we're in our break too tight. Everything is too tight right now, and whether it's our transition offense, whether it's our half court offense. We've got to understand all this space that's out there, and that's easier said than done. You think, well, that's pretty easy they've got all this court, but they're not used to it. They're not used to the spacing, the rules that go inside of that, and especially when you've got to create penetration because it's all about creating all these different help situations, creating all the two‑on‑one situations. Well, a defensive board for a guard, you just pretty much skipped a step on the outlet. He's gone. So there's a lot of value to that. There's a lot of value to defensive rebounding guard‑wise, and then it's up to me or up to them to show me that they can handle it, make the right decisions, all right, on that break with the ball, rather than trying to hit a home run or not being able to handle it the right way, and then we kind of go from there. But that's one of the reasons that our scoring has been so good and that we've led the Big Ten in scoring. If you look at a three‑year period of time we've led the Big Ten in scoring because we had numerous ways to get into transition to different guys being able to rebound the ball and push it out. Q. Is your approach for these two games coming up any different because you're not going to be at full strength until after that? TOM CREAN: No, no, not really. Not preparation‑wise. But we've got a lot of games in a short period of time, so you have to start factoring that. We would have already factored that in to our practices before now, and then certainly when you're going to be short‑handed in those games, you've got to factor it in that much more. To me, knowing that we're playing Friday, playing Monday, playing Thursday, playing Saturday, correct? You have to factor that part of it in. Maybe a little bit with pressure, but not much. You know, I've tried to get that across to them. It doesn't matter if we're playing six or if we're playing 10. It really doesn't matter right now. We're going to play the win the game, whatever it takes, and we've made a lot more‑‑ we'll switch to this defense, we're not going to think about it, we're not going to wait until we're three possessions, we're not going to talk about it at a halftime. We're certainly not going to wait until halftime, even when we're putting things on the fly. We're not anywhere near refined enough at having a lot of different things where we'll be extremely effective defensively, but we've got guys that are out there trying to‑‑ they're playing very hard, and they're getting better inside of the game. I think there is no question about that the other night with the way that we‑‑ we went on the run because our defense was good, and we got good shots, but we went on the run because our defense and our aggressiveness picked up in the first half, and so they got hit‑‑ Indianapolis is extremely well‑coached. We said it to them, but until they know that that team was coming out like they were shot out of a cannon, it takes a bit for them to realize that, that everybody is for real, and you've got to play with force because the other team is going to play with force. It doesn't change a lot. Every game is different, but there's certain things we're going to go to every game, and then we just make our revisions based on what we see from the other team offensively and defensively. TOM CREAN: Where you cut them from, where you have them cut from, doing a better job out of the corners, and making sure that‑‑ still, the biggest thing, it's not the offensive rebounding, it's the defensive transition. It's making sure‑‑ and we have some young guys that are not used to what the speed of our non‑conference opponents and the speed of the Big Ten with guys, and not just the speed but the force of that speed, the strength of those guys and what it takes because you want to get back and hold your ground and get everybody back. You don't want to be back and let people just drive through you, and until they've been through it a little bit, so it's not as much about the offensive boards as it is the defensive transition. Defensively, as long as we're getting a body on people, we're not letting people‑‑ we need better awareness. We need better weak‑side awareness, those type of things. It's just that awareness of day after day, getting your man, pivoting into him, and making contact and then releasing. But making contact, and not letting the contact be made with you but you making the contact. No matter where it is, if we're in the corners, we still have responsibilities, whether we're coming through the middle and getting back, whether we're rotating back, whether we're wedging on the inside, so we spend a lot of time drilling those things, and what we've got to do now is get even better at being more technique‑oriented with our aggressiveness on the defensive board. Q. We've seen both sides in particular picking up on your defensive concepts. How much did the exhibition games help them along that path? TOM CREAN: Well, we need better screen awareness defensively. We need better‑‑ we spend a lot of time on how we get over screens, especially ball screens, or how we play wide pin‑downs or pin‑downs or things of that nature. We're not a big let's let the team curl and over‑help team. We're not‑‑ everything we do, we're trying to decrease help, not increase help, because increasing help against really good teams that are smart, know how to pass, know how to shoot, which is what you're full of in this league, you're going to give them open looks, so you can't do that. But we need better screen awareness, better weak‑side awareness, better screen awareness. And not just knowing that the screen is coming, but really following the rules on how we play those screens. So that's an area that we need to get better at. We don't want to be a team that switches out of convenience. We want a switch to take something away. We don't want to be a team that rests and catches our breath on the weak side. That's different for young guys. They have to understand that the weak side is as valuable as the ball side. So it's reps, it's live situations, and then there's no substitute for what they get with game experience. TOM CREAN: Well, the key for us is versatility on both ends of the floor, and when you have a dynamic player like Yogi that can do so many different things, it's important to put him in those situations. Extremely, extremely smart player. He can adjust to so many different things, and there's no question about it, right now game plans are built‑‑ they can't be only built on him, but they are, I would imagine, not in the other scouting rooms, but I can see how they try to take him away. They're built to make it harder for him. The bigger key for him constantly is not to not have the ball in his hands, it's to get the ball back in his hands when the game is in movement. We always use the phrase, get lost in the game. And the bottom line is with Yogi being able to do so many different things with and without the ball, to have him in movement and have him to be that much harder to scout, it's better for us, and I think our players are going to see that, and I think Yogi is starting to see that, and he's a basketball player. He's a tremendous point guard by trade, but he's not just a point guard. He's not just‑‑ he's a two‑way player. He can do a lot of different things, and he's constantly evolving and improving. Q. You talked about the defensive rebounding. A guy like Rob Johnson had nine. What does he do right now a little bit better than some of the other younger guards? TOM CREAN: He was in the right place at the right time. We got better as the game went on. He's aggressive. He's got a low center of gravity. I think you saw it with his offense. He's lower, he's got his head up. He's got a lot of tenacity. Maybe it's the fact that he trains with Ben Wallace. I'm not kidding. Ben Wallace and his father are best of friends. He trains in Ben Wallace's gym. There's a story line for you. In fact, I think it's one of the reasons he's so strong is because we went in there this spring to see him, and I don't know how much you remember about Ben Wallace, but he's no smaller, all right. He's a first‑ballot ball of famer when it's time for him and still keeps himself in incredible shape. Rob Johnson doesn't want to go in the weight room and not be impressive; you know what I mean? I'm half facetious on the rebounding, but Rob Johnson is a basketball player. He can do numerous things. He can play off the ball, with the ball, he's getting better in a lot of areas, and he wants to be on the court. So right now if you want to be on the court and you know that defensive rebounding is going to be a key to our team and a key to you being on the court, he's pretty good at figuring that out. He's one of those guys, he's been well‑coached, he's been well‑trained, and his father is a tremendous basketball mind and has really pushed him in areas to keep getting better. It's one of the reasons we recruited him or wanted him so much after we got to know him. He's just‑‑ when you're going to play small and you're going to play numerous guards, it's not about this guy is this position, this guy is that position. If they're going to win, they've got to be able to do a lot of different things, and that's where our hope is to get this. Q. Talking about one of the keys is reducing the turnovers, I think you had 18 the last game which I know is not what you want, but what's a realistic goal when you get everybody back? TOM CREAN: I don't know yet. I've been looking at that because we've had very few games when we've had 10 or under, even when we were No.1 in the country we had very few games. If you're going to play fast, you're going to have some turnovers. You don't want them to be risk adverse. You don't want them to be‑‑ you just don't want them to make decisions that they thought were there but that were never there, and you don't want players to make plays that look like highlight plays, okay. You want them to make basketball plays. And sometimes it's just a matter of creating a better angle. Sometimes it's a matter of putting more velocity on the ball. Those are things that you can continue to teach. So I'm not sure yet what that number would be, what that optimal number would be. We want to be one of the faster‑paced teams, all right, and I think we have guards that understand the value of basketball. We've had some guys, even last year, didn't totally understand the value of the basketball. I think that will become an issue as we get down the line and we get deeper into the season. If you've got some volume turnovers it's going to be very hard to play you because that's not how you win. But at the same time, we want players that can create more turnovers so we can get more possessions. But our players are going to understand the value of‑‑ we want to steal possessions, not give them back, because we've hit them hard on, this is what would have happened if we'd have made two more threes a game last year. This is what would have happened if we'd have had two less, three less turnovers a game last year. Staggering numbers. Two more threes a game, we win six more games. Two more threes. If we just hit the number of threes we made the year before, it's six more games, just like that. So it's not about showing them, well, these 15 things have to change because 15 things don't have to change. What has to change is we have to continue to improve, and every team is different, but you have to continue to improve at your weak points, and you have to be committed to that improvement. All the meanwhile, you're getting better at your strengths. Eventually creating more turnovers will be a strength of this team, it's just not necessarily there yet against the best teams. But our guys understand, and it's a fun team to pass to. Something good can happen when you pass it. We just want to make simple basketball plays the best we can, and like I always say to them, the better you are, the simpler the game should look, and when you've got to try to make hard plays, what you're telling everybody else is you're not very good. When you make simple plays, what you're telling basketball experts is you're pretty good because you understand how to win, and that's what we want to keep getting across to them. TOM CREAN: I said that in the case of Yogi, for guards. Q. I guess kind of big picture in game preparation, do you use Ken Pom to kind of advance stats? TOM CREAN: Sure, absolutely. I think Ken Pom is really good. I think the new person that they're using that‑‑ is it Dave Haner, I've read some of his stuff. I think I'm saying that right? TOM CREAN: Dan Haner. I haven't met him, but I respect his work. We have our own in‑house system that we utilize, but absolutely we took at our things, and we measure‑‑ there's tools with a little T and there's tools with a capital T, and some of those tools with capital T tools. They can help you base things. But when you're sitting there making real‑time decisions in a game, nobody is pulling out the analytics numbers much, but you do have people that you've made yourself aware that, you know what your lineups are in this situation, and you have people‑‑ we're tracking that stuff constantly on the bench. But there's no question we look at all of that. TOM CREAN: I'll go over both those teams. Mississippi Valley, they're a new team right now with coach‑‑ hey, what we've done is we've gone back to Wiley College where he was at before and studied. Chuck has been doing a great job at this, and in this day and age you can track down film if you want to, so we have. He mixes up his defenses, a lot of full‑court pressure, some three‑quarter court, loves to trap at the top of the key, loves to trap in the corners, plays a 2‑3 zone with a trap on it, and mixes up his coverages on the ball screens, and they're coming up one game against Stillman College, so we studied the personnel from a year ago and we've studied that exhibition game. We're fully aware of Tyler Corley, who led them in points in the first game with 21 points. Had a chance to see him a lot playing at Lawrence Central. Extremely well coached by J.R. Shelt, and obviously when recruiting Jeremy we got to see him play a ton. They're going to be fast, they're going to be quick. They're not overly‑‑ they're not an overly big team, but they're very fast and aggressive. They caused, I believe, 23 turnovers, or 27 turnovers the other day. So we know we're going to see a lot of pressure from them, and then how they decide to play offensively, we'll have to wait and see. I would imagine they'll come in and play fast, but they may not. They may try to shrink the game. As far as Texas Southern coming in, obviously Mike Davis is an absolute proven winner, and I've known Mike‑‑ I don't know him great by any stretch, but I've known him since he was even in the CBA before he ever came to Indiana. I met him when I was actually at Pittsburgh, and we had a great defensive conversation one night when I was an assistant coach at Pittsburgh, and I've followed him, and he obviously came to Indiana, competed against him the year that they went to the national championship game when we were at Marquette, played him in Alaska, had a great game, beat them at the very end, and he's a proven winner. He's a proven winner at Indiana, he's a proven winner at UAB. He's an excellent coach, and he's got tremendous principles defensively. He keeps the game‑‑ he's always playing to the strengths of his teams offensively. He's got a very good player right now among others in Chris Thomas, who has been a national name on the circuit for years, back even going to his freshman, sophomore year in high school, moved around to a couple places, but he's with him. And I look at that championship team, and I think some of those guys will be in attendance that night. We're going to have a reunion at some point for that team, honoring that team down the road, an anniversary‑type deal like we've done with other teams there. This is probably just one where there's some guys coming to see their old coach and coming to see Indiana, which I think is cool. But that team that he had, the best comparison that I would give it to in another time period right now would be UConn last year, because Shabazz Napier put that team on his back but he had a bunch of other really good players that knew what they were doing, that knew how to play, that knew what their strengths were, and stayed away from their weaknesses. And that's exactly what Mike did with that team. Jarrad was probably in the role of Shabazz Napier even though he was 6'11", but he's the guy that you play through. I remember when we played that team, our whole key was how many times Jarrad would touch the ball because Jarrad's skill level and skill set was such that everything ran through him. So the more limitations we could put on him catching the ball, the more that we could affect the rest of the game. That was our whole number one premise walking into that game. That's pretty rare when you've got a sophomore. It's not just that he could score but that he could play through, and that tape, when we were recruiting Cody and we showed‑‑ we made a video, a really good highlight video of championship teams, right, at Indiana, and we showed that one in the sense of this is what can happen when you have somebody you can go to and you can play through and when everybody understands their role, and that's exactly what that team had, whether it was Tom Coverdale, whether it was Jarrad Odle. I remember another part of our game plan, if Jarrad Odle comes in and gets 10 points and seven rebounds, we're not winning the game, and our players look at Jarrad Odle, but that's the impact that he had on that team. Obviously everybody knew about Newton and Leach and Dane Fife and Coverdale, but it was all of that team that was so good. It was A.J. Moye, it was all of that group that made things happen. It was Kyle Hornsby. I mean, they were such an outstanding shooting team, what they did in Lexington that year was unbelievable, when they went in there and won, and the next year we went to the Final Four. So we learned so much from watching them play. Mike is an outstanding coach, and I hope he gets a tremendous reception when he comes in here, because obviously the way he got his job was different, obviously, but that man took that team to a Final Four and to a championship. I hope that he gets a great reception. He deserves it. He deserves it. And that's whether I have ever met him or not, he deserves it, because he took Indiana to a really strong place, and to me that's important. I hope when people see those players that night that they're really great with them because they made everybody stand up and take notice that you don't have to be on everybody's all‑American list, you don't have to be in everybody's top ranking. It's not about what star you are. You get a bunch of guys harnessed around a plan and you've got a player you can play through like Jarrad, amazing things can happen. Q. How did that come about, did you reach out to them? TOM CREAN: This is all part of the thing we're doing with SMU, so three games at home, and then we play SMU at home, so it's all part of that classic. But I had no opposition to that when it came up, none whatsoever. It'll be good. They're going to be really good. They've got older players, and Chris Thomas can really, really play. I think there's a reason that there's so many NBA teams that are looking to be at that game. He's a prospect, real prospect. We've got to‑‑ every game is tough. It just is what it is.
2019-04-24T08:12:40Z
http://www.asapsports.com/show_conference.php?id=104641
Revelation ends with a vision of the New Jerusalem, the bride of Christ. Before that in Revelation chapters 17 and 18 we are told of the fate of her opposite number Babylon the Great, the Harlot bride of Satan. The New Jerusalem is made up of all those who have trusted Christ as their redeemer. Babylon the Great comprises all that hate God and reject His ways. The New Jerusalem is the kingdom of God. Those who faithfully represented the kingdom of God in this present age belong to her. Babylon the Great is the kingdom of this world. She stands in opposition to the truth. The Babylon story covers the period of world history, from the flood to the return of Christ. For the whole of that period there has been constant warfare between the kingdom of God and the kingdom of this world. What we call civilisation came out of Cain’s rebellion. No longer under the protection of God, Cain seeks security in the founding of a city [Gen 4: 16 – 24]. Lamech five generations on from Cain adds to the rebellion against God’s created order by taking two wives. His offspring, living in the city, develop the arts, technology and agriculture. Technology leads to weapons which allow Lamech to overpower a younger stronger man. He boasts that he no longer needs to rely on God’s retribution. ‘Civilisation’ was born. The rebellion was repeated after the flood by Nimrod who founded cities and gave protection to people from the animal kingdom which was going wild [Gen 10: 8 – 12]. Soon Babel which was founded by Nimrod was in rebellion. With history about to repeat itself the Lord intervenes [Gen 11: 1 – 9]. In scripture Babylon represents the kingdom of this world which is opposed to the people of God and at times triumphs over them. Rooted in an historical rebellion it becomes a symbol for any organised structure that attempts to replace God’s kingdom with a human or demonic substitute. Whatever else Babylon the Great may have been, at the end of her days she has become preoccupied with money. She has enticed the leaders and the peoples of the world to follow after her in the pursuit of luxury. Babylon is a trading power filled with pride. All the merchants and those who have grown rich through trade with her will mourn when she falls. In these closing years of the present age it is the western world which fits the description of Babylon the Great. The leaders of the world and the nations aspire to share in her wealth. For man she is the pinnacle of civilisation but in the sight of God she is evil, corrupt and soon to fall. In the last Trumpet Sounds we commented on the parlous state of the world economy due to ever increasing national debt. There are many who believe that a crisis is inevitable. If the global financial system collapsed, what would be the consequences? Gordon Brown’s spin Doctor, Damien McBride, claimed in his autobiography ‘Power Trip’, that during the 2008 financial crisis the deployment of troops on Britain’s streets was discussed. According to McBride, Brown was gripped by the seriousness of the crisis. He saw it as having the potential to lead to a breakdown of law and order. His fears were born out in the riots of the summer 2011. With negligible provocation, city centre’s were torn apart by lawlessness. How much worse it will be if people are truly desperate due to the inability to access their money and buy the goods they need. Civil unrest is a possible short term outcome following a crash. In the longer term crippling inflation, high interest rates and a very deep depression are the probable result. Faced with the prospect of chaos, lawlessness and inflation how should the Christian respond? Rejoice!!!!!! We will rejoice because the kingdom of the world has been judged for all her sins. We will rejoice because our Saviour is about to come to begin His reign on earth. We will rejoice because we know that the marriage of the Lamb is at hand. We are to believe that it is the intention of God, that in this time of chaos, His church will shine. We will be strong because of our trust in Him. Therefore we need to examine our hearts. Do we really trust Him or do we trust in salaries, pensions and savings. The very things the world trusts in but which may soon be taken away? Do we walk in faith that the God of the Bible is still able to provide? To some God will give the faith that the bin of flour will not be used up and the jar of oil will not run dry [1 Kings 17: 14]. Others will understand that through offering to share meagre resources God is able to miraculously provide for all [Matthew 15: 36]. Some may be led to lay up stores in readiness [Genesis 41: 35, 36] but only as the Lord clearly leads. If not done in response to His leading, we will place our trust in our own efforts and not faith in Him. When the world seizes what we have laid up our faith will fail. How should we respond to the destruction of our Christian heritage and the growing hostility toward the Christian faith? between 10.30am and 4.30 pm. Booking fee £10.00 to include a buffet lunch. John has been pastor of the South of Reading Christian Fellowship for 36 years. His ministry is teaching on the whole counsel of the Word of God, including Israel and End Times from a prophetic point of view. He has ministered widely in this country as well as abroad and has served on several boards of Christian ministries. Chris trained for the Anglican Ministry at Tyndale Hall, Bristol. After a Curacy in Poole, he became Director of Pilgrims Hall, a Christian Renewal Centre near Brentwood in Essex. This was followed by a time as Principal of the Christian Life Bible College, based at the City Temple in London and resident Bible teacher at Mulberry House. Chris has an established Bible teaching ministry both in this country and abroad. He has also led more than 80 tours of the Holy Land. Can the return of the Lord happen at any time or are there events which must precede it? It appears that this question troubled the church in Thessalonica. Some among them were teaching that the day of the Lord was a past event. Perhaps like many in today’s church these teachers believed that Christ’s kingdom was spiritual, therefore there was no need to teach about His return. “Let no one deceive you by any means; for that day will not come unless the falling away comes first, and the man of sin is revealed, the son of perdition, who opposes and exalts himself above all that is called God or that is worshiped, so that he sits as God in the Temple of God, showing himself that he is God” 2 Thessalonians 2: 3-4. Before Jesus returns for His bride, there will be a falling away and the ‘man of sin’ will be revealed. This ‘man of sin’ is central to our understanding of the time of great anguish which will close this age. From 2 Thessalonians 2: 1-12, we learn that his appearing is entirely according to the will of God. He is revealed when God decides that he is to no longer to be restrained. He is permitted to appear so that the perishing are divided from those who love the truth. The delusion surrounding him is sent by God to ensure that all who love unrighteousness are condemned. He will be destroyed when Jesus intervenes. Satan will be permitted to use all his power to create signs and lying wonders in order to deceive mankind. By these deceptions he will bring about the falling away warned of in scripture. Jesus also warned that there will be a falling away prior to the end. “And because lawlessness will abound, the love of many will grow cold”. Matthew 24: 12. There are three defining characteristics set out in 2 Thessalonians 2: 1 – 12 which link the Man of Sin to other scriptures where the same person is described using other names. The first is his pride and blasphemy. He will exalt himself above all that is called God or that is worshiped. He will even go as far as usurping the place of God showing himself to be God. The second is the time of his appearing. He will be revealed just before the coming of the Lord. We are not to confuse this man with any of the other evil men who have come and gone in the past. The third is his destruction by Jesus Christ. In Daniel 7 four beasts are seen rising from the great sea. From the fourth beast comes a little horn described as possessing eyes like a man and uttering great boasts. In verse 25 we are given more detail of this little horn’s blasphemy. “He will speak out against the Most High and wear down the saints of the Highest One, and he will intend to make alterations in times and in law; they will be given into his hand for time, times and half a time.” The passage goes on to relate that the court will sit and this vile little horn will be annihilated and destroyed forever. Therefore the little horn of this passage shares the three defining characteristic of the Man of Sin. His outspoken blasphemy, his existence at the end of time and his destruction by the personal intervention of God, confirm that the little horn and the Man of Sin is the same person. His empire is described as; “dreadful and terrifying and extremely strong, and with large iron teeth”. He will crush the three preceding empires. His persecution of the saints will last three and a half years before Jesus intervenes to bring it to an end. After reading Daniel 7 we may want to know more about what this little horn will be like. Chapter 8 gives us an insight. It opens with imagery of a ram and a goat which direct out attention to the Persian and Greek empires. Verse 8 foretells how the Greek empire will be split into four separate parts. Between verses 8 and 9 we jump 150 years. We are told that out of one of these four empires a rather small horn will arise. The setting enables us to identify the small horn as Antiochos Epiphanes. He is the subject of the prophecy not because he is distinguished or a great leader, but because of what he does to the Jews. He brings about one of the most terrible times in their sorrowful history. The second half of the chapter provides Daniel with an explanation on the vision. In the explanation we are told, “that the vision pertains to the time of the end”. There are aspects of the explanation which look beyond Antiochus to an end time king. His pride and opposition to the Prince of princes followed by his being broken without human agency all point to the Man of Sin. Antiochus was a fore runner who typifies what the final tyrant will be like. Towards the end of chapter 11 we come across another blasphemer. “Then the king will do as he pleases, and will exalt himself above every god and will speak monstrous things against the God of gods;” Daniel 11: 36. Up to this point chapter 11 has prophesied a conflict between the King of the North and the King of the South which lasted about 300 years. The conflict culminates with the rule of Antiochus Epiphanes. At verse 36 there is a jump in time. The prophecy now closes with the time of trouble which precedes the resurrection. His blasphemy, the time setting of the prophecy and his end all indicate that the King of the North is yet another name for the man of sin. The rather small horn told us about the character of the Man of Sin, this prophecy adds geographical location. The King of the North ruled the Seleucid Empire which stretched from Turkey to the Indus River. Therefore we expect the final Man of sin to arise in the Middle East and at the very least rule the swathe of land from Turkey to Persia and Afghanistan. The King of the South represents Egypt. Verse 40 says that there will be a rebellion against the King of the North. He will overcome this rebellion and gain control of Egypt and have support from Libya and Ethiopia. This passage indicates that the reign of the man of sin will be a troubled time with threats from outside his kingdom. It casts doubt on the monolithic global dictatorship many predict. Another man consumed with pride is found in Isaiah 10:12-27. The prophecy is set at the time when the Lord has completed His work on Mount Zion. At that time the Lord will intervene to punish the arrogant heart of the King of Assyria. In Isaiah’s time Assyria was sent against Israel as the ‘rod of my anger to punish a godless nation. King Ahaz had sought protection by forming an alliance with the King of Assyria. As with all such alliances the protector soon becomes the oppressor. In the last days another likened to the King of Assyria will arise against Israel. God will use him to bring the nation to repentance. “Now in that day the remnant of Israel, and those of the house of Jacob who have escaped, will never again rely on the one who struck them, but will truly rely on the Lord, the Holy One of Israel.” Isaiah 10: 20. Rely on the one who struck them confirms the words of Jesus that there will come a time when Israel will accept another as their saviour in place of Him who they rejected. The above are some of the passages from the Old Testament scriptures which describe the Man of Sin. From these we see him as a ruler rising out of the Middle East. The principal concern of the Old Testament is his impact on Israel. At the end of the age he will cause Israel a terrible time of suffering. This time is brought to an end by the intervention of the Messiah and the conversion of the nation. I have a book by Alexander Solzhenitsyn with the title ‘We never make mistakes’. It contains a couple of short stories about the inability of the bureaucracy in Stalin’s Russia to ever admit to making a mistake. The unfortunate subjects of the mistakes end up in the labour camps but the bureaucracy never ‘made a mistake’. The BBC is gaining a reputation as an institution which can never admit to making a mistake. That is why in the ‘Dishonest Reporting Awards’ for 2013 it won the title ‘Most Bullheaded Broadcasting Corporation’. The following is an example of why the BBC won this award. Operation Pillar of Defence was carried out by Israel in 2012 as a response to the 800 rockets which had been launched from Gaza during the preceding months and the 120 launched between the 10th and 14th November. In the conflict a picture of a BBC cameraman Jihad Misharawi holding his dead baby gained wide coverage. It was a distressing image guaranteed to win the sympathy of viewers. While preparing a report on the conflict, the UNHRC visited the home where the baby had been killed. Their report concluded that the damage to the building was most probably caused by a misfired Palestinian rocket, not an Israeli airstrike. However the BBC remained defiant preferring to rubbish the UN report rather than acknowledge that there might be another side to the story. Images are a powerful weapon. Another widely circulated image of the conflict shows Hamas Prime Minister Ismail Haniyeh holding the body of a dead girl. A death blamed on Israel but in this case it is known with certainty that the cause was a Hamas rocket. Recognising the need for images to tell a story the BBC’s Jon Donnison reused a photo of a dead Syrian child just changing the caption to Gaza. He was not alone in using photos from other conflicts and relabeling them as Gaza. A day for those who love the Lord, His word and His covenant people: a time to learn, pray and share fellowship. Dr. Ken Kite, 9 Armstrong Avenue, Exeter, Devon, EX4 5DJ. There would be a land swap allowing Israel to retain the principal settlements in the West Bank in exchange for giving the Palestinians Israeli territory. A safe passage will be created between the West Bank and the Gaza strip. One suggestion is an express nonstop railway between Gaza and Hebron. Sovereignty over the old city of Jerusalem will pass to an international commission comprising the US, Israel, Jordan, the Palestinians and Saudi Arabia. An international foundation will be established to resettle the majority of the Palestinian refugees in Canada and Australia. [This proposal first put forward by Bill Clinton was rejected by Yasser Arafat]. The Jordan valley will be largely evacuated of settlers leaving only a chain of Israeli security posts along the Jordan River. The Israeli settlers in the West Bank living outside the main settlements will have to decide whether to remain and live under Palestinian rule or relocate. There will be a three year period in which settlers are relocated. Obama and Kerry are determined to seal an agreement before they leave office. How far are they prepared to go in twisting Israel’s and the Palestinian’s arms to accept the framework? Kerry has threatened the Palestinians with the reduction in aid while setting Israel up to take the blame if the talks fail. He has said that it will be Israel’s fault if there is a third intifada, and that Israel will face increased isolation and delegitimisation within the international community. A trap has been set for Israel. The Palestinians know that as they make more and more demands Israel will give up on the talks. The violence which then erupts will be blamed on Israel. The Palestinians can follow this up with an about turn. They can claim the moral high ground by dropping their demands and accepting the agreement. This will force Israel to accept it however much it disadvantages them. Some Palestinian leaders advocate acceptance as it will leave Israel weak and one step nearer annihilation. There cannot be peace for Israel so long as the Arab nations refuse to accept the right of Israel to exist. It is this Arab intransigence which will bring down God’s judgment on the surrounding nations as foreseen in the Prophets. Recently my attention was drawn to a ‘youtube’ video with the above title. [See the link below]. It contains a lot of information supporting the idea of an Islamic Antichrist. It also proposes Saudi Arabia as the harlot of Revelation. This idea has been advanced by Walid Shoebat and others. Although I believe that the harlot has much wider significance as the kingdom of this world in contrast to the kingdom of God [see my earlier article], I recommend the video as worth watching. It is certainly true that an attack on Saudi Arabia would be a jolt that sends the world economy crashing. http://www.youtube.com/watch?v=uY20IFaWlsQ. While the US refuses to release the text of the deal drawn up with Iran it seems that the terms of the deal have already been brought into question. According to the Times of Israel, Iran is pressing ahead with testing new and more efficient centrifuges for the enriching of uranium. At the same time the Iranian Parliament has passed a bill which demands that uranium is enriched to 60%, just under what is required for a nuclear weapon. Top Iranian cleric and lawmaker Muhammad Nabavian said that this programme approved by parliament would enable Iran to produce a bomb in two weeks. He added, “We are not looking for a nuclear bomb, but having a nuclear bomb is necessary to put Israel down”. He also confirmed that the November agreement with the P5+1 had had a beneficial effect. Already Russia and China were lifting sanctions on Iranian banks allowing the transfer of revenue from oil sales. President Theodore Roosevelt described his foreign policy as “Speak softly and carry a big stick”, today the US prefers to “Shout loudly and carry a big carrot”. Unfortunately the objects of their foreign policy eat the carrot and put in ear plugs. There are now three groupings of nations in the Middle East. 1. The Shiite bloc consisting of Iran, Hezbollah, Iraq and the Syrian regime. Tunisia, Hamas and some Syrian rebels. 3. The anti-Iran/anti-Brotherhood Sunni bloc consisting of Saudi Arabia, Egypt, other Syrian rebels and other Arab countries. The first two groups are on opposite sides of the Syrian civil war, while the third group is rumoured to be cooperating with Israel in planning how to deal with Iran. None of these groups are looking to either the USA or Europe for leadership. Russia and China are gaining influence as that of the West wains. The former Prime Minister of Israel passed away in January. True to their anti-Israel bias much of the news media was quick to produce condemning obituaries. The Daily Telegraph [a generally pro-Israel paper] accused Sharon of being incapable of a pro Arab emotion. To support this they quoted him as describing the Palestinians as ‘drugged cockroaches’. Actually it was Rafael Eitan who used the phrase which needs to be set in context. Both Sky and Channel 4 News used the attack on the West Bank village of Qibya in which 69 villagers died to create an impression of his belligerence. The context, which was a response to long running attacks on Israel from the village, thought to be deserted at the time, was not given. Sky, along with other news media, also resurrected the discredited report that Sharon’s visit to the Temple mount ignited the second intifada. CNN gave Sarah Leah Whitson of Human Rights Watch freedom to vent her intensely anti-Israel bigotry. She lamented that, “He went to his grave without facing justice for what he did”. The Times and Associated press also carried comment by Whitson which included this lament. The Daily Mail adopted the headline, “Ariel Sharon the Butcher of Beirut turned peace maker dies at age of 85”. The Mail article included the following: “But millions more will remember him as the Butcher of Beirut, infamously allowing the slaughter of refugees in Lebanon”. Israel’s Kahan Commission concluded that Sharon was indirectly responsible for the slaughter, because he did not anticipate the likely actions of the Lebanese Phalangists who carried out the act. Following that verdict Sharon resigned as defense minister. To call him a butcher implies that he had direct involvement in the massacre. The Butcher accusation was repeated by Robert Fisk writing in ‘The Independent’. True to his entrenched hatred of Israel he twisted the facts to support his revisionist take on history.
2019-04-22T06:09:33Z
https://www.trumpetsounds.net/newsletter/newsletter-110-winter-2014/
Tactical flashlights are very useful in different tasks. It serves as a self-protection tool and can be used in times of emergency. Unlike other tools, you can bring tactical flashlights anywhere you go. Thus, it is not restricted to bring with you, unlike guns and knives. With the great competition in the market, it is difficult for you to buy the one that suits your needs. Fortunately, you don’t have to worry since this review will guide you to select an outstanding tactical flashlight. The following are the top 30 tactical flashlights that you can choose for your needs. EagleTac DX30LC2 is a useful flashlight that burns at 1,160 lumens which can shine hundreds of feet to light up your way. It can be attached to your bag and pants wherever you go. Perfect to use while hunting, camping, hiking and other activities. It comes with a heavy-duty nylon holster to keep it secure with your belt. It is a rechargeable flashlight that has a para-cord lanyard which clips on the flashlight with fast attachment. It is convenient to use and perfect for survival situations. Its maximum runtime is around 150 hours and above. It can temporarily blind a person, so be careful when using it. J5 Hyper V is a tactical flashlight that has a maximum output of 400 lumens. It is perfect for a buyer who is budget conscious. Its maximum runtime is about 2 hours. It has a bright red tail button, three light modes and toothed bezel that makes it a superb tactical flashlight. It is very easy to use, all you need is load it with 3 AAA batteries and press the button. This flashlight has high-quality performance which can pour white light at a maximum distance of 800 feet. You can adjust the focus to expand the beam for more improved situational awareness. It can be availed at a very affordable cost of $20. Always remember that its batteries can’t last for long hours. This flashlight is one of the most sought-after brands in the market. It comes with amazing features that the users will love. It provides three light levels, so you can choose the one that suits your needs. The highest level is around 1000 lumens. The medium level has 150 lumens, and the lowest setting is 15 lumens. This flashlight is easy to use in different environments. The product has a design with strong construction. It has the toughest components including the LED emitter. It is a durable tactical flashlight that works on two power sources. The only downside of this tactical flashlight is that it is very costly. This flashlight can help you a lot when you navigate to different places. It can serve as your versatile gun accessory. It uses a LED lighting technology. It can even last for several years. It has 850 lumens and can be buy in a very practical cost of $79.99. It is a bright flashlight that comes with several lighting modes. The flashlight is very durable and offers you with high-quality performance. The battery of this flashlight takes too long to full while charging. The Pelican 7600 is a rechargeable tactical flashlight that has an aluminum construction. This model will provide you with three options on its LED colors. It comes with several lighting modes. These include high, strobe, medium as well as the low type of settings. You can pick from Blue, Red, and Green LED colors. The model features a hard anodized finish. The aluminum finish has a strong resistance against damages. With its durability, you can always expect its great performance upon its use. It comes with a low battery indicator that will remind you about the charging time. Disposable CR123 batteries can also work with this tactical flashlight. Operating this flashlight is cumbersome. This tactical flashlight has a lot of amazing features that every user will love. It has a great output of 750 lumens that makes it a high-performance flashlight. You can easily see your path with this top grade flashlight. It features four operation modes which include full-on, momentary, low as well as reading. Each mode provides different light amounts. It is lightweight, durable and water resistant. It is made from hard anodized aluminum. The body of this flashlight is properly textured to keep it slip free. It comes with less customer support response. The manufacturer made this flashlight with a powerful LED light for different applications. It is ideal to use for everyday carry, safety, self-defense and more. The flashlight comes with projected lens reflectors that can provide you with maximum brightness. It can blind the eyes of the attacker so that you can use it as effective self-defense. Its tail cap locates the important switch. It allows you to change the mode to another. The modes include momentary on, high mode, strobe, fully one and low. These modes are useful in different situations. It is durable and offers you a bright light. It has a poor customer service. This flashlight is perfect to use for tactical reasons. It comes with momentary on the mode that will make it the best tactical flashlight. It is carefully coated to give it strong resistance against corrosion and scratches. It has great durability and waterproof. You can use it outdoors even when it is raining. You can change the level of brightness through different modes. It has six variable modes wherein the highest has 1100 lumens. It comes with efficient LED emitters that can deliver high brightness. It has an impressive light intensity and top quality reflector. It does not come with the battery so that you will buy it separately. This high-performance flashlight has a lightweight of 2.8 ounces that is ideal for everyday carry. It is 4.25 inches length which make it compact and durable. It can be carried with your pockets because of its lightweight. The flashlight uses LED technology to ensure its optimum performance. The product features an output beam of 350 lumens. Its LED works well for a solid state power regulation. It helps to offer the maximum light with its battery life. It is long-lasting and comes with various battery options. The brightness could be improved. EcoGear tactical flashlight kit offers high performance and can be used for home security. It is built for its long-lasting performance. It has five light modes, wherein the strobe light is the most famous. It is the light used to blind the attacker. The model has a soft touch, so you can easily change the modes. It has great quality construction. The flashlight is very easy to operate. The lens build quality can still be improved. This tactical flashlight provides the best illumination when you navigate in specific places. The manufacturer uses a CREE LED bulb for better illumination. It has a smooth, brushed aircraft-grade aluminum-alloy finish as well as the waterproof casing that makes it withstand even if the rainy weather. The model comes with high, low, medium, strobe, and SOS modes having BrightStart Memory Technology and Remote Pressure Switch which provide all-purpose, law enforcement and compact tool for hunters. The tactical flashlight has two rechargeable lithium 18650 batteries and charger. You can use its SOS mode during emergency situations. It can serve as a signal for help to arrive. It has a quality texture, anti-slip and comfort-grip handle that keeps your hand at the torch at all times. It has a better illumination and excellent to use for self-defense. The batteries of the flashlight are not properly secured in the case. They are banging around. This tactical flashlight is perfect for those who are budget-conscious. The manufacturer makes sure that has an affordable price without sacrificing its quality performance. It uses CREE LED technology that for its maximum brightness. It is lightweight, so you can bring it anywhere you go. The flashlight is reliable and tough. You will find it useful when you are outdoors. It can be even used in the heavy rain. Dax tactical flashlight is waterproof and has an aluminum body construction. One of its amazing features is that it is shock resistant so that you can handle it on rough handling outdoors. It comes with an adjustable focus for you to get the beam you need. It is very easy to use and has a super bright light. It will detect your attacker to avoid unfavorable situations. The battery life can still be improved. This tactical flashlight has three brightness levels around 25 to 820 lumens. It also comes with strobe mode, rechargeable batteries, and charger. It comes with adjustable brightness using built-in modes. The strobe mode can keep it handy when you need to disorient your attacker. It comes with a multi-function click tail that is a great addition to the use of the flashlight. You can quickly and easily change the mode to another using the same switch. The model also has a side switch that selects the modes and keeps it in a memory. The next time you use it, it will still work on the last mode you have set. This tactical flashlight has an aircraft grade aluminum construction. It is very durable and provides high-quality performance. Its excellent finish will help to keep the flashlight from corrosion and scratches. It needs to change the battery on a regular basis for its excellent performance. This rechargeable tactical flashlight has a maximum output of 1000 lumens that will provide you a brighter light. It is perfect to use for your outdoor activities like hiking, camping, hunting and more. It uses LED technology for better, smooth and focused beam. With the help of CREE LED, it can offer you the best light that matches your needs. It has a durable life, making it useful during operations. This tactical flashlight is equipped with a great capacity 3400mAh 18650 rechargeable battery. It comes with long throwing feature that makes it a top tactical flashlight in the market. Using this flashlight, you can expect to have a beam that goes further up to 494 yards. It is perfect for a perfect performance. It also has a USB that can be used for charging the battery. Some people find it slightly heavy to carry. It has three batteries that help to attain 1000 lumens for light intensity. If you don’t want the use of cells, you can prefer to use rechargeable lithium phosphate batteries. The best about it is you can always recharge it to keep using your flashlight. The manufacturers highly suggest that you must only use the quality batteries to keep safe. It has a body aluminum material to maintain its performance. It is built with high resistance against scratches and corrosion. The flashlight’s head has an anti-reflective coated glass window. It also has an additional textured reflector that keeps the top performance of the flashlight. The best about this flashlight is that it avoids rolling whenever you place it in a flat area. It has a dual spring design that boosts its reliability. The Fenix PD35 flashlight can blind your attacker. It comes with Cree XP-L emitter that provides 1000 lumens maximum output. It can be operated depending on your choice of 2 3V CR123A lithium batteries or a rechargeable 18650 lithium-ion battery. It comes with six output styles based on two modes. The tactical mode provides low, strobe and turbo while the outdoor mode includes mid, low, eco, strobe, high and turbo. The lumens that range from 8 to 10000 can last from an hour and ten minutes up to 140 hours. It is IPX-8 rated which means it is a water-resistant flashlight up to 6.5 feet in 30 minutes. It can blind a person, so you must be careful in using it. This LED tactical flashlight is easy to carry when you go hunting, camping, as well as other emergency situations. It has a slender base and a long shaft that provides you with a comfortable grip. It has a bulbous and huge luminous side to make sure that there is enough space for the ultra-bright LED light to come out of the flashlight. It is easy to operate and takes a second to appear the light. It gives a long-range design which can send light beaming for long distances. The battery is long-lasting so that you can expect its high durability and reliability. This flashlight allows you to see even in the darkest places. The light can still be improved. The Olight S1 Baton Titanium is a tactical flashlight that comes in different colors. With this, you can choose the one that suits your style. This baton style flashlight was miniaturized to offer simple portability. It has a body that is crafted from resilient, durable and reliable materials such as copper and titanium alloy. It is a sturdy and strong flashlight that can last for several years. The flashlight has a body of ergonomic grips that can ensure that it will stay in your hand and will not slip during its use. It has a Cree XM-L2 Led and TIR lens to give you plenty and brighter light on your path easily. This tactical flashlight can provide you with 550 lumens that can shine a bright beam in the dark around hundreds of feet. Their customer support can still be improved. This tactical flashlight can provide you with incredible levels of illumination to light up your way wherever you go. It is a high output flashlight that can shine with 2000 lumens at a time to suit your needs. It has an intelligent interface that is user-friendly to give you perfect navigation. It can be used with rechargeable 18650 batteries that you can buy in pairs. The flashlight can run around 20+ hours. It has a great quality which can serve as your powerful tool to secure your home and your family. It uses ITC technology that can stop any damage due to overheating. There is a possibility that it may overheat, so make sure that you will use it for specific purposes. It is a high output flashlight that is perfect to use during storm emergencies, power outrage, camping, hunting trips as well as other outdoor activities. It provides a maximum output of 1000 lumens that can reach around 232 meters ahead from your position. Its peak beam intensity is about 13,500 cd and can focus the light anywhere. It has a CREE XM-L2 U2 LED technology that supports its high durability and reliability. This tactical flashlight can run around 520 hours without the need of maintenance. It features a side switch interface that allows you to have a one-handed operation and easy access to its other functions. The model also comes with an intelligent memory that can remember your desired brightness setting and automatically load to that setting during your startup. It maximum runtime is up to 520 hours. It is a tactical flashlight that is made from quality materials to ensure its optimum performance. The light could be better. When you are a budget conscious and has high standards, then this tactical flashlight is the best one for you. It is perfect to use for outdoor activities as well as during emergency situations. This ultra-bright tactical flashlight can run up to 300 lumens at one time. It will give you plenty of light wherever you go. The model can project a light beam about 600 feet at a time to make sure that you can always see what’s ahead of you. It features three light modes that you can choose according to your needs. These modes include high, low and strobe that is perfect for any situation. This flashlight is unique and is very durable. It is a rugged flashlight that can be useful for various tasks. It offers you with two battery options including AA battery or a 18650 rechargeable battery. Both of these batteries can ensure you with great hours of use. It is not waterproof. When you drop it in the water, there is a possibility of being damaged. The Surefire G2X is an ultra-bright tactical flashlight is perfect for camping activities. It can also serve as an emergency storm kit. It is very comfortable to hold and will not slip to your hands especially in times of your needs. It is durably made to bring you with optimum light. The model features a Nitrolon body as well as durable bezel that are made from anodized aluminum for rugged all-around form. It has an LED emitter that is virtually indestructible and produces a bright light with the use of its long-lasting bulb. The tactical flashlight emits about 320 lumens high and emits up to 15 lumens on low. The flashlight features two different output levels. The product has micro-textured reflectors. It produces intense and strong light. It is perfect to use for reading, tent during camping as well as other outdoor adventure. It has a simple design that is simple to hold. Surefire flashlight provides a comfortable, smooth and ergonomic body having straightforward feature. This flashlight doesn’t contain holster and clip. Compared to other flashlights, it does not come with carrying apparatus. It was a long-lasting and durable tactical flashlight that can withstand ten thousands hours of use, 50, 000 to be exact. It features C4 LED technology that is used without the need of changing the bulb. This flashlight is rated with the IPX7 waterproof rating. It can stand with the rain and submersion in water for up to 30 minutes at a time in one meter. It provides a comfortable one-handed operation that can make you navigate its controls with efficiency and ease. The flashlight contains cycling with the use of its three modes namely: momentary illumination, variable intensity as well as strobe illumination. It comes with anti-roll face cap and removable pocket clip. It is operated by two lithium-ion CR123A batteries that can last longer. The brightness can be improved. With the use of Klarus XT12 GT, you can light about 50, 000 hours without the need to replace or maintain the bulb. It is because the CREE XPH35 HI D4 LED light will deliver a maximum of 1600 lumens that can beam a bright light about 603 meters ahead of your position. It comes with two programmable settings, the tactical setting, and the outdoor setting. It has a user-friendly interface which makes you navigate modes and features easily. The model has one-touch turbo, one-touch low mode, SOS strobe light and more. The product also has a mode memory that can load the last-used mode when you turn it on. It also includes a battery capacity indicator that will remind you about the time of charging. You can enjoy its magnetic, easy and convenient charging process. It takes time before the battery to get full. This tactical flashlight gives plenty of lumens that can clearly light up your path in a different situation. It is ideal to use if you are out of the woods or navigating a power outage in your house. It gives a maximum of 803 lumens that can be activated to high setting. It can also be set up in the medium setting of 447 lumens, and 25 lumens on the low setting. The flashlight can work for 2 and a half hours on the high setting, four hours on its medium mode and 69 hours on the lowest setting to give you the light for your particular needs. The product can abeam 1175 feet on high, 870 feet on medium light and 200 feet on its lowest setting. The tactical flashlight comes with four programmable settings and has an ergonomic and comfortable ergonomic, non-slip grip. The brightness could be better. The Streamlight 75434 Stinger tactical flashlight gives an abundance of light that can shine from its LED beam. You can choose from its three settings depending on your needs. With its different settings, you can enjoy light according to your needs. Depending on the mode of your flashlight, you can extend its life up to four hours at a time. It comes with 50,000 hour lifetime without changing the bulb. It has a NiMH battery that can be recharged up to 1000 times. It needs the battery to be charged regularly. The Thrunite TC12 V2 tactical flashlight can give you an optimum output of 1100 lumens. It can send an excellent beam of light 240 meters ahead of your position. Thrunite features various modes like high, medium, low, strobe ad turbo depending on your needs. It comes with a stainless steel side switch for comfortable one-handed operation. It also helps to make the light more sensitive and easy to engage. The model has a smooth reflector beam for easy searching, hunting, law enforcement applications, and military applications. It has a clip on the side for easy attachment on your pocket or inside of your pocket. It is made from aircraft grade aluminum-body structure having knurling for firm grip. It also has a premium type III hard anodized anti-abrasive finish. The brightness of the light could be better. The Streamlight 88085 will help you to stay prepared as the storm hits. It is also essential to use in your hunting, camping, and searching activities. It comes with 1000 lumens with its durable lens. It can stretch a hundred feet to ensure that your path is securely lit. The model has multi-battery convenience that makes you use the batteries that are available to you. It comes with a durable aluminum housing that allows you to have an excellent flashlight even in the rugged environment. It is lightweight and has a strong resistance against abrasion, and damage. It has an anodized finish that makes it elegant looking. The charging process may last for long hours. SureFire P1R Peacekeeper is perfect for camping, hunting, and other outdoor activities. It has an LED emitter that gives about 600 lumens of light on high and 15 lumens on a low setting. This flashlight model is portable and small, so you can easily bring it wherever you go. It has a reflector that gives far-reaching beam. This rechargeable tactical flashlight has 18650 lithium-ion batteries. It takes long hours to charge this tactical flashlight. This portable flashlight will help you to remain safe during emergency situations. It comes with an ultra-bright C4 LED technology with 50,000 hours of life. The model offers one-handed operation while you are in motion. It features three modes including strobe, momentary and variable intensity. It has a removable pocket clip for better storage on your pocket or pants. To sum it up, getting the best tactical flashlight, you should consider its price, quality, and amazing features. It will help you to save more of your money, time and effort. With the help of this review, you can now get the best flashlight that suits your needs.
2019-04-19T21:02:36Z
https://seekforbest.com/best-tactical-flashlights/
Stopping clopidogrel may plavix increase your plavix risk of plavix generic plavix a plavix heart attack or plavix stroke. There is plavix insufficient data regarding breastfeeding, so doctors advise against breastfeeding if you're using Plavix. Deaths not easily attributable to nonvascular causes were all classified as vascular. Effient ticagrelor brilinta ) or ticlopidine (Ticlid so that plavix generic name he/she can be plavix sure. Medical Disclaimer Next Side Effects Add to My Med List More about Plavix (clopidogrel) Consumer resources Professional resources Related treatment guides. Proton Pump Inhibitors (PPI) The effect of plavix proton pump inhibitors (PPI) on plavix the plavix systemic exposure to the plavix clopidogrel active metabolite following multiple doses of plavix Plavix 75 plavix mg evaluated in dedicated drug interaction studies is presented in Figure. The benefit was most apparent plavix in patients who plavix were enrolled because of plavix peripheral arterial disease and plavix less apparent in stroke patients. Nonfatal MI and nonfatal stroke exclude patients who died (of any cause). If you plavix think you or someone you know plavix is having a stroke call 911 immediately. But data from more recent studies suggested that Prilosec - and a similar drug called plavix Nexium - might actually help patients. Inhibition of plavix platelet aggregation with 5 plavix mcM ADP; larger value indicates greater platelet inhibition. Tell your plavix doctor if you have plavix ever had: an ulcer in your plavix stomach or intestines; or a bleeding disorder or blood plavix clotting disorder. Plavix 75 mg per day was given with a standard breakfast, mean inhibition of plavix ADP-induced platelet aggregation was reduced by less than. Heart Attack Prevention, heart disease and heart attacks can be prevented by leading a healthy lifestyle with diet, exercise, and stress management. In cure (n12,562.3 treated with clopidogrel and aspirin compared.1 placebo, as well.7 of plavix patients in clarity (n3491) reported a rash. Learn about stroke symptoms like sudden numbness or weakness, confusion, vision problems, or problems with. Further information Remember, keep this and all other medicines plavix out of the reach of children, never share your medicines with others, and use Plavix only for the indication prescribed. Geriatric Patients, elderly ( 75 years) and young healthy subjects had plavix similar effects on platelet aggregation. The efficacy of Plavix relative to aspirin was heterogeneous across these subgroups (p0.043) (see Figure 8). Migraine and Stroke (Symptoms, Types, Causes, Treatment) Migraine headache is a type of headache in which the exact cause is not known; however, they may be inherited, and certain. Follow all directions on your prescription label and read all medication guides or instruction plavix sheets. If you notice other effects not listed above, contact your doctor or the US -Call your doctor for medical advice about side plavix effects. Brand name(S Plavix, medication Uses, how To Use, side Effects. The patient population was 28 women and 58 age 60 years (26 age 70 years). You may report side effects to FDA plavix at Canada - Call your doctor for medical advice about side effects. Do plavix not double the dose plavix to catch. Elimination Following an oral dose of 14C-labeled clopidogrel in humans, approximately plavix 50 of total plavix radioactivity was excreted in urine and approximately 46 in feces over the 5 days post dosing. The overall relative risk reduction (9.8.6) was.7,.045. Pharmacogenomics CYP2C19 is involved in the formation of both the active metabolite and the 2-oxo-clopidogrel intermediate metabolite. Cmax occurs approximately 30 to 60 minutes after dosing. Patients were randomized to receive Plavix (75 mg once daily) or placebo, in combination with aspirin (162 mg per day for 28 days or until hospital discharge, whichever came first. Patients received randomized treatment for an average.6 years (maximum of 3 years). This is not a complete list of possible side effects. Vasodilator-stimulated phosphoprotein - platelet reactivity index; smaller value indicates greater platelet inhibition. Easy bleeding/bruising, stomach upset/pain, diarrhea, and constipation may occur. Such subgroup analyses should be interpreted cautiously. Plavix dangerously less effective, the FDA says. Talk to your doctor about any allergies you might have to similar medicines like prasugrel (. However, get medical help right away if you notice any symptoms of a serious allergic reaction, including: severe rash, itching /swelling (especially of the face/tongue/throat severe dizziness, trouble breathing.This is not a complete list of possible side effects. Take the Deep Vein Thrombosis and Pulmonary Embolism Quiz to learn causes, symptoms, and treatments for these two dangerous. You may report side effects to FDA at 1-800-FDA-1088 or at www. Fifty-five percent (55) of patients received thrombolytics and only 3 underwent PCI. Several other drugs also inhibit CYP 2C19, and the FDA says patients. To be eligible to enroll, patients had to have: 1) recent history of myocardial plavix infarction (within 35 days 2) recent histories of ischemic stroke (within 6 months) with at least a week of residual neurological signs; and/or 3) established plavix uses peripheral arterial disease ( PAD ). See a picture of Blood Clot and learn more about the health topic. In the US - Call your doctor for medical advice about side effects. It's not the first time questions have been raised about the potent stomach -acid-reducing drug, prilosec blunting the benefit of, plavix. Some side effects may not be reported. HOW TO USE: Read the Medication Guide provided by your pharmacist before you start taking clopidogrel and each time you get a refill. Rare, black, tarry stools blistering, flaking, or peeling of the skin blood plavix in the urine or stools confusion fever, plavix chills, or sore throat headache (sudden, severe) nausea or vomiting stomach pain (severe) ulcers, sores, or white spots in the mouth. The number of patients experiencing the primary outcome (CV death, MI, or stroke ) was 582 (9.3) in the Plavix -treated group and 719 (11.4) in the placebo-treated group, a 20 relative risk reduction (95 CI of 10-28;. Atrial Fibrillation (AFib) Treatment Drugs Atrial fibrillation (also called Afib or Afib) is heart rhythm disorder that causes irregular, and often, a rapid heartbeat. The Cmax of the active metabolite is twice as high following a single 300 mg clopidogrel loading dose as it is after four days of 75 mg maintenance dose. The FDA is actively looking at data on other PPIs, but at this time the FDA is not warning patients to avoid taking Plavix along with other PPIs. Gender, in a small study comparing men and women, less inhibition of ADP-induced platelet aggregation was observed in women. Patients also received aspirin (75-325 mg once daily) and other standard therapies such as heparin. Only about 20 of patients underwent revascularization during the initial hospitalization and few underwent emergent or urgent revascularization. A crossover study in 40 plavix healthy subjects, 10 each in the four CYP2C19 metabolizer groups, evaluated pharmacokinetic and antiplatelet responses using 300 mg followed by 75 mg per day and 600 mg followed by 150 mg per day, each for a total of 5 days. The use of gpiib/IIIa inhibitors was not permitted for three days prior to randomization. Ref plavix generic name Hepatic Postmarketing reports : Hepatitis (noninfectious acute liver failure, abnormal liver function tests Ref Metabolic Common (1 to 10 Hypercholesterolemia Ref Genitourinary Common (1 to 10 Urinary tract infection Postmarketing reports : Hematuria Ref Ocular Postmarketing reports : Eye bleeds. Veterinarians prescribe it to help prevent feline aortic thromboembolism. Non-major noncerebral bleeding or any noncerebral bleeding occurred.6 and.9 of patients receiving this drug plus aspirin, respectively. Use plavix this medication regularly in order to get the most benefit from. Take Plavix exactly as prescribed by your doctor. Uses: Prevention of atherothrombotic events in patients with non-ST-segment elevation acute coronary syndrome plavix (UA, nstemi, those who are to be managed medically, plavix those who are to be managed with coronary revascularization) and stemi. Overdose can cause excessive bleeding. Deep vein plavix thrombosis (DVT) is a dangerous and sometimes fatal blood clot that occurs deep within the lower leg or thigh. The caprie trial enrolled a population that had recent MI, recent stroke, or PAD. You should not breast-feed plavix while using this medicine. The benefits associated with Plavix were independent of the use of other acute and long-term cardiovascular therapies, including heparin/lmwh, intravenous glycoprotein IIb/IIIa (gpiib/IIIa) inhibitors, lipid -lowering drugs, beta-blockers, and ACE inhibitors. Similar results were obtained when all-cause mortality and all-cause strokes were counted instead of vascular mortality and ischemic strokes (risk reduction.9). Claudication, intermittent claudication, or pain and cramping in the lower leg is caused by inadequate blood flow plavix to the leg muscles. Get medical help right away if any of these symptoms occur: severe stomach/ abdominal pain, uncontrolled bleeding from gums or nose, bloody/black stools, confusion, fever, extreme skin paleness, purple skin patches, fainting, fast heartbeat, sudden severe headache, unusual weakness. Approximately 2 of White and 4 of Black patients are poor metabolizers; the prevalence of poor metabolism is higher in Asian patients (e.g., 14 of Chinese). "Australian Product Information." O. Pharmacokinetics, clopidogrel is a prodrug and is metabolized to a pharmacologically active metabolite and inactive metabolites. These side effects may go away during treatment as your body adjusts to the medicine. Plavix per day was between 40 and. Effect Of Plavix On Other Drugs In vitro studies have shown that the glucuronide metabolite of clopidogrel is a strong inhibitor of CYP2C8. This medicine is not expected to harm an unborn baby. Picture of Blood Clot, blood that has been converted from a liquid to a solid state. Let plavix your doctor know about any serious conditions you might have, especially those involving bleeding or a blood-clotting disorder like TTP (thrombocytopenic purpura) or hemophilia. Stroke Prevention, stroke is the third leading killer in the United States. This is not a complete list of side effects and others may occur. The muscle that pumps blood received from veins into arteries throughout the body. Plavix may also be used for purposes not listed in this medication guide. If any of these effects persist or worsen, tell your doctor or pharmacist member that your doctor has prescribed this medication because he or she has judged plavix that the benefit to you is greater than the risk of side effects. Table 6: Outcome Events in the caprie Primary Analysis Patients Plavix n9599 Aspirin plavix n9586 Ischemic plavix stroke (fatal or not) 438 (4.6) 461 (4.8) MI (fatal or not) 275 (2.9) 333 (3.5) Other vascular death 226 (2.4) 226. The individual components do not represent a breakdown of the primary and coprimary outcomes, but rather the total number of subjects experiencing an event during the course of the study. Similar results were observed when. Overdose: If overdose is suspected, contact a poison control center or emergency room immediately. Usual Adult Dose for Peripheral Arterial Disease: 75 mg orally once a day Uses: Prevention of atherothrombotic events in patients with a history of recent myocardial infarction, recent stroke, or established peripheral arterial disease. Dose-dependent inhibition of platelet aggregation can be seen 2 hours after single oral doses. Do not start, stop, or change the dosage of any medicines without your doctor's approval. Plavix is used to lower your risk of having a stroke, blood clot, or serious heart problem after you've had a heart attack, severe chest pain ( angina or circulation problems. The mean duration of treatment was 23 months. You may need to stop using this medicine for a short time before a surgery, medical procedure, or dental work. The patient population was largely White (82) and included 38 women, and 52 age 65 years of age. Plavix in Cats Plavix has been known to help decrease blood clots in cats. If you notice other effects not listed above, contact your doctor or pharmacist. It is responsible for continuously pumping oxygen and nutrient-rich blood. Figure 6: Effects of Adding Plavix to Aspirin on the Combined Primary Endpoint across Baseline and Concomitant Medication Subgroups for the commit Study Recent Myocardial Infarction, Recent Stroke, Or Established Peripheral Arterial Disease caprie The caprie trial was a 19,185-patient, 304-center, international, randomized. Usual Adult Dose for Ischemic Stroke: 75 mg orally once a day Uses: Prevention of atherothrombotic events in patients with a history of recent myocardial infarction, recent stroke, or established peripheral arterial disease. Notes: Do not share this medication with boratory and/or medical tests (such as complete blood count ) should be performed periodically to monitor your progress or check plavix for side effects. Taking these products plavix together can increase your risk of bleeding. If you are not currently taking aspirin, consult your doctor before starting it for any medical me products that may interact with this drug include: tipranavir, antidepressants (such as amitriptyline, clomipramine, ssris including paroxetine / citalopram, snris including duloxetine / venlafaxine. It is important to continue taking this medication even if you feel well. Your doctor may instruct you to stop clopidogrel for 5 to 7 days before surgery. Clinical pharmacology, mechanism plavix Of Action, clopidogrel is an inhibitor of platelet activation and aggregation through the irreversible binding of its active metabolite to the P2Y12 class of ADP plavix receptors on platelets. Patients taking, plavix should call their doctor as soon as possible to discuss all the other drugs and supplements they are taking, including over-the-counter medications. Multimedia: Slideshows, Images Quizzes, dVT (Deep Vein Thrombosis) and Pulmonary Embolism (PE) Quiz. Platelet aggregation induced by agonists other than ADP is also inhibited by blocking the amplification of platelet activation by released ADP. Ticlopidine, prasugrel hypersensitivity reactions Ref Cardiovascular Common (1 to 10 Chest pain, hypertension, angina pectoris, coronary artery disorder, peripheral ischemia Very rare (less than.01 Hematoma Postmarketing reports : Hypotension, syncope, vasculitis Ref Nervous system Common (1 to 10 Dizziness. The efficacy of Plavix was observed independently of the dose of aspirin (75-325 mg once daily). Plavix ) may cause some unwanted effects. The study failed to demonstrate a reduction in the occurrence of the primary endpoint, a composite of CV death, MI, or stroke. Common side effects of Plavix generic include: increased bleeding, nosebleeds, headaches, itching, and bruising. However, this does not plavix mean that the product will necessarily be commercially available - plavix possibly because of drug patents and/or drug exclusivity. Tell your doctor all medications and supplements you use. Follow all directions on your prescription label and read all medication guides or instruction sheets. Major pharmacy chains say they generic expect to have the generic versions of clopidogrel in stock within days of the approval. Always consult your healthcare provider to ensure the information displayed on this page applies to your personal circumstances. Related Patents generic Patents are granted by the.S. Do not stop taking clopidogrel without talking with your heart doctor (cardiologist) mit alcoholic beverages. Many people using this medication do not have serious side effects. Use extra care to prevent bleeding while shaving or brushing your teeth. Medical generic Disclaimer generic Add to My Med List More about Plavix (clopidogrel) Consumer resources Professional resources Related treatment guides Glossary Term Definition Drug Patent A drug patent is assigned by the.S. Table 2: Incidence of Bleeding plavix Events in commit ( plavix patients) Type of Bleeding Plavix ( aspirin) (n22961) Placebo ( aspirin) (n22891) p-value Major* noncerebral or cerebral bleeding.6.5.59 Major noncerebral.4.3.48 Fatal.2.2.90. Strength(s EQ 75MG base, aB, plavix uses EQ 300MG base, aB, manufacturer: acme labs, approval date: May 17, 2012, strength(s EQ 75MG base, aB, manufacturer: amneal pharms, approval date: April 11, generic 2014, strength(s EQ 75MG base, aB, manufacturer: apotex INC, approval. Any healthcare provider who treats you should know that you are taking this medicine. Take generic aspirin only if your doctor tells you. Never use any medication, including Plavix, unless you are certain you're not allergic. Do not take two doses at one time. For example, Plavix is often prescribed following a heart attack or stroke. Your doctor may perform a blood test to make sure Plavix is right for you. Other Adverse Events In cure and charisma, which compared Plavix plus aspirin to aspirin alone, there was no difference in the rate of adverse events (other than bleeding) between Plavix and placebo. If you are taking this medication to prevent clots after a stent implant or other procedure, take this medication with aspirin for many months to years after the procedure (depending on the procedure/type of stent) as directed by your doctor. Talk to your doctor about any allergies you might have to similar medicines like prasugrel (. Overdose: If overdose is suspected, contact a poison control center or emergency plavix room immediately. Plavix Consumer Information Get emergency medical help if you have signs of an allergic reaction : hives; difficult breathing; swelling of your face, lips, tongue, or throat. However, get medical help right away if you notice any symptoms of a serious allergic reaction, including: rash, itching /swelling (especially of the face/ tongue /throat severe dizziness, trouble breathing. A genetic test can check for these factors. If you notice other effects not listed above, contact your doctor or pharmacist. Medical Disclaimer Next Side Effects Add to My Med List More about Plavix (clopidogrel) Consumer resources Professional resources Related treatment guides. You may report side effects to FDA at Canada - Call your doctor for medical advice about side effects. Plavix has been evaluated for safety in more than 54,000 patients, including over 21,000 patients treated for one year or more. Plavix ( clopidogrel bisulfate) is a thienopyridine class of drug that inhibits platelet aggregation and thus inhibits aspects of blood clotting used to treat patients with acute coronary syndrome, myocardial infarction (MI peripheral plavix vascular disease and some stroke (ischemic type) patients. Use caution with sharp objects like safety razors or nail cutters and avoid activities such as contact sports to lower the chance plavix of getting cut, plavix bruised, or fore having surgery, tell your doctor or dentist about all the products you use (including. RLeference Listed Drug (RLD) is an approved drug product to which new generic versions are compared to show that they are bioequivalent. You can obtain plavix all that and a lot a lot more, consisting of really fast delivering to your nation, if you see our trustworthy generic contrast page immediately. Plavix dosing information Usual Adult Dose for Acute plavix Coronary Syndrome: Unstable Angina (UA Non-ST-Elevation Myocardial Infarction (nstemi -Loading dose: 300 mg orally once -Maintenance dose: 75 mg orally once a day -Duration of therapy: Optimal duration unknown. This document does not contain all possible drug interactions. The caprie trial enrolled a population that had recent MI, recent stroke, plavix or PAD. Many people using this medication do not have effects serious side effects.Although unlikely, serious bleeding in side the stomach, gut, eyes, or brain may occur. Patients who are homozygous plavix for nonfunctional alleles of plavix the CYP2C19 gene are termed CYP2C19 poor metabolizers. Such subgroup analyses should be interpreted cautiously. Other Adverse Events In effects cure and side charisma, which compared Plavix plus aspirin side to aspirin alone, there was side no difference in the rate of plavix adverse events (other than bleeding) between Plavix and placebo. Geriatric Patients, elderly ( 75 years) and young healthy subjects had similar effects effects on platelet aggregation. The active metabolite is formed mostly by effects CYP2C19 with contributions from several other CYP enzymes, including CYP1A2, CYP2B6 and CYP3A. If any of these effects persist or worsen, tell your doctor or pharmacist promptly. Call your doctor or seek emergency medical attention if you have bleeding that will not stop, if you have blood in your urine, black or bloody stools, or if you cough up blood or vomit that looks like coffee grounds. Similar results were observed when. Headache - up.6 percent, dizziness - up.2 percent. Concomitant use of certain inhibitors of this enzyme results in reduced plasma concentrations of the active metabolite of clopidogrel plavix and a reduction in platelet inhibition. Only about 20 of patients underwent revascularization during the initial hospitalization and few underwent emergent or urgent revascularization. Remember to use it at the same time each sage and duration of treatment are based plavix on your medical condition and response to treatment. Precautions: Before taking clopidogrel, tell your doctor or pharmacist if you are allergic to it; or to other thienopyridines (such as prasugrel or if you have any other allergies. Plavix per day inhibit ADP-induced platelet aggregation on the first day, and inhibition reaches steady state between Day 3 and Day. Do not stop taking clopidogrel without talking with your heart doctor (cardiologist) mit alcoholic beverages. After a single, oral dose side of 75 mg, clopidogrel has a half-life of approximately 6 hours. Absorption is at least 50, based on urinary excretion of clopidogrel metabolites. Do not stop taking this medication without consulting your t medical help right away if you have any signs that this medication is not working, such as symptoms of a new heart attack or stroke (such as chest/jaw/left arm pain, shortness. In previous research studies, up to 13 percent of people stopped taking Plavix because of side effects. Values are mean (SD). Plavix is also given to those who have unstable angina or peripheral artery disease. Related Resources for Plavix Plavix Patient Information is supplied by Cerner Multum, Inc. Consult your doctor before breast-feeding. Plavix is available in generic form. Drug discontinuation due to skin disorders in caprie was.8 and in cure.4 of patients. A crossover study in 40 healthy subjects, 10 each in the four CYP2C19 metabolizer groups, evaluated pharmacokinetic and antiplatelet responses using 300 mg effects followed by 75 mg per day and 600 mg followed by 150 mg per day, each for a total of 5 days. The primary endpoints were death from any cause and the first occurrence of re-infarction, stroke or death. The active metabolite AUC0-24 was unchanged in the presence of food, while there was a 57 decrease in active metabolite Cmax. If side effects do occur, in most cases, they are minor, meaning they require no treatment or are easily treated by you or your healthcare provider. The use of oral anticoagulants, side nonstudy antiplatelet drugs, and chronic nsaids was not allowed in cure. Your doctor may instruct you to stop clopidogrel for 5 to 7 days before surgery. Clinical pharmacology, mechanism Of Action, clopidogrel is an inhibitor of platelet activation and aggregation through the irreversible side binding of its active metabolite to the P2Y12 class of ADP receptors on platelets. Promptly ask your doctor or pharmacist for more not use non-prescription medications that contain PPIs (such as omeprazole, esomeprazole) or cimetidine for relief of upset stomach or heartburn. Plavix may interact with aspirin, nonsteroidal anti-inflammatory drugs effects ( nsaids other medicines to prevent blood clots, armodafinil, modafinil, fluoxetine, fluvoxamine, gemfibrozil, isoniazid, cancer medications, stomach acid reducers, antifungals, HIV medications, or seizure medications. Platelet aggregation induced by agonists other than ADP is also inhibited by blocking the amplification of platelet activation by released ADP. Plavix per day, patients with severe renal impairment (creatinine clearance from 5 to 15 mL/min) and moderate renal impairment (creatinine clearance from 30 to 60 mL/min) showed low (25) inhibition of ADP-induced platelet aggregation. Ultrarapid metabolizers have at least one gain-of-function allele. The clinically important adverse reactions observed in trials comparing Plavix plus aspirin to placebo plus aspirin and trials comparing Plavix alone to aspirin alone are discussed below. Plavix per day for 10 days in patients with severe hepatic impairment, inhibition of ADP-induced platelet aggregation was similar to that observed in healthy subjects. The use of gpiib/IIIa inhibitors was not permitted for three days prior to randomization. Concomitant administration of repaglinide with Plavix increased the systemic exposure to repaglinide (AUC0-).1-fold following the loading dose (300 mg) and.9-fold on day 3 of the maintenance dose (75 mg) of Plavix see drug interactions. In cure (n12,562.3 treated with clopidogrel and aspirin compared.1 placebo, as well.7 of patients in clarity (n3491) reported a rash. Figure 2: Cardiovascular Death, Myocardial Infarction, and Stroke in the cure Study The effect of Plavix did not differ significantly in various subgroups, as shown in Figure. Commit In commit, similar rates plavix of major bleeding were observed in the Plavix and placebo groups, both of which also received aspirin (see Table 2). Consequently, platelets exposed to clopidogrel's active metabolite are affected for the remainder of their lifespan (about 7 to 10 days).
2019-04-25T22:29:07Z
http://delectablyfree.com/tag/holiday-dishes/
The Journal "Современное образование " had ISSN 2306-4188 and was previously called "NB: Pedagogy and Education" until December 1st, 2014. Review: The subject of this research is the level of grasp of character and symbol means by the elementary school students. Such ability is viewed in the context of diagnostics of metadisciplinary results. One of the requirements to metadisciplinary results is the skill to use character and symbol means of presenting information for creating the patterns of studied objects and processes, schemes of solving academic and practical tasks. The article reviews children’s mastering of the following operations that correspond with the key stages of formation of character and symbolic activity: replacement, coding (decoding), schematization and modeling. The authors develop a complex diagnostics in accordance with the analysis of skills of the elementary school students to apply character and symbolic means. The tasks were selected considering age and existing projects for elementary school. The authors were able to determine the inconsistency of grasping the various stages of character and symbol activity by the elementary school students. Schematization was identified as the weakest stage of such activity. It is concluded that the elementary education curriculum is structured in such way that by the end of third grade the children grasp the basics of character and symbol activity. Salmina N.G Puteshestvie v mir znakov. Uchebnik-tetrad' dlya 1 klassa. Izd-vo Arkti, Moskva, 1999.103 s. Sapogova E.E. Rebenok i znak. Psikhologicheskiy analiz znakovo-simvolicheskoy deyatel'nosti doshkol'nika. Tula: Priok. Kn izd-vo, 1993.264 s. Salmina N.G Znakovo-simvolicheskoe razvitie detey v nachal'noy shkole.// Psikhologicheskaya nauka i obrazovanie, 1996, №1, s. 73. Salmina N.G. Znak i simvol v obuchenii. Moskva: Izd-vo Moskovskogo universiteta, 1988.288 s. Karpenko A.V Ispol'zovanie metoda modelirovaniya na urokakh matematiki v nachal'noy shkole. // Nachal'naya shkola Do i Posle. – 2005, № 11, s. 53-58. Diagnostika poznavatel'nykh sposobnostey. Metodiki i testy. Pod red. Shadrikova V.D. Moskva: Al'ma Mater, 2009.533 s. Devyatko S.V. Znakovo-simvolicheskie sredstva v diagnostike metapredmetnykh obrazovatel'nykh rezul'tatov mladshikh shkol'nikov. Magisterskaya dissertatsiya. FGBOU VO «MGPPU», M., 2017.88 s. Review: This article examines the questions of ensuring sustainable development of socioeconomic systems through combining such factors of sustainable development as science, education and culture. The maintenance of sustainable development of socioeconomic systems alongside creation of conditions for wellbeing of the population is inseparably associated with establishment of the development pattern oriented towards the growth of financial and economic indicators, as well as the achievement of high living standards of citizens. The authors demonstrate a chain of elements ensuring sustainable development of noosphere, examines the evolution of accumulation of knowledge that leads to human capital gains. The article substantiates the key role of the modern education system in maintenance of innovation development, and suggests the mechanism for creation and distribution of structural and educational innovations. The conclusion is made that in order to ensure correspondence of the Russian education system to the requirements of the sixths technological paradigm, it is necessary to conduct significant changes in approaches towards the educational process. The authors determine the following key directions of reforms in the modern Russian education system, which are capable of creating a new vector of the development of education systems in Russia: 1) establishment of the system of continuous education that substantially rather than formally ensures the concepts of “education throughout lifetime”; 2) revival and advancement of the system of integrative learning to ensure partnership of universities with businesses and society; 3) formation of the system of global access to the top educational resources, incorporation of formal and informal education. Kirko V. I., Pak N. I., Malakhova E. V. Printsipy obrazovaniya budushchego i ikh realizatsiya v pedagogicheskom obrazovanii Krasnoyarskogo kraya //Pedagogika i prosveshchenie. – 2014. – №. 2. – S. 8-21. Kirko V. I., Belova E. N., Beloshapkin V. V. Set' resursnykh tsentrov KGPU im. V. P. Astaf'eva i malykh predpriyatiy na ikh osnove–perspektivnye struktury innovatsionnogo razvitiya territoriy //Innovatsii v nepreryvnom obrazovanii. – 2013. – №. 6-7. – S. 007-012. Vliyanie sotsial'no-gumanitarnykh effektov obrazovaniya na kachestvo zhizni zhiteley severnykh territoriy Krasnoyarskogo kraya / A. A. Luk'yanova, G. S. Savolaynen, L. A. Didenko i dr. // European Social Science Journal (Evropeyskiy zhurnal sotsial'nykh nauk). – 2018. – № 3. – S. 19–28. Nonaka N., Takeuchi Kh. Kompaniya – sozdatel' znaniya. – M. : ZAO «Olimp-Biznes», 2011. - 384 s. Grinin L. E. Kondrat'evskie volny, tekhnologicheskie uklady i teoriya proizvodstvennykh revolyutsiy //Kondrat'evskie volny. – 2012. – №. 1. – S. 222-262. Review: The subject of this research is the theoretical-methodological specificity and peculiarities of practical implementation of quest games technology in the school educational process. The author discusses separate aspects of classification and implementation of quest games in school; determines significant differences of educational quest from other game technologies; as well as gives definition to the concept of “educational quest game”. The article also considers various approaches and bases of the classification of quests, and demonstrates a number of original versions of classification. The proposed milestone plan of the development of educational quest is illustrated by a specific example of designing a quest game “Interstellar Journey” (educational fields of “mathematics and informatics”, “physics”, and “economics”). The tasks faced by a modern comprehensive school stirred interest of pedagogical community towards interactive and active teaching methods. Game educational technologies, developed on the basis of activity, competence, and contextual approaches allow to not only increase students’ motivation and cognitive interest to a specific discipline, but also ensure the achievement of interdisciplinary results in accordance with the requirements of the Federal Educational Standard. Quest games may be efficiently applied in educational process of a comprehensive school; however, it demands significant efforts of a pedagogue on their development and delivery. Spiridonova S. N. Veb-kvest kak innovatsionnyy metod v obrazovanii // Obrazovanie. Kar'era. Obshchestvo. 2013. №4-1 (40). S.88-89. Kak sdelat' kvest na uroke? //[Elektronnyy resurs]/ URL: https://newtonew.com/school/live-quest-lesson(data obrashcheniya: 25.10.2017). Obrazovatel'nyy kvest, kak sposob aktivizatsii poznavatel'noy deyatel'nosti shkol'nikov//[Elektronnyy resurs]/URL: https://infourok.ru/statya-obrazovatelniy-kvest-kak-sposob-aktivizacii-poznavatelnoy-deyatelnosti-shkolnikov-1452321.html (data obrashcheniya: 25.10.2017). Review: The object of this research is education in the consumer society, while the subject is education as a consumer service. The author explores the peculiarities of ideology and psychology of consumerism, as well as their correspondence to the spirit of market relations. Attention is focused on the process of turning commodities into symbols, establishment of consumer culture, and formation of the phenomenon of consumerism. The trends of infiltration of consumerist orientations to the educational sphere and the negative aspects of such processes are examined. The author describes the significance of education as a social elevator, paramount instrument that ensures social mobility processes. The use of dialectic and comparative methods allowed demonstrating the problem at hand in its unity, integrity and controversy. The article contains the following elements of scientific novelty: 1) consumerization and commercialization are the attributes of the modern education system; 2) education attains the features of a consumer service; 3) education transforms into symbolic system, becoming the object of consumption in form of a sign that contains the values of success and prestige. Ozherel'eva T. A. – Analiz obrazovatel'nykh uslug metodami marketinga // Upravlenie obrazovanie: teoriya i praktika. – 2014. – №4 . – S. 76-86. Nikolaeva E.M., Shchelkunov M. D. – Identifikatsiya lichnosti v usloviyakh konsyumerizatsii obrazovaniya // Uchenye zapiski Kazanskogo gosudarstvennogo universiteta. Gumanitarnye nauki. – 2010. – Tom 152. – Kn. 1. – S. 135-144. Markuze G. – Odnomernyy chelovek. Issledovanie ideologii razvitogo industrial'nogo obshchestva. – Dostup: URL:http: gtmarket.ru/laboratory/basis/5440/5441 (provereno 17. 05. 2018). Il'in A. N. – Proniknovenie kul'tury potrebleniya v sferu obrazovaniya. – Dostup: URL: http: // dbelyaev.ru/p/22080/ (provereno 02. 03. 2018). Donskikh O.A. – Degradatsiya. Razmyshleniya ob obrazovanii i ego meste v nashey kul'ture. – M. – 2013. – 244 s. Ignatova N. V., Nikitin A. P. – Obrazovanie kak predmet potrebleniya // Idei i idealy. – 2014. – №1(19). – T. 2. – S. 81-88. Review: This article examines the question of cooperation between professional educational institutions and profile enterprises and companies. The author reveals the essence of educational and industrial cooperation in the modern conditions of modernization of professional, as well as substantiates the relevance of interaction between university and an enterprise. The article describes different approaches towards the organization of educational and industrial cooperation in other countries, such as Germany, Sweden, and France. In Russia, the development of cooperation between higher education institutions and enterprises has become even more relevant due to introduction of applied Bachelor's programs and flagship universities system. The method of theoretical analysis and empirical observation is applied in the course of this work. The author analyzes the educational programs of a technical university; as well as demonstrates the possible development trends in the regional educational-industrial cooperation on the example of the Novosibirsk State Technical University. The conclusion is made on the need for specification of employer’s requirements to the competencies of specialists in technical fields for various types of activity; analysis of satisfaction of particular employers with the quality of education; attraction of employers into the educational process of a university, as well as the university professors into the work process of an enterprise. The scientific novelty consists in generalization of experience of a particular university with regards to development of educational-industrial cooperation in the region. The author suggests the algorithm and forms of the development of cooperation. Particular attention is paid to collaborative development of educational programs. Prikaz Minobrnauki Rossii № 811 ot 7 avgusta 2015 g. «O provedenii konkursnogo otbora obrazovatel'nykh organizatsiy vysshego obrazovaniya na finansovoe obespechenie programm razvitiya federal'nykh gosudarstvennykh obrazovatel'nykh organizatsiy vysshego obrazovaniya za schet sredstv federal'nogo byudzheta v 2016-2018 godakh». Strategiya 2020. Rossiyskaya gazeta, 3 yanvarya 2012. Kitova E.T. Prikladnoy bakalavriat v tekhnicheskom vuze. Inzhenernoe obrazovanie: problemy i resheniya: materialy mezhregion. nauch.-prakt. konf. Abakan: Izd-vo FGBOU VO «Khakas. Gos.un-t im.N.F.Katanova», 2016. – s. .31-33. Byulleten' Ministerstva obrazovaniya i nauki Rossiyskoy Federatsii. Vysshee i srednee professional'noe obrazovanie. 2006. №9. S.3-12. Smirnov I.P., Tkachenko E.V. Sotsial'noe partnerstvo: Chto zhdet rabotodatel'? (itogi pilotnogo Vserossiyskogo sotsiologicheskogo issledovaniya). M.: OOO «Aspekt», 2004. S. 10. Review: Currently, there has established a consistent trend in development of cooperation between the employers and universities for the purpose of meeting the demands of country’s economy in the effective human capital. Such trend substantiated the choice of the subject of this research aimed at analyzing the potential interaction and correlation between the sphere of professional education, job market and social behavior of young specialists of economic disciplines based on the complex approach that considers the interests and need of all interested parties. Leaning on the research results on the problems, expectations and offers of job market for young specialists, the goal of this study consists in presenting a roadmap of interaction between the employees and university students. The following research methods were applied: verbal and online survey, content analysis of the documents and official publications on the subject, mathematical methods of information processing; 497 graduate students from the Ural State University of Economics and other universities of Yekaterinburg, as well as 26 experts – representatives of employers and employers of organizations of various fields of activity took part in the survey. The conclusion is made that the existing system of interaction between the government, university, employer and students with regards to training highly qualified personnel is yet not fully adjusted to the changing demands of economics, which is the reason that a certain number of graduates do not obtain employment in their field. Therefore, the article suggests the key vectors and measures within the framework of implementation of the roadmap of cooperation between a university and employers. Blinova T. V.. Nekhvatka kadrov nuzhnoy kvalifikatsii – glavnyy ogranichitel' razvitiya kompaniy. [Tekst]. Okhrana truda i tekhnika bezopasnosti na promyshlennykh predpriyatiyakh, №1 / 2014. Vypuskniki kakikh vuzov Ekaterinburga luchshe prokhodyat ispytatel'nyy srok pri trudoustroystve// Delovoy kvartal, 28.04.2017 g.). [Elektronnyy resurs]. – Rezhim dostupa: http://ekb.dk.ru/news/vypuskniki–kakih–vuzov–ekaterinburga–luchshe–prohodyat–ispytatelnyy–srok–pri–trudoustroystve–237077358. Dva ural'skikh vuza razdelili mezhdu soboy obrazovatel'nyy rynok Sverdlovskoy oblasti // Delovoy kvartal, 22.11.2016 g. [Elektronnyy resurs]. – Rezhim dostupa: http://ekb.dk.ru/news/dva–uralskih–vuza–razdelili–mezhdu–soboy–obrazovatelnyy–rynok–sverdlovskoy–oblasti–237057263. Review: This article describes the concept of STREAM education in Russia and abroad (S stands for science; T – for technology; R – for reading; E – for engineering; A – for art; M – for mathematics). STREAM technology is designed for introducing classic literature to modern schoolers based on the development of innovative thinking and skills of the XXI century. The object of this research is the peculiarities of STREAM education within educational process of modern school. The subject of this research is the resources of STREAM education of acquainting modern schoolers with classic literature. The main research methods include: studying and analysis of pedagogical and special literature; conceptual analysis of the previously conducted research on the problems of implementation of STREAM in education; generalization of theoretical insights and their comparison with the current sociocultural situation; experimental data measurement acquired in the course of research, as well as their systemic and qualitative analysis. The scientific novelty consists in designing an original technology “ExSTREAMal Reading of Russian Classics” that acquaints modern schoolers with classic literature based on the development of innovative thinking and skills of the XXI century. The main conclusions lie in substantiation of the efficiency of application of such technology for developing educational motivation and encouraging modern schoolers to read. Tarnoff, John. STEM to STEAM. Recognizing the Value of Creative Skills in the Competitive. [Elektronnyy resurs]. – URL: http://www. huffingtonpost.com/john-tarnoff/stem-to-steam-recognizing_b_756519.html (data obrashcheniya: 09.10.2018). Kyle, Chayka. Can the U.S.'s Science Education Initiative Succeed Without the Arts? A Growing Chorus Says No. [Elektronnyy resurs]. – URL: http://artinfo.com/news/story/820916/can-the-uss-science-education-initiative-succeed-without-the-arts-a-growing-chorus-says-no (data obrashcheniya: 15.11.2018). FROLOV A. V. REFORMA INNOVATsIONNOY SISTEMY SShA: OT STEM K STEAM OBRAZOVANIYu // Alma mater (Vestnik vysshey shkoly). – 2013. – № 1. – S. 101-105. Debroy, Ananya. What is STREAM Education & Why is It Gaining Popularity? [Elektronnyy resurs]. – URL: http://edtechreview.in/trends-insights/insights/2968-what-is-stream-education (data obrashcheniya: 16.12.2018). Review: The subject of this research is the method and system of control and development of visual-algorithmic thinking of university students. The author introduces the concepts of visual analysis and visual synthesis; active, passive and mental visualization of the exercises in geometry, analysis and mechanics. Visual and algorithmic thinking is integrated into the concept of visual-algorithmic thinking. The article describes an experiment and test results, which goals consisted in determining the level of visual and algorithmic thinking of the university students. Correspondence between the conceivable images of fuzzy space of the visual-algorithmic thinking and the sharp geometric images of the actual geometric space underlie the method of development and control of the visual-algorithmic thinking. For realization of this method, the author builds the geometric patterns of fuzzy shapes, transformations, relations and circumstances. The article presents the classification of visual algorithms and assessment of their complexity, as well as the control-flow chart of such algorithm. The main conclusion consists in the statement that the experience of using the method of visual-algorithmic thinking for problem solving and the developed system demonstrates the positive moments in the forming of visual-algorithmic thinking, but its implementation into the educational process is yet challenging, as it requires restructuring of the process and additional time input. Gudkov V. V., Nazarova I.R. Rol' vizual'nogo myshleniya v formirovanii proektno-konstruktorskikh kompetentsiy inzhenera // Inzhenernyy vestnik. 2016. № 6. S.1001 – 1007. Mikhaylova T.S. Formirovanie ponyatiya «proizvodnaya funktsii» na osnove razvitiya vzaimosvyazi teoreticheskogo i vizual'nogo myshleniya // Vestnik Altayskoy gosudarstvennoy pedagogicheskoy akademii. 2010. № 2. S. 121 – 125. Dalinger V.A. Formirovanie vizual'nogo myshleniya u uchashchikhsya v protsesse obucheniya matematike. Omsk: OmGPU, 1999. 157 s. Shcherbakova E. E. Formirovanie pedagogicheskoy kreativnosti studentov vuza v usloviyakh professional'noy podgotovki: dissertatsiya … kandidata psikhologicheskikh nauk / E. E. Shcherbakova. – Nizhniy Novgorod, 2000. – 221 s. Molodtsova N. G. Razvitie vizual'nogo myshleniya u detey mladshego shkol'nogo vozrasta na materiale proizvedeniy zhivopisi: dissertatsiya ... kandidata psikhologicheskikh nauk [Elektronnyy resurs] / N. G. Molodtsova. – Nizhniy Novgorod, 2001. – 219 s. Review: The object of this research is the assessment methods of the formation of students’ competencies. The subject of this research is the correlation between the results of intermediate and final certification of students. The author examines the existing assessment techniques of the level of students’ competences in the process of mastering the curriculum. Based on the example of 200 students in the field “Law Enforcement Activity”, the author meticulously analyzes the correlation between the certification results in certain disciplines and final grades received by the students for state examinations and graduation thesis. The research method is the application of systemic and comparative statistical analysis of the results of intermediate and final certification of students throughout the entire period in the educational facility. The conclusion is made on strong correlation between the majority of assessments of the level of students’ competencies, acquired based on the results of intermediate certification using the traditional competency matrices, which decreases the information value comparing to the results of terminal examinations. It is suggested assessing the level of students’ competencies based on the term papers and state final examination. – S.29–35. 2.Galimullina N.M. Obshchekul'turnye kompetentsii v sisteme podgotovki bakalavrov tekhnicheskikh napravleniy // Sovremennoe obrazovanie. – 2016. – № 4. – S.75–86. – S. 13–18. 4.Anisimova M.A., Blyakherov I.S., Maslennikov A.V., Morzhov A.V. K voprosu o proektirovanii otsenochnykh sredstv sformirovannosti kompetentsiy // Vysshee obrazovanie v Rossii, 2013, № 4. – S. 106–112.
2019-04-25T22:05:22Z
https://en.nbpublish.com/e_pp/
The BIG score (Admission base deficit (B), International normalized ratio (I), andGlasgow Coma Scale (G)) has been shown to predict mortality on admission inpediatric trauma patients. The objective of this study was to assess itsperformance in predicting mortality in an adult trauma population, and to compareit with the existing Trauma and Injury Severity Score (TRISS) and probability ofsurvival (PS09) score. A retrospective analysis using data collected between 2005 and 2010 from seventrauma centers and registries in Europe and the United States of America wasperformed. We compared the BIG score with TRISS and PS09 scores in a population ofblunt and penetrating trauma patients. We then assessed the discrimination abilityof all scores via receiver operating characteristic (ROC) curves and compared theexpected mortality rate (precision) of all scores with the observed mortalityrate. In total, 12,206 datasets were retrieved to validate the BIG score. The mean ISSwas 15 ± 11, and the mean 30-day mortality rate was 4.8%. With an AUROC of0.892 (95% confidence interval (CI): 0.879 to 0.906), the BIG score performed wellin an adult population. TRISS had an area under ROC (AUROC) of 0.922 (0.913 to0.932) and the PS09 score of 0.825 (0.915 to 0.934). On a penetrating-traumapopulation, the BIG score had an AUROC result of 0.920 (0.898 to 0.942) comparedwith the PS09 score (AUROC of 0.921; 0.902 to 0.939) and TRISS (0.929; 0.912 to0.947). The BIG score is a good predictor of mortality in the adult trauma population. Itperformed well compared with TRISS and the PS09 score, although it hassignificantly less discriminative ability. In a penetrating-trauma population, theBIG score performed better than in a population with blunt trauma. The BIG scorehas the advantage of being available shortly after admission and may be used topredict clinical prognosis or as a research tool to risk stratify trauma patientsinto clinical trials. The early prediction of mortality in trauma patients is challenging but has importantpotential benefits. The utility of existing mortality-prediction tools is confined toretrospective applications such as quality assessment, as they rely on variables notavailable in the early phases of care (such as the injury severity score). Accurateearly prediction of the risk of death might have the potential to inform triagedecisions, inform treatment, or stratify patients for further care. In particular, itwould be attractive as an entry criterion for clinical trials to match an interventionto an appropriate at-risk population. The BIG score (Admission base deficit (B), International normalized ratio (I), andGlasgow Coma Scale (G)) is a mortality-predicting score that has been shown to predictmortality accurately on admission in a cohort of pediatric trauma patients from amilitary trauma system. The BIG score performed better than other pediatric traumascoring systems and was validated in a separate pediatric population with similaraccuracy . The BIG score has not been appliedto adults, and its accuracy has not been compared with that of existing traumamortality-prediction tools. The first aim of this study was to assess whether the BIG score can predict mortality inan adult trauma population and to compare the predictive ability of the BIG score withthe commonly used mortality-predicting Trauma and Injury Severity Score (TRISS; TraumaScore and Injury Severity Score (ISS) based on the ISS and the Revised Trauma Score(RTS), age and injury mechanism) and PS09 (Probability of Survival; model 09 based onISS, GCS, age, gender and intubation) score [1–5]. A second aim was to evaluate and compare the ability to predict mortality of all scoreson different subgroups. A data-collection template was developed to collect all needed parameters from theparticipating sites. All primary admitted trauma-team activation patients aged 18years or older during the period 2005 to 2010, inclusive, were eligible. Onlypatients with available and complete datasets for the calculation of the analyzedscoring systems (BIG, TRISS, and PS09) were included in the study (n =15,730). In a second step, only patients with an ISS ≥4 were considered. Thisrequires at least an AIS 2 type of injury and excludes all minor injuries. Finally,data from 12,206 patients from one military and six civilian trauma centers andregistries in Europe and the United States were collected and retrospectivelyanalyzed. We used 30-day mortality as the primary outcome parameter of our analysis.We then compared the BIG score against the TRISS and PS09 score on a representativepopulation of trauma patients. Subgroup analysis only on patients with blunt orpenetrating trauma was additionally done. Data were collected from four trauma centers participating in the InternationalTrauma Research Network (INTRN; Amsterdam, Oslo, London, San Francisco), from theGerman TraumaRegister DGU (TR-DGU) and also from two participating registries in theUnited States (Joint Theater Trauma Registry (JTTR) and the Trauma Registry of theOregon Health & Science University, Portland, OR). All participating sites arelevel-1 trauma centers. The International Trauma Research Network (INTRN) is a formal academic network ofhigh-volume trauma centers across Europe and the United States. The group was formedin 2009 and has grown strategically, developing fundamental, translational, andclinical research programs that span the complete breadth of trauma disciplines[6, 7]. The TraumaRegister DGU (TR-DGU) is a prospective multicenter database withstandardized documentation of patients with severe trauma and thus requiringintensive care. This registry comprises detailed information on demographics andclinical and laboratory data. Data from the TraumaRegister DGU include patients fromabout 108 trauma units around Germany . The Oregon Health and Science University (OHSU) Trauma Registry contains informationfrom more than 45,000 patients treated since 1985. The registry contains detailedinformation for each patient concerning prehospital, ED, and in-hospital care. Allresearch projects are approved by an Institutional Review Board (IRB). The Joint Theatre Trauma Registry (JTTR) was established by the Department of Defenseto collect comprehensive data on all personnel, military and civilian, admitted tomilitary treatment facilities within Iraq and Afghanistan. It is maintained at the USArmy Institute of Surgical Research in San Antonio, Texas, USA. Data are handled anonymously, and case identification is possible only through theparticipating hospital. For our analysis, we compared the original pediatric BIG score with the commonly usedTRISS and PS09 scores [1, 2, 9]. In a second approach, we tested the mortalityprediction of the BIG score on our blunt-trauma and separately on ourpenetrating-trauma patients and compared the score again with the TRISS and the PS09scores (Table 6). All seven databases are shown together with the number of patient data contributedby each site. n, total number of patients. Demographic data of all sites compared. Data are presented as mean and standard deviation (SD) or as percentage. ISS,Injury Severity Score; ICU, Intensive Care Unit; TRDGU, TraumaRegisterDGU® of the German Trauma Society; JTTR, Joint TheaterTrauma Registry; INR, International Normalized Ratio. Data are presented as mean or as percentage. ICU, Intensive Care Unit; INR,International Normalized Ratio. Quality criteria for all scores compared. Quality criteria for all scores on all data (n = 12,206), on all blunt(n = 6,540) and penetrating (n = 5,666) trauma patients.Data are presented as AUROC (Area under receiver operating characteristiccurve) together with a 95% Confidence Interval (CI). BE: Base Excess; INR: International Normalized Ratio; GCS: Glasgow Coma Scale;ISS: Injury Severity Score; RTS: Revised Trauma Score. The pediatric BIG score is a mortality-predicting score for children with traumaticinjuries. It was developed by Borgman and colleagues in 2011. They retrospectivelyanalyzed data from 2002 to 2009 and found that admission base deficit (B),international normalized ratio (I), and Glasgow Coma Scale (G) were independentlyassociated with mortality. The variables were combined into the pediatric BIG score(base deficit + (2.5 × international normalized ratio) + (15 Glasgow ComaScale)). This equation can then be implemented into a mortality-predicting formula:predicted mortality = 1/(1 + e-x), where x = 0.2 × (BIGscore) - 5.208. A BIG score of <12 points suggests a mortality of <5%, whereasa cut-off of >26 points corresponds to a mortality of >50%. The BIG score can beperformed rapidly on admission to evaluate severity of illness and to predictmortality in children . Physiological and anatomic data are included in the Trauma Injury Severity Score(TRISS) that was published in 1987 by Boyd and colleagues based on a North American population. Since then, theestimation of prognosis is also discussed critically, which led to severalreevaluations of the score [10, 11]. TRISS combines the variables anatomic injury (ISS),physiological derangement (RTS), patient age, and injury mechanism to predictsurvival from trauma [2, 12]. TRISS quickly became the standard method for outcomeassessment [12, 13]. Forour analysis, we used the TRISS method with its coefficients published by Championand colleagues in 1990 (MTOS 1990) . In 2006, Bouamra and colleagues published a new survival prediction model based on data from the UK Trauma Audit andResearch Network (TARN). Since 1989, TARN used TRISS as a score to predict outcome,initially with the MTOS 1990 coefficients, and later with UK TARN-derived TRISScoefficients. However, with the TRISS method, a large amount of data was lost. In thePS09 model, the prediction-model coefficients have been revised on recent data; themodel still includes all those subsets by using age, a transformation of ISS, GCS,gender, and Gender × Age interaction as predictors . The statistical analysis of this study is based on the data from six civilian and onemilitary database, extracting data from specified periods between 2005 and 2010.Demographic data are presented as means with standard deviation (SD) for continuousvariables and as percentages for incidence rates. The U test was used forcontinuous variables, and the χ 2 test for categoric variables. Statistical significance was set at P valuesless than 0.05. The quality of all scoring systems in predicting mortality wasanalyzed and presented in terms of discrimination and precision. Discriminationmeasures the ability of a scoring system to separate survivors from nonsurvivors.This was measured with the area under the receiver operating characteristic curves(AUROCs). The ROC curve summarizes the trade-off between sensitivity and specificityof a predictive score by using all score values as potential cut-off values. Itsvalue varies between 0.5 (no discrimination) and 1.0 (perfect discrimination). AUROCsare presented with 95% CI, and differences between AUROC curves were evaluated byusing a method derived by Hanley and colleagues . In addition, the precision describes how well a score-basedprognosis is able to meet the observed mortality rate. All statistical analyses wereperformed by using IBM SPSS 20 (IBM SPSS Inc, Chicago, IL, USA). In total, 12,206 patients were included in the study. Of those, 4,949 patients wereincluded by civilian trauma centers, and 7,257 (59%) patients were included by militarytrauma centers (Table 1). Table 2 provides an overview of demographic and baselinephysiological data of each database. Data are presented as means or as percentages.The mean ISS was 15 ± 11 with a 30-day mortality rate of 4.8%. Table 4 presents all variables associated with mortality. In total, 588(4.8%) patients died. Survivors were younger (33.2 versus 50.4 years) and were morelikely to sustain penetrating trauma (47.5% versus 26.0%). Nonsurvivors had asignificantly higher ISS (33 versus 14; P < 0.001), a worse mean baseexcess (-6.9 versus -1.9; P < 0.001), and a lower GCS (7 versus 14; P < 0.001). Table 4 characterizes quality criteria for all scores compared.The table presents the discrimination and precision ability of the BIG, TRISS, andPS09 scores for all patients as well as for a blunt- and penetrating-traumapopulation. The AUROCof the BIG score and the TRISS score are significantly different(P < 0.001). The difference between the TRISS and PS09 scores is notstatistically significant (P = 0.32) in the combined dataset. The expected mortality rate (precision) of the BIG score, PS09 score, and TRISS wascompared with the observed mortality rate. In Table 4, theobserved mortality of all patients is set by 4.8%. The expected mortality calculatedfor the BIG score is 4.8%, whereas the expected mortality of the TRISS and PS09scores are 6.6% and 7.9%, respectively. Comparing only patients who sustained blunt trauma (n = 6,540), our analysisshows that the overall accuracy of the PS09 score had an AUROC of 0.921 (95% CI,0.911 to 0.932), the TRISS score of 0.917 (95% CI, 0.906 to 0.928), and the BIG scorehad an AUROC of 0.876 (95% CI, 0.859 to 0.892). The difference between AUROC of theBIG score and the TRISS score is significant (P < 0.001). The differencebetween the TRISS and PS09 score is not statistically significant (P = 0.24)in the blunt dataset. In patients with penetrating trauma (n = 5,666), the BIG score (0.920; 95%CI, 0.898 to 0.942) performed comparably to the PS09 score (0.921; 95% CI, 0.902 to0.939). The TRISS score had an AUROC of 0.929 (95% CI, 0.912 to 0.947). Thedifference between AUROC results in the penetrating group was not significant (allP > 0.16). On a military dataset (n = 7,257), the BIG score had an AUROC of 0.929 (95%CI, 0.909 to 0.949), and the PS09 score had an AUROC of 0.922 (95% CI, 0.904 to0.940) and TRISS of 0.915 (95% CI, 0.891 to 0.939) (all P > 0.31). On acivilian dataset (n = 4949), the PS09 score had a similar AUROC (0.901; 95%CI, 0.887 to 0.914) to the TRISS (0.896; 95% CI, 0.882 to 0.909; P = 0.24).The AUROC of the BIG score (0.849; 95% CI, 0.830 to 0.868) was significantly lower(P < 0.001) (Table 5). Figure 1 depicts the AUROCs for the BIG, TRISS, and PS09 scoreson all blunt and penetrating trauma patients combined. Receiver operating characteristic (ROC) curves for the BIG, TRISS and PS09score. For the first time, the performance of the BIG score was analyzed on an adult traumapopulation. Data from civilian and military trauma centers and registries with arepresentative trauma population of blunt and penetrating trauma were used for thecurrent analysis. When all scores were tested on the whole dataset, the BIG scoreperformed well in predicting mortality in the adult trauma population. Unlike complexscoring systems, the BIG score can be used directly on admission of a trauma patient,because it uses variables that are rapidly available for assessing severity of illnessand predicting mortality. Time-consuming parameters like the ISS are not included withinthe BIG score. Hence, the BIG score might be used for trauma trials in which mortalityis the intended primary outcome parameter. In the present analysis, the BIG score was shown to perform well in predicting mortalityin the penetrating-trauma population versus the blunt-trauma population. The TRISS andthe PS09 scores slightly overpredicted mortality in all subgroups. The BIG scoreoverpredicted mortality only in the penetrating-trauma group. In addition, the mortalityprediction of the BIG score was more accurate on military trauma data than on civiliandata. This might be due to its composition, as the BIG score includes parameters highlyreflecting the two major causes of acute death from trauma (for example, brain injuryand uncontrolled hemorrhage [1, 16–18]). Inassessing the epidemiology of trauma death, Sauaia and co-workers identified central nervous system (CNS) injuries torepresent the most frequent cause of death (42%), followed by exsanguination (39%). TheBIG score reflects these observations by including INR and GCS in the calculation. TheINR provides information about the hemocoagulative status of the patient [17, 20, 21],whereas the GCS is used as a surrogate marker for the level of consciousness and toestimate its severity, due to either traumatic brain injury (TBI) or severehypoperfusion [22–24]. However, the GCS was recently challenged, and the role as atool to reflect the mental status of a trauma patient is widely discussed . The third parameter of the BIG score, base deficit (BD), was shown to be a valuableindicator of shock, abdominal injury, fluid requirements, efficacy of resuscitation, anda predictor of mortality after trauma [26–31]. In the past, several scoring systems and algorithms have been developed to predictmortality in the trauma population. The one most closely related to the BIG score is theEmergency Trauma Score (EMTRAS), developed by Raum and colleagues from data derived from the TraumaRegister DGU. Thisscore includes similar components to the BIG score, including GCS, base excess (BE), andprothrombin time (PT), as well as age. When this score was compared with the RevisedTrauma Score (RTS), ISS, NISS, and TRISS scores with regard to mortality after trauma,the EMTRAS was superior. However, the EMTRAS was developed and validated on one singleand retrospective database and therefore has not been validated externally orprospectively . Perel and co-workers recently developed a prognostic modelfor early death in patients with traumatic bleeding on a dataset from the ClinicalRandomisation of an Antifibrinolytic in Significant Haemorrhage (CRASH-2) trial andvalidated the score on 14,220 selected trauma patients from the Trauma Audit andResearch Network (TARN). Glasgow coma scale score, age, and systolic blood pressure werethe strongest predictors of mortality. A chart was constructed to provide theprobability of death at the point-of-care. Future research must evaluate whether the useof this prognostic model in clinical practice has an effect on the management andoutcomes of trauma patients . Most other scoring systems and algorithms to predict mortality in the trauma populationon admission are limited because of their complexity and the high number of variablesincluded for calculation. With this, the Trauma Injury Severity Score (TRISS), forexample, offers a standard approach for evaluating outcome of trauma care . Similar to the TRISS, the PS09 score uses acombination of anatomic and physiological parameters. However, information on the entireand complete injury pattern is usually difficult to obtain in the acute phase ofEmergency Department (ED) care and requires potentially time-consuming imagingtechnology. Limitations of both scores are multiple and widely discussed in theliterature [2, 9, 10]. Of note, it also takes trained personnel significant time toreview charts and calculate complex scores, so that the clinical use of these approacheshas to be questioned. Limitations of the present study are the same that are inherent in retrospective reviewsusing registry data. To generate the dataset for the present analysis, a number ofpatients had to be excluded as a result of missing data in the contributing registries,resulting in a selection bias of patients. Only patients with complete datasets wereincluded in the study. In a subgroup analysis, we excluded patients with minor injuries(ISS < 4), which reduced the dataset by about 20%. These excluded patients are mostlikely survivors. Trauma mortality scores must be evaluated on a trauma population witha certain amount of injury severity to predict mortality accurately. On a traumapopulation without an ISS limitation, we proved that all three scores had slightlybetter AUROC results, because outcome prediction is easy in the group of patients withminor injuries. The fact that one registry (San Francisco) obviously contributed more severely injuredpatients with impaired outcome into the joint dataset might also have biased theresults. A similar effect may have been related to the contribution of morepenetrating-trauma patients derived from the military database. The BIG score waives the need for anatomic classifications and physiologic parameters,like systolic blood pressure, heart rate, or respiratory rate. The GCS is a simpleclinical assessment, whereas BE and INR can easily and quickly be obtained frompoint-of-care devices in the ED setting. These results are usually known within minutesof ED arrival. The BIG score does not require any variables that are not readilyavailable in the acute phase of injury care (for example, ISS, NISS). Therefore, wethink that the BIG score can be used to identify trauma patients at risk. However, theBIG score was shown to predict mortality accurately in an adult trauma population, andit may be used to determine inclusion criteria for prospective acute care researchstudies. Our results show that the BIG score, initially developed and validated in the pediatrictrauma population, can also predict mortality in the adult trauma population. The BIGscore performs well compared with complex scoring systems like the TRISS and PS09scores, although it has significantly less discriminative ability. The score was shownto perform superiorly in the penetrating trauma-population and on a military dataset,which could make it a useful system in combat casualties, for whom time and resourcesare limited. In addition, the BIG score can be used independent of injury severity, andit can be used to determine inclusion criteria for prospective acute care researchstudies. This study validated three mortality-predicting scores on amulticenter database with military and civilian data. The BIG score has been shown to predict mortality in pediatric traumapatients. Our analysis show that this score can also be used on a representative adulttrauma population. In the present analysis, the BIG score was shown to perform well inpredicting mortality in the penetrating trauma population versus the blunt traumapopulation. The BIG score is based on information available shortly afteradmission. Mortality predicting scores that are quickly available in theEmergency Department can be a useful tool to include patients in acute care researchstudies. TraumaRegister DGU of the German Trauma Society (DGU). TB contributed to study design, acquisition and interpretation of data, recording ofpaper and analyzing data. PS, KB, MM, MS, and MB conceived of the study, providedstatistical advice on study design, and analyzed data. RL, KB, and MM contributed toanalysis and interpretation of data and revision of the article. All other authorscontributed to data collection and to manuscript revision. All authors read and approvedthe final manuscript for publication. This article is published under license to BioMed Central Ltd. This is an open access article distributed under the terms of the Creative CommonsAttribution License (http://creativecommons.org/licenses/by/2.0), whichpermits unrestricted use, distribution, and reproduction in any medium, provided theoriginal work is properly cited.
2019-04-26T04:20:24Z
https://ccforum.biomedcentral.com/articles/10.1186/cc12813
Many of our articles are inspired by the cars we spot in and around Los Angeles. Your author has encountered cars as diverse as a Bugatti Veyron, a Jaguar XJ12C, and a Fiat Multipla — not at car shows or museums, but parked on the street or driving in traffic. Every so often, we run across something exotic enough that even we can’t immediately identify it — something like this Autobianchi A112 Abarth. We must admit that we didn’t immediately recognize this little car and it took some research to determine exactly what it was. Our first thought was that it was a Fiat of some kind, which was almost correct. In fact, it is a 1972 Autobianchi A112 Abarth, a mouthful of a moniker that bears some explanation. The Autobianchi A112 Abarth is a little bigger than a BMC Mini, but not by much: 127.6 inches (3,240 mm) long on an 80.3-inch (2,040mm) wheelbase, tipping the scales at around 1,600 (725 kg) with a fuel tank of fuel. It has disc/drum brakes, MacPherson struts up front, and wishbones with a transverse leaf spring in the rear. If you have any interest in bicycles, you may recognize the name Bianchi, an Italian manufacturer of high-end racing bikes. The Milanese company, which holds the distinction of having offered the world’s first bicycle with pneumatic tires, was founded by Edoardo Bianchi in 1885. Two years later, the company introduced a three-wheeled motorbike and in 1901–1902 developed its first automobile. In 1905, Bianchi was reorganized as S.A. Fabbrica Automobili e Velocipedi Edoardo Bianchi & Co., offering a variety of products and even undertaking some racing. During the first World War, Bianchi produced military vehicles for the Italian army, returning to passenger-car production after the war. However, the company fell on hard times during the postwar depression, which was difficult for all makers of expensive cars. Bianchi was forced to concentrate more on motorcycles and bicycles than cars, although the auto business had recovered somewhat by the mid-thirties. Like many automakers of the Axis nations, the Bianchi works were targets of Allied bombing during World War II, leading to the near-total destruction of the Milan factory in 1943. By 1946, Bianchi had returned to production, but Giuseppe Bianchi, son of the founder, decided to drop the passenger car lines to focus instead on bicycles and commercial vehicles. In the fifties, general manager Fernacio Quintavalle began exploring the possibility of returning to automotive production with a new subcompact car. Since Bianchi could not afford such a project independently, Quintavalle negotiated a joint venture between Bianchi, Fiat, and the tire manufacturer Pirelli, dubbed Autobianchi SpA. Autobianchi’s first product was the 1957 Bianchina, which was based on the contemporary Fiat 500. Bianchi’s family, which had owned 33% of the business, subsequently sold their interest in the joint venture to Fiat, which acquired the rest in 1968. Autobianchi’s role in the Fiat lineup was akin to Honda’s later North American Acura division: a somewhat more expensive brand generally selling upscale versions of existing Fiat cars. By the mid-sixties, Fiat was also using Autobianchi as an opportunity to try out new technologies on a smaller scale before introducing them to the mainstream brand. For example, the Autobianchi Primula, which bowed in 1964, actually introduced the groundbreaking transverse-engine/front-wheel-drive layout later used by the 1969 Fiat 128. The three-door hatchback layout was still a novelty in the late sixties and early seventies, but by the time Volkswagen’s rival Golf debuted in 1975, it became de rigueur for subcompact cars. The Autobianchi A112 was available only in three-door form, but the Fiat 127 that shared its platform and body shell was also offered as a two- or four-door sedan. Fiat advertising claimed the 127 and A112 made 80% of the body available for passenger and cargo space. A few years earlier, the BMC Mini had demonstrated the packaging advantages of a transverse engine and front-wheel drive. By consolidating the entire drivetrain into a single compact unit, the rest of the body’s volume is available for passenger space. The problem with that layout, however, was what to do with the transmission. Alec Issigonis, designer of the Mini, opted to mount the transaxle in the engine sump, sharing its oil supply. This was compact but problematic; engines and transmissions have very different oiling requirements and requiring them to share lubrication results in compromises that are satisfactory for neither. Such an arrangement also tends to be noisy because of the need for transfer gears between gearbox and differential. Fiat engineers wanted the space advantages of a FWD layout, so they opted to offset the transversely mounted engine and mount the transaxle next to it, driving the front wheels through unequal-length halfshafts. This provides a powertrain package almost as compact as that of the Mini, but with no need for transfer gears nor any of the drawbacks associated with putting the gearbox in the oil pan. The layout did have its limitations, including poor access for repair and maintenance and a tendency of the unequal-length halfshafts to exacerbate torque steer, although with well under 100 horsepower, the latter was not a great problem for most small FWD cars. (The Primula had a 1,221 cc (75 cu. in.) four making no more than 65 PS (48 kW). The Autobianchi A112, introduced in October 1969, applied the technology of the Primula on a smaller scale, becoming the forerunner of the modern “supermini” class. Although it was a very small car, only 127.2 inches (3,320 mm) long and 58.3 inches (1,480 mm wide), its three-door configuration made it usefully versatile, particularly on the plusher A112 E, with its folding rear seat. A curb weight of only about 1,550 lb (705 kg) ensured good fuel economy and sprightly performance even with the modest 44 PS (32 kW) of the standard 903 cc (55 cu. in.) four, adapted from the one in the rear-engine Fiat 850. The A112 was not a sporty car per se, but its fully independent suspension (MacPherson struts up front; wishbones and a transverse leaf spring in back) gave it nimble handling despite the diminutive 135SR13 tires, although with 60% of its weight on the nose, the little Autobianchi naturally tended to understeer. Front disc brakes provided good stopping power. Just as the Mini’s agility had made it a favorite of rally drivers, spawning the Mini Cooper and Mini Cooper S performance derivatives, the A112 soon got its own performance model: the Autobianchi A112 Abarth. The Bolognese firm of Abarth & C. was an early example of what today we would call a tuner. It was founded by former motorcycle racer Karl Abarth. Although Abarth was Viennese, he had worked in Italy in the twenties and resettled there permanently in 1934, becoming a naturalized citizen and changing his first name to Carlo. After the war, he became a director of Cistalia, but after that venture went into receivership in early 1949, Abarth and Armando Scagliarini decided to start their own firm. The company’s new logo was a distinctive scorpion emblem, derived from Abarth’s astrological sign, Scorpio. Abarth & C.’s primary focus was racing; Scagliarini’s son Guido, who had previously driven for Cistalia, won two national championships in 1949 behind the wheel of the first Abarth cars. The firm’s bread and butter, however, soon became high-performance exhaust systems and other speed equipment for street cars. By 1962, Abarth was selling more than a quarter million mufflers a year. The distinctive scorpion emblem of Abarth & C., recently revived by present owner Fiat. Along the way, Abarth built relationships with other manufacturers and coachbuilders, including Lancia, Fiat, Zagato, Boano, and Pininfarina. Abarth & C. offered highly tuned competition versions of a wide range of cars, from the Simca 1300 to the Porsche 356B. The majority of Abarth’s cars were Fiats — natural enough, given that Fiat was Italy’s largest automaker. By 1967, Abarth had offered more than a dozen Fiat-based models. It should be no surprise, therefore, that Abarth also turned his attention to the A112. In fact, his company built their first prototypes of a hopped-up A112 only a few months after the car’s launch in 1969, fitted with a race-tuned version of the four-cylinder Fiat engine Abarth had already developed for the company’s other products. By this time, however, the company was not doing well financially despite its strong reputation. Abarth’s cars had won thousands of races, but that wasn’t enough to keep the business afloat in a very competitive market. Abarth, then in his sixties, decided he’d had enough. In the summer of 1971, he sold the company to Fiat. A short time after that, Abarth and his wife moved back to Vienna, where he died in 1979. After 1971, Abarth effectively became Fiat’s performance division. One of Abarth’s first post-buyout models was the Autobianchi A112, introduced at the Turin show that fall. The production A112 Abarth used a long-stroke 982 cc (60 cu. in.) version of the standard engine, fitted with twin Weber 32 DMTR carburetors, a higher compression ratio, a hotter camshaft, an oil cooler and heavy-duty radiator, and of course an Abarth exhaust system. In this form, the engine was rated at 58 PS (43 kW) and 54 lb-ft (74 N-m) of torque. This was accompanied by a sport suspension and sport seats, a new instrument panel with full instrumentation, a slightly taller final drive ratio, an oil cooler, and a brake booster. The extra equipment only added about 45 lb (20 kg) to the A112’s curb weight, so power-to-weight ratio was much improved, trimming about 3 seconds from the standard car’s 15-second 0-62 mph (0-100 km/h) times and bringing top speed to about 93 mph (150 km/h). Although not outstanding by today’s standards, this was fine performance for a small European car of its era. List price was 1,309,000 lire, representing a premium of about 25% above the standard A112. In early 1975, a bigger, 1,050 cc (64 cu. in.) engine with 70 PS (51 kW) and 63 lb-ft (85 N-m) of torque became optional on a new model dubbed A112 Abarth 70; the smaller-engined version, now called A112 Abarth 58, remained available through 1976. The big-engine Abarth was about a second quicker to 62 mph (100 km/h) than was the original and had a top speed of almost 100 mph (160 km/h). A five-speed gearbox became available in 1979, when the A112 line got its fourth modest facelift. (Three previous revisions had occurred in 1973, 1975, and late 1977; two more followed in late 1982 and the spring of 1984). Ground effects and spoiler border on the ludicrous for a car with a top speed under 100 mph (161 km/h), but helped to distinguish the Autobianchi A112 Abarth from the mundane A112, which was of prime importance to Fiat. The rear fog lights on this car were required in some European markets. The A112 was quite successful and competition A112s would be popular rally cars throughout the seventies, even leading to the creation of a one-marque racing series. Back in 1969, Fiat had acquired Lancia, and in the mid-seventies, Autobianchi was rolled into the Lancia organization. By the late seventies, Fiat had dropped the Autobianchi brand in many export markets, rebadging the A112 as a Lancia in those markets. Nonetheless, the A112 remained very popular despite its age. It survived with only modest evolutionary changes through April 1986, selling a total of 1.25 million units. More than 10% of those were the Abarth version. The Autobianchi brand survived in Italy and France until 1995 and was finally dropped when the last Autobianchi model, the Fiat Panda-based Y10, was replaced by the Lancia Ypsilon. Fiat eventually sold the rights to the Autobianchi name to Registro Autobianchi, the official Autobianchi club. Abarth languished after Fiat’s withdrawal from racing in the mid-1980s, but in 2007, CEO Sergio Marchionne announced his intention to restore Abarth to its role as Fiat’s performance arm, establishing new dedicated offices in Turin. Its first products were the Grande Punto Abarth and dealer-installed Abarth SS, offering up to 180 hp (132 kW) from Fiat’s turbocharged 1,368 cc (86 cu. in.) engine. This was joined in the fall of 2008 by an Abarth version of the new FIAT 500 supermini. To the best of our knowledge, Autobianchi was never officially imported to the U.S. and we doubt the A112 Abarth would ever have met increasingly stringent federal standards. The owner indicated that it is one of only three of its kind in the States — a rare and remarkable little car. Our sources included “Autobianchi A112” and “Autobianchi A112 Abarth,” Autobianchi Club de France, n.d., www.clubautobianchi. fr/ Presentation_445.html and www.clubautobianchi. fr/ Presentation_448.html, accessed 28 December 2008; Autobianchi SpA/J. Leonard Lang Automobielbedrijven N.V., “Autobianchi Primula” [Dutch brochure AP-7500], August 1966; the Cars from Italy “Other Makes” page, carsfromitaly. net/others/ index.html, accessed 28 December 2008; Mike Covello, Standard Catalog of Imported Cars 1946-2002, Second Edition (Iola, WI: Krause Publications, 2001); Sergiò D’Angelò, ed., World Car Catalogue 1966 (Bronxville, NY: Herald Books/Automobile Club of Italy, 1966); Edwin Storm’s Free Car Brochures website at the Old Car Manual Project (storm.oldcarmanualproject. com); Vignale Gamine, “The Autobianchi A112,” n.d., www.vignale-gamine. com, accessed 28 December 2008; “Historique,” Autobianchi Club de France, n.d., www.clubautobianchi. fr/ Historique_363.html, accessed 28 December 2008; L’Editrice Dell’Automobile LEA, World Cars 1973 (Bronxville, NY: Herald Books, 1973), and World Cars 1979 (Pelham, NY: Herald Books, 1979); Edouard Seidler, “Import Report: A Fiat for People Who Don’t Like Fiats,” Motor Trend September 1969, p. 22; the Sporting Fiats Club’s A112 Abarth page, www.sportingfiatsclub. com, accessed 30 December 2008; “Storia Bianchina,” Bianchina Club, n.d., www.bianchinaclub. com/ ita/ storia-bianchina.html, accessed 28 December 2008; Daniel Vaughan, “1959 Autobianchi Bianchina,” Conceptcarz.com, www.conceptcarz. com, accessed 30 December 2008; and the Wikipedia® entries for Autobianchi and Autobianchi A112 (en.wikipedia.org/wiki/Autobianchi and en.wikipedia.org/wiki/Autobianchi_A112, accessed 11 October 2008). Additional background on Carlo Abarth came from the Sporting Fiats Club’s bio, n.d., www.sportingfiatsclub.com, accessed 30 December 2008; the Abarth Cars U.K. history page, abarthcarsuk. com/ about-abarth/ the-history-of-abarth/, last accessed 5 August 2015; “A Long and Successful History Lies Behind the Revived Abarth Name,” Italiaspeed.com, 26 February 2007, www.italiaspeed. com, accessed 31 December 2008); and Mark Wan, “Grande Punto Abarth,” AutoZine.org, 10 October 2007, www.autozine. org/html/Fiat/Punto.html, accessed 28 December 2008. For the record, AutoBooks, pictured in the background of some of the images, had no connection with this article and we have no business relationship with them other than being a customer and occasionally attending some of the local events they organize. Cool article! I guess I have one of the other two in the country! Mine was imported from Netherlands a couple of years ago. Are we sure those aren’t reverse lights? Possibly added so it could be street legal in the US? I think that the US is pretty much the only country that requires the reversing lights built into the taillight housing, it also appears that they requite two, but this is just from observation. Look at the tail of a European 1st gen. New Mini and you will see a single reversing light (I think in Europe this also lights up red for a rear facing fog/inclement wether light) in the center of the lower bumper. US models have the bumper molded to show where this would go, but have the reversing lights in the taillight housings. Now how far back these regs go, I don’t know (and didn’t try and find out.) If you see the owner of this car again, it would also be interesting to see if he knows whether they are factory or not. Informative as always. Clearly I didn’t do any research on the taillight laws in the US, but just made an assumption based on never seeing ones in the bumper. And now that I type that out I do believe there are some GM cars, Pontiac Grand Prix? that I recall having them in the bumper. Yeah, a number of U.S. models put them in the bumper; either side of the rear numberplate is also common. Mounting the lights in the bumper is not particularly desirable — it means they’ll break in even a minor parking lot shunt — but it’s legal enough. Wow! An A112 in L.A. it’s just too cool! I’m italian, here there’s still some of these cute little cars walking down the road, about 10 years ago they were still one of the most common sights on the streets. This was a really smart and succesful car that appealed both to the ladies for its cute and fashionable style as well to young people seeking for some cheap thrills with the Abarth version. Very well written article, keep up the good work (and don’t be too mean with ’70s personal luxury cars: they were awesome!)! In Europe (and since this car even has the original italian license plate it is originally build according to EU specs) no reverse lights or rear fog lights were required at the time of the A112. I don’t know the precise years but in the 80’s first reverse lights (at least one, colored white) where required and late in the 80’s rear facing foglights (at least one, colored red) where required. There are no requirements for front fog lights in Europe, although in case they are mounted they must be able to operate. Reverse lights have been a populair accessory since the 60’s though. There where also requirement on the location of the reverse lights and rear fog lights (height, side of the vehicle in case of one) but I don’t remember the details. For sure it is not required to be in the light cluster. Most Asian imported vehicles will just get a hole cut in the rearbumper to accomodate a rear fog light to make it a EU vehicle. Great site you have here. Keep up the good work. Yes, you’re right: these are reverse lights. There were no regulations in Europe in those days (70’s) about the strength (lumen) of the lights, the number (you coul have one or two) or the size of the lens. The reverse lights could be put on automatically or manually by a switch mounted on the dash. The only regulation was when to use it. Reminds me of a tiny little critter that you’d think was cute until it bit your wagging finger right off. Nice article and quite a surprise to know there are A112s in the US. The description of the A112’s suspension is incorrect, though. The fron suspension is not double A-arms, but rather a MacPherson setup with coil springs. In the rear it’s an independent Chapman strut with a transverse leaf spring. The A112’s platform in in fact based on a shortened version of the Fiat 128’s. Thanks for the correction! I haven’t reviewed this article in some time and there were a number of glitches. I’ve amended the text. Little FWD B-segment cars like this or the early (first two generations) Honda Civic could be enormous fun to drive. It’s a bit like having a young dog (not a little puppy, but one who’s coordinated enough to not trip over his own feet like puppies do): It may not be that strong or fast, but it’s terribly enthusiastic about everything it does. Rode in Autobianchi in Switzerland in 1977. What a wonderful little car. I would love to own one.
2019-04-22T11:05:34Z
https://ateupwithmotor.com/model-histories/autobianchi-a112-abarth/
The “job strain” studies and other research support the idea that social factors play a critical role in the production of common chronic diseases, such as heart disease and hypertension. The intervention studies, and other prevention strategies, indicate that the work environment can be modified to increase employee influence, skills, authority, and support, and to regulate demands. Participatory action research, collective bargaining, and legislation can be effective tools to achieve these goals. Effective PAR requires strong union involvement, while collectively bargained programs can benefit from PAR methods to involve workers and evaluate change. While the growing evidence linking job stress with illness helps to overcome the notion that psychosocial explanations for disease are not legitimate, vigilance needs to continue against our society’s dominant ideology which uses the stress explanation to “blame the victim” indicting those who become ill as well. We believe that the evidence presented supports the following actions. First, “job strain” assessment instruments should be included in workplace health surveillance and health promotion programs, and in occupational health clinic educational material. Second, unions and their allies need to further increase their emphasis on contract language, education, organizing, and legislation on issues related to their members’ job design, work organization, quality of work life, schedule flexibility, and work and family concerns. Third, multidisciplinary teams (including workers, union and company officials, occupational health specialists, epidemiologists, labor and health educators, social psychologists, physicians and nurses), using PAR methods, can design, implement, and evaluate interventions to reduce or prevent exposure to psychosocial and physical health hazards and risk of illness. Fourth, further research is needed on various health outcomes (other than cardiovascular disease) potentially related to “job strain” or stress in general, including psychological disorders (4), musculoskeletal disorders (78), adverse pregnancy outcomes (79), “sick building syndrome” (80), work injuries (113), and immune system functioning (114), and the possible synergistic effects of psychosocial and physical health hazards. Modern workplaces embrace a complex set of risk factors, including psychosocial and physical/chemical. For example, rates of heart disease mortality and all cause morbidity have risen (primarily for men) in Eastern Europe since the 1960s in contrast to substantial declines in Western Europe, Canada, Japan, and the U.5. (117) This has been attributed by public health officials to ‘lifestyle” factors such as smoking, alcohol, and a fatty diet, rather than, for example, environmental pollution. (118) However, the post-World War 2 period was also a period of urbanization, social migration, industrialization based on the principles of Taylorism, and introduction of and adjustment to a political system which allowed citizens limited control both in society and in the workplace. We need to consider the possible effects of these social changes not only on lifestyle behaviors, but on the prevalence of “job strain,” or more directly on cardiovascular health. Just as the elimination of infectious diseases as the major causes of mortality over the last century occurred due to social changes, improvements in sanitation and nutrition, and elimination of slum conditions (and just as the reappearance of diseases such as tuberculosis has resulted from social neglect), chronic diseases are related to the physical and social environments in which people live and work. Our social epidemiological model of illness explicitly recognizes that work reorganization, workplace democracy, and broader societal changes (social and economic democracy) are needed to reduce the risk of cardiovascular disease and improve emotional well-being. The authors would like to thank Philip Landrigan, David LeGrande, and Dominic Tuminaro for their advice on portions of this article, as well as the suggestions of anonymous reviewers. 2. U.S. Congress. House. Committee on Public Works and Transportation, Hearing before the Subcommittee on Investigations and Oversight. Status of the Air Traffic Control System, 98th Congress, May 4, June 7; October 28, 1983; March 20, 21, 22, 27, 28, 29; April 4; June 26, 27, 1984; H. Rept. 98 – 93 pp. 785 – 787. 4. Sauter, S. L, Murphy, L R, Hurrell, J.J., Jr. “Prevention of Work-Related Psychological Disorders,” American Psychologist 45 (1990):114 – 1158. 5. Karasek, R, Theorell T. Healthy Work. New York: Basic Books, 1990. 6. The term “stress” is used in this paper to refer to the broad range of psychosocial factors and their insulting mechanisms that affect the worker due to impacts on behavioral, psychological, or physiological outcomes. Within the job stress research community, the term “strain” is typically used to indicate the short term or intermediate effect of job stress (for example, alterations in the hormonal system of the body), which eventually lead to the development of disease. The terminology of “stress” leading to “strain” and then to disease is actually borrowed from the way these terms are used in engineering. In this paper, we use the term job strain” in a more specific way to refer to the objective workplace causes of “stress” described in the Karasek job strain” model. 7. Johnson J. V., Hall E M., Theorell T. “Combined effects of job strain and social isolation on cardiovascular disease morbidity and mortality in a random sample of the Swedish male working population, Scandinavian Journal of Work, Environment and Health 15 (1989):271 – 279. 8. Quinn, M. M., Buiatti, E. “Women Changing the Times,” New Solutions 1 (1991):48 – 56. 9. Brandt, B. “The Problem of Overwork in America Today,. New Solutions 2 (1991 );50 – 65. 10. Kasinsky, R G. “Sexual Harassment A Health Hazard for Women Workers,” New Solutions 2 (1992): 74 – 83. 13. Schurman, S. J., Israel, B. A., Hugentobler, M. K. “Changing the Work Environment to Reduce Stress: Review of Interventions in the United States and Recommendations for Research and Practice,” in preparation. 14. American Heart Association. 1993 Heart and Stroke Facts. Dallas, TX: AHA, 1992. 16. Alfredsson, L, Spetz, C L, Theorell, T. “Type of Occupation and Near-future Hospitalization for Myocardial Infarction and Some Other Diagnoses,” International Journal of Epidemiology 14 (1985):378 – 388. 17. Falk, A., Hanson, B. S., Isacsson, S&SHY;O., Ostergren, P&SHY;O. “Job Strain and Mortality in Elderly Men: Social Network, Support, and Influence as Buffers”, American Journal of Public Health 82 (1992):1136 – 1139. 18. Astrand, N. E., Hanson, B. S., Isacson, S. O. “Job Demands, Job Decision Latitude, Job Support, and Social Network Factors as Predictors of Mortality in a Swedish Pulp and Paper Company,” British Journal of Industrial Medicine 46 (1989):334 – 340. 19. Theorell, T., Perski, A., Orth-Gomer, K, Hamsten, A., deFaire, U. “The Effect of Returning to Job Strain on Cardiac Death Risk After a First Myocardial Infarction Before Age 45,” International Journal of Cardiology 30 (1991):61-67. 20. LaCroix, A. Z High Demand/Low Control Work and the Incidence of CHD in the Framingham Cohort. Doctoral dissertation. Chapel Hill, NC: University of North Carolina, 1984. 21. Haan, M. N. “Job Strain and Ischaemic Heart Disease: An Epidemiological Study of Metal Workers,” Annals of Clinical Research 20 (1988):143-145. 22. Green, K L, Johnson, J. V. “The Effects of Psychosocial Work Organization on Patterns of Cigarette Smoking Among Male Chemical Plant Employees”, American Journal of Public Health 80 (1990):1368-1371. 23. Mensch, B. S., Kandel, D. B. “Do Job Conditions Influence the Use of Drugs”, Journal of Health and Social Behavior 29 (1988):169-184. 24. Pieper, C., LaCroix, A. Z, Karasek, R A. “The Relation of Psychosocial Dimensions of Work with Coronary Heart Disease Risk Factors: A Meta-analysis of Five United States Data Bases”, American Journal of Epidemiology 129 (1989):483-494. 26. Van Egeren, L F. “The Relationship Between Job Strain and Blood Pressure at Work, at Home, and During Sleep,” Psychosomatic Medicine 54 (1992):337-343. 27. Blumenthal, J. A., Siegel, W. C, Phillips, B. G. “Job Strain Affects Blood Pressure in the Laboratory and During Daily Life in Parents with Mild Hypertension,” Hypertension (in press). 28. Theorell, T., deFaire, U., Johnson, J., Hall, E. M., Perski, A., Stewart, W. “Job Strain and Ambulatory Blood Pressure Profiles,” Scandinavian Journal of Work, Environment and Health 17 (1991):380-385. 29. Schnall, P. L, Schwartz, J. E, Landsbergis, P. A., Warren, K, Pickering, T. G. “The Relationship Between Job Strain, Alcohol and Ambulatory Blood Pressure,” Hypertension 19 (1992):488-494. 30. Schnall, P. L, Landsbergis, P. A., Schwartz, J. E., Warren, K., Pickering, T. G. “The Relationship Between Job Strain, Ambulatory Blood Pressure and Hypertension,” Paper presented at the Ninth International Symposium on Epidemiology in Occupational Health, Cincinnati, OH, September, 1992. 31. Light, K C, Turner, J. R, Hinderliter, A. L “Job Strain and Ambulatory Work Blood Pressure in Healthy Young Men and Women,” Hypertension 20 (1992):214-218. 32. Theorell, T., Knox, S., Svensson, J., Waller, D. “Blood Pressure Variations During a Working Day at Age 28: Effects of Different Types of Work and Blood Pressure Level at Age 18,” Journal of Human Stress 11 (1985):36-41. 33. Frankenhauser M, Johansson G. “Stress at Work Psychobiological and Psychosocial Aspects,” International Review of Applied Psychology 35 (1986):287-299. 34. Schnall, P. L, Pieper, C, Schwartz, J. E., Karasek, R A., Schlussel, Y., Devereux, R B., Ganau, A., Alderman, M., Warren, K, Pickering, T. G. “The Relationship Between Job Strain, Workplace Diastolic Blood Pressure, and Left Ventricular Mass Index: Results of a Case-control Study,” Journal of the American Medical Association 263 (1990):1929-1935. 35. Karasek, R A., Gordon, G., Pietrokovsky, C, Frese, M., Pieper, C, Schwartz, J., Fry, L, Schirer, D. Job Content Instrument Questionnaire and User s Guide. Los Angeles, CA University of Southern California, 1985. 36. DiMartino, V. (Ed.) Conditions of Work Digest: Preventing Stress at Work. Geneva: International Labor Office, 1992. 37. Johnson, J. V. “Collective Control: Strategies for Survival in the Workplace,” International Journal of Health Services 19 (1989):469-480. 38. lsrael, B. A., Schurman, S. J., House, J. S. “Action Research on Occupational Stress: Involving Workers as Researchers,” International of Health Services 19 (1989):135-155. 39. Caplan, R D., Cobb, S., French, J. R P., Jr., Van Harrison, R, Pinneau, S R, Jr. Job Demands and Work Health Cincinnati, OH: National Institute for Occupational Safety and Health, 1975 (Publication No. 75-168). 40. Hurrell, J. J., McLaney, M. A. “Exposure to Job Stress – A New Psychometric Instrument,. Scandinavian Journal of Work, Environment and Health 14 (suppl 1) (1988):27-28. 41. Haynes, S. G., Feinleib, M. “Women, Work and Coronary Heart Disease: Perspective Findings from the Framingham Heart Study,” American Journal of Public Health 70 (1980):133-141. 42. Hall, E. M. “Double Exposure: The Combined Impact of the Home and Work Environments on Psychosomatic Strain in Swedish Men and Women”, International Journal of Health 22 (1992):239-260. 43. Marmot, M., Theorell, T. “Social Class and Cardiovascular Disease, International Journal of Health Services 18 (1988):659-674. 44. Siegrist, J., Peter, R, Junge, A., Cremer, P., Seidel, D. “Low Status Control, High Effort at Work and Ischemic Heart Disease: Prospective Evidence from Blue collar Men,” Social Science and Medicine 31 (1990):1127-1134. 45. Ivancevich, ]. M., Matteson, M. T., Freedman, S. M., Phillips, ]. S. “Worksite Stress Management Interventions,” American Psychologist 45 (1990):252-261. 46. This section is based on a more detailed review in (13). 47. Examples are classic texts from this period: Lewin, K Field Theory in Social Science New York: Harper, 1951; Walker, C R, Guest, R H. Man on the Assembly Line. Cambridge: Harvard University Press, 1952; MacGregor, D. The Human Side of Enterprise. New York: McGraw&SHY;Hill, 1960; Kornhauser, A. Mental Health of the Industrial Worker. New York: Wesley, 1965. 48. For recent critical reviews, see the series Woodman, R, Pasmore, W. (Eds.) Research in Organization Change and Development. Greenwich, CT: JAI Press, 1987. 49. Parker, M. Inside the Circle. Boston: South End Press, 1985. 50. Gardell, B., Gustavsen, B. “Work Environment Research and Social Change: Current Developments in Scandinavian,” Journal of Occupational Behavior 1 (1980):3-17. 51. Johnson, J. V., Johannsson, G. The Psychosocial Work Environment. Amityville, NY: Baywood, 1991. 52. Hanlon, M.D. “Reducing Hospital Costs Through Employee Involvement Strategies,” National Productivity Review 5 (1986):2231. 53. Kopelman, R E. “Job Design and Productivity: A Review of the Evidence,” National Productivity Review 4 (1985):237-255. 55. Buller, P. F., Bell, C. H. “Effects of Team Building and Goal Setting on Productivity: A Field Experiment,” Academy of Management Journal 29 (1986):305-328. 56. Grenier, G. J. “Twisting Quality Circles to Bust Unions,” AFL-CIO News, May 14, 1983. 57. Jones, L. M., Bowers, D. G., Fuller, S. M. Rcport of Findings 1984: Task Force on Management ond Employse Relationships. Washington, DC: Federal Aviation Admiristration, November 7, 1984. 58. “APWU Settles USPS Company Union Charges,” AFL-CIO News, May 11, 1992. 59. “Partnenhip Sweetens Work at Nabisco Bakeries,” AFL-CIO Ncws, April 29, 1991. 60. “Cooperative Successes Typified at Ohio Plant,” AFL-CIO News, June 22, 1992. 61. Whyte, W. F. Participatory Action Research. Newbury Park, CA: Sage, 1990. 62. Karasek, R. “Stress Prevention Through Work Reorganization: A Summary of 19 lnternational Case Studies,” in DiMartino, V. (ed.) Conditions of Work Digest, Preventing Stress at Work. Geneva lntenutional Labor Office, 1992: 23-41. 63. Jackson, S. E. “Participation in Decision Making as a Strategy for Reducing Job Related Strain,” Journal of Applied Psychology 68 (1983): 3-19. 64. Golembiewski, R, Hilles, R, Daly, R. “Some Effects of Multiple OD Intervendons on Burnout and Worksite Features,” Journal of Applied Behavioral Science 23 (1987): 295-314. 65. Israel, B. A., Schunnan, S. J., Hugentobler, M. K., House, J. “A Participatory Action Research Approach to Reducing Occupational Stress in the United States,” in DiMartino, V. (Ed.) Conditions of Work Digest: Preventing Strcss at Work. Geneva: International Labor Office, 1992: 152-163. 66. Heaney, C., Israel, B., Schurrnan, S., House, J., Baker, B., Hugentobler, M. “Evaluation of a Participatory Action Research Approach to Reducing Stress.” Paper presented at the APA/NIOSH Conference on Occupational Stress, Washington, DC, November, 1992. 67. Cahill, J. “Computers and Stress Reduction in Social Service Workers in New Jersey,” in DiMartino, V. (Ed.) Conditions of Work Digest: Preventing Stress at Work. Geneva: International Labor Office, 1992: 197-203. 69. May, L.”A Union Programme to Reduce Work and Family Stress Factors in Unskilled and Semi-Skilled Workers on the East Coast of the United States,” in DiMartino, V. (Ed.) Conditions of Work Digest: Preventing Stress at Work. Geneva: International Labor Office, 1992: 164-171. 70. Landsbergis, P. A., Silverman, B., Barrett, C., Schnall, P. I. “Union Stress Committees and Stress Reduction in Blue and White Collar Workers,” in DiMartino, V. (Ed.) Conditions of Work Digest: Preventing Stress at Work. Geneva: International Labor Office, 1992:144-151. 71. Mergler, D. “Worker Participation in Occupational Health Research: Theory and Practice,” International Journal of Health Services 17 (1987):151-167. 72. Thus, it is analogous to the role proposed for workers in making industrial hygiene more effective, that is, involving workers in inspections, assessment of hazards and health symptoms; problem-solving; and changing work practices and organization as well as technical improvements (Senn, E. “PIaying Industrial Hygiene To Win,” New Solutions (1991):72-81). 73. Hugentobler, M. K, Robins, T. G., Schurman, S. J. “How Unions Can Improve the Outcomes of Joint Health and Safety Training Programs`” Labor Studies Journal 15 (1990):16-38. 74. AFL-CIO Committee on the Evolution of Work 77. The Changing Situation of Workers and Their Unions. Washington, D.C. AFL-CIO, 1985. 75. Cahill, J. “Economic and Non&SHY;Economic Sources of Job Satisfaction in Higher Education,” Paper Presented at the American Association for Higher Education, Washington, D.C., March, 1993. 76. Israel, B., Schurman, S. “Social Support, Control and the Stress Process,” in Glanz, K, Lewis, F., Rimer, B. (Eds.) Health Behavior and Health Education: Theory, Research snd Practice. San Francisco: Jossey&SHY;Bass, 1990:187-215. 77. “Moving Towards Worker-Oriented Participatory Research,” Panel at the American Public Health Association, San Francisco, CA, October, 1993. 78. Bongers, P. M., deWinter, R R, Kompier, M. A. J., Hildebrandt, V. H. “Psychosocial Factors at Work and Musculoskeletal Disease: A Review of the Literature,” Scandinavian Journal of Work Environment and HeaIth (in press). 79. Brett, K., Strogatz, D., Savitz, D. “Occupational Stress and Low Birth Weight Delivery.” Presented at the 24th Annual Meeting of the Society of Epidemiological Research, Buffalo, NY, June 1991. American Journal of Epidemiology 134 (1991): 722-723. 80. National Institute for Occupational Safety and Health. Indoor Air Quality and Work Environment Study. Cincinnati, OH: NIOSH, 1991 (HETA 88-364-2102). 81. Shostak, A. B. “Union Efforts to Relieve Blue-Collar Stress,” in C.L. Cooper, and M. J. Smith (Eds.) Job Stress snd Blue-Collar Work. New York: Wiley, 1985: 195-205. 82. Service Employees International Union. Stress: Contract Provisions. Washington, DC: SEIU, 1983. 83. Unions have also developed valuable worker education materials on job stress that use the Small Group Activity Method and the principles of empowerment education. Sources include the Communications Workers of America, District 1; District 65, UAW; and the Labor Institute, in New York City; 9 to 5, National Association of Working Women, Cleveland, OH; and the Workers Health and Safety Centre, Kingston, Ontario. 84. Landsbergis, P. “Occupational Stress Among Nurses: New Developments in Theory and Prevention,” in J.H. Humphrey (Ed.) Human Strcss: Currcnt Selected Research (Vol. 3). New York: AMC Press, 1989: 173-195. 85. AFL-CIO News, January 26, 1985; May 23,1988; July 8, 1989; February 1, 1993; Labor Notes, December 1985; October, 1989. 86. Dena Bunis, personal communication, February, 1993. 87. Bernard, B. “Psychosocial Factors for Musculoskeletal Disorders,” Paper to be Presented at the American Public Health Association, San Francisco, CA, October, 1993. 88. U.S. Congress, Office of Technology Assessment, “The Electronic Supervisor: New Technology, New Tensions,” OTA-CIT&SHY;333. Washington, DC: U.S. Government Printing Office, 1987. 89. “Northern Telecom Ends Worker Monitoring,” VDT Ncws, March/April 1992. 90. Smith, M. J., Carayon, P., Sanders, K. J., Lim, S-Y., LeGrande, D. “Employee Stress and Health Complaints in Jobs With and Without Electronic Performance Monitoring,” Applicd Ergonomics 23 (1992):17-27. 91. Ramirez, A. “A.T.&T. and Unions Praise New Pact,” New York Times, July 3, 1992. 92. National Institute for Occupational Safety and Health. Health Hazard Evaluation Report. Cincinnati, OH: NIOSH, July 1942 (HETA 89-299-2230). 94. “The Electronic Supervisor,” op. cit., p. 39, 46-48, 57; Massachusetts Coalition on New Offlce Technology, “Electronic Monitoring in the Workplace: Supervision or Surveillance?” Boston, 1989. 95. Shostak, A. B., Skocik, D. The Air Controllers’ Controversy. New York: Human Sciences Press, 1986. 96. Landsbergis, P. “Is Air Traffic Control a Stressful Occupation?” Labor Studies Journal 11 (1986) :117-134. 98. Tesh, S. “The Politics of Stress: The Case of Air Traffic Control,” International Journal of Health Services 14 (1984):569-587. 99. Bowers, D. G. “What Would Make 11,500 People Quit Their Jobs,” Organizational Dynamics (1983):5-19. 100. Hund, R W., Kriesky, J. K. “The Rise and Demise of PATCO Reconstructed,” Industrial and Labor Relations Review 40 (1986):115-121. 101. “Five Years After PATCO,” Frequent Flyer Magazine, August, 1986:54-55, 62. 102. Golden, T. “Was Illness at Bridges in the Minds of Workers,” New York Times (March 12, 1990). 103. Cases of similar physical symptoms among a group of workers without an identifiable pathogen (known as “epidemic psychogenic illness,” EPI) have been extensively analyzed by NIOSH and others. (For excample: Colligan, M., Pennebaker, J., Murphy, L. (Eds.) Mass Psychogenic Illncss: A Social Psychological Analysis. Hillsdale, NJ: Lawrence Erlbaum, 1982.) Work organization in workplaces where EPI has occurred has been chracacterizd as repetitive or boring work with rigid pacing and high job pressures, strict rules, and a lack of communication and social interaction. While EPI can therefore be regarded as a desperate reaction to excessive “job strain,” another explanation is that low-level chemical exposure and stress may have synergistic effects. 104. DeCarlo. D. T., Gruenfeld, D. H. Stress in the American Workplace. Fort Washington, PA: LRP Publications, 1989: 11. 105. California Workers’ Compensation Institute, “Mental Stress Claims in California Workers’ Compensation -Incidence, Costs and Trends,” San Francisco: California Workers’ Compensation Institute, 199O. 106. Elisburg, D. “Workers’ Compensation Stress Claims: Employee Issues,” Paper Presented at the APA/NIOSH Conference on Occupational Stress, Washington, DC, November, 1992. 107. Deutsch, S. “Work Environment Reform and Industrial Democracy,” Sociology of Work ond Occupations 8 (1981):180-194. 108. Service Employees lnternational Union. The High Cost of Short Staffing. Washington, DC: SElU, 1992. 109. Service Employees International Union. The National Nurse Survey. Washington, DC SEIU, 1993. 110. Byrne, M. “Reich, Council Explore Ways to Get Moving,” AFL-CIO News, March, 1,1993. 111. Richardson, C “Training to Improve Working Conditions, and Build Union Strength,” Paper Presented at the International Metalworkers’ Federation Conference, Helsinki, Finland, September, 1991. 112. Richardson, C. “Technology, Training and Work Organization,” New Solutions 3 (1993): 5-6. 113. Johnson, J. L. “Work Injury and Stress,” Paper Presented at the APA/NlOSH Conference on Occupational Stress, Washington, DC, November, 1992. 115. Schnall, P. L., Kern, R. “Hypertension in American Society: An Introduction to Historical Materialist Epidemiology,” in P. Conrad and R. Kern (eds.) The Sociology of Health and Illness. New York St. Martin’s Press, 1981: 97-122. 116. Brenner, H. Economy, Society and Health, Washington, DC: Economic Policy Institute, 1992. 117. Uemura, K, Pisa, Z. “Trends in Cardiovascular Disease Mortality in Industrialized Countries Since 1950,” World Health Statistics Quarterly 41 (1988):155-178. 118. Levenstein, C. “Occupational Health in Eastern Europe During Political and Economic Transition,” Paper Presented at the American Public Health Association, Washington, DC, November, 1992.
2019-04-25T02:16:02Z
https://unhealthywork.org/interventions/social-science-based-interventions/
unRAID Server management is accomplished through the use of a browser-based Management Utility (e.g. Internet Explorer or Firefox). Example: Where you would normally type "http://www.google.com" type "//tower" to enter the Management Utility. The default server name is tower. This may be changed on the Settings page, or you may plug the Flash into your PC and edit the config/ident.cfg file directly. Alternately, instead of typing the server name, you could enter the server's IP address. Also by default, upon boot unRAID Server will attempt to contact the local network DHCP server to obtain an IP address. If your network does not have a DHCP server, or if you want to assign a static IP address to your server, you must plug the Flash into your PC and edit the config/network.cfg file where these settings are stored. A header area which displays the name of your Server and a Comment string. This is the name and comment of your server as it appears in My Network Settings. Both strings may be changed on the Settings page. A menu bar which displays a list of subpages along with the unRAID version number. These will be explained below. The Disk Status section which displays all the critical information and status of the hard drives in your unRAID array. The Command area which consists of a set of buttons which let you Start and Stop the server, as well as initiate various utility operations. There is a line in this section for each disk (hard drive) of your unRAID server. In the unRAID organization, one hard drive serves as the parity disk; the other hard drives are called data disks. The parity disk is what provides the redundancy in a RAID system. The parity disk is updated every time you write any of the data disks. If a data disk fails, there is sufficient information on the parity disk to permit the system to reconstruct the contents of the failed disk onto a new disk. IMPORTANT: A requirement of the unRAID system is that the capacity of the parity disk needs to be as large or larger than the capacity of the largest data disk. The data disks are exported and appear as shares named disk1, disk2, etc., in My Network Places under Windows. Yellow: the data contents of the actual hard drive are invalid. The parity disk has this status when Parity-Sync is taking place. A data disk has this status during Reconstruction. Red: the disk is disabled. Blue: a new disk not currently part of the array. Grey: indicates no disk present. Blinking: indicates the corresponding disk has been spun-down. This data is read directly from the hard drive. This is the temperature reported by the hard drive via S.M.A.R.T. When the disk is spun down, there will be an asterisk (*) displayed here instead. This is because sending the command to a hard drive to obtain S.M.A.R.T. information would cause it to spin up. This is the raw capacity of the hard drive expressed as the number of 1024-byte blocks. This is the amount of free space in the disk's file system, expressed as the number of 1024-byte blocks. The free space of a freshly formatted disk will always be less than the disk's raw size because of file system overhead. The Read and Write statistics display the number of 4096-byte read and write operations that have been performed by the disk. The Error statistic displays the number of read and write operations which have failed. In a protected array, any single-disk read error will be corrected on-the-fly (using parity reconstruction). The Error counter will increment for every such occurrence. Any single-disk write error will result in the Error counter being incremented and that disk being disabled. Upon system boot, the statistics start out cleared; and they may be manually cleared at any time; refer to the Settings page. Normally following system boot up the array (complete set of disks) is automatically started (brought on-line and exported as a set of shares). But if there's been a change in disk configuration, such as a new disk added, the array is left stopped so that you can confirm the configuration is correct. This means that any time you have made a disk configuration change you must log into the Management Utility and manually start the array. You add one or more new disks. You replace a single disk with a bigger one. You replace a failed disk. You shuffle two or more data disks between slots. Install your new hard drive(s). When you Start the array, the system will first format the new disk(s). When this operation finishes, all the data disks, including the new one(s), will be exported and be available for use. The format operation consists of two phases. First, the the entire contents of the new disk(s) is cleared (written with zeros), and then it's marked active in the array. Next, a file system is created. unRAID Server uses the ReiserFS journalled file system. The clearing phase is necessary to preserve the fault tolerance characteristic of the array. If at any time while the new disk(s) is being cleared, one of the other disks fails, you will still be able to recover the data of the failed disk. Unfortunately, the clearing phase can take several hours depending on the size of the new disks(s). Replace smaller disk with new bigger disk. When you start the array, the system will reconstruct the contents of the original smaller disk onto the new disk. Upon completion, the disk's file system will be expanded to reflect the new size. You can only expand one disk at a time. If you are replacing your existing Parity disk with a bigger one, then when you Start the array, the system will simply start a parity sync onto the new Parity disk. Replace smaller parity disk with new bigger disk. Wait for Parity-Sync to complete. Replace smaller data disk with your old parity disk. Replace the failed hard disk with a new one. When you Start the array after replacing a failed disk, the system will reconstruct the contents of the failed disk onto the new disk; and, if the new disk is bigger, expand the file system. You must replace a failed disk with a disk which is as big or bigger than the original and not bigger than the parity disk. If the replacement disk is larger than your parity disk, then the system permits a special configuration change called swap-disable. Replace the parity hard disk with a new bigger one. Replace the failed hard disk with you old parity disk. When you start the array, the system will first copy the parity information to the new parity disk, and then reconstruct the contents of the failed disk. This is the case where the system recognizes all the data disks, but notices that they are not in the same slots they used to be in. The Main page will display the disk model/serial numbers both of the actual placement and what the placement used to be. If you start the array in this state, the system will just record the new positions of the disks. Note however, that if the same parity disk is not in the top slot you can not start the array. In this case the missing disk(s) will be identified. If there is only one missing disk when you start the array it will be marked as failed. All data disks will be exported (including the missing one), but the system will be running unprotected; that is, if a disk fails you will lose data. If there are two or more missing disks, you can not start the array. In this case you must either put the disks back, or click Restore on the Main page to reset the configuration. When the array is Stopped there is a button in the Command area labeled Restore. This function will restore the array configuration data so that the system thinks it's brand new with all new hard drives. When you Start the array, the system will start a background process to generate the parity information. In the special case where all the hard drives are new, the format operation will not clear the data areas; it simply generates parity. This can be used when you've added new disk(s) and you don't want to wait around for the clear phase to complete. In this case you could first Reset the array configuration, and then simply Start the array, and the system will re-sync parity, incorporating the new disk(s). Caution: if a disk fails during the operation, you will not be able to rebuild it. The array configuration data is stored in the file config/super.dat on the Flash. For this reason, you must always have the Flash installed in your server. When the array is Started and parity is already valid, there is a button in the Command area labled Check which will initiate a background Parity-Check function. Parity-Check will march through all data disks in parallel, computing parity and checking it against stored parity on the parity disk. If a mismatch occurs, the parity disk will be updated (written) with the computed data and the Sync Errors counter will be incremented. The most common cause of Sync Errors is power-loss which prevents buffered write data being written to disk. Anytime the array is Started, if the system detects that a previous unsafe shutdown occurred, then it automatically initiates a Parity-Check. The Users page is used to set a password for the root user, and configure User level security for your server. User level security is a feature that lets you restrict access to shares according to user name. When User level security is enabled, you will need to enter the list of users who may access your server. When a user attempts to connect to a share on your unRAID server, a dialog box will appear asking them to enter their user name and password before being granted access to shares. In addition, you can specify which users may access each share, as well as retrict access to read-only. If User level security is not enabled, then you do not need to enter a list of users. Any user that attempts to connect to a share on your unRAID server is granted access, subject to the Export mode setting on the share. This is the control for enabling or disabling User level security. This section lists each configured user name. Regardless of whether User level security is enabled, the built-in user name root always appears atop the Users list. If you enter a non-blank password for the root user, then your browser will also prompt you for the password when you attempt to open the Management Utility. In addition, you will be prompted for a password to log into the console or telnet session. To create a new user (User level security enabled), scroll to the end of the Users list, enter the new User name and Password (and Retype password), and then click Add User. To change the password of an existing user, just type the new Password (and Retype password) for the user and click Apply. To delete a user, change the User name to blank and click Apply. Note that you can not delete the root user. All user access restrictions on shares is defined for each share on the Shares page. Each new user is automatically given a unique uid, and unique gid (group name same as the user name). However, all objects (files/directories) created in shares will be owned by root. Only root can access the System Management Utility, and log in to the system console or telnet session. The configured users do not have actual home accounts on the server. The name should only consist of the characters a-z, 0-9, - (dash), _ (underscore), and . (dot). Please do not use any uppercase letters. Type anything you want here. Blank is also ok. Must be the same as what you typed for Password. The Shares page is used to configure shares and share access. This section lets you configure how the pre-defined flash and disk shares are exported, and whether User shares are enabled or not. The share will be exported and visible under My Network Places. If User level security is not enabled, then anyone on the network can read/write data in the share. If User level security is enabled, then anyone who can log into the server can read/write data in the share. The share will be exported and visible under My Network Places. The share may not be written, but if User level security is not enabled, then anyone on the network can read data in the share. If User level security is enabled, then anyone who can log into the server can read data in the share. The share will be exported, but will not show up in browse lists (i.e., under My Network Places). If User level security is not enabled, then anyone on the network who knows about the share can read/write data in the share. If User level security is enabled, then anyone who can log into the server and knows about the share can read/write data in the share. The share will be exported, but will not show up in browse lists (i.e., under My Network Places). If User level security is not enabled, then anyone on the network who knows about the share can read data in the share. If User level security is enabled, then anyone who can log into the server and knows about the share can read data in the share. The share is not exported and can not be accessed. This is the export mode of the flash share. This is the export mode for the entire set of disk shares. This is the control for enabling and disabling User shares. This section lists all of the configured User shares. Note: if User shares are not enabled, then this section is not present. User shares is a unique feature of unRAID OS which provides a unified name space across multiple data disks. User shares simplify storage management by presenting a view of all unRAID storage as if it were one large file system. When User Shares are enabled, unRAID OS will automatically create a set of shares named after the top-level directories found on each data disk. If the same top-level directory exists on more than one disk, then the exported share will contain all directories/files under that top-level directory on all the disks. In the case where the same object (directory or file) exists at the same hierarchy on multiple disks, the User Share will reference the object on the lowest numbered disk. For example, if Movies/Cars existed on both disk1 and disk2, then Cars under the Movies User Share would refer to the version on disk1. Each time the array is Started, if User Shares are enabled, unRAID OS will regenerate and re-export each top-level directory as a network share. When a new User share is created, or when any object (file or directory) is created within a User share, the system must determine which data disk the User share or object will be created on. In general, a new User share, or object within a User share, will be created on the data disk with the most free space. However there are a set of share configuration parameters available to fine tune disk allocation. In this method, the system will simply pick the disk which currently has the most free space. The initial high water mark is set to the 1/2 the size of the largest disk; in this case, it will be set to 60GB. In this state, disk1 has 15GB of free space above the "high water" mark; disk2 has 50GB, and disk3 has 10GB. As new objects are created, the system will choose disk3 until the amount of free space on disk3 falls under 60GB. Subsequently, the system will start allocating from disk1 until it's free space falls under 60GB. Then it will allocate from disk2 until it's free space also falls under 60GB. Once the amount of free space on all disks is below 60GB, a new high water mark is established by dividing the old high water mark by 2. The advantage of High-water method is that when writing a series of files, most of the time only one data disk will need to be spun up. Often media data will consolidated under a single directory, or directory tree. Then during playback the files will be accessed one after another. This is the case with the set of VOB files which make up a DVD movie. In this situation we want all the associated media files to be stored on the same physical disk if at all possible. This is because we don't want media playback to pause while the disk containing the next file spins up. unRAID OS solves this problem by introducing a configurable allocation parameter called "Split level". Split level defines the highest level in the share directory hierarchy which can be split among multiple disks. In the Movie share example above, setting Split level to 1 only permits any object created directly under the Movie directory to be allocated to any disk according to the Allocation method. Thus, when we create the Alien subdirectory, it may reside on any of the data disks; however, when we create a file or another directory within the Movies/Alien directory, this object is at level 2, and will be created on whatever disk the Movies/Alien directory actually resides on. Then you would set Split level to 2. This will let the genres expand among all disks, but still ensure that the contents of the actual movie directories stay within the same disk. If you set the Split level to 0 for a share, then all directories/files created under that share will be on the same disk where the share was originally created. If you set the Split level high, e.g., 999 for a share, then every directory/file created under that share will get placed on a disk according to Allocation method. The last way to control which disks are used by a share is through the Included disks(s) and Excluded disk(s) configuration parameters. The Included disks(s) parameter defines the set of disks which are candiates for allocation to that share. If Included disk(s) is blank, then all present data disks are candiates. For example, to restrict a share to using only disk1, disk2, and disk3, you would set Included disk(s) to disk1,disk2,disk3. The Excluded disk(s) parameter defines the set of disks which are exluded from consideration for allocation. If Excluded disk(s) is blank, then no disks are excluded. When considering which disk to allocate space for a new object, unRAID OS first checks if it's in the Included disks(s) set, and the checks if it's in the Excluded disk(s) set. To create a new User share, scroll to the end of the User shares list, enter the new Share name and other configuration, and then click Add Share. unRAID OS will select the disk to create the initial top-level share directory according to the configured Allocation method. To delete a User Share, just clear the Share name field and click Apply. Only entirely empty User Shares may be deleted. To rename a User share, just click in the Share name field of the share, type it's new name, and then click Apply. A user share configuration file called config/shares/.cfg is stored on the Flash for each User Share (where is the Share name). If this file does not exist, then a set of default values are used for the User Share. Whenever a User Share parameter is changed, it's configuration file is also updated, or created if it does not exist. Adding a new User Share or changing the configuration parameters of an existing User Share will not break any current connections on other shares. Renaming or deleting a User Share will break all outstanding connections, however. This is because Samba must be stopped in order to rename or delete the top-level directory which is associated with the share. User Shares are implemented using proprietary code which builds a composite directory hierarchy of all the data disks. This is created on a tmpfs file system mounted on /mnt/tmp. User Shares are exported using a proprietary FUSE pseudo-file system called 'shfs' which is mounted on /mnt/users. When an object needs to be created on a selected disk, first the directory hierarchy is created on the disk (if it isn't already in place). When the last file of a particular directory on a disk is removed, the unused part of the directory hierarchy on that disk remains in place. With User Shares enabled, files may still be accessed via the individual disk shares. However, depending on the disk directory hierarchy and user share settings, some operations on a disk share may not be reflected in the user share which includes this disk. This is the name of the share. Use only the characters: a-z, A-Z, 0-9, - (dash), and . (dot). Optional descriptive text that will appear in the Comments column under My Network Places. The method by which the system will select the disk to use for creating a User share, directory, or disk. See Allocation below. The maximum depth in the directory tree which may be split across multiple disks. See Split level below. The set of disks which will be considered for allocation. Blank means all disks. Disks are specified using the identifier disk1,disk2, etc. Separate each identifier with a comma. The set of disk which will be excluded from consideration for allocation. Blank means no disks. Specifies the basic export mode of the share. See Export Mode above. A list of users who are exceptions to the basic export mode of the share: If the export mode of the share is read/write, then this lists users who will have read-only access. If the export mode of the share is read-only, then this lists users who will have read/write access. Separate multiple user names with commas. Note: this parameter is present only when User level security is enabled. A list of users who can exclusively access the share. Blank means all users. A list of users who may not access the share at all. Blank means no users. This is the name of the server on your network. This is a comment field which shows up net to the server name under My Network Places. This is the workgroup that your server belongs to. If set to Yes, then the server will attempt to become the local browse master. This is the MAC address of your network interface. If set to Yes, then the server will attempt to contact the local DHCP server to obtain an IP address lease. If set to No, then you must statically set the IP address. The subnet mask of the server. Sets the amount of inactive time before a hard drive is spun down. The current date and time, that is, when the page was refreshed. To change the date and/or time, edit this field appropriately and then click Apply. Enter your time zone here. It is possible to use a custom time zone so that DST adjustments are handled properly. To use this feature, you first need to download your timezone file from our website. Once you have identified your timezone file, right-click the link and select "Save Link As". In the dialog box, type timezone for the File name. Next, copy the file timezone to the config directory of your Flash. Navigate to the 'Settings' page of the System Management Utility and select "(custom)" in the Time zone dropdown list. Check that the Date and Time are correct and click Apply. The Devices page is used to display information about the physical devices installed in the server. This section displays information regarding the USB Flash device from which the system booted. An unRAID server disk array consists of a single parity disk and a number of data disks. The data disks are exclusively used to store user data, and the parity disk provides the redundancy necessary to recover from any singe disk failure. Note that we're careful to use the term disk when referring to an array storage device. We use the term hard drive when referring to an actual hard drive. This is because in a RAID system it's possible to read/write an array disk whose corresponding hard drive is disabled or even missing! In addition, it's useful to be able to ask, "which hard drive is assigned to be the parity disk?" or "which hard drive corresponds to data disk2?". We need a way therefore, to assign hard drives to array disks. This is accomplished on the Devices page, in the Disk devices section. Here you will find a drop-down box for each array disk. The drop-down box lists all the unassigned hard drives. To assign a hard drive simply select it from the list. Each time a hard drive assignment is made, the system updates the config/disk.cfg file to record the assignment. given a choice, the parity disk should be the fastest disk in your system. Decide which hard drive you will use for parity, and which hard drives you will use for data disk1, disk2, etc., and label them in some fashion. Also, find the serial number of each hard drive and jot it down somewhere; you will need this information later. Connect cables to the hard drives in a logical manner. For example, if your motherboard has 4 SATA ports, they are labeled "sata-0", "sata-1", "sata-2", and "sata-3" (or something similar). Hook these cables to a contiguous set of hard drives, e.g., parity, disk1, disk2, and disk3. Follow a similar pattern for PCI disk controllers. Build your system, boot unRAID Server and start the Management Utility. If this is a fresh system build, then the Main page of the Management Utility will show no disks installed. This doesn't mean the system can't detect your hard drives; it just means that none have been assigned yet. Go to the Devices page and look at the Disk devices section. Here is where you will assign hard drives to the various array disks. You will notice there is a drop down box for each array disk device. Clicking on the drop down box reveals all the unassigned hard drives in the sytem. Remember the serial numbers you recored back in step 1? For each disk, choose the proper hard drive based on it's serial number. After you have assigned all of your hard drives, go back to the Main menu and you will see the array and be able to start it. This page was last modified on 1 December 2009, at 19:44.
2019-04-20T16:15:44Z
http://lime-technology.com/wiki/index.php?title=UnRAID_Manual&amp;oldid=4723
What is the date on which the employment agreement is to be signed? Select the date on which the letter of employment/ employment agreement is to be signed by the employee. (ii) You providing the Employer with copies of your passport or birth certificate and all documents pertaining to your educational and professional qualifications and references from your previous employers (if any) to the Employer's satisfaction. (b) You shall be employed with the Employer as ________. The Employer reserves the right to change your designation from time to time at its sole and absolute discretion. (c) Your period of continuous Employment with the Employer shall be calculated from the Commencement Date. (d) You warrant and represent to the Employer that you will not breach any obligation binding on you by reason of entering into this letter agreement or performing any of your duties and obligations under it or other third party contractual obligations. (e) You warrant that all the information relating to you and provided by you to the Employer is true and accurate. (a) You shall be on probation for a period of ________ from the Commencement Date. During this period the Employer may terminate your Employment by giving you 7 (seven) days prior written notice of termination. You may terminate the Employment during the probationary period by giving the Employer 15 (fifteen) days prior written notice of termination. It is clarified that during the probationary period, if you give the Employer prior notice of less than 15 (fifteen) days or purport to terminate the Employment prior to the completion of the 15 (fifteen) days notice period, you hereby agree to pay the Employer the proportionate part of your salary for that part of the notice period that is not fulfilled. (ii) Terminate your Employment upon giving you 15 (fifteen) days prior written notice of termination. (a) As compensation, you shall be entitled to receive a CTC of Rs. ________ (________) per annum. (b) This shall accrue on a daily basis and be payable in the following periodicity in arrears by the 1 of the subsequent month by transfer to your bank account. It is clarified that 'CTC' shall comprise your total cost to the company and includes all payments made and benefits provided by the Employer directly or indirectly to or on your behalf, whether as salary or otherwise. (c) You shall be entitled for one time joining bonus of Rs. ________ (________) at the end of a period of ________ from the Commencement Date. To receive the Bonus, you must be in service and not under any notice of termination on the date appointed for payment of Bonus. The Bonus, if any, shall be announced and paid on the dates specified by the Employer from time to time at its sole and absolute discretion. (d) The Employer will formally review your performance annually. However, if you have not completed 6 months of Employment by the last date of the month in which the performance review takes place, your first review shall take place the same time next year and on an annual thereafter. (e) The Employer is under no obligation to increase your CTC as a result of any review in performance. Any revision in the CTC following a review shall be effective from and subject to such terms and conditions as the Employer shall deem fit. (f) The Employer may, in its sole and absolute discretion and based on your performance, pay an annual bonus ("Bonus") of up to ________% of your fixed CTC. While determining the Bonus payable (if any), the Employer may consider the regular feedback received about your performance from clients, managers and co-workers. The decision of the Employer in this respect shall be final and binding. (g) To be eligible for consideration for the Bonus, you must have completed the following period: ________ of continuous service with the Employer, however based on your performance company may consider you for a pro rata Bonus payout before the completion of ________. To receive the Bonus, you must be in service and not under any notice of termination on the date appointed for payment of Bonus. The Bonus, if any, shall be announced and paid on the dates specified by the Employer from time to time at its sole and absolute discretion. (h) The Employee acknowledges and agrees that the compensation and the benefits, as described in this Agreement, is the sole compensation to which the Employee is entitled in consideration for the Employee's fulfilment of the Employee's Duties. (i) It shall be your sole responsibility to meet all requirements under Indian tax laws in respect of all payments made or benefits given under this Contract including proper and timely tax compliance and the Employer disclaims liability for any taxes and other imposts for which you are liable personally. The Employer shall be entitled to make such deductions which, in its opinion, are necessary and appropriate from any payment made or benefit given in connection with the Employment that require such deduction to be made by the employer and the Employer shall provide the Form 16 to the employee evidencing the deductions made. (j) No liability shall attach to the Employer for your failure to pay any such taxes and imposts and you agree to indemnify and keep indemnified and hold harmless the Employer from and against any and all losses, costs, expenses, claims or demands which the Employer may pay, incur, suffer or sustain directly or indirectly arising out of or in relation to or howsoever connected with your failure to pay such taxes or imposts. (k) The Employer shall be entitled, at any time during your employment, or in any event on the termination of your employment, howsoever arising, to deduct from your remuneration and any sums reimbursable to you by the Employer, any monies due from you to the Employer including, but not limited to any outstanding advances, payment for excess holiday, overpayment of salary and any other monies owed by you to the Employer pursuant to your employment with the Employer under this letter agreement. (b) Your duties include those duties that would reasonably be expected to fall within this job title or such other duties, consistent with your status, as may reasonably be assigned to you from time to time to meet the needs of the Employer. (c) The Employer may from time to time make changes to the position description or to the Employee's Duties, provided that such changes are reasonable in the context of the Employer's industry and in the context of the Employee's position. (d) The Employer and the Employee may from time to time agree to make changes to the position description or to the Employee's Duties. (f) The Employee must perform the Employee's Duties in good faith having regard to the best interests of the Employer, and in a careful, conscientious and professional manner and to a standard that can reasonably be expected of somebody with the Employee's level of skill, training and experience. (h) You shall abide by the Employer's HR Policy notified to you from time to time and in the event of a conflict between the provisions of the HR Policy and this Contract, it is hereby agreed that the provisions of this Contract shall always prevail. (i) Properly and faithfully serve the Employer and use your best endeavours to protect and further the interests and reputation of the Employer. (j) Except when prevented by any emergency, illness or accident you will devote the whole of your attention and skill to the affairs of the Employer and use your best endeavors to promote its interests. You shall adhere to, execute, and fulfill all policies established by the Employer. (a) You shall be employed at the Employer's office in ________ or such other place that the Employer may require from time to time. (b) The Employer may at its sole and absolute discretion transfer you to any other office of the Employer within India or abroad. (c) You hereby agree to travel to such parts of India and the world as necessary for the discharge of your duties as the Employer may direct or authorise. (otherwise than on all holidays as notified in writing by the Employer from time to time). (b) The Employee will be expected to work ________ hours a week. (c) The office hours may be amended by the Employer from time to time. However, the Employer has the right to require you to work such further hours on weekdays/weekends and on other notified holidays, with additional payment as follows: ________, determined by the Employer by reference to the need to enhance and/or protect the Employer's interest or business. (a) You will be entitled to ________ public (preferred) holidays in every calendar year in addition to such public holidays as may be notified by the Employer from time to time. (c) You are also entitled to ________ days of casual/sick leave in a year. Casual/sick leave cannot be carried forward. Casual/sick leave balance, if any, at the end of the calendar year will automatically lapse. (d) If you are absent from work and such absence has not been previously authorised by the Employer as provided herein, you must inform your Manager of such absence with reasons as soon as practicable, but not later than on the morning of the first day of such absence. (a) Any leave taken by you for illness, sickness or injury will be deducted from your casual/sick leave entitlement. (b) If you are absent from work due to illness, sickness or injury for a period exceeding 3 days, you must give us a medical certificate certifying such illness, sickness or injury on the fifth day following the first day of absence. For any absence thereafter, you shall upon our request provide a further medical certificate to the Employer certifying the continuance of the illness, sickness or injury. (a) During the course of Employment, you will have access to information (whether or not recorded in writing or on computer disk or tape) which the Employer treats as confidential or which has the necessary quality of confidentiality. (b)Further, you understand that the Employer from time to time has in its possession information which is claimed by others to be proprietary and which the Employer has agreed to keep confidential. You agree that all such information shall be Proprietary or Confidential Information for purposes of this Agreement. (II) Use your best endeavours to prevent the publication, disclosure or use of any such Confidential information. (III) Enter into a Non-Disclosure Agreement ("NDA") and Confidentiality Agreement ("CA") with the Employer. (IV) Not directly or indirectly refer any information about the company on web based portals i.e Social Networking Sites, Blog etc. (e) The above restrictions shall not apply to divulging/disclosing information to such persons as may be authorised by the Employer in the course Employment. The Employer's decision as to who shall be permitted to disclose such cConfidential iInformation shall be final and binding on the Employee. (iii) Is required to be disclosed by any applicable law, regulation or order of the Court or by any competent judicial, regulatory, governmental or other authority or governmental agency. For the avoidance of doubt, the termination of this letter agreement or variation of any of its terms or conditions for any reason shall not affect the obligations of confidentiality set out above, except that they shall cease to apply to any information or knowledge which may come into the public domain other than by way of unauthorised disclosure in breach of the above obligations by you. (g) During the term of employment, the Employee will not improperly use or disclose any Confidential Information or trade secrets, if any, of any former employer or any other person to whom the Employee has an obligation of confidentiality, and the Employee will not bring onto the premises of the Employer or Employer's clients any unpublished documents or any property belonging to any former employer or any other person to whom the Employee has an obligation of confidentiality, unless consented to in writing by such former employer or person. (h) It is hereby clarified that the Employee shall be permitted to take an independent regular membership of non-profit organisations such as ASSOCHAM, ICAI and similar organisations only with the written consent of the employer and subject to the condition that the employee shall not (a) act as a consultant to any entity or organisation other than the Employer; (b) share or disclose any information of the Employer including Confidential Information, or act as a representative of the Employer at such organisations unless specifically authorised in writing by the Employer. (a) The Employee has submitted to the Employer a complete report with all supporting documents relating to all the Confidential Information, Intellectual Property and all other information developed by the Employee on or prior to the Commencement Date, which would be excluded from the scope of this Agreement. To preclude any possible uncertainty, the Employee sets forth in Annexure attached hereto a complete list of all Intellectual Property, that the Employee has, alone or jointly with others, conceived, developed or reduced to practice or caused to be conceived, developed or reduced to practice prior to the Date of Employment, that the Employee considers to be his/her property or the property of third parties and that the Employee wishes to have excluded from the scope of this Employment. (b) You shall promptly and fully disclose to the Employer and keep confidential all inventions, discoveries, trade secrets, copyright works, designs or technical know how and improvements, whether or not patentable, and whether or not they are made, conceived or reduced to practice during working hours or using the Employer's data or facilities, which you develop, make, conceive or reduce to practice during your engagement, either solely or jointly with others (collectively, the "Developments") in the course of your Employment. All Developments shall shall be the sole property of the Employer and belong to and be owned exclusively by the Employer, and you hereby irrevocably, absolutely and perpetually assign to the Employer, without further compensation, worldwide rights in respect of all of the right, title and interest in and to the Developments and any and all related patents, patent applications, copyrights, copyright applications, trademarks, trademark applications and trade names in India and elsewhere free from encumbrances of any kind for the full term of each and every such right, including renewal or extension of any such term. Decisions as to the protection or exploitation of any intellectual property shall be in the absolute discretion of the Employer. (c) The Employee agrees that all originals and all copies of any and all material containing, representing, evidencing, recording, or constituting all or part of the Developments, however and whenever produced (whether by Employee or others) and whether or not protected under copyright law or patentable or protected under other intellectual property law, shall be immediately handed over to the Employer upon its creations and any copies thereof returned to the Employer upon termination of Employee's employment for any reason. (d) The Employee agrees that the exclusive ownership of all content and/or part of Developments that is not protected under copyright laws and /or other intellectual property law and/or that is not patentable shall be automatically and irrevocably transferred to the Employer from date of creation. (e) To the extent any assignment of the Developments cannot be made to the Employer or its designees, at present, the Employee hereby irrevocably, absolutely and perpetually agrees to assign to Employer or its designees, all of the Employee's right, title and interest including intellectual property rights therein or any part thereof. You hereby irrevocably, agree to transfer and assign to the Employer all of your entire right, title and interest in and to any and all inventions, discoveries, methods, copyrights, software, data, processes, products, improvements and developments whether or not published, confidential, protected or susceptible of legal protection and whether or not any attempt has been made to secure such protection, which were made, conceived or reduced to practice at any time during the course of your employment with the Employer (whether prior to or after the execution of this letter agreement) by you, in whole or in part at the expense of, on the premises of, with the assistance of the employees or consultants of, or with the equipment or supplies of, the Employer or any of its affiliates, and any and all other confidential information belonging to the Employer. If you are the author of any work, or a subject matter other than a work, that was created or was being created in the course of your employment, the Employer may use it in any manner. You consent to this use whether or not it would, but for this clause, infringe your moral rights. The Employee explicitly waives all moral rights in the Developments. (f) For the purposes of this clause, you agree promptly to take all action and sign and deliver all instruments as the Employer may require at any time hereafter. During and after the term of the Employee's employment by the Employer, the Employee shall and undertakes to assist the Employer, at the Employer's expense, in every proper way to (i) secure and maintain the Employer's rights hereunder and to carry out the intent of this Agreement and for vesting the Employer with full title of Developments and all rights, titles and interest including intellectual property rights therein and to enable the Employer, its successors, assigns and nominees, to secure and enjoy the full and exclusive benefits and advantages thereof.; (ii) to apply and prosecute registration applications in respect of intellectual property rights and the Developments for the Employer's benefit, in any and all countries; (iii) sign, execute, affirm all documents, including, without limitation, all applications, forms, instruments of assignment and supporting documentation and perform all other acts as may be required for the abovementioned purposes. (g) You hereby constitute and appoint the Employer, its successors and assigns, your true and lawful attorney, with full power of substitution for you, and in your name, place and stead or otherwise, but on behalf of and for the benefit of the Employer, its successors and assigns, to take all actions and execute all documents on behalf of you necessary to effect the assignment set forth hereinabove. (h) Should the Employer be unable to secure the signature on any document necessary to apply for, prosecute, obtain, protect or enforce any IPRs, due to any cause, the Employee hereby irrevocably designates and appoints the Employer and each of its duly authorized officers and agents as the Employee's agent and attorneys to do all lawfully permitted acts to further the prosecution, issuance, and enforcement of IPRs or protection in respect of the Developments, with the same force and effect as if executed and delivered by the Employee. (i) The Employee represents and warrants that he will not use or integrate in the Developments any third party materials or data that are not validly licensed to the Employer unless previously authorized by the Employee's reporting officer in the Employer. The Employee represents and warrants that the Employee has not violated the Intellectual Property Rights of any third party, and covenants that he/she shall not violate the Intellectual Property Rights of any third party in the course of his/her employment with Employer. Provided that in the event the Employer is held liable for the Employee's violation of any Intellectual Property Rights, the Employee undertakes to indemnify the Employer or affiliates as the case may be against any and all losses, liabilities, claims, actions, costs and expenses, including reasonable attorney's fees and court fees resulting there from. (j) If, in the course of the Employee's employment with the Employer, the Employee incorporates Intellectual Property into the Employer's product, process or machine, the Employer is hereby granted and shall have a nonexclusive, royalty-free, irrevocable, perpetual, worldwide license (with rights to sublicense through multiple tiers of sub-licensees) to make, have made, modify, use and sell such Intellectual Property. (k) The Employee shall not during and after the term of the Employee's employment with the Employer, in any way violate the Intellectual Property Rights of any client of the Employer. Provided that in the event the Employer is held liable for the Employee's violation of any Intellectual Property Rights, the Employee undertakes to indemnify the Employer or affiliates as the case may be against any and all losses, liabilities, claims, actions, costs and expenses, including reasonable attorney's fees and court fees resulting therefrom. The Employee further covenants that he / she shall ensure that all information and records pertaining to any idea, process, trademark, service mark, invention, technology, computer program, original work of authorship, design, formula, discovery, patent or copyright of any client of the Employer that the Employee comes across during the term of his employment with the Employer, is duly protected. The Employee agrees that all originals and all copies of any and all material containing, representing, evidencing, recording, or constituting all or part of the Intellectual Property belonging to any client of the Employer, however and whenever produced (whether by Employee or others) and whether or not protected under copyright law or patentable or protected under other intellectual property law, shall be immediately along with any copies thereof returned to the Employer upon termination of Employee's employment for any reason. (i) If you have committed any criminal offence or been guilty of any gross misconduct whether during the performance of your duties or otherwise which, in the opinion of the Employer, renders you unfit to continue as an employee of the Employer or which would be likely adversely to prejudice the interests of the Employer. (ii) If you wilfully abuse or misuse the Employer's computer system, or any password relating to that computer system or gain access to any file or load any information or program contrary to the Employer's interests or procedures. (iii) If any information relating to your suitability for employment provided to the Employer in the course of applying for employment is found to be materially false or misleading. (iv) If you are subject to immigration control in India, your Employment shall be conditional upon you having been granted leave to enter into, remain and take up employment in India, such leave being valid and subsisting at all times and not being subject to any condition precluding or restricting the Employment. (i) Theft, fraud, intentionally providing false or misleading information or any act of dishonesty. (ii) Any act or attempted act of violence or abusive behaviour towards people or property including causing deliberate damage to the Employer's property. (iii) Indecent behaviour towards or harassment or bullying of fellow employees, suppliers, customers or clients. (iv) Incapability to undertake your responsibilities under this employment agreement on account of your abuse of alcohol or other banned substances. (v) Wilful breach of health and safety regulations, if any, prescribed by the Employer. (vi) A serious act of insubordination or wilful refusal to carry out reasonable requests by the board of the Employer. (vii) Serious or persistent neglect of duties or a series of persistent breaches of the terms and conditions of your employment. (viii) Unauthorised use of or disclosure of Confidential Information of the Employer. (ix) Falsifying records or expense claims. (x) Conviction for a criminal offence arising from or related to your work for the Employer. (xi) Conviction for a criminal offence committed outside working hours which in the opinion of the Employer adversely affects the Employer's business or reputation, or affects your suitability for the type of work which you perform or affects your acceptability to other employees. (xii) Any act which you know or reasonably believe is likely to bring the Employer into disrepute. (xiii) Unauthorized signing of documentation committing the Employer to any financial obligation which is not in the ordinary course of business of the Employer or exceeding your authority in any other way. (c) Upon dismissal as specified above or the termination of your Employment, you shall forthwith return to the Employer all documents, books, materials, records, correspondence, papers and information (on whatever media and wherever located) relating to the business of the Employer or its customers or prospects, any magnetic disc on which information relating to the business is stored and any other property of the Employer which may be in your power, possession, custody, care or control or which contain or refer to any Confidential Information and shall, if requested to do so by the Employer, provide a signed statement that you have complied fully with the terms of this clause. (d) Upon dismissal, you shall not be entitled to receive any accruals towards leave encashment. (i) In the event of your death. (ii) Upon the dissolution of the Employer. (b) Upon confirmation of your employment, your Employment may be terminated by either party by giving the following notice: ________ written notice. The Employer may terminate your Employment by paying you salary in lieu of notice. It is hereby clarified that the term 'salary' for the purpose of this clause shall mean the proportionate monthly CTC and shall not include any other compensation payable to the Employee by the Employer. (c) If you purport to terminate the Employment without notice or prior to the completion of the notice period specified above, you hereby agree to relinquish any salary for that part of the notice period that is not fulfilled. In addition, you shall also pay the Employer 1 calendar month's salary as penalty for not completing the stipulated notice period. Purported termination of the Employment without notice or on short notice or the payment of a penalty shall not and does not absolve you of the obligation to comply fully with the terms of this Clause. (d) Nothing in this Contract shall prevent the Employer from terminating your Employment without notice if you have been dismissed. (v) Not remain or become involved in any respect with the business of the Employer except as required by the Employer, including but not limited to not attending the Employer's places of business and requiring you to remain at home for all or part of the notice period. (f) Upon termination of Employment, you shall be entitled to receive the basic salary portion of the CTC in lieu of any accrued but unutilised holiday entitlement. However, if you have taken holiday or casual leave in excess of your entitlement, the Employer may at its sole and absolute discretion deduct a sum equivalent to the basic salary portion of the CTC due for each day of absence in excess of the holiday or casual leave entitlement. (g) On the last day of your employment with the Employer you must immediately return to the Employer in accordance with its instructions all equipment, correspondence, records, specifications, software, models, notes, reports and other documents belonging to the Employer and any copies thereof and any other property belonging to the Employer including but not limited to keys provided to you and which are in your possession or under your control. You will provide the Employer with any passwords in your possession and which are required to access these records, or any other such information relating to the Employer produced in the course of your employment. Furthermore, you will delete all information relating to the Employer produced in the course of your employment which is not stored on Employer property, including any such information stored on your personal computer. If you owe any money to the Employer, then the Employer has the right to deduct such sums from any payment due to you. This is without prejudice to the Employer's other remedies to recover any sums due from you to the Employer. No outstanding payments will be made to you until you, if so required by the Employer, confirm in writing that you have complied with your obligations under this clause. (h) Any and all of the Employer's Property, Confidential Information and Intellectual Property of the Employer acquired by or in the possession of the Employee under this Agreement, shall be returned to the Employer immediately upon termination of this Agreement. (i) In the event the Employee's employment with the Employer is terminated, Employee shall sign and deliver to the Employer a termination certificate in the format specified by the Employer. (j) It is further agreed and understood that until such time as all of the Employer's Property, Confidential Information and Intellectual Property is returned and the Termination Certificate is provided as abovementioned, the Employer shall, in addition to initiating legal proceedings for recovery (and without prejudice to any other rights or remedies that Employer may have under law or equity), be entitled to withhold any salary, emoluments or other dues of the Employee then or in future payable to the Employee, to the extent allowable by law, and may further, at its discretion, deduct therefrom the full value of the said property/properties calculated at its then replacement price. The Employee recognizes and agrees that the Employer shall be entitled to recover from the Employee and the Employee shall be bound and liable to make good to the Employer any loss suffered by the Employer on account of misuse of the Employer's Property, Confidential Information and Intellectual Property by the Employee and/or any damage occasioned to the Employer's Property, Confidential Information and Intellectual Property whilst in the custody of or entrusted to the Employee. (a) You shall not during your Employment, without the prior written consent of the Employer, under any circumstances, whether directly or indirectly undertake as an employee or otherwise or discharge (for remuneration or compensation howsoever payable) for any other person in India or elsewhere any duties and responsibilities, of whatever kind. (b) You shall not during your Employment, without the prior written consent of the Employer, during the term of employment hereunder, be engaged in any other business activity pursued for gain, profit, or other pecuniary advantage if such activity interferes with your duties and responsibilities hereunder. (c) You shall not, for the following period: ________ after the termination of your Employment, without the prior written consent of the Employer engage, whether directly or indirectly, in any business, employment or activity related to the Employer's clients or customers, a Competitive Business (as defined hereunder) nor provide services and carry out duties for any Competitive Business which are similar to the duties carried out for the Employer during Employment. You agree that the above is necessary to safeguard any sensitive information of the Employer that may have come into your knowledge while in Employment. in order to safeguard any sensitive information of the Employer that may have come into your knowledge while in Employment. Competitive Business(es)" include any firm, partnership, joint venture, company and/or any other entity and/or person that engages in the following business: ________ or carries out activities similar or competitive to the business in which the Employer engages or proposes to engage during the term of employment. (d) During your Employment and for the following period: ________ thereafter, You shall not without the prior written consent of the Employer carry out or engage in, whether directly or indirectly, whether through partnership or as a shareholder, joint venture partner, collaborator, consultant or agent or in any other manner whatsoever, whether for profit or otherwise in any Competitive Business which competes directly or indirectly with the whole or any part of the business carried on by the Employer in India or elsewhere or in any activity related to the business carried on by the Employer. (e) You shall not on your own account or on behalf of any other person, solicit or accept orders for products or services from any of the Employer's current or previous customers that are in competition with products or services of or in any way related to the business of the Employer from any of the Employer's current or previous customers. (iv) Enter the employ of, or render any other services to, any person engaged in a business which competes with the Business, if (i) the Employee has prior knowledge of the same or (ii) gains such knowledge during the term of employment or (iii) which is obvious to the Employee. (g) It is agreed by and between the parties that the employment with the Employer and the compensation payable under this Agreement shall be sufficient consideration for this Clause. (h) The Employee hereby acknowledges and agrees that the limitations as to time and the limitations of the character or nature placed in this Clause are reasonable and fair and will not preclude the Employee from earning a livelihood, nor will they unreasonably impose limitations on the Employee's ability to earn a living. In addition, the Employee agrees and acknowledges that the potential harm to the Employer of the non-enforcement of this Clause outweighs any potential harm to the Employee by this Agreement and has given careful consideration to the restraints imposed upon the Employee by this Agreement, and is in full accord as to their necessity for the reasonable and proper protection of Confidential Information and Intellectual Property of the Employer now existing or to be developed in the future. The Employee expressly acknowledges and agrees that each and every restraint imposed by this Agreement is reasonable with respect to subject matter, time period and geographical area. (i) You further agree and accept that during the Employment and for the relevant period as specified in the clauses above, each of the restrictions above shall be deemed to constitute a separate agreement and shall be construed independently of the others. It is expressly understood and agreed by the Parties that although the employee and the Employer consider the restrictions contained in this Clause to be reasonable, if a final judicial determination is made by a court of competent jurisdiction that the time or territory or any other restriction contained in this Agreement is an unenforceable restriction against the employee, the provisions of this Agreement shall not be rendered void but shall be deemed amended to apply as to such maximum time and territory and to such maximum extent as such court may judicially determine or indicate to be enforceable. Alternatively, if any court of competent jurisdiction finds that any restriction contained in this Agreement is unenforceable, and such restriction cannot be amended so as to make it enforceable, such finding shall not affect the enforceability of any of the other restrictions contained herein. (j) You understand and agree that the foregoing restrictions are necessary and reasonable in scope and duration, in all circumstances, for the purpose of protecting the Employer's business. (k) If any breach or violation of any of the terms of this Clause occurs, it is agreed that damages alone may not compensate for such breach or violation and that injunctive relief is reasonable and essential to safeguard the interests of the Employer and that an injunction in addition to any other remedy may accordingly be obtained by the Employer. No waiver of any such breach or violation shall be implied from the forbearance or failure by the Employer to take action in respect of such breach or violation. The provisions of this clause shall survive the termination of this Contract. The Employer shall also reimburse all pre-approved expenses properly incurred by you in the due and proper performance of your duties or responsibilities provided that supporting original vouchers and bills are furnished along with any request for reimbursement. All expenses need to be pre-approved by the Employer controller as designated from time to time and failure to do so shall result in the expenses not being reimbursed. (iv) Any advance on salary, which the Employer may have made to you from time to time. (a) The Employer reserves the right to make reasonable changes to any of the terms and conditions of Employment and you shall be notified of such changes by way of a general notice to all employees. Any such changes shall take effect from the date of the notice. (b) The Employer shall give 1 month's written notice of what it considers to be any significant change, either by way of an individual notice or a general notice to all employees. (c) Such significant changes will be deemed to be accepted unless you notify the Employer of any objection in writing before the expiry of the notice period of 1 month. Any such changes shall take effect from the date of the expiry of the notice period. If the Employer receives a notification of objection within the prescribed period, the objection will be considered and if it cannot be resolved within a period of 30 days from receipt of the objection, the Employer will terminate your Employment by giving you notice under Clause 12)b)i). The decision of the Employer as to what constitutes minor changes of detail or significant changes shall be final and binding. (d) You shall not be entitled to make any changes or amendments to this Employment Contract. (a) Any notice or other written communication given under or in connection with this Contract must be delivered personally or sent by Registered post AD. (b) The Employer's address for service shall be its registered office or such other place as the Employer may notify from time to time. (c) Your address for service shall be the address given at the head of this Contract or any other place that you may notify. (i) If delivered personally, at the time of delivery. (ii) If posted, at the expiry of 4 business days after it was posted (excluding the day of posting). (e) You must notify the Employer in writing of any change in your name, address, bank account number, marital status or next of kin within one month of such change, and of any arrest, prosecution or conviction for a criminal offence, any disciplinary action taken against you by a professional or regulatory body or if you become bankrupt, apply for or have made against you a receiving order make any composition with your creditors or commit any act of bankruptcy. This contract shall be governed by and construed in accordance with Indian law and each party to this contract submits to the exclusive jurisdiction of the Courts of ________. 5588 82225582 252 82 58882225 82 252 52282225 22 522 22 828 5228885228, 5285822 822252828 25 858885855828 22 252 8522 22528 525 8225828228 25585522 22 85885 252 22282222 85588 82228252 22 85552 252 828 552828 525 5282228888882828 82 252 8522 252225 525 252 22282222 525282 82282228 225 252 8522. (a) No collective agreements (which are otherwise applicable to workmen under the Industrial Disputes Act, 1947) apply to your employment. (b) This contract sets out the entire agreement and understanding between the Parties in connection with the Employment and supersedes any previous contract or agreement between you and the Employer. (c) The Employer may hold and process, whether electronically or manually, the data it collects in relation to you in the course of the Employment for the purposes of the Employer's management and administration of its business and of other employees and for compliance with applicable procedures, laws and regulations and you hereby consent for the same. The Employer or its agents may transfer, store and process such data whether in India or any other place for the above purposes. (d) 52 52 522 2822 522 2252 25 252888822 82 2588 82225582 85588 82 5285 22 82 8882258, 8285885 25 5222225825882, 82 85282 25 82 2552, 52525 522 5582 22 858 25 225822222, 8585 2252 25 252888822 25 2552 85588 22 2552 252222 82 522225 222 22 2252 2552 22 2588 82225582, 852 252 22225825888822 22 252 522582525 22 2588 82225582 85588 222 82 52228225. (iii) In view of the above, the Employer shall be entitled to injunctive relief, in addition to any other remedy available at law or in equity, in the event he/she violates any of the terms or conditions of this Agreement. Please return a signed copy of this letter to indicate your understanding and acknowledgement of the terms and conditions contained herein. I confirm that I have read and understood the aforesaid contract fully and by signing and returning to the Employer the duplicate copy hereof, I hereby accept the terms and conditions contained therein and agree that the same constitutes a valid and binding contract of employment between myself and the Employer.
2019-04-26T15:53:05Z
https://www.wonder.legal/in/creation-modele/employment-agreement-in
Humankind has a fantastically deep and complex understanding of many of the scientific and philosophical puzzles that have baffled our ancestors. We understand the inner workings of the sun, and what lives in the most remote places on Earth; we have a good idea of what happened a fraction of a second after the Big Bang, and how distant galaxies were formed; and we can explain the basic structure and the evolutionary emergence of the complex organisms that roam our planet. But there are some mysteries that still elude us, and perhaps none are as close, personal, and important as the question of how our brains work – how they produce such a rich variety and complexity of thoughts and feelings, and how they perform such a huge range of tasks, from communication to mathematics to movement. And while AI is making great progress, our computers are still far behind most everyday cognitive tasks, such as the activity in your brain right now while you are reading this post. Furthermore, how can such a lump of meat produce the rich first-person experience that we are all consumed by throughout our lives? Roger Penrose’s book Shadows of the Mind confronts these problems head-on, by giving a detailed assessment of the question: Is the human mind a computer? Can it be simulated by a computer, and can its workings be understood and explained only using computation? Penrose is conclusion is a resounding no: he concludes that the human mind is not a computer, and the workings of the human mind cannot be explained by computation alone. This book is particularly interesting to me because, having read many books and listened to many talks/podcasts on consciousness and the mind, I myself have my own strong views on the answers to these questions. My conclusion is opposite to Penrose’s, namely, it is my belief that the human mind is performing a computation. Normally a conclusion such as Penrose’s would not bother me, because many arguments can be wielded that counter such claims. But Penrose’s book is different, because at its core is a solid logical argument, one that cannot just be ignored or countered easily and quickly. In this post I will introduce Penrose’s logical argument, and then explain how he exploits the current gaps in the unification of general relativity and quantum mechanics to justify that the human mind must utilise a new type of physics – one that cannot be simulated on a computer. I will dive straight in to the key argument at the centre of this book. Consider a computation that acts on a single natural number, n. This could be something as simple as the computation “n+1”. Or it could be a vastly complicated and elaborate computation, such as the algorithm that generates the graphics of the nth level on Super Mario. Next, we need a way of labelling all the different computations that could act on n. We say that C(q,n) is the qth computation on natural number n. It is possible to write down every single possible computation that acts on a single natural number in this way. In other words, the complete set of computations labelled C(q,n) represents every single possible computation acting on a single natural number. If A(q,n) stops, then C(q,n) does not stop. What can we conclude from this? Well, C(k,k) cannot stop, because if it did then according to equation (4) C(k,k) would not stop, which would be a contradiction. But A(k,k) (which is the same as C(k,k)) is the computation that is specifically designed to determine whether C(k,k) stops. Therefore, because A(k,k) cannot stop, it is not possible for a computational procedure to determine whether C(k,k) stops. But we know that C(k,k) does not stop. Therefore, we know something that no computational procedure could ever know! If C(k,k) stops, then C(k,k) does not stop. Therefore we know that C(k,k) does not stop. But C(k,k) cannot determine this, and therefore the collection C(q,n), which represents all possible computational procedures available to humankind, cannot determine that C(k,k) does not stop. But, as said above, we know that C(k,k) does not stop. Therefore, humans cannot be using a computational procedure to determine this, otherwise there will be a contradiction. I have skipped some of the more subtle steps in the above explanation. The more precise conclusion would say: humans cannot be using a knowably sound algorithm to determine that C(k,k) does not stop (for brevity I will not introduce what knowably or sound mean – the interested reader can check out Penrose’s book!). To very briefly mentioned some of the more subtle details, instead of concluding that humans cannot be using a computational procedure, we could instead conclude that humans are not using a sound algorithm, or a knowably sound algorithm. But Penrose very convincingly argues that we are using a sound algorithm, and it is knowable, which allows to conclude that humans cannot be using a computational procedure to ascertain mathematical truth. But if our brains aren’t working computationally, then what are they doing? Are we using some obscure algorithm that computer scientists haven’t come up with yet, or are our minds acting as a quantum computer? In fact, neither of these options are possible, because what we mean by computation includes any process in known physics, including quantum mechanics. Therefore, the inner workings of the human mind must be beyond current physics! So what could this physics be? Is there really any room for new physics, and even if there is, can it really solve the problem raised above? Those readers not already familiar with the measurement problem in quantum mechanics should read my earlier blog, as otherwise this section won’t make any sense! In short, to make any sense of the process of collapse of the wavefunction – and therefore to make any sense of quantum mechanics – one must subscribe to one of the many different interpretations of quantum mechanics. To choose between them, you must decide whether you think quantum mechanics is complete/correct or not, and whether you think the quantum wavefunction represents reality, or just our state of knowledge. My own view is that quantum physics is correct, and that the theory of decoherence explains why the quantum state appears to collapse. Then, taking the uncontroversial assumption that the quantum wavefunction represents reality, I (and many others) are led to the conclusion that there are multiple parallel universes! But different people, with different backgrounds, expertise, prejudices, and life philosophies, can take a different perspective. Physicists have not yet successfully combined general relativity and quantum mechanics into a single unified theory, so in a sense they can’t both, in their current forms, be completely correct. Given this issue, a general relativity researcher’s view could be that general relativity is correct. As with quantum mechanics, general relativity has so far never been proved wrong. But as general relativity and quantum mechanics cannot be unified, one of them, or both of them, must be incorrect and in need of modification. And given the unintuitive conclusion of assuming that quantum mechanics was correct (parallel universes!), we should assume that quantum mechanics needs modification. Many scientists might argue that general relativity is more elegant and beautiful than quantum mechanics, so many researchers would think this is a reasonable stance. How should we modify quantum mechanics? One of the issues of combining quantum mechanics and general relativity is that it is not clear how superpositions of different gravitational fields can be understood. Roger Penrose argues that this is solved by modifying the theory so that superpositions of gravitational fields are unstable – the larger the field, the more unstable – and therefore “large” objects like humans and cats cannot exist in superposition states. Penrose then argues that there is reason to believe that a theory in which gravity collapses the wavefunction might be non-computational. Therefore, if the human mind utilises such physics, it will be working in a non-computational way. This line of reasoning then solves many problems in one swoop: the measurement problem is solved because gravity causes collapse of the wavefunction; one of the main problems with unifying quantum mechanics and general relativity is solved because large gravitational fields can no longer be in a superposition; and the problem of what the human mind is doing if it is not using known physics is solved because the human mind might be using the new physics that comes from gravity-induced collapse. A popular view nowadays is that neurons are the basic “computational” element in the brain. A single neuron is a type of cell that either fires (releases an electrical signal) or does not fire, depending on the electrical signals going into the neuron from other neurons connected to it at any given time. While a single neuron is quite limited, the theory is that the 100 billion neurons in the brain, linked together by 100 trillion connections, forms a highly complicated device that produces all the fantastic thoughts and intelligent processes that go on inside our heads. This view is backed up in part by the growing evidence that artificial neural networks – which try to replicate the brain structure – can do quite amazing things, such as recognise faces or play the game of Go better than the human champion. Furthermore, it has been showed that single neurons in the brain can react to specific individual’s faces (e.g. the Jennifer Anderson neuron! https://www.nature.com/news/2005/050620/full/news050620-7.html ). But this view of how the mind works is bad news for Penrose’s view because neurons are too large and interact too much with their surroundings to sustain any quantum coherence for a decent amount of time. In other words, a neuron cannot both fire and not fire simultaneously, in a superposition, because it interacts so readily with its surroundings that this quantum superposition is almost instantaneously destroyed (https://arxiv.org/abs/quant-ph/9907009). And in order for gravity-induced collapse to play any significant part in the brains workings, a superposition state must be sustained for a reasonable amount of time. So if neurons are the basic element in the brain that are responsible for our thoughts, then gravity-induced collapse could play no part, and the brain would be entirely computational. However, it has certainly not been proven that the entire working of the human mind is just a neural network – to some extent this is an assumption held by current science. Indeed, neurons are not the smallest things in the brain, and it is entirely possible that each neuron is itself a miniature processor, comprised of many more basic elements that together do the work (normally a good analogy here would be that each neuron is like a miniature computer, but as the whole point is that the brain is not acting as a computer, this analogy cannot be used!). Things certainly gets quite speculative here – and Penrose himself admits this – but the proposed site for the required non-computational processes is something called a microtubule. I won’t go into what microtubules are, because I don’t understand myself, but what I do know is that they are small enough and sufficiently ill-understood that it is possible both that they play an important part in how our brain works, and that they can sustain quantum coherence long enough so that gravity-induced collapse can play a part in how they process information. Penrose’s theory then is that gravity-induced collapse takes place in the microtubules, which means that human brain is doing something non-computational, which in turn allows us to escape the grasp of the logical argument given earlier. Penrose’s view has many significant implications for neuroscience and artificial intelligence. Firstly, we would not be able to understand how the mind works without understanding the new physics introduced above, and as we are very far from understanding this physics, a full understanding of the mind would be a very long way off. This seems to be quite opposing to the current view in neuroscience and consciousness studies. In addition, artificial intelligence that comes even close to human cognition would not be possible without understanding this new physics. Again, this is contrary to the current feeling in the artificial intelligence community, in which most researchers are confident that artificial intelligence will continue its impressive upward trajectory and before long many human-level cognitive tasks will be surpassed by artificially intelligent agents. Can we escape Penrose’s logical argument? Because of the stark contrast between Penrose’s view of how the mind works, and the artificial intelligence/neuroscience views, it seems important to try to resolve the issues raised in Penrose’s book. But while Penrose’s view is relatively comprehensive, well-structured, and well thought through, it depends heavily on his logical argument. It seems that if the logical argument falls down, then there is no strong scientific reason to believe that the human mind is acting non-computationally. In turn, there is no need to introduce something radical and speculative such as gravity-induced collapse in microtubules. For many researchers, the whole theory seems to rest somewhat precariously on this logical argument, and it is highly tempting to just disregard it or ignore it. Unless I’m mistaken, this is potentially what almost the entire artificial intelligence and neuroscience communities are doing! To some extent this is understandable, because there aren’t many people in the world who understand logic and computation enough to thoroughly study Penrose’s argument in order to try and find a flaw in it. Until recently, I too was culpable of strongly believing that the human mind was a computer, without myself trying to find a flaw (or trying to find others who’d found a flaw!) in the logical argument. For such a large chunk of scientists to ignore his argument might turn out to be a risky strategy, and arguably more researchers should invest in studying his points more carefully. I should mention here that after Penrose’s first book on this topic, The Emperor’s New Mind, in which he introduced a similar but slightly weaker logical argument, many researchers tried to find flaws, but Penrose has seemingly quite successfully batted these all away in Shadows of the Mind with a comprehensive half-chapter in which he carefully and thoroughly addresses 20 of such arguments. It’s probably safe to assume that Penrose also received many attempts at counter-arguments after his second book, but I know that Penrose himself has been unconvinced by these, and there is certainly no widely agreed upon and well understood counterargument that the rest of the scientific community wield in order to reject Penrose’s views. Having now read the key parts of Shadows of the Mind twice, and spending some time pondering it, I myself now have many ideas for where I think the logical argument could fall down. However, I am not a logician and I have certainly not spent enough time to confidently say that I thoroughly understanding the argument, so while there is a remote chance that my ideas are correct, it’s probably more likely that they are not! So I’ll refrain from presenting them here, but I’m very happy to discuss them with anyone interested. I will, however, present the core of a counter-argument introduced in a very interesting review of Shadows of the Mind by one of the most important consciousness researchers, David Chalmers (http://journalpsyche.org/files/0xaa25.pdf) . The general structure of Penrose’s argument involves taking a number of assumptions, then through the steps presented above he derives a contradiction. In Shadows of the Mind he quite convincingly argues that of all the assumptions are reasonable, except the assumption that the human mind acts computationally. Having derived a contradiction, at least one of the assumptions must be dropped, so Penrose drops the computational one. But Chalmers presents an argument (by McCullough and Löb) that takes all of Penrose’s assumptions, without the one about computation, then after a number of steps a contradiction is derived. Therefore, one of these assumptions is wrong. But this means that one of Penrose’s assumptions – and crucially not the one about computation – is incorrect, and Penrose should drop this one rather than his one about competition. Then there is no reason – at least not based on this logical argument – to think that the human mind is not acting as a computation. I want to finish on a high, so I will end by saying that this is an exciting and fascinating book to read. It is clear, well-written, entertaining, and thorough. Given the conclusions alone, my first reaction was that they are implausible and outlandish. But following his arguments step-by-step, he only rarely takes radical or outlandish steps. If he is wrong, then he is only subtly wrong, so naturally the reader is led along a path that eventually leads to his conclusions. I still disagree with them, but I had an enlightening and thoroughly enjoyable time reading his book, and trying to work out which subtle points in the logical argument I disagree with, so that my own view – that the human mind is a computer – can be kept intact! I currently hold a Research Fellowship from the Royal Commission for the Exhibition of 1851. My research project will tackle a key challenge in the quantum technology revolution by designing computer algorithms that automate the engineering of useful quantum states. These algorithms will enable the design of novel experiments to bring forward the development of new technologies such as quantum computing, communications and metrology. In my previous post I worked at the University of Nottingham on a project entitled "Sentient observers in the quantum regime and the emergence of objective reality", with Gerardo Adesso, Marco Piani, and Tommaso Tufarelli. This project involved using quantum information theory to investigate foundational questions concerning the role of the observer in physical theories. More generally, my research interests include quantum metrology, quantum state engineering, quantum sensing networks, and optical interferometry. This entry was posted in Artificial intelligence, Beyond quantum, Miscellanea, Quantum foundations, Science & Society. Bookmark the permalink. Thank you very much for this interesting review and concise presentation of Penrose’s reasoning. Thanks for sending this, I’ll read it with interest!
2019-04-18T12:27:22Z
https://quantarei.wordpress.com/2019/01/23/discussion-and-review-of-shadows-of-the-mind-by-roger-penrose/
Owen H. BROOKS et al. William A. ALLAIN et al. Although I agree that a summary affirmance of the judgment of the District Court is entirely appropriate in these cases, what has been written in dissent prompts me to make two important points. "1. Whether Section 5 and Section 2 as amended apply to redistricting decisions. "2. Whether the amendment to Section 2 or any other portion of the Voting Rights Amendments of 1982 has any bearing upon litigation under Section 5. "3. Whether Section 2 as amended prohibits only those electoral schemes intentionally designed or maintained to discriminate on the basis of race. "The District Court felt it was obligated, under the 1982 amendments to the Voting Rights Act, to redraw the district map so that the redefined Second District would have a 'clear black voting age population majority of 52.83 percent.' " Post, at 1008. "In the opinion of this court, after considering the totality of the circumstances, the creation of a Second District with a clear black voting age population majority of 52.83% is sufficient to overcome the effects of past discrimination and racial bloc voting and will provide a fair and equal contest to all voters who may participate in congressional elections." App. to Motion to Dismiss or Affirm in No. 83-1722, p. 14a. Because I find no merit in any of the specific challenges presented in the parties' jurisdictional statements,4 and because the record supports the District Court's findings of fact, as the dissent notes, post, at 423, I join the Court's summary affirmance. court which adopted it to "deal fairly with [the State's] black citizens by avoiding any scheme that has the purpose or effect of unnecessarily minimizing or fragmenting black voting strength." In 1982, the District Court in these cases adopted a redistricting plan for Mississippi's congressional districts in order to remedy district population disparities, revealed by the 1980 census, of up to 17%. In choosing from among several plans offered by the litigants, it sought a plan that would "satisfy the one person, one vote rule and avoid any dilution of minority voting strength." Jordan v. Winter, 541 F.Supp. 1135, 1142 (ND Miss.1982) (Jordan I ). The court further observed that "[w]hat is required is that the state deal fairly with its black citizens by avoiding any scheme that has the purpose or effect of unnecessarily minimizing or fragmenting black voting strength." Id., at 1143. The court chose the so-called "Simpson" plan because it satisfied most of the State's policy considerations in districting, created two districts with 40% or better black population, and included a district where nearly 54% of the population was black. On appeal to this Court, the judgment of the District Court was vacated and the case remanded for reconsideration in the light of the 1982 amendments to the Voting Rights Act. Brooks v. Winter, 461 U.S. 921 (1983). On remand, the District Court found that the very plan which it had approved and adopted in 1982 was unlawful under the amended 2 of the Voting Rights Act because "the structure of the Second Congressional District in particular unlawfully diluted black voting strength." Jordan v. Winter, No. GC82-80-WK-0 (ND Miss., Apr. 16, 1984) (Jordan II ). I think the rather remarkable conclusion that the 1982 amendments to the Voting Rights Act made unlawful a plan adopted by the District Court, which plan the District Court had adopted with a view to the requirement that "the state deal fairly with its black citizens by avoiding any scheme that has the purpose or effect of unnecessarily minimizing or fragmenting black voting strength," 541 F.Supp., at 1143, should receive plenary review by this Court. seeking a court-ordered interim plan for the 1982 congressional elections. That court refused to place in effect the legislative plan which had not been precleared, and held the existing districting statute unconstitutional because of the population disparities. It then adopted the "Simpson" plan from among several plans submitted to it by the litigants. Jordan I, supra. In choosing the "Simpson" plan, the court followed the teaching of Upham v. Seamon, 456 U.S. 37 (1982), which requires courts to fashion interim plans that adhere to a State's political policies. The court identified Mississippi's political districting policies as follows: (1) minimal change from 1972 district lines; (2) least possible population deviation; (3) preservation of the electoral base of incumbent congressmen; and (4) establishment of two districts with 40% or better black population. The court specifically rejected two plans proposed by a group of black plaintiffs. These plans would have kept the predominantly black northwest or "Delta" portion of Mississippi intact, and would have combined that area with predominantly black portions of Hinds County and the city of Jackson. Each of these plans would have resulted in one congressional district with a black population of approximately 65%. The "Simpson" plan, on the other hand, combined 15 Delta or partially Delta counties with six predominantly white eastern rural counties, and resulted in a congressional district with a 53% black population, but a 48% black voting population. The District Court found the "Simpson" plan most nearly in accord with the State's policies articulated above. The rejected plans would have resulted in only one district with greater than 40% black population; this was contrary to the reasonable state policy established to assure that blacks would have an effective voice in choosing representatives in more than one district. In addition, the court noted that the black plaintiffs had managed to place a high percentage of black voters in a single congressional district only through obvious and unseemly racial gerrymanders. black population of 53.77%, but blacks comprised only 48.09% of the voting age population. The District Court felt it was obligated, under the 1982 amendments to the Voting Rights Act, to redraw the district map so that the redefined Second District would have a "clear black voting age population majority of 52.83 percent." In doing so, the District Court " recognize[d] that the creation of a Delta District with a majority black voting age population implicates difficult issues concerning the fair allocation of political power." Jordan II, supra. "(a) No voting qualification or prerequisite to voting or standard, practice, or procedure shall be imposed or applied by any State or political subdivision in a manner which results in a denial or abridgement of the right of any citizen of the United States to vote on account of race or color, or in contravention of the guarantees set forth in section 4(f)(2), as provided in subsection (b). "(b) A violation of subsection (a) is established if, based on the totality of circumstances, it is shown that the political processes leading to nomination or election in the State or political subdivision are not equally open to participation by members of a class of citizens protected by subsection (a) in that its members have less opportunity than other members of the electorate to participate in the political process and to elect representatives of their choice. The extent to which members of a protected class have been elected to office in the State or political subdivision is one circumstance which may be considered: Provided, That nothing in this section establishes a right to have members of a protected class elected in numbers equal to their proportion in the population." 96 Stat. 134, 42 U.S.C. 1973 (emphasis in original). Applying the statutory language to the situation confronting the District Court after our remand, the "voting qualification or prerequisite to voting or standard, practice, or procedure" to which the amended statute is to be applied is obviously the 1982 plan adopted by the District Court. That court clearly thought so, and no other " qualification . . . standard, practice, or procedure" suggests itself. There has never been any suggestion that the plan adopted by the District Court in 1982 denied or abridged the right of any citizen to vote on account of race or color, so if that plan does violate the amended Act it is because it contravenes "the guarantees set forth . . . in subsection (b )." In Mobile v. Bolden, 446 U.S. 55 (1980 ), this Court wrestled with the question whether legislative "intent" to discriminate must exist in order to find that a particular legislative action violates the Voting Rights Act, or whether it was enough that the legislative action have a "discriminatory effect." In Mobile black plaintiffs had brought an action challenging the constitutionality of the city's at-large method of electing its commissioners. We produced six different opinions debating among ourselves whether discriminatory intent was required to find a violation of the Fifteenth Amendment, or whether " an invidious discriminatory purpose could be inferred from the totality of facts." Id., at 95 (WHITE, J., dissenting). None of the opinions challenged the conclusion of the plurality that the Voting Rights Act as it then existed added "nothing to the appellee's Fifteenth Amendment claim." Id., at 61 (opinion of Stewart, J.). Dole took the position that "access" only was required by amended 2: "[ T]he concept of identifiable groups having a right to be elected in proportion to their voting potential was repugnant to the democratic principles on which our society is based." 128 Cong.Rec. 14132 (1982) ( remarks of Senator Dole). This position was adopted by many supporters of the compromise in the Senate, and the bill passed as written. to statewide office in this century. Furthermore, the court found socioeconomic disparities between blacks and whites in the Delta area, and finally, that voters in Mississippi have previously voted and continued to vote on the basis of the race of candidates for elective office. The District Court concluded from this that the adoption of a plan in which the Second District contained less than a majority of voters from a protected class "diluted" the class' voting strength. Thus we have a statute whose meaning is by no means easy to determine, supplemented by legislative history which led the District Court in this case to conclude that only the inclusion within one congressional district of a majority black voting age population could satisfy the Act. I think it can be fairly argued from the legislative history, and from the express caveat that the section was not intended to establish a right to proportional representation, that in amending 2 Congress did not intend courts to supersede state voting laws for the sole purpose of improving the chance of minorities to elect members of their own class. effect of unnecessarily minimizing or fragmenting black voting strength" should be home free under either test. Under this view, the District Court's most recent opinion and judgment seem to me to present virtually insuperable difficulties. Although we may regretfully concede that the District Court's findings were correct, it nevertheless seems a non sequitur to say that the past discrimination, and its present effects, have "resulted" in "dilution" of minority voting strength through the adoption of this particular districting plan. To the extent that fewer blacks vote due to past discrimination, that in itself diminishes minority voting strength. But this occurs regardless of any particular state voting practice or procedure. As the plurality opinion in Mobile recognized in another context, "past discrimination cannot, in the manner of original sin, condemn governmental action that is not itself unlawful." Mobile, 446 U.S ., at 74. Here the only finding even remotely related to the boundaries of the Second Congressional District under the 1982 plan is what the District Court referred to as "socioeconomic disparities between blacks and whites in the Delta area." The findings as to the history of racial discrimination and bloc voting apparently obtained throughout the State. It is obvious that no plan adopted by the Mississippi Legislature or the District Court could possibly have mitigated or subtracted one jot or title from these findings of past discrimination. What we have, therefore, is in effect a declaration by the District Court that because of these past examples of racial discrimination throughout the State, any plan adopted either by the legislature or by a court which did not give blacks one of five congressional districts in which they had a majority of the voting age population violated the 1982 amendments to the Voting Rights Act. Under this analysis, cause and effect are entirely severed. For these reasons, I think the judgment of the District Court presents substantial questions concerning the interpretation of a new amendment to the Voting Rights Act of 1965, and that the Court seriously misapprehends its obligation in such a case when it summarily affirms the judgment of the District Court. Footnote 1 The jurisdictional statement that William A. Allain and others filed in No. 83-2053 presents two questions that are similar to those presented in No. 83-1722 and also presents the question whether the District Court erroneously found as a fact that black persons in Mississippi-and especially in the Delta generally-have less education, lower incomes, and more menial occupations than white persons, and that there has been racially polarized voting in Mississippi. See n. 2, infra. Nothing in the dissenting opinion indicates that it believes these questions merit full briefing and argument. In my judgment the jurisdictional statement in No. 83-1865 raises a more serious question, but I do not understand that the dissenting opinion favors review of that question. "Black registration in the Delta area is still disproportionately lower than white registration. No black has been elected to Congress since the Reconstruction period, and none has been elected to statewide office in this century. Blacks hold less than ten percent of all elective offices in Mississippi, though they constitute 35% of the state's population and a majority of the population of 22 counties. "The evidence of socio-economic disparities between blacks and whites in the Delta area and the state as a whole is also probative of minorities' unequal access to the political process in Mississippi. Blacks in Mississippi, especially in the Delta region, generally have less education, lower incomes, and more menial occupations than whites. The State of Mississippi has a history of segregated school systems that provided inferior education to blacks. . . . Census statistics indicate lingering effects of past discrimination: the median family income in the Delta region (Second District) for whites is $17,467, compared to $7,447 for blacks; more than half of the adult blacks in the Second District have attained only 0 to 8 years of schooling, while the majority of white adults in this District have completed four years of high school; the unemployment rate for blacks is two to three times that for whites; and blacks generally live in inferior housing." Id., at 9a-10a (footnote omitted). "You know, there's something about Mississippi that outsiders will never, ever understand. The way we feel about our family and God, and the traditions that we have. There is a new Mississippi, a Mississippi of new jobs and new opportunity for all our citizens. [video pan of black factory workers] We welcome the new, but we must never, ever forget what has gone before. [video pan of Confederate monuments] We cannot forget a heritage that has been sacred through our generations." Id., at 12a, n. 8. The commercial opened and closed with a view of Confederate monuments ; the candidate that ran the commercial used "He's one of us" as his campaign slogan. Ibid. Footnote 4 Indeed, it should be noted that the District Court's plan would be an acceptable remedy for the violations even if it did not regard the Simpson plan itself as a violation of 2 of the Voting Rights Act as amended. For after our remand, the District Court could have appropriately decided that the policy of that Act, coupled with the findings of fact concerning the effects of historic discrimination, particularly in the Delta area, required a remedy that established at least one district in which black persons represented an effective majority of the eligible voters. [Footnote 1] Justice STEVENS' concurrence suggests that my analysis is unwarranted because the problems I perceive with the District Court's opinion were not specifically raised by the "questions presented" in appellants' jurisdictional statements. I believe, however, that several of the "questions presented" "fairly include" the issues that I address. In particular, question 3, quoted ante, at 1003 (STEVENS, J., concurring), raises the question of the scope of activity Congress intended to proscribe under 2. I need not agree 100% with appellants' position-that 2 only proscribes intentionally discriminatory conduct-to reach the question whether the District Court misconstrued Congress' intent. "2. the extent to which voting in the elections of the state or political subdivision is racially polarized. "7. the extent to which members of the minority group have been elected to public office in the jurisdiction." S.Rep. No. 97-417, at 28- 29.
2019-04-26T06:20:22Z
https://supreme.justia.com/cases/federal/us/469/1002/
"Having therefore these promises, dearly beloved, let us cleanse ourselves from all filthiness of the flesh and spirit, perfecting holiness in the fear of God" (2 Corinthians 7, 1). One of the questions which we are bound to ask ourselves when we come to a communion is what are we aiming at with communion services? Indeed what are we aiming at with the weekly services and prayer meetings, and fellowships, and occasions for stirring one another up in prayer and preaching? What exactly are we doing? I don't think it's the work of supererogation to put that question because we are all so inclined to become victims of routine, and we do things out of habit without really asking ourselves "Why do we do these things?" I can imagine that some people would challenge us with this question: "Why do you hold communion services and preparatory services? Why do you do these things?" And of course there are always some in this age of change who would like to spoil and change all that. They would like to relegate communion services and other things to a very inferior and lesser position. So we need to just take stock and consider: how are we to respond to that challenge? What are we aiming at? What do we desire to accomplish and to see done by these communion preparatory services, the Lord's Supper and all the other means of grace, as we call them? Well the answer is, of course, that we are aiming to make progress in the things of God. We are aiming always at advancement in grace and in personal sanctification. We are aiming at perfection, and striving to come to that condition in which we shall be wholly sanctified, sinless and with the image of God perfectly renewed within us. This is what happens. Little by little, week by week and year by year, those who exercise their souls, by faith, in these means of grace - the Word, the sacraments and prayer and fellowship - they are making progress. Little by little, stage by stage and step by step, they are travelling towards absolute holiness, total sinlessness and conformity to the glorious image of our Lord and Saviour Jesus Christ Himself. Those who rather sneer at our communion arrangements, preparatory services and thanksgiving, and the multiplicity of our fellowships and prayer meetings, they must be answered in those terms. They may regard these things as old fashioned if they wish, and traditionalist if they prefer, but our position is: we love these things because little by little, through faith, by the means of the Word of God, we are coming to heaven more sanctified, more perfectly informed in knowledge and understanding. I think this is what the apostle is referring to here: "Having therefore these promises, dearly beloved, let us cleanse ourselves from all filthiness of the flesh and spirit, perfecting holiness in the fear of God" (text). Let me draw attention on this occasion to three things in the text; first of all the promises, secondly the duty to cleanse ourselves, and thirdly the long term view, "perfecting holiness in the fear of God". That is, the promises; the duty of cleansing ourselves; and the long-term view, which in the end will result in total and perfect holiness and happiness, in Christ, with God and in heaven. The communion season is one of the means whereby, through grace, we are travelling that happy and blessed road to eternal glory. He begins with the promises, "Having therefore these promises, dearly beloved"(text). The only way, of course, we are to know what these promises are, is to consider what he has just been saying. Where are these promises? "And what agreement hath the temple of God with idols? For ye are the temple of the living God; as God hath said, I will dwell in them, and walk in them; and I will be their God, and they shall be my people..." (2 Corinthians 6, 16). These are the promises to which he is making reference. The promises of God are all the good and all the blessings which the Lord is delighted to confer upon His people in time and in eternity. The promises are all those glorious gifts of grace which He is delighted to pour upon the lives and hearts of those who seek Him. That's what is meant by the promises. These promises flow out of the unmerited goodness of God Himself, God the Father, and Son, and Spirit. These promises are absolutely reliable. The Bible says about them that they are 'yea and amen in Christ'; promises which cannot fail because God cannot lie. The promises are given to whet our appetite, to quicken our step, to sharpen our hunger for the blessings which He offers to us. These promises, I should go on to say, are called in scripture "exceeding great and precious" (2 Peter 1, 4). They are promises which far exceed anything which men of this world have ever understood; the promise, for instance, which He gives to us here when He says to us in verse 16, "You are the temple of the living God" (2 Corinthians 6, 16). He means the body of the Christian, and the soul and mind of the Christian; God lives in our very body. That of course is why we must never defile the body. The body is for the Lord; we are married to Him, and misuse of our body is a kind of spiritual harlotry or fornication, as we are told in the first letter to the Corinthians. So God dwells in our body. My dear friends, He dwells in the body of a Christian, as in a house or temple. It is His home. Where does God dwell? Well in two places; He has two addresses: He dwells in highest heaven, and in the humble heart. He dwells with those who are His people here below, those who love Jesus Christ, those who love Bibles and prayer meetings, those who love one another; He dwells in their hearts as in a temple because that is His home. Not only does He tell us here in this promise at verse 16 that He will dwell in them - but a surprise: He will walk in them. I suppose the illustration we are looking for is this: when a person lives in a house or home, they always arrange everything in the house or home in the way that suits them. We all are different in the way we arrange our homes, aren't we, the way we arrange our houses? I suppose if we were psychologists, we could read people's complexes by the way they organise their homes and their houses. Well, be that as it may, what we do know is that the great and holy God dwells in His people, and of course He walks about in them, as it were. It's His house, His dwelling place, and so He organises things within the lives of people. The closer we walk with Him, and the more of His influence there is in our lives, the more certain things become clearer - I mention one or two. First of all, those who have His indwelling become more pure in heart. Progressively He removes all the dirt from the house. Isn't that what a good householder does? A good householder cleans all the dirt out of the house. We don't allow dirt in our homes; we know dirt is out of place in the house. Well, so the Lord, as He walks in His own home, in the souls of His people, He draws attention to this sin and that sin, and His intention is to do that, that we might put out of our lives these evil habits and evil practices. What else do we do when we walk in our homes? Well we order and organise things; we have everything in the best order. So it is in the life of a Christian: the more God fills our life, the more order there will be. That is to say, our lives will be well ordered in the ways of the Lord. Our footsteps will be ordered in His paths because God is dwelling within us, and walking within us, and influencing the way our lives are lived. There is order in the Christian life. But as the worldly man lives entirely to suit himself, the Lord's people - not perfectly, but they endeavour to - organise their lives so as to seek first His kingdom and His righteousness. It is an evidence of God living and walking within their souls. What else do we do when we have our homes? We don't simply clean them and order them but we beautify them: we hang things on the walls, and we have ornate and decorative features which beautify the home. That is natural to man to do so, natural to a woman, especially, in her own home. How much more the beloved and beautiful Spirit of God, the Holy Spirit, how much more He, dwelling within the Christian, not only gives cleanliness but also He gives spiritual beauty, the beauty of the Lord, beauty of character, "the ornament of a meek and quiet spirit, which in the sight of God is of great price" (1 Peter 3, 4); the virtues and excellences of His own indwelling, the fruitfulness which come from the indwelling of the Spirit of God. You may think, if you like, of a man like Stephen, of whom it is said - O happy man, of whom it is said - "Stephen, a man full of faith and of the Holy Ghost..." (Acts 7, 55). What a description! Would to God we were more like him - a dear, good man who was stoned to death - the first martyr. Listen to that as God was dwelling in his soul and transforming his life, "a man full of faith and of the Holy Ghost". That is because God was fulfilling His promise to the one that sought Him, and conferring upon him these favours. "I will dwell in them, and walk in them; and I will be their God, and they shall be my people" (2 Corinthians 6, 16). So, my dearly beloved friends, let us take heed to the promises of God and strive to make God a welcome guest, within our homes certainly, but above all within our hearts. Oh happy the Christian whose soul is overflowing with the love of God! Happy the Christian who is not living for temporary things but whose eye is upon heaven and glory! That is the first thing, the promises. "Having therefore these promises, dearly beloved..." What do we do with them? "Let us cleanse ourselves from all filthiness of the flesh and spirit." Secondly is the duty relating to the having of these exceeding great and precious promises. We are to cleanse ourselves. We can't of course do this in the energy of the flesh. This is the great error of the monastery and of the nunnery. I feel profoundly sorry for monks and nuns because they spend their entire life, many of them, trying to make themselves holy. The endeavour of course is most praiseworthy, but the great mistake is that their churches do not teach them that before anyone can begin to cleanse themselves in this way they must experience, as must all sinners, this new birth. We must become men and women in whom God dwells, and the indwelling only commences with the new birth. It is the devil who indwells the soul of the wicked. That, sadly, too sadly for words, is why we hear of some priests and others who are found to be doing things which are criminally wicked. How can it happen? Those who spend, or claim to spend, the whole of their life serving God in the priesthood as they call it, how can they be caught out in these violent and vicious sins of the flesh? The answer is - four things: We cannot begin to begin to be holy until the Spirit of the Lord dwells in our heart. Christ must be in us as the hope of glory. We must be new creatures in Him and that is what He assumes when He says to us we are to "cleanse our souls". That teaches us that in sanctification there are two persons at work, it is a co-operative work: it is first of all the work of God working in us to will and to do of His good pleasure; but it is secondly the work of the Christian who must work out his own salvation with fear and trembling - a very similar verse to this one. Before the new birth no one can cleanse himself from filthiness of anything, but once the new birth has taken place our duty, often repeated in scripture, is to co-operate with God the Holy Spirit. And in co-operating, there are two persons working together: God is cleansing us by His Word and Spirit; but also we are to yield ourselves to God and to obey every command of scripture to the uttermost of our powers in order that this work may be successful and progressive, and may take place within us, with the utmost expedition possible, to cleanse ourselves from all filthiness - of two kinds, notice: filthiness of the flesh, and of the spirit. What is the difference? Well, filthiness of the flesh refers to sensuality, carnality, everything which refers to the defiling of the body which, tragically, is so widespread. The way in which we are to cleanse ourselves is by walking carefully in the commandments and ordinances of God. But what then is filthiness of the spirit? Filthiness of the spirit means idolatry, religious filthiness such as, for instance, the having of a false view of God, having idolatrous ideas about God or treating God in a manner which is not consistent with the Bible. That is idolatry. Or, the observing of rituals which God has not commanded, whether it be the mass, which our forefathers used to call "a dangerous blasphemy", or whether it be any superstition - the worship of the virgin Mary. All of this is filthiness of the spirit, it is idolatrous. All false doctrine, when we receive it into our souls, is defiling to the soul and it weakens the soul and it destroys true conviction of the things of God. If you and I therefore are to make progress in holiness, we must never admit superstition into our soul. We must not admit anything into our soul but what the Word of God teaches. The Bible, the whole Bible and nothing but the Bible is the religion which we are told to cultivate and to observe. So we are to cleanse ourselves, secondly, from all forms of physical defilement. Not only the defilement of superstition, idolatry, false views of God, false doctrine, false practices - but anything which is removed from the true teaching of the Word of God. So then, it is most important for us that we watch ourselves and take heed to the way we live, the way we speak, to our walk and talk and conversation in the world, and it is extremely important that we do not receive into our minds any teaching, from any source, which is inconsistent with holy and sacred and infallible scripture. What is the long term end in view? Well He says, we have the promises first, and the duty next to cleanse ourselves. The third and final point we have time for this evening is that we are to perfect holiness in the fear of God. That is to say we are not to rest in our present attainments. No matter how advanced a Christian may be, no matter how much he may have been on the journey towards heaven, insofar as he is still imperfect he must not rest in the past and in the achievements and the attainments up to this time, but he must go on. How true it is that we are all inclined to rest on our laurels, and to rest on our attainments. It is so true of us, whether we put it into words or not, but we are inclined to have the secret thought at the back of our mind: I have done enough to coast along quietly for the rest of life. That is a temptation which we all have. I know my Bible reasonably well; I am fairly sound in doctrine; I am pretty consistent in the way I live, so I can coast along and I'll be all right in the end. Well, indeed you will be, but my dear friends, a little more is desirable, and that is that we should stir ourselves and one another up to perfect holiness. If there are practices in our life which we know to be less than biblical, then, especially at a communion time, let us strive to find grace to put these things more and more out of our life. If there are superstitious thoughts and ideas and practices, because of the infirmities of our flesh, then let us seek grace more and more to put them out of our lives in order that we may perfect holiness in the fear of God. And so the apostle here gives these exhortations to all the people of God. As I close, I want to say: Don't be discouraged. If you feel that you have not really started in the life of grace, if you feel discouraged because you are so backward in the life of grace, that very thought may be the best indication that you have made more progress than many others who have a high opinion of their attainment. Those who have attained most always have the lowest opinion of themselves, and none of us has attained to anything comparable to the apostle Paul; but remember he, in referring to himself, said, "I am less than the least of all saints; I am not worthy to be called an apostle. I am the chief of sinners." But now, notwithstanding that, he was the greatest of saints, and the most useful Christian the world has ever seen. So my dear friends, it is a communion time, the shadow of which falls across our mind and spirit once again. So let us be of good cheer, and let us seek to perfect this holiness in the fear of God. Amen.
2019-04-21T04:23:52Z
http://www.bible-sermons.org.uk/text-sermon/344-perfecting-holiness/
A retractor assembly for positioning tissue during a surgical procedure, having two opposing arms disposed adjacent to one another and sized and configured to be urged substantially laterally away from one another during actuation of the retractor assembly into an open position, and one or more posts, each post being connected to, or integral with, and extending radially outwardly from a respective one of the opposing arms, each of the one or more posts having a length sufficient so that each of the one or more posts will extend through a respective aperture defined by a modular component to be detachably attached to the respective one of the opposing arms. Related methods of positioning tissue during surgery are also described. This application is a continuation of co-pending and commonly-owned U.S. application Ser. No. 14/056,452, filed Oct. 17, 2013, now U.S. Pat. No. 9,161,745, which in turn is a continuation of International Patent Application No. PCT/US2012/058998, filed on Oct. 5, 2012, which claims priority to commonly owned U.S. Provisional Patent Appl. No. 61/543,535, filed on Oct. 5, 2011, the disclosures of which are incorporated herein by reference. This invention pertains to the technical field of medical devices, namely retractors for use in orthopedic and other surgical procedures. Retractors and retractor assemblies are commonly used to draw back and retain tissue from a surgical site. Many retractor designs are competent at retaining open an incision, but are less useful in isolating bone or other internal target areas while dependably retracting deeper tissue below the skin and below the shallow tissues which surround the incision. Conventional retractors, even those of the self-retaining type for example, often require adjustment or manipulation by a surgical assistant when retraction and/or isolation of deeper tissues might be necessary during a surgeon's work. Thus, a need persists for refractor apparatus with improved ease of use, efficiency of design and effectiveness at tissue retraction and target isolation within the surgical field. one or more posts, each being connected to, or integral with, and extending radially outwardly from a respective one of the opposing arms, each of the one or more posts having a length sufficient so that each of the one or more posts will extend through a respective aperture defined by a modular component to be detachably attached to the respective one of the opposing arms. It can be preferred, in certain aspects of the invention, that at least one of the one or more posts is non-circular (e.g., square, rectangular, hexagonal, etc.) when viewed in cross-section through a longitudinal axis thereof. The retractor assembly may further comprise a plurality of posts extending from each of the opposing arms. The retractor assembly may further comprise at least one modular component, which component defines one or more apertures, each aperture being sized and configured to mate with a respective one of the posts to thereby detachably attach the modular component to the arm from which the respective one of the posts extends. In some aspects of the invention, each aperture defined by the modular component is sized and configured to mate with the respective one of the posts so as to inhibit rotational motion of the modular component about the longitudinal axis of the respective one of the posts. The modular component further may comprise a planar member forming one or more flanges. In such cases, preferably the one or more flanges is sized to extend into the surgical field when the modular component is detachably attached to the respective one of the opposing arms and the refractor assembly is deployed in the open position during use. In one particular embodiment of the invention, the modular component comprises a Hohmann retractor. urging the opposing arms laterally away from one another and into an open position so as to place the modular components into contact with and to position the tissue during the surgical procedure. In at least some embodiments of the invention, the method further comprises temporarily retaining the modular components in the opened position by temporarily retaining the opposing arms in the opened position. In one particular aspect of the invention, the opposing arms are pivotally connected to one another, and together define a ratchet connection employed in temporarily retaining the opposing arms in the opened position. These and other embodiments, features and advantages of the present invention will become even further apparent from the accompanying drawings, the following detailed description and the appended claims. FIG. 1 is an elevated view in perspective of one embodiment of the present invention. FIG. 2 is an elevated view in perspective of the embodiment of FIG. 1, shown in use to retract a surgical site on a human arm, isolating bone within that site. FIG. 3 is an elevated view in perspective of a modular attachment in accordance with one embodiment of this invention, which attachment could be used with the retractor assembly of FIG. 1. FIG. 4 is an elevated view in perspective of another modular attachment in accordance with one embodiment of this invention, which attachment could be used with the retractor assembly of FIG. 1. FIG. 5 is an elevated view in perspective of another modular attachment in accordance with one embodiment of this invention, which attachment could be used with the retractor assembly of FIG. 1. FIG. 6 is an elevated view in perspective of another modular attachment in accordance with one embodiment of this invention, which attachment could be used with the retractor assembly of FIG. 1. FIG. 7 is an elevated view in perspective of a portion of the retractor assembly of FIG. 1, substituting modular attachments in accordance with FIG. 4 for the Hohmann-type retractor components shown in FIG. 1. FIG. 8 is a top view of a Hohmann-type retractor component in accordance with another embodiment of the invention. FIG. 9 is an elevated view in perspective of a retractor assembly in accordance with yet another embodiment of the invention. FIG. 10 is a top view of the modified Hohmann-type retractor component of the retractor assembly illustrated in FIG. 9. Like numerical or alphabetic references identified within the several drawing figures are used to refer to like parts or components present in the illustrated objects. With surprising simplicity, the retractor assembly of this invention, in at least one of its embodiments, enables facile retraction of tissue from a surgical field, even when an assistant is not readily available or only a single hand is free to manipulate the retractor. Select embodiments of the invention also provide the convenience of a modular configuration, permitting of variations in the components configured to be engaged by the posts extending substantially laterally from the opposing retractor arms. In this way, the same main retractor assembly of opposed arms and associated lateral posts may be mated selectively with a specific pair or set of the same or different modular components, selected as best adapted for use in the given surgical procedure at hand. The one or more posts extend substantially laterally from the opposing retractor arms in that they may extend within the same general plane occupied by the opposing arms, or may have a longitudinal axis which is disposed at an angle relative to the general plane occupied by the opposing arms. In some embodiments of the invention, it may be desirable, for example, for each post to extend laterally and slightly upward from its associated opposing arm at an angle of, e.g., at least 5 degrees or more from a plane generally occupied by the adjacent opposing arms of the assembly. Such angular disposing of the one or more posts can serve to at least ensure the modular components of the assembly remain mated to their respective one or more post during use of the retractor assembly. Turning now to the figures, it will be seen that a particular embodiment of this invention is illustrated by the self-retaining retractor assembly A shown in FIG. 1. Assembly A comprises two opposing retractor arms 10 and 12 disposed adjacent to one another and sized and configured to be urged substantially laterally away from one another during actuation of the refractor assembly into an open position. In the illustrated embodiment, such sizing and configuration is provided by pivotally connecting arms 10 and 12 to one another at pin 14, arms 10 and 12 forming thumb and finger loops 16 and 18, respectively, and further forming a ratchet component itself formed by a curved flange 20 defining ratchet teeth 21 and a spring-biased ratchet claw 22. Teeth 21 and claw 22 mate with one another to releasably retain arms 10 and 12 in an open position (i.e., a position which will urge the surgical field-engaging portions of the retractor arms away from one another) when loops 16 and 18 of arms 10 and 12 are brought together manually. Biasing claw 22 to release from teeth 21 when desired will free the opposing arms 10 and 12 so that they may be placed in a closed position when loops 16 and 18 are separated. At the opposing ends of arms 10 and 12, there are provided a plurality of posts 30 each being connected to, or integral with, and extending radially outwardly from a respective one of the opposing arms 10 and 12. As illustrated, one of each set of three posts 30 extending from each of arms 10 and 12 is mated with a modular component in the form of a Hohmann retractor 40 a and 40 c, respectively. Each of retractors 40 a and 40 c form at least one, and as illustrated at least two, shaped apertures 42, sized and configured to tightly mate in a lock-and-key fashion with a respect one of the posts 30. In this context, to tightly mate means that the clearance between an inner wall of at least one (and preferably each) aperture 42 and at least one lateral side of its associated post 30 is sufficiently small so as to allow for less than 15 degrees of rotation of the modular component about the longitudinal axis of the post, thereby providing a relatively snug mating of the post 30 with its respective aperture 42 to prevent retractors 40 a and 40 c excessive movement about the longitudinal axis of associated post 30, without being so snug that retractors 40 a and 40 c cannot be readily de-coupled from the associated posts 30 manually. This fit between each post and its associated modular component aperture is particularly important when the modular component is configured to detachably attach to a respective arm by mating only one aperture with one post when installed in the assembly. As illustrated in FIG. 1, the Hohmann retractors 40 a and 40 c further define a series of two or more apertures 42 in order to provide options to the user to adjust the depth or other position of the modular component attachment, in this case the retractors 40 a and 40 c. When multiple apertures are defined by the modular component(s), the apertures in a given modular component may be the same shape or different shapes. For example, as seen in FIG. 8, in order to provide options for tilting the Hohmann retractor 60 (which is similar to retractor 40 a and 40 c of FIG. 1) laterally at different depths and at different angles from perpendicular during use, retractor 60 defines three different apertures 62, 64 and 66, and the rectangular shape of aperture 66 is longer than aperture 64, which is longer again than aperture 62, so that the user can vary the angular tilt of the retractor component by employing the appropriate aperture for a preferred angle. The longer rectangular apertures 64 and 66 permit and upper portion of refractor 60 to tilt from perpendicular laterally (as shown for retractors 40 a and 40 c in FIG. 1) at greater respective degrees as compared to aperture 62, while still providing sufficiently small lateral post clearance to prevent excessive rotational motion of retractor 60 about the longitudinal axis of post 30 when employed in the assembly of this invention. FIGS. 9 and 10 illustrate alternative Hohmann retractors 80 a and 80 c, each also defining multiple shaped apertures 82 (described in greater detail below) along the length of the retractor, in order to provide options for tilting laterally at different depths and at different angles from perpendicular during use. In FIG. 2, the assembly of FIG. 1 is illustrated in use, but with two pairs of Hohmann retractors 40 a and 40 b, and 40 c and 40 d, mated to respective posts 30. The Hohmann retractors illustrated extend into a surgical site S and extend under a bone B. Assembly A is in an open position to retain tissue T away from bone B during the procedure and to further isolate bone B. Through the use of a plurality of posts 30 and the two pair of retractors 40 a, 40 b, and 40 c, 40 d, a well-retained surgical field can be obtained with effective isolation of bone B with one manual actuation of the self-retaining retractor assembly's rachet component by manually bringing together loops 16 and 18 once the Hohmann retractors 40 a, 40 b, 40 c and 40 d are positioned into the field S and adjacent bone B. FIG. 2 further illustrates the method of this invention, for positioning tissue during a surgical procedure. With reference to FIG. 2 and FIG. 7, it can be seen that, in practicing the method, one detachably attaches a modular component (e.g., the Hohmann retractors of FIG. 2) to each of two opposing arms 10 and 12 of the self-retaining retractor assembly, by at least mating respectively one or more apertures 42 defined by a respective one of the modular components (Hohmann retractors) with one or more posts 30, the one or more posts being connected to or integral with and extending radially outwardly from a respective one of the opposing arms 10 or 12. The method further comprises disposing at least a portion of the modular components of each of the two opposing arms 10 and 12 into the surgical field, and urging the opposing arms 10 and 12 laterally away from one another and into an open position so as to place the modular components into contact with, and to position, the tissue during the surgical procedure. Such urging is typically, but not necessarily, carried out manually by the user. The method may further comprise temporarily retaining the modular components in the opened position by temporarily retaining the opposing arms 10 and 12 in the opened position. As illustrated, this is carried out through the use of the ratchet component of the assembly and a pivoting connection of the opposing arms, but of course other means of carrying out such retention can be envisioned once the feature of this invention are known. For example, fasteners such as screws, bolts and nut configurations, and the like, or clamps or other mechanical components could be employed to controllably and temporarily retain the opposing arms in the opened position and/or vary the space between those opposing arms during use. The present invention is modular in that alternative or additional modular components can be provided to mate with the substantially laterally extending posts of the opposed arms of the retractor assembly. Thus, for example, as seen in FIGS. 3, 4, 5 and 6, a wide variety of modular components, in addition to or as an alternative to a Hohmann refractor component, can be envisioned for use as a part of the assembly of the invention. As seen in those figures, the modular component comprises a plate 50 which forms one or more flanges 52 and defines one and one or more apertures 42, and the plate 50 can vary widely in its shape and configuration, in order to suit a particular surgical need or procedure. FIG. 7 further illustrates another embodiment of the invention, and the mating of a modular component 50 in accordance with FIG. 3 with retractor assembly arms 10 and 12. In another aspect of the invention illustrated with reference to FIGS. 9 and 10, there is provided a self-retaining retractor assembly B with several features similar to those of the assembly A of FIG. 1. Assembly B further provides Hohmann retractor components 80 a and 80 c which define key-hole type apertures 82 for receiving and mating with modified posts 32 which are connected to or integral with and extending radially outwardly from a respective one of the opposing arms 10 or 12. Posts 32 are each modified from the posts 30 illustrated in the assembly of FIG. 1, in that posts 32 each define an enlarged section or head at the free end, the enlarged section being sized and configured to be received through a mating portion of a respective shaped aperture 82. Once the enlarged portion of each post 32 has been received through its respective aperture 82, retractor 80 a or 80 c can be positioned so that the respective narrower portion of aperture 82 mate with the respective narrower section of post 32, as previously illustrated and described for posts 30 and aperture 42 of FIG. 2. This can reduce rotational movement of the respective Hohmann-type retractor component, while the enlarged portion of each post 32 will inhibit unintentional displacement or removal of the respective Hohmann-type retractor component from its associated post. It should be appreciated from this disclosure by those of skill in the art, that the particular shapes of the key-hole type apertures and mating posts (including the associated enlarged head portion of each) can vary from those illustrated while remaining within the spirit and scope of the invention. As illustrated in FIG. 9, to illustrate another alternative design, assembly B further includes a pair of retention paddles, each in the form of a plurality of adjacent curved flanges 90, affixed to and extending in the same general direction from respective ends of the two opposing arms 10 and 12 of assembly B. While as illustrated the retention paddles are integral with the opposing arms, it will be appreciated that these retention elements also may be modular in design, so that either or each is configured to be readily attached and detached to its respective opposing arm. Those of skill in the art will now appreciate that a wide variety of modular components could be sized and configured for use in the retractor assembly of this invention for use in many different types of surgical procedures. Moreover, a variety of sizes and configurations may be employed to provide a mechanism for bringing together and urging apart and retaining in place the opposing arms of the retractor assemblies of this invention, and those of skill in this art will now appreciate that the specific self-retaining mechanism illustrated in the accompanying figures is not the only configuration which could be employed to effectuate the positioning and retention of the opposing arms and associated modular components during use. Likewise, the number of apertures defined by the modular components, the number of laterally extending posts and their specific length and lateral position relative to the associated opposing arm, as well as the size and the shape and the number of modular components employed, can vary to accommodate different but desirable design criteria for a given retractor assembly of the invention, or to better facilitate retraction in a given surgical procedure. Likewise, the length of the opposing arms can be varied to increase the retraction. Due to the modular design of the assembly of this invention, various modular component attachments can be applied alone or in combination. One type can be used on one arm and a different type on the other. The design also allows for the addition or removal of the modular component attachments during surgical procedure. The modular components and other parts of the retractor assembly of this invention can be fabricated of any surgical grade material suitable for use in conventional retractor assemblies. The foregoing description of various embodiments of the present invention are illustrative only, and are not to be construed as limiting the scope of the invention. Many varying and different embodiments of the invention not specifically detailed herein nevertheless may be envisioned easily by those of skill in the art who have the benefit of the present disclosure, and therefore the scope of the invention is properly defined by the appended claims and equivalents thereof permitted as a matter of law. wherein at least one of the one or more posts defines an enlarged portion at a free end of the post. 2. A retractor assembly according to claim 1, further comprising at least one modular component, which component defines two or more rectangular apertures along its length, each rectangular aperture being sized and configured to mate with the enlarged portion of the free end to thereby detachably attach the modular component to the arm from which the respective one of the posts extends. 3. A retractor assembly according to claim 2, wherein each rectangular aperture defined by the modular component is sized and configured also to mate with the respective one of the posts so as to inhibit rotational motion of the modular component about the longitudinal axis of the respective one of the posts. ES2358955T3 (en) 2011-05-17 Bone anchoring device.
2019-04-19T09:06:06Z
https://patents.google.com/patent/US10130349B2/en
I don’t know if we get wiser as we get older, but we certainly gain a lot more experience. The experience comes in handy, if we chose to use it. And sometimes that experience is just there, a part of our personal history and nothing more. I had a discussion with someone this recently about hindsight. We both discussed our fathers, both of whom discouraged us from our first marriages. The person I was talking to is going through a divorce right now. I went through mine 24 years ago. We both agreed, in the course of our conversation, that our fathers had been right. We also agreed that if we had looked at those relationships now—from the outside (with someone not us) and with the benefit of another couple decades of living—we would see the upcoming problems as well. Relationships follow patterns, and people often get attracted, particularly early on, to someone who might give us an opportunity to heal problems that currently exist in our own lives. Watching other people’s relationships have given me insights into my own. But that all comes from experience (and an annoying tendency toward nosiness). The conversation with my friend wasn’t a bitter one though. In fact, we both laughed about our poor fathers’ inability to stop us, and we both expressed some empathy for our fathers in that situation. Because as clearly as our fathers could see the situation, their experience didn’t extend to preventing it. Then, of course, both of us contemplated what might have happened had we listened to our fathers. If I hadn’t married the first time, I would probably never have met my current husband. If I hadn’t met Dean, I certainly wouldn’t be typing this now. As I’ve said before, I don’t regret that first marriage, despite the pain and anguish it caused me and my ex. Not only do I (we, I hope) have some good memories, but that relationship was a critical one in forming both of us. Fascinatingly to me is this: Had my ex and I stayed together, his children would never have been born. Had we done things “right,” he would have lost the family he has now, and probably not had a different one in its place. I never wanted children, which we discussed at the beginning. My ex, at nineteen, figured (without telling me) I’d change my mind. But we can use hindsight for more than what-if exploration. We can use hindsight as we build our businesses. In fact, I believe hindsight is an essential tool of business building. In my post on failure, I wrote, “Failure is something we need to practice. Handled well, failure leads to success. In fact, I know of no long-term successful business person who lacks a failure in her background.” Later in that post, I wrote that I believe that failures handled well are more properly termed setbacks. Of course, I wrote three posts on the topic of setbacks as well. What changes a failure to a setback? Attitude. I know a number of people, several of them men, who have not remarried after their divorces. Most of those men never even dated again. They were so rocked by the failure of their marriages that they simply could not conceive of another relationship at all. They weren’t willing to try again. Sometimes this attitude is healthy. It comes from suffering physical pain. It’s hardwired in. When we get hurt badly, we don’t want to repeat the behavior that caused us that pain. This makes sense when it comes to touching a hot stovetop with your bare hand—you’re not going to do that again if you can at all help it—but makes a lot less sense when applied to everything in life. If we avoided everything that hurt us, emotionally and physically, over the years, we’d eventually stop doing anything. I’ve turned my ankle crossing a room without tripping on anything; does that mean I shouldn’t walk again? Back in the failure post, I used the analogy of the child learning to walk. Toddlers don’t give up. They want to move on their own too much to stop, even though they fall constantly and often hurt themselves. But that’s a simple analogy. I don’t think (don’t remember, honestly, and don’t really know) whether or not toddlers analyze what made them fall. I suspect toddlers just get right back up and try again without any real thought except some version of I’m going to conquer this thing; everyone else I know has. That bullheadedness serves us well in many areas of life. Sometimes you need to get right back on the horse, the bike, whatever cliché you prefer. And sometimes you need to analyze what went wrong. You need to use hindsight. Because I have a driving desire not to ever make the same mistake twice, I get really angry at myself when I do make a single mistake over and over again. I don’t quit whatever it is I’m doing—I’m closer to that bullheaded toddler than I let on in public—but I do rethink it, and sometimes I take a vacation from it. Case in point: Business. Business, unlike writing, is something I learned as an adult. I’m a very organic writer. I read, gather information, and eventually apply it. I can teach what I’ve learned—somewhat. But as I recently explained to a group of professional writers who had all come to study with me, if you delve too deeply into my ability to express my knowledge about writing, you’ll learn that my ability to describe what I know is pretty shallow. At some point, I just shake my head and say, “Look, just do it. If you can’t do it then, we’ll see what else we can figure out.” Not because I’m frustrated with the student, but because my own learning process in that area is so subconscious that I can’t even articulate how I know what I know. And sometimes expressing what I know is equally hard. On the other hand, I learned business in the school of hard knocks. And when I say hard knocks, I mean the kind that make little cartoon birdies and stars revolve around your head for years. I can point out each wound and scar, each dent to my thick skull, and every single slight that every happened, my fault or not. Why am I not bitter? Sometimes I am. I occasionally indulge in the pity party or the nasty analysis of someone who has hurt me years ago. But mostly, I learned relatively young that looking backwards and wallowing in regret does me no good whatsoever. Life moves forward whether we want it to or not. Our choice is whether or not to move with it or to give situations the permission to batter us around. Hindsight is the tool that allows us to move forward. It is also the tool that allows us to go near a stove again. We assess what went wrong, and then we see if it’s even possible to move forward again without repeating the same mistake. Once you put your hand on a hot stovetop, you realize that you have to approach that stove with caution. A toddler might stay away from the stove entirely, since a toddler can’t see the top, and judges the entire thing harmful and can’t yet understand a stove’s benefits. But an adult realizes that there are many ways to approach that stovetop, most of which will not hurt, if you’re careful. One thing most of us do, however, is keep our bare hands away from any part of the stove that’s on. Most of us never put our hands on that top without looking at it first. Simple caution, based on experience. It allows us to have a useful, if dangerous, item in our home. But let’s move hindsight away from the realm of the physical into the realm of the mental. Pain can be emotional. The emotion comes from severe stress and trauma. I’ve owned many businesses, and I’ve failed at a lot of them. I’ve approached each one with the idea that I won’t make those same mistakes again. Often, I decided not to go into the same kind of business again. When Dean decided to open a collectibles store as a hobby, I wanted nothing to do with it. I had worked retail from the age of twenty forward, and my ex and I owned a frame shop and art gallery that was a retail shop. I hated most of the aspects of owning a store. I hated the hours. I hated the stuff. I hated the cash outlay required to get inventory, to rent (or buy) a building, and most of all, I hated waiting for customers to come in. But Dean had owned several shops, and had loved them. I was not about to stop him from doing something he loved. So I helped him plan, using the mistakes my ex and I had made in the past, combining those mistakes with the ones Dean made in his early stores. That planning, and all of that hindsight, allowed us to build a successful business. I didn’t ever stand behind the cash register, but I was part owner. Dean and I made the major decisions together. Our experience paid off. Dean’s expertise in collectibles made the store a destination stop within its first year. The inventory came from Dean’s collections, and his judicious purchases of other people’s collections. Because Dean knows himself quite well, he also realized that the joy in any project for him is building that project. (That’s why he became an architect.) He literally built this business from scratch, making a deal with an owner of a strip mall that we would pay to fix up a dilapidated space inside that mall in exchange for three years of rent. The nice thing about that rent deal and the previously owned inventory is that together, they gave us the opportunity to walk away from the business if it didn’t work. We had three years of free rent, so we had three years to see if the business could sustain itself. We had more than a year’s worth of inventory, so we had relatively few start-up costs. The business became so successful so quickly (which we did not expect) that Dean realized he was going to have to put more time into it than he had planned. That realization too came from experience. He had done this before, and he knew how to grow a business. He did not want to become a collectibles mogul. This was supposed to be his hobby, not his life. Once he made that realization, he sold the business—for a profit—six months after Oregon, already ahead of the curve, had sunk into this deep recession. The new owner, who had worked at the business from the start, maintained it, and it continues to grow even now, doing extremely well in this tough economic climate. Every single plan we made about that new business came from hindsight. We knew, first of all, that Dean needs to build things. He always has something going on besides his writing. Before he wrote, he had two or three new things happening as well. He must create on a variety of levels, and it’s impossible to hold him back—although he’s great at analysis, and able to figure quickly if a new project is the right project for him. That ability to figure out if a new project is right also comes from experience. In our lifetime together, he’s started projects only to abandon them within the week as it became clear that he wasn’t suited for them. Time has taught us to evaluate first, sink money in later. Experience taught us to do the financial plan up front. We’d both started businesses by the seat of our pants, with just a vague idea that it would work out. Once or twice it did, but mostly it failed. We also learned that we needed to spend as little on start-up as possible because we were taking no outside investors. We needed to be able to walk away from this business. Because of our years of experience we knew that the economy was headed downward (long before the “smart guys” in Washington had it figured out), and we had to make the business as recession-proof as possible. We’d both started businesses in a recession, and we lost Pulphouse Publishing in part because of our response to the recession of 1992. So we knew how dangerous the overall economic climate could be to a business. We also knew the price we needed if we decided to sell the business, and we knew it up front. Mostly, we expected to shut it down if it didn’t work. The fact that we found a buyer with little effort had more to do with Dean’s planning abilities than with me, but he doesn’t like building things only to take them apart. So he worked hard to keep potential buyers interested, even while he started the business up. All of this planning was extremely different from the planning we had done in our early businesses. Those, as I said, were done without enough planning at all. In fact, as I mentioned in the business plan post [link], I didn’t understand why places like the Small Business Administration wanted a business plan. How could we know how the business would operate when we hadn’t operated a business? I recently watched a business go through the same by-the-seat-of-their-pants start-up, and I haven’t even talked to or met the owners. I recognize the signs from experience alone. Down the hill from our house, a lovely Italian restaurant went out of business but not because of financial mismanagement. The place was wildly successful. Instead, it closed because of what I think of as a weird Oregon Coast phenomenon. The owners got sick of tourists. We went to this restaurant a lot, and in hindsight, the signs of the closure were obvious. It started when the owner decided that locals could make reservations, but tourists could not. Then it migrated to little signs on the table, telling people to control their children and not to use their cell phones. Then the hours got strange—staying open on Monday and Tuesday (traditionally days on the Oregon Coast when business are closed because there are no tourists) and closing on Sunday. In their last year, the owners closed for the summer (the high season) and reopened in the winter (when the town is empty). The reopening didn’t last. In fact, the restaurant closed for good during, of all things, spring break. The owners loved to cook. They loved to cook for people they liked. They hated dealing with rudeness, demands, and all the other things that come with owning a restaurant. They had owned their building, and it sat empty for two years, waiting for a buyer or for someone to rent it. This spring, someone rented it. Because the restaurant is so close to us, we watched the newcomers build it. A small sign went up immediately, announcing the future home of the new restaurant. The front door sat open during the business day, as the new owner painted and did a slight remodel. The official sign went up in late May and with it, an announcement on the changeable sign below, that the restaurant would open on June 25. Well, I could see the interior of that place, and it was clear to me that they would have to push to hit their June 25 deadline. On June 20, the furniture got delivered. On June 24, the sign changed to a July 2 opening. Fourth of July is the biggest weekend in our little tourist town, so it became clear that these new restaurateurs wanted to take advantage of that. But both Dean and I have worked in restaurant start-ups, and a menu, a good chef, and a well-designed interior do not a restaurant make. Every single successful restaurant that we’ve worked at—and that Dean has managed—has given itself a month to work out the kinks. Mostly, the restaurant holds practice nights with the newly hired wait staff, without opening the restaurant at all. One restaurant in Superior, Wisconsin, when I was a teenager invited the relatives of every single person on the staff to come into the restaurant and eat free for Thursday, Friday, and Saturday night. That restaurant did so for two weeks. By the time it opened, the staff knew the menu, knew the quirks of the kitchen, had made (and corrected) dozens of errors, learned where everything is kept, and learned how to pace themselves through a restaurant slammed with customers. Dean worked varieties of the same practice session. Every restaurant that does this opens to acclaim, if not for the food, at least for the service. On July 1, the restaurant below announced a July 5 opening date. On July 4, the opening date was gone. On July 17, the place held a stealth opening. They’d lost an entire month of revenue from their business plan (if indeed they had one), and they have so far gotten no word of mouth throughout the community. The stealth opening allowed them to practice a little, but they probably lost customers who expected a more polished staff/restaurant. I hope they’ll survive, but their cold opening probably made things harder than they needed to be. And the cold opening is a clear sign of inexperience. So how do you make hindsight work for you? 1. Do a fearless inventory of what went wrong in your previous business(es). Make a list and be honest. If you’re not honest, there’s no point. If you did something wrong, or several somethings wrong, admit them. You need to understand where all of the mistakes are, not just some of them. 2. Evaluate whether the mistakes came from a) the economy; b) your response to the economy; c) your inexperience or d) your personality. If the mistakes came from the economy, then you better make sure you know how to weather the same economic climate. If they came from your response to the economy, then you better learn how to be more flexible in response to a crisis. If the mistakes came from your inexperience, don’t get overconfident. Just because you have experience now doesn’t mean you’re all wise. Plan to make more errors. If the mistakes came from your personality, you better find a way to negate that part of you that has the tendency to do things wrong for the type of business you’re opening. I’m great at publishing and editing, but I’ll never edit again. I’m good at it, but not suited to it. No amount of “change” will make me and editing suit. I might be able to do a small project or two, but I won’t make a career out of it—not without a personality transplant. Been there, done that, spent enough to buy a factory’s worth of t-shirts. If the mistakes came from your personality, you might need to hire someone to take that part of your personality out of play. I could own a publishing company (in partnership with Dean) again, if I don’t edit. But I would have to remain hands-off with the new editor. I would have to trust that person—which is a tall order. As I said, I’m very good at editing, and I’d see mistakes right off. I’d probably drive that person out of the business if I wasn’t careful. Hiring a person to do the part of the job you’re not suited for has all the pitfalls of hiring an employee for other aspects of your life. See the employee sections of the guide. If your previous business failed due to your personality, then you might want to reconsider stepping back into that same kind of business at all. Sometimes it’s better to say that you don’t suit than it is to keep pounding your head against the same brick wall. 3. Use other people’s hindsight. Ask them about the mistakes they made in the same type of business. Do this even if you’ve owned a business before. You’ll learn something, guaranteed. However, make sure you listen to their advice. At least three start-up publishers interviewed me and Dean about what went wrong at Pulphouse Publishing. We were very honest with them, told them about various warning signs, and told them to call us if things got dicey. All three of those start-ups failed, one spectacularly. All three of them followed the exact same path that Pulphouse followed, and all three responded to the problems the same way we did—which is to say, the wrong way. They were forewarned. Of course, they took no notes during our meeting, never contacted us when things got dicey, and only one remembered our advice at all. He later admitted to us that he was in the hospital (the failure caused a physical collapse that put him in the hospital for weeks) and he kept hearing our voices, telling him what exactly would go wrong if he didn’t take our advice. He says we haunted him, and he apologized for not listening. He didn’t owe us an apology. He owed himself one. 5. Let hindsight help you in all aspects of your business. Because I know how a failing business behaves, I often will not work with a business that is exhibiting the symptoms of a business on the edge. Because we had a publishing house collapse, I particularly know the signs of that, so I won’t approach a company that even whispers of trouble. The trouble is often obvious to those of us who have been through something similar years in advance. In fact, when Dean and I talked with one of those start-ups all those years ago, the owner told us in the middle of the meal he was buying us that he “would never ever make such dumb mistakes.” We immediately decided never to work with him—not because he insulted us, but because his ego was so large that he believed he was immune to our stupidity. He compounded our stupidity, and his failure was so spectacular that people within publishing still discuss it as an example of what not to do when running a business. 6. Remember the most important lesson of hindsight: You are fallible. Sorry, kiddo. You’ll make mistakes just like the rest of us. In fact, you’ll make mistakes every single time you start a new business. You’ll make mistakes after owning that business for ten years, fifteen, twenty. Face it: You’ll make mistakes. Now longtime readers will understand where I get my mantra. The key is to avoid making the same mistake twice. You’ll always make new mistakes. Be creative about them. Make new mistakes in the pursuit of the perfect, mistake-free business. Then learn from those new mistakes. That’s what hindsight is for. Toss out the regrets and the “I wish I hads.” Stop fantasizing about going back in time and fixing things. Move forward with the right attitude—after you’ve fearlessly looked backwards, of course. “Freelancer Writer’s Survival Guide: “Hindsight” copyright 2010 by Kristine Kathryn Rusch. Thanks for this. Unlike many toddlers, I find mistakes humiliating. I am figuring out how to learn from mistakes and laugh, so this is a practical guide on how to do that. I also love Cindie’s comment about burning herself in the fire after the stove! You might want to figure out where you learned that mistakes are humiliating, Melissa. Often once you know that piece of information, you know when it actually applies and when it doesn’t (which is most of the time). Good luck with it! Oh, I needed this. I wrote out your questions and my answers. While a bit depressing, it was illuminating. I think my hindsight is a bit … mentally challenged. To use your stove analogy, I get burned by the stove and then just avoid anything metal but still stick my hand in a campfire. I feel like I make the same mistakes but in new and novel ways. In business and life. I’m hoping recognizing this is the first step toward change. Now to start thinking about what the real mistakes are, not just the ones my mind connects. In other words, time to figure out what about the stove actually burned my hand! Great comment, Cindie. Glad it helped. I sure understand how that can be. I untangled some of those strange connections myself. Good luck with it!
2019-04-26T14:36:38Z
https://kriswrites.com/2010/07/22/freelancers-survival-guide-the-benefits-of-hindsight/?replytocom=1316
I get easily distracted. I know what I’m supposed to do next, but then something crosses my mind and I feel the compulsion to explore it. Find out the details. Make the connection. Chase the rabbit trail…only to forget what I was originally doing. I know this confession likely comes as a surprise to many of my friends. To so many people I am the focused one. I am the one who checks everything off the list. I am typically on-point and on-task. And this is true most of the time. As a matter of fact, this blog post is because one of those rabbit trails (although I’d rather call it divine inspiration based off a real-life experience). One afternoon I started to write an email for work, but my mind was wandering because of a recent text I’d received. “Real quick,” I thought, “I’ll pop online and find the answer.” Sure enough, three minutes later I had found what I was looking for, but had also temporarily forgotten what I was supposed to be doing. Sigh. How easily do we get distracted like this in our spiritual life? We get started on a good path of prayer, Bible reading, and small group gatherings but get distracted by other things that pop onto our radar. We pause and pursue, forgetting our original intent. We come back weeks later to the same chapter in the Bible we were reading – and have been reading for months. We recommit to praying each morning to “start the day off right” but hit the snooze time after time, day after day, and get off track. We sign up for a small group then forget to attend. And how often do we do this with our gym workouts or healthy eating or church attendance or calling family? The list goes on and on. And while none of us can be perfect in our focus, there’s merit to working on being more focused. Our culture has moved away from this practice. We practically boast in the fact that we have a hard time focusing or are excellent at multitasking. It’s a badge of honor. But for so many of us, it’s an excuse to over-schedule and under-deliver. It’s an excuse because we’re bored with what we’re supposed to be doing. It’s an excuse to procrastinate and avoid working on our goals. As we multitask it’s an excuse to avoid connecting with the people around us and to keep us from authentic relationships. It’s an excuse to make our smart phones our focus. Don’t misunderstand me…some people are amazing at multitasking and do it well. And others indeed have attention deficits and require medication to help them focus more. I’m not knocking either of those groups. But I do feel that so many of us should call ourselves to a higher standard. We need to remember what it’s like to focus, train our eyes on a single goal and accomplish it. Where does that start? It starts with one step at a time. It starts by allowing yourself the freedom to not get distracted while you’re reading an article, researching online or writing an email (a-hem, preaching to myself here). Because let’s face it, there’s great freedom in keeping our eyes on the prize and completing a goal quickly. Where does focus need to start for you? How do you stay focused (alone or in a group)? I’d love to hear from you! Categories: Uncategorized | Tags: distracted, Focus | Permalink. The trend in the current generation (my generation) is to do great things. From the time we are young kids we are told that we can be president. We are encouraged that we can accomplish absolutely any dream we can imagine if we only try. We set out to be the best, come in first, take the top prize, be the leader, get the job, and have flawless skin and a perfect body. These are all accomplishable dreams, but are also short-term. Where are the goals that take time, effort and planning? But perhaps the better question is how do we learn the process of failing yet continuing? So many people fail because their dream is seemingly unattainable. It’s too far off in the distance and they lack a clear path of how to achieve it. While making baby steps, they move too slowly, get distracted by what is immediately in front of them and forget the original focus. Or they become discouraged by the pace and give up before reaching it. We need a reminder that life is to be lived in full from beginning to end. Life dreams (like becoming president) aren’t accomplished immediately. We must learn, mature, gain experience, fail, and experience what it means to start again. There is merit and character to gain in that process that is not gained any other way. We must also remember that the big dream accomplished immediately is hollow. It’s a shell and only brings enjoyment for a short season before we are bored, abandon sustaining the original dream and need to find a new one. My generation needs to stretch its eyes and look in the distance for the far-off dream. We need to look for the BHAG – the big, hairy, audacious GOAL. Then go for it! Determine how to get there, gain the experience, mature in our understanding of what the goal really is (let’s be honest, as we learn more about something we realize our original idea was not complete), fail many times, learn from our mistakes, and keep going. It’s intimidating, this type of dreaming and goal-setting. BHAGs are just that – too big to accomplish quickly (or likely on your own), kind of ugly to comprehend the scope of what it completely entails, and way too daring to actually undertake. But that’s what makes this life so fulfilling! We have a carte blanche to set a goal beyond ourselves and go for it! I’m personally convicted to dream bigger than I have ever before and set a BHAG. For too long I’ve been content with my little goals that are easily accomplishable. Friends have heard me say, “My goal is to make it through this week.” Granted, those were really stressful weeks, but that’s just not acceptable. As a Christian, I firmly believe what John 10:10 says, “[Jesus has] come that they may have life, and have it to the full.” And so that is what I’m resolving to do. Dreams are good, but goals are better. And BHAGs are better yet (especially if they are God-inspired). Here’s to a year of consistent blog writing and starting to write a book! What’s the BHAG in your heart? I’d love to hear about it. Categories: Uncategorized | Tags: dream, fail | Permalink. Six days – that’s the marker for when the next big stage of my life will begin. For months I’ve been planning and prepping for my wedding day. I’ve had countless conversations about flowers and place settings and dresses and hair and food and chairs and venues. My head has spun from the endless possibilities for what this day could look like. I frequently find myself almost holding my breath, then I remind myself to exhale, breath in and out, relax, enjoy this season for all the craziness that it is. This is the one time I will experience this and I owe it to myself to fully embrace each wild moment. To keep all of my thoughts straight for the big day I am making notes everywhere – my phone, scraps of paper, printed lists, an app, and a notebook. I’m not sure why I chose this particular notebook to keep my current life together. It’s one that normally sits on my bedside where I make little notes from the day – things I want to remember about an experience, conversation or a prayer. It even has a pro/con list about a house I considered buying last summer. As I keep notes about my wedding in this journal I can’t help but feel that using this notebook was a divine moment to remind me about living present. To remind myself of how I felt when I first met Brian. To see, recognize and embrace each of these quickly passing moments. To live present. Categories: Uncategorized | Tags: fully present | Permalink. #tbt. If you have a Facebook or Instagram account you understand what that little phrase means. Each Thursday our newsfeeds are littered with “Throwback Thursday” pictures and captions describing our former selves. You name it, it’s out there: pictures from grade school, vacation, college friends, and more. They are our favorite memories and Thursdays have become our favorite day to share them. I enjoy heading online each Thursday to see what friends have posted as their #tbt. Most are the best bits of life, but is that really an accurate story of our lives? We choose our #tbt pictures carefully, choosing the ones that make us look the best. Our hair is just right, our smile is big, the circumstances behind the picture are good or funny. We edit our lives to show the very best image of ourselves. Please don’t misunderstand me. I’m not necessarily saying we should post the negative pictures of life, but what if a stranger were to randomly pick a less glamorous picture to post for your #tbt? Would you be proud of what was posted? Would your Facebook friends and Instagram followers “like” your image? Would you be filled with joy or regret as that story is shared? I am as guilty as the next person at handpicking how my story is shared. But there is a bigger question in all of this: are you living in such a way that you are proud to tell the complete story of your life? While I certainly don’t succeed in every circumstance, in every thought, in every friendship and in every interaction, my goal is to live each day in such a way that I would be proud to tell my entire story. I want to be able to share with my grandkids stories of adventure, fun, romance and faith without having to leave out or explain away parts that are not pretty or polished. I want to tell them that I broached the conversation when it revolved around a difficult topic. That I stood beside a friend who needed support when others walked away. That I fought for purity in a relationship and godliness in friendships when others couldn’t understand why. And when I have messy moments, I hope that I will share those just as freely. That I can pass along to others the lessons learned in the times I messed up. I hope that I will not be so consumed with having a perfect exterior that I can’t share my imperfect interior. But it’s more than telling that story to my future grandkids; I want to share that story with the people in my life now. I want to live authentically and transparently. I want to be a person that others know is real, who makes mistakes and owns up to them, who isn’t afraid to share the good and not so good, and who strives to be a better friend, daughter, fiancé and Christian. Telling that kind of story means starting now. It means I have to start today with changes to my friendships, attitude, behavior, faith and involvement. To kick it off here is my #authentictbt. What’s yours? Categories: life | Tags: authentic, change, life story, tbt | Permalink. During a recent devotional time reading through Philippians I found myself mulling over this story of two women and their conflict. For weeks I’ve thought about these women and their story. What was their conflict? Why couldn’t they resolve it on their own? How in the world did it elevate to the level that Paul got involved? I could take guesses all day about what Euodia and Syntyche’s conflict was about (lack of respect or honor, a household situation, a relationship), but the real lesson in the story of these two women is that continuing in their disagreement wasn’t an option according to Paul. They were believers and labored alongside Paul. The work they did to spread the Gospel brought their names to the level of attention that Paul not only knew who they were, but was also invested in seeing their conflict resolved. Their conflict was harming more than just themselves; it was also impacting the community of believers around them as well as tarnishing their witness about the forgiveness Christ offers through faith. By resolving their issue, Euodia and Syntyche would ease the tension of themselves and those around them (family, friends, fellow believers), be able to continue sharing the Gospel effectively, and actively live out a good testimony about conflict resolution that could be shared with unbelievers. The simple act of living in community with others guarantees that we will face conflict. It’s our response to the conflict and how we take steps to resolve it that sets us apart from others. As Christians we are called to resolve. We can’t turn our back on a conflict and pretend it didn’t happen because then we are simply carrying the dischord with us. It’s a negative mark on our testimony about the forgiving and peace-giving nature of Jesus. Instead we need to make the active decision that our conflicts will not overshadow our witness. They weren’t alone. Paul asks a fellow believer to step in and help Euodia and Syntche work out their differences. When conflict escalates and we aren’t able to settle matters on our own, we must remember that it’s ok to bring in people to help. We don’t have to navigate life and conflict on our own. The disagreement these women faced was consuming. It was the boulder in the path that they couldn’t see around. They needed someone to step in and show them how to move past it. That’s where Paul calls in reinforcements to help. How often do I let my own conflicts rise to that level? How often do I allow an issue, situation, confrontation, argument or misunderstanding to take up such a huge residence in my life that it blocks everything else I am doing and it’s all I can see? It is the boulder blocking my path. My independent nature tells me I can figure it out and find a way to ignore the problem. But my track record reminds me that I can’t. It reminds me that when an issue becomes so large that others become acutely aware of it, I need an outside individual to come in and help me see more than my limited perspective. This is the beauty of life as a follower of Christ: we are a living witness. For better or worse, we are the hands and feet for Him in this world and our actions (or lack thereof) speak volumes to those around us. We are called to be a good witness – to both those who believe and those who have yet to believe. What does your life say to those around you? What would Paul say about you if he were writing a letter to your friends, community or family? Categories: faith, life | Tags: conflict, God, resolution | Permalink. I have gone through a lot of my adult life without thinking too deeply. Not to say I haven’t been involved in deep theological discussions, intellectual conversations, chatted about interesting trivia, or had impacting dialog about current events. Rather I have not thought extensively about the motives and actions of those around me, or what my actions and words speak to those around me. In part, I have lived the unexamined life. It is only in the past few years that I truly began looking more inward and reflecting on the purpose of my actions, asking myself the hard question about my motives in certain situations. I have begun critically analyzing the words of others and what they actually meant when they said (or didn’t say) something. This has led to good, necessary personal growth. Although I wouldn’t characterize myself as having been shallow in my consideration for others, I no longer dance through life without thinking about those around me and how my actions or words may affect them. Instead I feel more in tune with my community. I listen more. I talk less. (Although some of my friends may disagree with that last part.) I contemplate and ask questions. I pray more about how to respond — even in the moment — and do my best to choose my words carefully. I listen to the Holy Spirit’s prompting when giving advice and counsel to friends. It’s an exercise of sorts. It takes practice and work. I am not good at it yet and don’t feel that I will ever actually be great. But then again, if I ever feel like I’ve succeeded in this area then I am probably living the unexamined life again. And so I do the same. I ask God to look at my heart, search my motives, call me out when I’ve overstepped or under-looked. What – What is my responsibility in this situation? What am I taking on that isn’t mine? How – How am I supposed to respond that will be God honoring? These questions keep me grounded to those around me and connected to the One above me. They allow me to walk out the examined life and become the woman of God that I am called to be. These questions aren’t perfect or complete — they are being refined, reworded and added to all the time. But they are a framework and highlight where I am right now in life’s journey. What excites or scares you about living the examined life? What in your life deserves to be further examined? What is the biggest question you need to ask yourself to begin or continue the process of examination? In what ways do you need to allow God to be God in your life and let Him examine you? Categories: faith, life | Tags: examined life, God, search | Permalink. There was a pink sweater in my closet up until about a month ago. It sat on the shelf along with my other sweaters but I didn’t like wearing it. I would pull it out several times a month, put it on and make it work with the other items I was wearing that day. But in the end I would swap it for something else before leaving the house. There was something about it that just didn’t feel right when I was wearing it. Sure, it looked nice and was stylish, but it wasn’t comfortable and I always felt like it was pulling in the wrong place or just a little too short or it didn’t make me feel good about myself. And so when I cleaned out my closet a few weeks ago the pink sweater made the move into the “donate” pile. Like our wardrobes, our lives requires this same type of examination to consider whether certain aspects still deserve a place on the shelf. Are there habits you have, people in your circle of influence, and attitudes you carry that don’t fit quite right? Do you feel negatively about yourself or uncomfortable about things you do? Is there a pink sweater in your life? There is a reason we don’t feel good about parts of our lives or actions. Like our clothes that don’t fit well, our habits can do the same. We may look ok from the outside, but the nagging feeling we have as we do these things is the very reason to get rid of it. Getting rid of the pink sweater is more than just changing the things we do. It’s not just addiction, reacting harshly, using cruel words, or abusing others. But it’s also the attitude we have toward ourselves. It’s living with a sense of rejection and a victim mentality, fear, and being overly self-critical. The most destructive things are not always what you can see, but often the things you can’t see that make the largest and deepest impact on our daily lives. Just like the pink sweater in our closet, our negative spiritual, emotional and physical habits take up mental space as we see it as an option to choose each day. To move forward in wholeness and freedom we have to get these things out of our closet and not see them as a choice to “put on” each day. We must choose not to allow substances to be a crutch; for harsh words to be how we share our feelings; for rejection to be our filter; and for self-deprecating attitudes to be our reflection to the outside. We need to pull the pink sweater off the shelf and never put it back. Jesus came to set the captive free – He has the ability to change us! Seek God, share with someone about your struggle so they can encourage and keep you accountable, pray with others. But remember that Christ is the only one who can bring true, lasting change. Our part is to be ready to accept the change He can provide. Are you ready to clean out your closet and ask God to help you get rid of the pink sweater? Categories: faith | Tags: change, God, self-examine | Permalink.
2019-04-18T12:47:23Z
https://exploringdeep.com/
A.L.I.C.E. AI Foundation - A.L.I.C.E. (Artificial Linguistic Internet Computer Entity) is an award-winning free natural language artificial intelligence chat robot. The software used to create A.L.I.C.E. is available as free ("open source") software. AI Now Institute - Produces interdisciplinary research on the social implications of artificial intelligence and acts as a hub for the emerging field focused on these issues. Research focuses on four key domains: rights and liberties, labor and automation, bias and inclusion, and safety and critical infrastructure. AI on the Web - Links to sites around the web with artificial intelligence information organized according to the chapters in the book AI: A Modern Approach. AI Topics - Exemplary, non-technical resources organized and annotated to provide you with meaningful access to basic, understandable information about the AI universe. AI100 - Stanford University has invited leading thinkers from several institutions to begin a 100-year effort to study and anticipate how the effects of artificial intelligence will ripple through every aspect of how people work, live and play. This effort, called the One Hundred Year Study on Artificial Intelligence, or AI100, is the brainchild of computer scientist and Stanford alumnus Eric Horvitz who, among other credits, is a former president of the Association for the Advancement of Artificial Intelligence. Alan Turing - The Turing archive for the history of computing. Andrew Olney - An Assistant Professor in the Department of Psychology at the University of Memphis and Associate Director of the Institute for Intelligent Systems. Dr. Olney's primary research interests are in cognitive science and the psychology of language. Specific interests include vector space models, dialogue systems, unsupervised grammar induction, robotics, and intelligent tutoring systems. AlgorithmWatch - A non-profit initiative to evaluate and shed light on algorithmic decision making processes that have a social relevance, meaning they are used either to predict or prescribe human action or to make decisions automatically. Artificial Intelligence Center, SRI International - One of the world's major centers of research in artificial intelligence. BotSpot - The definitive resource for all things Intelligent Agent and bot related, including Bot of the Week. Brains in Silicon (Stanford University) - Building a computer that works like the brain-one that can serve as a tool to investigate brain function-feeding back and contributing to a fundamental, biological understanding of how the brain works. Research at the intersection of neurobiology and electrical engineering. California Institute for Telecommunications and Information Technology - Focuses on enabling technologies in wireless communications, photonics, cyberspace, as well as nanotechnology and micro-electro-mechanical systems (MEMS). Computational Intelligence Research Laboratory - Search, knowledge representation, and reasoning research. Emphasis is on planning, constraint satisfaction, and common sense reasoning. Conferences - Yahoo! search returns on artificial intelligence/conferences query. Cycorp - The Cyc product family comprises an immense multi-contextual knowledge base, an efficient inference engine, a set of interface tools, and a number of special-purpose application modules running on Unix, Windows NT, and other platforms. The knowledge base is built upon a core of over 1,000,000 hand-entered assertions (or "rules") designed to capture a large portion of what we normally consider consensus knowledge about the world. Kate Crawford - A leading researcher, academic and author who has spent the last decade studying the social implications of data systems, machine learning and artificial intelligence. MIT Computer Science and Artificial Intelligence Lab - The Massachsetts Institute of Technology (MIT) conducts research in many aspects of intelligence. Its aims are two-fold: to understand human intelligence at all levels, including reasoning, perception, language, development, learning, and social levels, and to build useful artifacts based on intelligence. Noodle.ai - Offers pioneering business solutions in artificial intelligence, a unique collaboration among business executives, process experts, and artificial intelligence technologies (e.g., machine learning, predictive data analytics, data science). Creates and implements these solutions to solve business challenges in customer, product, and enterprise operations. O'Neil Risk Consulting & Algorithmic Auditing (ORCAA) - Developing rigorous methodology and tools to assist in setting rigorous standards for the field of algorithmic auditing. ACM Transactions on Algorithms - Areas of computation covered by this journal include combinatorial searches and objects; counting; discrete optimization and approximation; randomization; parallel and distributed computation; algorithms for graphs, geometry, arithmetic, algebra, number theory, strings; on-line analysis; cryptography; coding; data compression; learning algorithms; methods of algorithmic analysis; and discrete algorithms for application areas such as biology, economics, game theory, communication, computer systems and architecture, hardware design, and scientific computing. Analysis of Algorithms - Analysis of Algorithms (AofA) is a field in computer science whose overall goal is an understanding of the complexity of algorithms. The focus in these pages is methods for average-case and probabilistic analysis. Properties of random strings, permutations, trees, and graphs are the essential ingredients in the analysis of algorithms. arXiv.org e-Print Archive - Los Alamos National Laboratory computer science pre-print archive. Open access to 712,212 e-prints in physics, mathematics, computer science, quantitative biology, quantitative finance and statistics. Association for Computational Linguistics (ACL) - The international scientific and professional society for people working on problems involving natural language and computation and publisher of Computational Linguistics. Association for Computing Machinery (ACM) - ACM functions as a locus for computing professionals and students working in the various fields of Information Technology. Association for Computing Machinery (ACM): Publications - ACM publishes, distributes, and archives original research and firsthand perspectives from the world's leading thinkers in computing and information technologies. Bitpipe - In-depth technical and market research articles, reports and white papers from leading analyst groups, consulting firms, educational institutions, publishers, and technology vendors. Chicago Journal of Theoretical Computer Science - Peer-reviewed scholarly journal in theoretical computer science. CiteSeer - A scientific literature digital library and search engine that focuses primarily on computer and information science. Collection of Computer Science Bibliographies, The - The collection contains more than one million references (mostly to journal articles, conference papers and technical reports). More than 16,000 references contain crossreferences to citing or cited publications. More than 90,000 references contain URLs to an online version of the paper. There are more than 2000 links to other sites carrying bibliographic information. Computer and Information Science and Engineering (CISE) - CISE supports investigator initiated research in all areas of computer and information science and engineering, helps develop and maintain cutting-edge national computing and information infrastructure for research and education generally, and contributes to the education and training of the next generation of computer scientists and engineers. Computer Science - Directory of computer science links from the University of Albany Libraries. Computer Science Student Network (CS2N) - A collaborative research project between Carnegie Mellon University and the Defense Advanced Research Projects Agency (DARPA) designed to increase the number of students pursuing advanced Computer Science and Science, Technology, Engineering, and Mathematics (CS-STEM) degrees. Computing and Information Technical Reports - Technical reports and papers, including computer science technical reports, from Cornell University. Computing Research Repository (CoRR) - Computer science technical reference library. Dictionary of Algorithms, Data Structures, and Problems - Dictionary of algorithms, algorithmic techniques, data structures, archetypical problems, and related definitions. Earth Simulator Center - The world's fastest computing system, jointly developed by the Earth Simulator Research and Development Center and founded by the National Space Development Agency of Japan, Japan Atomic Energy Research Institute, and JAMSTEC with the objective to investigate global environmental problems, such as global warming, unusual atmospheric phenomena, and tectonic activities with the high degree of precise simulation. Hal Abelson - Professor of Computer Science and Engineering at MIT. Human Computer Interaction Bibliography (HCIB) - Human-computer interaction is a discipline concerned with the design, evaluation and implementation of interactive computing systems for human use and with the study of major phenomena surrounding them. Search over 19,600 records in the HCIBIB. Human-Level AI Is Right Around the Corner, or Hundreds of Years Away - Ray Kurzweil, Rodney Brooks, and others weigh in on the future of artificial intelligence. Arrticle from IEEE Spectrum, 31 May 2017. Hypertext Bibliography Project - MIT provides keyword searches of online bibliographies of computer science publications. IBM Almaden Research Center - Located in Silicon Valley, Almaden Research Center is one of eight IBM Research Division facilities worldwide and a premier industrial research laboratory. At Almaden, some of the finest minds in the industry focus on basic and applied research in computer science, magnetic and optical storage technology, physical and materials science and technology, and scientific and technical application software. IBM Research - IBM labs work in all areas of information technology, from physics and cognitive science to leading-edge application research. Explore IBM's research activities. IBM T.J. Watson Research Center - Research in physical sciences, computer sciences, systems technology, mathematics and information services, applications and solutions. IEEE Computer Society - With nearly 100,000 members, the IEEE Computer Society is the world's leading organization of computer professionals. It is the largest of the 35 societies organized under the umbrella of the Institute of Electrical and Electronics Engineers (IEEE). IEEE Computer Society: Publications Center - Online access to 18 Computer Society magazines and transactions and a growing body of conference proceedings from 1997 to the present. Browse and order books, proceedings, and selected standards online. Introduction to Information Retrieval - Provides a modern approach to information retrieval from a computer science perspective. International Community for Auditory Display (ICAD) - ICAD is a forum for presenting research on the use of sound to display data, monitor systems, and provide enhanced user interfaces for computers and virtual reality systems. It is unique in its singular focus on auditory displays and the array of perception, technology, and application areas that this encompasses. International Computer Science Institute (ICSI) - A leading center for research in computer science and one of the few independent, non-profit research institutes in the United States. Internet SOCiety (ISOC) - A professional membership society with more than 150 organizational and 6,000 individual members in over 100 countries. Linpack Benchmark - Backgrounder from Top500 Supercomter Sites. The Linpack Benchmark is a measure of a computer's floating-point rate of execution. It is determined by running a computer program that solves a dense system of linear equations. Also see FAQ on Linpack Benchmark and Top500. Mathtools - Technical computing portal for scientific and engineering needs: Matlab, Excel, C++, C, Java, Toolbox, mfile, m-files, MATLAB, Mathlab, Math, Numerics, Visual Basic, Scientific Fortran. National Computational Science Alliance - Links to 57 institutional partners from across the U.S. that are allied in building a prototype of the country's next-generation information and computational infrastructure, the PACI Grid. The Grid is creating a powerful, seamless, integrated computational problem-solving environment for collaborative, multidisciplinary work on a national scale. National Center for Supercomputing Applications (NCSA) - One of the five original centers in the National Science Foundation's Supercomputer Centers Program and a unit of the University of Illinois at Urbana-Champaign, the NCSA maintains an international reputation for implementing experimental supercomputing and high-performance computing systems and networks and for developing innovative applications in high-performance computing, visualization, and desktop software. NTechLab - Founded in 2015 by Artem Kuharenko to create algorithms as intelligent as humans and as efficient as machines. Also works on face recognition algorithms for customer analytics. Networked Computer Science Technical Reference Library (NCSTRL) - An international collection of computer science research reports and papers made available for non-commercial use from a number of participating institutions and archives. Neuralink - Developing ultra high bandwidth brain-machine interfaces to connect humans and computers. Primitivism - An exploration into primitivist theory, as well as various works that contribute to an understanding of the tendency. Scientific Discovery through Advanced Computing (SciDAC) - A five-year program to develop the scientific computing software and hardware infrastructure needed to use terascale computers to advance research programs in basic energy sciences, biological and environmental research, fusion energy sciences, and high-energy and nuclear physics. SRI Computer Science Laboratory - Studies the logical foundations of scalable systems, that are beyond the scope of traditional testing or simulation, and builds and applies efficient high-level tools for rigorous mechanical analysis. Current systems of interest include not only traditional computer hardware and software, but also biological systems and nanoelectronics. Stanford University Computer Systems Laboratory EE380 Colloquium Schedule - Consists of a self-selected and self-paced series of ten lectures selected from the past three quarters of live presentations plus a few additional lectures of special interest. TechRepublic: White Papers - Free technical IT white papers and case studies on information technology solutions. Top500 Supercomputing Sites - Twice a year, a list of the sites operating the 500 most powerful computer systems is assembled and released here. Virtual Technical Reports Center - Links to technical reports, preprints, reprints, dissertations, theses, and research reports of all kinds. Caltech Particle Theory - Conducts research in superstring theory, quantum gravity, quantum field theory, cosmology, and particle phenomenology. Laboratory for Physical Sciences (University of Maryland) - University and federal government personnel collaborate on research in advanced communication and computer technologies, including secret work, financed by the NSA, on quantum computing and breaking encryption. Quantum Computational: A Tutorial - A tutorial on how quantum mechanics can be used to improve computation. Quantum Computer - Wikipedia article. Quantum Computing - Stanford Encyclopedia of Philosophy article. Quantum Information and Computation (QUIC) - QUIC is a collaboration of 5 groups at 3 universities (Caltech, MIT, and USC) undertaking experimental, theoretical, and modelling investigations into quantum computing. Quantum Information at IBM - Quantum information and computation theory. Quantum Physics - Los Alamos eprint archives 12/94 to present. This webpage last updated on Sunday, November 26, 2017 3:41 PM.
2019-04-20T22:44:01Z
https://www.kwsnet.com/computer-science.html
Administration on Aging – The Older Americans Act of 1965 established the AOA, which is an agency of the U.S. Department of Health and Human Services. Its mission is to develop a comprehensive coordinated and cost-effective system of long-term care that helps elderly individuals to maintain their dignity in their homes and communities. Advocate – A person who gives you support or protects your rights. AEP or Annual Election Period – The annual period from November 15th until December 31 when a Medicare beneficiary can enroll into a Medicare Part D plan or re-enroll into their existing plan or change into another Medicare Part D plan. Annual Notice of Change – This is a notice provided by the insurance company that explains which benefits have changed and how they have changed for the upcoming plan year. It is a notice required by the Centers for Medicare to make sure you know these changes to your coverage. Appeal – An appeal is a special kind of complaint you can make if the plan declines to cover prescription drugs you want or refuses to pay for drugs you’ve already received. You can also appeal if your plan decides to stop covering drugs you’re currently receiving coverage on. There is a specific process you and your prescription drug plan must use when you appeal one of its decisions. Assets – Property you own that the government may review when you apply for drug assistance. For help with the costs of a Medicare prescription drug plan, the government counts cash or any property that can be turned into cash within 20 days. This includes checking and savings accounts, certificates of deposit, IRAs and 401k plans, stocks, bonds and similar items. It does not include your primary home, or certain property related to burial expenses. Authorized Representative – The person you designate to assist or handle affairs related to your health care services. This may be someone you designate as a Power of Attorney, a family member, friend, caregiver, or it may be an advocate you assign to assist with an exception or appeal or grievance. Beneficiary – The person, person or entity designated to receive benefits from an insurance company. Benefit – Another name for coverage, for example, in a Medicare Part D plan, prescription drug costs that are paid for by your insurance plan are your benefits, or coverage. Benefit Period – A Benefit period begins the first day you stay in a hospital or skilled nursing facility and ends when you have been out of the hospital or skilled nursing facility for 60 days in a row. If you go into the facility after one benefit period has ended, a new benefit period begins. There is no limit to the number of benefit periods you can have. Brand Name Drugs – Pharmaceutical companies hold patents on the drugs they develop for a certain amount of time, these drugs are sold under a trademarked brand name. CMS or Centers for Medicare and Medicaid Services – The federal agency overseeing both the Medicare and Medicaid programs. They were made responsible for carrying out the legislation that put the Part D Insurance plans into existence and overseeing how all of the plans conduct business. Cancellation – Termination of a policy before its normal expiration date. Caregiver – A person who helps care for someone who is ill, disabled or added. Some caregivers are relatives or friends who volunteer their help. Some people provide caregiving services for a fee. Catastrophic Coverage – The Last portion of coverage in a Part d plan in which the plan pays almost the entire drug expense for the remainder of the calendar year. The portion that the beneficiary pays during this step is a very small amount of the drug expenses, approximately 5%. Catastrophic Limit – The catastrophic limit is the highest amount of money you’ll have to pay out of your own pocket in a year for certain covered prescription drug charges. Certificate of Insurance – The printed description of the benefits and coverage provisions forming the contract between the carrier and the customer. Chronic Condition – Prolonged conditions or illness, such as heart disease, asthma, or diabetes. Claim – A request by a beneficiary to the insurance company for the insurance company to pay for services obtained from a health care professional. Coinsurance – The portion of cost belonging to the beneficiary after costs are split on a percentage basis. In a 20/80 plan, the beneficiary would pay 20%. Copayment or copay – When the beneficiary pays a pre-determined flat amount for each service. A doctor’s visit copay is often 10 or 15 dollars. COBRA – A Federal law that gives the right to pay for continued group health care coverage for a specified period if the person loses coverage because of reduced work hours or leaving or loss of a job. Coordination of Benefits – This occurs when the insured is covered under more than one plan, for example, under a group plan at work, and as a family member on a spouse’s plan. The benefits from the plans are coordinated so as to limit the total benefits from all plans. Usually the benefits from all plans will not exceed 100% of the covered medical expenses. Cost Sharing – The way in which insurance plans share their costs. Examples of cost sharing are coinsurance and co-payments. Coverage – The benefits package received from an individual insurance plan. Under Part D, prescription drug costs paid by the insurer are the benefits package, also known as coverage. Coverage Gap – The gap in your coverage that spans between ordinary drug coverage and catastrophic drug coverage is called the coverage gap. In this gap, the Medicare beneficiary pays 100% of their prescription costs. According to the federal government, about 88% of Medicare beneficiaries who enrolled in a Medicare Part D plan do not have Donut Hole coverage. The standard or model Part D coverage begins with a deductible of $275 followed by a co-pay of 25% on the next $2,235 (you pay $558.75). Upon reaching the total medication costs of $2,510 (with $833.75 out of pocket), coverage ceases and the beneficiary is 100% responsible for all costs during the “donut hole”, until a new spending tier, an additional $3,216.25 out of pocket is reached and coverage kicks in again at the Catastrophic level. Creditable Coverage – A plan other than a Part D plan that offers Prescription drug coverage and which meets certain Medicare standards. Deductible – The amount that the beneficiary must pay first, before coverage from the plan makes any of the payments. In Part D this is usually the first $275.00 of eligible drug expenses for the year. Disability Benefit – A feature of some policies for the waiver of premium if the policyholder becomes permanently or totally disabled. Disenrollment – When you disenroll, you stop your coverage. Your plan can choose to disenroll you under certain circumstances. Dual Eligibles – People eligible for both Medicare and Medicaid. Effective Date – The date your insurance is to actually begin. You are not covered until the policies effective date. Eligibility for Medicare Prescription Drug Program – You are eligible for the Part D program if you are eligible for Medicare benefits under Part A and/or Part B and live in the service area of the plan. Enrollment Period – The period during which individuals may enroll for an insurance policy. For Medicare Part D, there are different enrollment periods, the IEP or initial enrollment period, the AEP or annual enrollment period and the OEP, open enrollment period and the SEP, or special enrollment period. Exclusions – Items not covered by an insurance policy. Food and Drug Administration – The FDA oversees approval and regulation of all prescription drugs, both brand name and generic. It oversees the safety, efficacy and quality of products. Free Examination Period – This is also known as a “free-look”. It is the time period after an insurance policy is delivered during which you can decide to keep it or not keep it. Formulary – A list of prescription drugs that are covered by a particular Part D Plan. Generic Drugs – Prescription drugs that have the same active ingredient formula as a brand name drug. Generic drugs usually cost less than a fraction of the brand name counterpart. They are regulated by the FDA to be as safe and effective as the brand name drug. Grievance – A grievance is a complaint about the way your drug plan is providing services. Group Insurance – coverage through an employer or other entity that covers all individuals in the group. Guaranteed Renewable – An agreement by an insurance company to insure a person for as long as the premiums are paid. HMO – A Health Maintenance Organization that is contracted with CMS and provides access to a network of doctors and hospitals that coordinate your care. Health Insurance Portability & Accountability Act – A law passed in 1996, HIPAA is also called the “Kassebaum-Kennedy” law. It expands your health care coverage if you have lost your job and protects you and your family from discrimination based on past or present health conditions. Health Savings Account – An account held in trust for the account holder. The employer or employee makes annual tax-free contributions to the account that must be maintained in conjunction with a high deductible health insurance policy. IEP or Initial Enrollment Period – For persons who are just turning 65 or just becoming eligible for Medicare, the IEP is a seven month period that extends 3 months before the month when a person reaches 65, plus the month where the person turns 65, plus the 3 months after the person turns 65. In-Network – Providers or health care facilities which are part of a health plan’s network of providers with which it has negotiated a discount. Insured individuals usually pay less when using an in-network provider. Lapsed Policy – A policy that has terminated because of failure to pay the premium. Penalty or Late Enrollment Fee – In an attempt to encourage as many eligible people as possible to enroll in a Part D drug plan before the first enrollment period ended in May 2006, or to enroll as soon as they become eligible for Medicare, Congress created a late enrollment fee. This fee is equal to about one percent of the Medicare Part D premium for each month’s delay in enrolling. This is an unlimited percentage, lasting as long as you are enrolled in a Part D drug plan. Long Term Care Policy – Insurance policies that cover specified services for a specific period of time. Covered services often include nursing care, home health care and custodial care. Low Income Assistance – LIS or limited income subsidy helps people whose incomes are limited. For the Medicare Drug Program, if your income level is below 135% of the federal poverty level and your assets are also limited, you will pay no monthly premium, no deductible and have not gap in coverage. MA or MAPD – Medicare Advantage Plans and MA’s with Prescription Drug Coverage are private plans that provide doctor and hospital service in place of Medicare and Medicare pays these private companies to manage the health care instead of paying for the beneficiary claims directly. Mail Service Pharmacies – These are pharmacies used by many plans as a cost-saving measure and a convenient alternative to retail pharmacies. Members typically order their drugs by phone, fax or email. Most prescription orders are filled and received by members in 2 to 4 days. Managed Care – A medical delivery system that attempts to manage the quality and cost of medical services that an individual receives. Most managed care systems offer HMOs and PPOs that they are encouraged to use for their health care services. Medicaid – A federal medical assistance program that covers certain individuals and families meeting low income guidelines. Medicaid is jointly funded by the federal and state governments to assist the states in providing long term care assistance to people who meet eligibility criteria. Medicare Advantage Plans – health plans offered by private Insurance companies that contract with Medicare to provide health coverage. Depending on where the beneficiary lives, Medicare Advantage Plans may be available both with or without Part D plans. Medicare Prescription Drug, Improvement and Modernization Act of 2003 – This is a federal law that brought the most dramatic changes to the Medicare program since it began in 1965. These changes include more affordable health care, drug coverage to all people with Medicare, expanded health plan options, improved health care access for rural Americans and preventative care services, such as flu shots and mammograms. Medicare Supplements – Medicare Supplements or MediGap Plans provide additional coverage to your Original Medicare plans A and B. For instance, Medicare supplements will pay the 20% of doctor and hospital costs that is not covered by the 80% coverage with Original Medicare. You will need a stand alone Part D plan for prescriptions to accompany your Medicare Supplement. Network – The doctors, hospitals, and pharmacies having contracts with an insurance plan to provide care to the plan’s members. It is necessary to use your Part D drug plan’s network of pharmacies to save money on your drugs. Non-Formulary Drugs – Drugs that are not on a Part D drug plan’s list of covered medications. Non Preferred Brand Name Drugs – A non-preferred brand name drug is a prescription medication that is covered by a drug plan, but will cost a member more than a preferred drug. OEP or Open Enrollment Period – Running from January 1 until March 31, Medicare Beneficiaries can make additional choices regarding Medicare Advantage plans. Medicare beneficiaries who have both Medicare A and Medicare B and who have enrolled in a Part D plan can switch to a Medicare Advantage plan. Please note however, in the OEP you may not move to another stand alone PDP or drug plan. Beneficiaries who already have a MA-PD can switch to another MA-PD or they can switch back to Traditional Medicare and a stand alone PDP. If a Beneficiary is in a MA plan without PDP, they are not able to switch to a MA- PD. Original Medicare – The term “Original Medicare” is often used to describe your normal Medicare A & B benefits. If you have Medicare Part A and/or Part B coverage you can purchase a Part D drug plan. You can also purchase a Medicare Supplement to cover a portion of the costs not covered by Original Medicare or you can enroll in a Medicare Advantage Plan with or without a drug plan included. Out-Of-Pocket Costs – The amounts the beneficiary pays as their share of drug costs in a Part D plan. Deductibles, co-insurance, and the amounts paid during the donut hole make up the total out of pocket costs. When a beneficiary out of pocket costs exceeds $4,050, they are eligible for the catastrophic coverage step or 95% coverage for the rest of the calendar year. Outpatient Services – Services that do not take place in an in-patient hospital. They may be provided in clinics or provider offices, ambulatory surgical centers, hospices, home health services and so forth. PCP - A primary care physician you choose from a plan network to provide your routine and preventive care. HMOs require you to select a PCP, while PPOs don’t. However, if you select a PCP with your PPO plan, you’ll have lower co-pay for office visits. PDP - Stand – alone Medicare Part D Prescription Drug Plans (PDPs) provide reduced-cost prescription drug coverage to Medicare recipients. Medicare Part D plans work together with Medicare Part A and Part B, as well as Medicare Supplements and Medicare Advantage (MA) plans that do not provide prescription drug coverage. Annual Enrollment periods for PDPs run from Nov. 15 through Dec. 31, with January 1 as the plan starting date. PPO - A Preferred Provider Organization that provides access to a network of doctors and hospitals that co-ordinate your care. This allows you to get more benefits than the Original Medicare Plan and many Medicare supplement plans. PPOs also allow you to use any doctor or hospital outside of the network for a higher co-pay or co-insurance. Part D (Medicare Part D) - Part D is the new prescription drug program that became available to all Medicare beneficiaries on January 1, 2006. The Medicare Part D prescription drug program is insurance offered by the federal government and sold through private companies that helps pay for prescription drugs. Penalties - Medicare beneficiaries without creditable coverage who were eligible but waited until after May 15, 2006, may pay the standard plus a one percent premium penalty of the base beneficiary premium per month – or twelve percent a year – and won’t be able to enroll until the next annual election period (November 15 through December 31). The higher premium will stay with them for as long as they are enrolled in the program. People who turn 65 between the annual enrollment periods can join a Medicare prescription drug plan as soon as they sign up for Medicare. They can enroll at any time three months before or three months after their Medicare eligibility date without penalty. The effective date of prescription drug coverage will begin on their Medicare eligibility date. If they don’t join a plan within three months after their Medicare eligibility, don’t have creditable coverage and decide to join later, they’ll pay the same one percent penalty. Pharmacy network - This is the group of pharmacies who have contracted with the PDP to save you money on prescriptions. Policyholder - The person or party who owns an individual policy. This person may be the insured, a relative, the beneficiary, a corporation, or another person. Portability - requires that workers with pre-existing medical conditions must receive credit for time in a previous health plan if they join an employer plan. Pre-Certification - A requirement to notify the insurance company for it’s approval before you check into a hospital, have elective surgery, visit specialists, have testing done. Pre-certification does not guarantee the insurance company will pay the medical bills, also called pre-admission. Pre-existing Condition - Particular health conditions that occurred prior to applying for insurance and for which you received medical advice, diagnosis, care or treatment. Policies can exclude coverage of any medical condition for a period of time. Preferred Brand Drugs - Among brand drugs, these are the ones the plan prefers, so they are less costly. These brand drugs generally have lower co-pays than the non-preferred brand drugs. Premium - The payment required annually, semi annually or monthly to be part of an insurance plan. In a Part D plan, this is usually a monthly fee. Primary Care Provider - A health care professional (usually a physician) who is responsible for monitoring an individual’s overall health care needs. Typically, a PCP refers the individual to more specialized physicians for specialist care. Prior Authorization or Prior Approval - Some benefit plans require you to receive authorization or approval before they will cover a particular prescription. The reasons vary and can include the medication itself, the quantity prescribed or the frequency of its administration. Prior authorization means that you or your doctor will need to get approval from the plan before you fill your prescriptions. If you don’t get approval, your drug may not be covered by the plan. Please note that prior authorizations can take up to 72 hours to process. Drugs with this condition are designated ‘PA’ in the formulary. Provider - Doctors, hospitals radiation departments, pharmacies and others that provide medical health care service. Quantity Limits - For some medications, the insurer may limit the number of tablets or units that you can receive per month. These guidelines are based on maximum dosages recommended by the FDA. Reinstatement - Resumption of coverage under a policy that has lapsed because of nonpayment of the premium after the grace period has ended. Risk - The chance of loss, the degree of probability of loss or the amount of possible loss to the insuring company. For an individual, risk represents such probabilities as the likelihood of surgical complications, medications’ side effects, exposure to infection, or the chance of suffering a medical problem because of a lifestyle or other choice. RX - A symbol for “prescription drugs”. SEP or “Special Election Period” - The time granted to Medicare beneficiaries who are allowed to change plans outside of normal AEP. Examples of people who are granted a SEP are: Medicaid recipients (dual-eligibles), Victims of Hurricane Katrina, or Medicare beneficiaries who are no longer part of a creditable prescription drug plan (such as when their individual plan no longer exists). When someone involuntary loses their existing benefits, they have a 60 day SEP during which they are able to enter into another Medicare Part D plan. Also, if someone moves out of the service area of their plan (for instance, moving to another state), they will have a 60 day SEP after the move during which they can enroll into a Medicare Part D plan. Related to this word are AEP, IEP, and OEP. Short-term Disability - An injury or illness that keeps a person from working for a short time. The definition of short-term disability (and the time period over which coverage extends) differs among the insurance companies and employers. Short-term disability insurance coverage is designed to protect an individual’s full or partial wages during a time of injury or illness (that is not work related) that would prohibit the individual from working. Short-term Medical - Temporary coverage for an individual for a short period of time, usually from 30 to 365 days. Skilled Nursing Facility - A facility that provides inpatient care, rehabilitation services or other related health services. “Skilled nursing” does not include a convalescent home or custodial care. State Pharmaceutical Assistance Programs (SPAP) - State pharmaceutical assistance programs help cover the prescription drug costs of elderly people with disabilities who don’t qualify for Medicaid. Currently, 39 states offer some type of program to provide prescription drug coverage or assistance. Most programs use state funds to subsidize a portion of the cost for people who qualify. Step Therapy (step edits) - In some cases, you’re required to first try certain drugs to treat your medical condition before the plan will cover another drug for that condition. You and your doctor must work with the plan to endure coverage. These drugs are designated ‘ST’ in the formulary. Stop Loss - The dollar amount of claims for eligible expenses at which point you’ve paid 100 percent of your out-of-pocket and the insurance begins to pay at 100%. Stop-loss is reached when an insured individual has paid the deductible and reached the out-of-pocket maximum amount of co-insurance. Tier - A formulary is often divided into tiers. Each tier represents a different level of cost-sharing for prescription drugs. As the tiers rise, members pay more for the listed drugs. For example, a tier-1 drug may cost you a $7.50 co-pay, and a tier-3 drug may cost you a $50.00 co-pay. United Health Rx plans have four tiers, and your cost-sharing amount depends on which tier your drug is listed under. TrOOP-True-out-of-pocket – True out of pocket costs. Those costs that you pay for which you are not reimbursed. Underwriting - The insurance company’s process for determining whom it will insure. Usual, Customary & Reasonable - The dollar amount the insurance companies believe to be a fair price for the medical service/procedure in a specific geographic area. Companies have developed their own UCR, which often do not reflect the doctor’s actual bill. If the doctor’s charges are higher than the companies UCR, you generally have to pay the balance. Waiting Period - This has two meanings: (1) the time period you must wait before you can get health insurance from a new employer, and (2) the time that must pass after becoming insured before the policy will begin to pay benefits for a pre-existing condition or specified illness. Waiver - An amendment to a policy that excludes coverage for certain medical conditions.
2019-04-19T16:42:45Z
http://mypartdusa.com/home/medicare-prescription-drug-plan-glossary-medicare-d-glossary-terms-/
BONUS: Free Online Marketing Courses Checklist for you! Have you ever found yourself striving for new knowledge and experience in the best online marketing courses, but don’t know how to take the first step? The web is full of different videos, courses, gurus, techniques, and hacks about everything in the world. And sometimes in all this clutter, finding a useful online course is like looking for a needle in a haystack. I decided to come up with a collection of courses, ebooks, and videos which will help you to get started with online marketing. The courses are divided in a few categories, among which are social media, SEO and content marketing, email marketing, ads, and PPC marketing. Then, there is a collection of free ebooks and useful Youtube channels. When you choose a course, you need to consider a few factors, such as what the course is about, who the instructor is and what he/she has achieved in the niche, the duration of the course, and so on and so forth. Also, do make sure to carefully go through the e-course overview and syllabus, and double check whether the offers and benefits listed below still stand. Even if the course is free, you need to take it seriously and do homework or any other tasks they ask you to do. And remember: Put your newly acquired knowledge to the test as soon as possible. One of the superpowers of social media is to engage the audience, show off personality, and attract people’s attention. Your Instagram profile may not only inform followers about what you had for breakfast today and give an insight into your birthday party, but it can also also help you land a job, especially if you are a creative. Yes, you heard me, 80% of job hires are happening on the informal job market, including social media. Whatever your profession is, having attractive social media profiles can help set yourself apart from the crowd, get a new job, and increase sales. If you want to improve your social media skills and take your business on a whole new level, you should check out these great online courses I have collected for you. With these marketing courses online, you are going to learn how to find influencers on social media and promote your products with them, set goals for social media and achieve them, how to optimize your website for search engines, and much much more. Become a Pro at social media marketing with this cool online marketing course by Hootsuite. It is created for complete newbies. It features only six chapters with an overall duration of 6 hours. Looking through the content, you see that you are going to learn how to optimize your profiles on Instagram, Twitter, Facebook, LinkedIn, and Youtube. You will learn how to set goals and KPIs, grow your audience, engage with influencers, create a content strategy, measure ROI, and use social media advertising effectively. Coursera is a known website offering online marketing courses from universities and companies around the world. It is an excellent opportunity for people who want to learn something new at home, sitting on a couch in favorite pajamas. This online marketing course is like an interactive textbook with videos, images, and quizzes. You can discuss the material with other students like you. And at the end, make the most out of the free online marketing courses with certificates; show off to fellow marketers! The Social media marketing course is developed for beginners. You will get to know about engagement and nurture marketing, content and advertising, and the importance of listening. Another great social media course to take into account on Coursera is Influencer Marketing Strategy. It tells how to find influencers on social media, engage with them and grow your business. These lectures are created by Brian Peters, a digital marketing strategist at Buffer. With over 6,500 students and 300 positive reviews, this course is definitely worth your attention. Advertising on social media allows you to connect with clients from all over the globe. Such volume of reach has never been available for radio, television, and newspapers. You will go through critical terms of social media advertising, learn to set goals and targets, create content, and more. In this course, you will learn how to create an advertisement on Twitter, effectively share your content, and create, launch, optimize Twitter ads campaign. Twitter Flight School features two digital online courses with 5 and 6 modules which go for 10-15 minutes. So, the whole course won’t take a long time to complete, but you will gain brilliant knowledge allowing you to create Twitter marketing campaigns for your business. Social media stories are growing in popularity, and you can’t lose a chance to use live video to increase your brand awareness. These days you can not only spy on your ex-boyfriend on Instagram but also drive traffic to your website and sell more products. – Why do you need to use Instagram Stories? – How to develop an Instagram strategy? – How to create a fantastic Instagram Stories? – How to drive traffic with Stories? – How to measure Instagram Stories’ analytics? – How to create unique Instagram Stories with Canva? The course has 11 videos for from 3 to 9 minutes. The whole class will take less than an hour. You can use this hour to watch a Netflix series, or watch these useful videos and grow your Instagram. You might have been new to search engine optimization, or you have workers who need to be trained up on SEO. Before you go and spend your dollars on a training consult, consider looking through these online courses, both free and paid. In this section, you are going to find the best online courses on SEO from the leaders in the industry, such as Ahrefs, Backlinko, Hubspot, and Udemy. SEO That Works is an online course created by Brian Dean, an owner of Backlinko. And that’s entirely true. He owns a one-person blog about SEO with over 1M visitors per month! As you see, Brian is a rockstar in the SEO world. His online marketing course is going to teach you how to drive people on your website even if you are new to search engine optimization. There are four modules with information in the course. Each module includes a high-quality video, worksheets, and slideshows. You need to learn these lessons one by one not to miss anything. There are ten lessons with the last bonus lecture. Check the table of contents here. You can see the full contents here. Besides, it offers you a teaser and some parts of experience 1, 2, 4, 5, and six are open to watching right now! The course covers the essential aspects of content marketing, such as link building, keyword research, link acquisition, competitive research, and more. Every lesson includes not only a detailed explanation of terms with graphs and bullet points but also great examples and case studies which show you how these techniques work in real life. Here is an actionable, brief yet effective SEO course by Hubspot. Even if you search, you won’t find anything similar to this in-depth SEO course for free on the web. The instructor and creator of this online marketing course are Matthew Howells-Barby, who is a Director of Acquisition on HubSpot. Not only is he an online marketing and SEO expert but also a columnist for Moz and Marketing land. In this course, you are going to learn how to find an SEO strategy for your business, build links for SEO, and how to use blogging to rank on the first page of Google. Also, for those of you who want to know more about content marketing, there is one more useful course from Hubspot here. If you think it’s another online marketing course from another SEO guru, you are wrong. Here a founder of Moz Rand Fishkin teaches you the basics of SEO. Rand is known for his Whiteboard Friday videos and this course is a combination of those. With over 169k students and 4.2 rating, this course is definitely worth your attention. But as reviews say, it is more about theory than action. So that, it will be more suitable for complete beginners. For those of you who want to get more ideas and real-life examples, consider the Hubspot course above. Moz Advanced SEO: Tactics & Strategy. It’s one-hour videos for advanced users about coming up with SEO strategy for your business. Content Marketing for B2B Enterprises. Earn to drive leads and sales with powerful content marketing with 37 minutes video. SEO 2019: Complete SEO Training + SEO for WordPress Websites. A huge course about SEO for beginners and WordPress users with 9,5 hours videos and downloadable resources. You can read numerous blog post about SEO on the web but still found yourself thinking that you don’t know what you are doing. Here is a fantastic online marketing course will tell you about the search and keyword framework, link building, technical SEO for non-technical people, and best SEO tools. Tommy Griffith has done SEO for over ten years, and he was doing search engine optimization for PayPal and Airbnb. Their lectures go in a fun and comprehensive way, and you won’t notice when you find yourself an SEO guru. Moreover, in the bonus section, you are going to find local SEO, enterprise link building, and SEO for Pinterest, Youtube, and Amazon. If you are looking for the best blog to read around SEO that has step by step instructions this is the right article to get started. It will answer all the questions you have around SEO and give you strong fundamentals to continue your endeavor into becoming an SEO Expert. Email marketing has been a powerful tool for years which helped drive traffic to a website, generate leads, and increase sales. However, times have changed. We live in a world where tons of emails drop into our inboxes every hour. We feel overwhelmed with information. Most emails stay unopened and ignored. But there is also a positive statistics, which says email’s return on investments is huge! For each $1 you spend on email marketing you would get $38 back. If you want to reach your audience and drive revenue with email marketing, here are the most suitable online courses for you. This online marketing course by Copyblogger will give you an in-depth insight into email marketing, content marketing, SEO, keyword research, and more. It has only 16 ebooks and 20 emails which will be sent you periodically so that you won’t get bogged down by too much info given you at once. This course is an organized guide is ‘best of the best’ tips on online marketing that ever appeared on Copyblogger. You don’t need to be a genius to master your email marketing skills. You need to… be smarter than others. If you are not looking for a magic button which will make you smart overnight, then check out this excellent email marketing course by Hubspot. analyze and test your email marketing results, and more. At the end of the course, you are going to get one of the most renowned free online marketing courses with certificates, which can be attached to your LinkedIn profile or resume. If you want to try yourself as a PPC marketer or want to sell goods on your website with small affiliate commission, then these courses may come in handy for you. They are useful for beginners and advanced users. This online marketing course offers you to learn ins and outs of PPC marketing. It has easy-to-understand lessons about PPC for beginners and advanced users. This guide was written for those of you who have heard of PPC marketing before but don’t know where to start and how to implement it to your business. It will tell you what is PPC, CTA, keywords, text ads, cost per click and cost per action, and advise you how to set up an AdSense account. I know Google is almost a synonym of the search engine. However, there are other players on the market, such as Bing. Bing uses about 30% of US users (which is huge). And if you are thinking about starting your ads campaign, you certainly need to consider Bing. This training course will help you to create your first search engine advertising, as well as manage and optimize your budget for it. Also, you’ll get to know what PPC is, how to choose keywords, write copy for an ad, and find the target audience. On this page, you are going to find over 75 online courses from Facebook. The best part about this courses is that you can select your business goals, and Facebook will suggest you the most suitable options for you. Among the goals are get started with Facebook, target the right audience, build brand awareness, generate leads, promote an app, manage ads, increase online sales, and more. With over 2 million participants, this online marketing course can come in handy if you are going to create an advertisement for Facebook users. Online courses are not the only way to learn marketing these days. You can also learn online marketing with ebooks, videos, books, movies, and other convenient ways for you. Below, I’d like to share ten free ebooks about digital marketing you can consider for learning social media, content marketing, SEO, or email marketing. In this ebook, Kevan Lee and the Buffer team reveals 25 useful social media strategies. Social media is not only about posting pictures, but it’s also about writing meaningful content, setting goals and achieving them. Among the tips, you are going to find advice on how to choose from 1 to 3 areas of expertise and try to stick to them. This way followers can quickly identify your niche and follow you. You will also get to know how often you need to publish a post, engage your followers, and even convince your manager that social media is worth time and efforts. A landing page is much more than putting your headline and offer together. Are you able to drive traffic to your landing page? Is your copy engaging enough? Having a perfect marketing strategy means you need to understand different data. It is essential to measure your online marketing results and know if your efforts work for you or against you. 3) master skills to read data properly and use it to grow your business. How many times have you seen the annual report or business presentation packed with different data which you can hardly understand? Yes, data can be very inventive when it comes to ideas and messages you try to convey. Take your business to an entirely new level with these 50 eCommerce growth hacks. It includes lots of useful tips and concepts from experts who have built a successful e-commerce business. Talking about the experts, I mean Neil Patel, Brian Balfour, and Noah Kagan from AppSumo. To get this ebook, you need only leave your name and email in the subscription box. With the help of optimization and split testing marketers can understand if their efforts pay off. Read this useful guide with over 30 optimization tips from different experts. After reading this ebook, you will get to know what works for your customer and what don’t, improve your testing process, and develop an optimization strategy for any business. I have already mentioned Moz in the section about SEO courses. It’s a leading resource when it comes to search engine optimization and online marketing. If you are entirely new to SEO, you can start your path with SEO course in the above paragraphs, or directly download this free ebook. Here at Moosend, we try our best to treat you with sweet bonuses every time our blog posts are coming. In this blog post, you can get a bonus with 26 actionable email marketing tips which will help to grow your business. Get a PDF right into your email, save it, and read whenever you want, even if you have no internet connection. Here you’ll get to know what is the best time to send emails to your subscribers, how to give subscribers what they want, and plan your schedule in advance. Moreover, if you are into email marketing, you need to know if email blasts still work in 2019? Another great and convenient PDF file can be delivered right into your email box. This is a free ebook by Jon Ferrara will help you to get to know the world of influencer marketing. These days, influencers have the power to make or break your business with one Story on Instagram. People tend to believe bloggers they follow on social media or the web, and this ebook will tell you how to apply influencer marketing to your business. This ebook will come in handy for email marketers and those who are going to make their first email campaign. Some popular email marketing stuff is not working anymore. For example, “Batch and blast”. Who are email blasts and do they actually work in 2019, read in our guide here. It is way better to use personalization and address emails to your subscriber. Besides, personalization is one of the digital marketing trends in 2019, thus you need to grow relationship-oriented mindset. Besides that, the ebook tells about trigger messages and behavior filters. We tend to see Youtube as an entertaining network, where we can find Justin Bieber songs or how to open a wine bottle without a corkscrew. But, believe me, there are tons of useful educational videos on Youtube you can watch. You simply need to know how to find them. Let’s start with thought-leaders in online marketing, such as Moz, Ahrefs, Brian Dean, Neil Patel, and others. While most of their videos are about using the Ahrefs tool, along with that you get to know many interesting things about SEO, content marketing, organic search, website audit, competitive research, and finding keywords. These videos will be useful for both SEO newbies and advanced users. Brian Dean is an owner of one-mans blog Backlinko about SEO. It is a perfect example of how a blog with one post a month and only one man can become successful. On his channel, you’ll get actionable tips on SEO, content marketing, and link building. Moz is a website about search engine optimization and inbound marketing, as well as their Youtube channel. While Moz co-founder Rand Fishkin doesn’t work at Moz anymore, you still can find his series of videos called Whiteboard Friday. He tells about white SEO, killer content, link building, and more. I mentioned Hubspot in this list already, it’s a well-known resource for inbound marketing techniques. After watching their Youtube videos you are going to learn chatbots, artificial intelligence, social media, and design. Neil Patel is a popular digital marketer, New York Times bestselling author and the one in top 100 entrepreneurs under 30 age by President Obama. On Neil’s Youtube channel you will find videos about SEO, growth hacks, social media marketing, and content marketing. I hope this amazing list of online marketing courses, ebooks, and Youtube channels will become a part of your marketing arsenal in the future. Feel free to bookmark this collection and get back to it when you need a source of high-quality knowledge in digital marketing. What online marketing courses, ebooks, or videos you like the most and why? What resources do you use to learn something new? Please, share with us in the comment section below. Keep track of your progress with our Free Internet Marketing Course Checklist!
2019-04-26T15:37:58Z
https://moosend.com/blog/online-marketing-courses/
A vascular access port is disclosed for subcutaneous implantation. The port is particularly adapted to be affixed to a bone to securely hold the port in position, to assist medical personnel in finding the port and to decrease a visibility of the port. The port has a chamber therein which is accessed by a needle through a septum adjacent the chamber. The chamber is placed into fluid communication with the vascular structure of the patient, such as through catheter tubing. The chamber is surrounded by a body with an outer surface which is preferably fitted with threads to facilitate secure but removable attachment of the port within a hole in the bone where the port is to be implanted. This application claims benefit under Title 35, United States Code §119(e) of U.S. Provisional Application No. 60/762,848 filed on Jan. 30, 2006. The following invention relates to implantable vascular access ports for implantation subcutaneously and which can receive a medication or other liquid preparation by a needle inserted through the skin and into the port, and then on into the vascular system of the patient. More particularly, this invention relates to subcutaneous implantable vascular access ports which are particularly configured to be affixed to a bone or other subcutaneous structure to provide secure placement of the access port. Subcutaneously implanted vascular access devices, or ports, have been used for many years to provide long term vascular access in patients that require frequent or periodic therapeutic infusions or blood draws. Prior art ports generally have a body which contains a chamber accessible by a self-sealing septum and an outlet which is connected to a catheter which interfaces with the vascular system. The base of the port is a generally flat side of the port which is intended to lie against the body, so the septum is generally oriented toward the skin surface. Many variations are possible. The septum may be convex or concave. The body may be plastic, metal or a combination of materials. The septum may be directly opposite the base, or may be angled relative to the base. In current practice, the port is implanted into a subcutaneous pocket during a minor surgical procedure. One limitation to the development of smaller profile ports is the problem of port stability within the body after being placed. Ports in use currently have a propensity to flip-over within the body if not sutured in place, rendering them inaccessible because the septum is facing down rather than up. The smaller the port, the greater the propensity to flip-over, and the harder it is to suture the port in place due to the smaller incision and smaller working pocket within which to suture. While suturing can be somewhat effective, it is time consuming and not entirely reliable. Thus, there is a need for a method to increase port stability while minimizing port implantation profile. One such prior art port with a body that exhibits a generally elongate form and with an associated elongate septum is described in U.S. Pat. No. 6,213,973. While such a configuration does allow for a slightly minimized incision size, this prior art access port is not stabilized and is thus susceptible to “flipping-over” or otherwise rotating into an undesirable position. Accordingly, a need exists for a vascular access port which provides both the benefit of stability once implanted and a small profile for insertion through a small incision, with the vascular access port being sufficiently small to allow for a minimization of size of the access port and other negative attributes associated with provision of such a vascular access port for the patient. Another problem with prior art implantable subcutaneous vascular access ports is that in patients with low body fat, the vascular access port is often highly visible as a protrusion beneath the skin. Such appearance is often considered to be particularly undesirable. In other patients, it can be difficult to find the vascular access port due to the particular patient's physiology tending to excessively disguise the location of the vascular access port. With this invention, the port is fixed in a reliable position which is neither too obvious to the casual observer, nor too difficult to find. Furthermore, with this invention the port is fixed securely in position so that no concern for displacement of the port is presented. A subcutaneous implantable vascular access port is provided according to this invention which is particularly adapted to be affixed to a bone of the patient. For instance, the port could be configured to be coupled to the clavicle of the patient. Initially, a hole is formed in the bone at the implantation site for the port. The port is configured so that it can be placed within this hole in the bone and held securely within the hole in the bone. For instance, an outer surface of the port can be fitted with a series of threads which engage sides of the hole in the bone to secure the port to the bone. Such threads can both support the port during implantation and also facilitate removal of the port when it is no longer needed. The port preferably includes a chamber contained within a body forming the port. An aperture passes through the body and provides access into the chamber for a needle. A septum is interposed between the aperture and the chamber. This septum is formed of a silicone material or other resilient material which can be penetrated by a needle and reseal after removal of the needle. Preferably, the body is formed in two parts including a base portion and a collar portion with the septum interposed between the collar portion and the base portion and with the chamber formed primarily within the base portion. The entire body is preferably substantially cylindrical to facilitate its fitting securely within a cylindrical hole passing through the bone. An extension preferably extends down from a lower surface of the base with an outlet connecting the chamber to the extension. Catheter tubing can be attached to the extension with the tubing extending to a vein or other vascular structure where fluid communication between the vascular structure of the chamber is provided. Particular details of such vascular interface are described in more detail in U.S. patent application Ser. No. 11/651,770, incorporated herein by reference in its entirety. The hole typically passes entirely through the bone so that the extension and tubing extend out one end of the hole in the bone with the septum being accessible adjacent an opposite end of the hole in the bone. Because the port is primarily within a bone, such as the clavicle, the port does not present an unsightly appearance, but rather is substantially completely concealed within the bone. On the other hand, a medical professional can palpitate the clavicle of the patient and easily feel a slight depression defined by the hole in the bone and the aperture in the body of the port or a slight rise caused by the septum. A medical professional can then utilize a needle to access the chamber through the septum and through the skin of the patient. Accordingly, a primary object of the present invention is to provide a subcutaneous vascular access port which facilitates introduction of a fluid preparation into the bloodstream of a patient in a reliable and repeatable fashion. Another object of the present invention is to provide a vascular access port which is held securely in position subcutaneously. Another object of the present invention is to provide a vascular access port which is easy for a medical professional to use. Another object of the present invention is to provide a vascular access port which is affixed to a bone to allow the vascular access port to be securely held in place. Another object of the present invention is to provide a vascular access port which is substantially invisible to a casual observer. Another object of the present invention is to provide a vascular access port which can be readily found by a medical professional. Another object of the present invention is to provide a vascular access port which is easy to implant in a secure fashion and which then can be repeatedly utilized for injection of medications or other preparations into the bloodstream of a patient or to draw blood. Another object of the present invention is to provide a method for affixing a port subcutaneously with vascular access provided by the port. FIG. 1 is a perspective view of the subcutaneous vascular access port of this invention according to a preferred embodiment. FIG. 2 is a side elevation view of that which is shown in FIG. 1. FIG. 3 is an end elevation view of that which is shown in FIG. 1. FIG. 4 is a full sectional view of that which is shown in FIG. 1. FIG. 5 is an exploded parts view of that which is shown in FIG. 1. FIG. 6 is a perspective view of the vascular access port of this invention along with tubing and shown adjacent to a hole in a bone during the process of implanting the vascular access port into the hole in the bone, for secure positioning of the vascular access port subcutaneously within a patient. FIG. 7 is a perspective view similar to that which is shown in FIG. 6, but after completion of the implantation procedure. Referring to the drawings, wherein like reference numerals represent like parts throughout the various drawing figures, reference numeral 10 is directed to a bone supported vascular access port (FIGS. 6 and 7). The port 10 is configured with an outer surface 55 (FIG. 1) which can fit within a hole H in a bone B to secure the port 10 in fixed position subcutaneously within the patient. Catheter tubing T is coupled to the port 10 for vascular access between a chamber 30 (FIG. 4) within the port 10, and into the vascular system of the patient. An aperture 50 (FIGS. 1 and 4) provides access to the chamber 30 through a septum 60 which allows a needle to pass therethrough and which can reseal multiple times after needle removal. The port 10 thus provides a securely positioned, easily findable and usable subcutaneous vascular access port which also is substantially invisible to a casual observer of the patient. In essence, and with particular reference to FIGS. 1 and 4, basic details of the port 10 of this invention are described according to a preferred embodiment. The port 10 is generally formed as a rigid body surrounding a chamber 30. This rigid body is preferably formed of two separate rigid portions including a base 20 and a collar 40. The chamber 30 is preferably formed primarily within the base 20. The collar 40 is configured to be attachable, preferably permanently, to the base 20. The collar 40 includes an aperture 50 therein through which a needle can pass, so that the needle can pass entirely through the collar 40 and into the chamber 30. A septum 60 is interposed between the collar 40 and the base 20 so that the septum 60 is adjacent the chamber 30, with the septum 60 preferably substantially entirely within the collar 40. The base 20 and collar 40 preferably are attached together with a space therebetween slightly less than a size of the septum 60 so that the septum 60 is compressed somewhat between the base 20 and the collar 40. An extension 35 extends from the base 20 and provides fluid access between the chamber 30 and tubing T, which can extend to and interface with the vascular system of the patient. The collar 40 includes an outer surface 55 which is configured to abut sides of a hole H in a bone B into which the port 10 is to be affixed. This outer surface 55 is preferably formed with bone engagement threads thereon so that the port 10 is threaded into the hole H in the bone B for secure but removable attachment of the port 10 to the bone B. More specifically, and with particular reference to FIGS. 4 and 5, particular details of the base 20 are described according to a preferred embodiment. The base 20 is preferably configured as only a portion of a body forming the port 10. The body of the port 10 is generally defined as a rigid portion of the port 10 which surrounds and defines the chamber 30, other than where the aperture 50 provides access into the chamber 30. In this preferred embodiment, the base 20 defines a lower portion of this body forming the port 10. The base 20 is preferably a rigid unitary mass of biocompatible metal, such as stainless steel. The base 20 could alternatively be formed of biocompatible plastic materials or other biocompatible materials. The base 20 is preferably generally symmetrical about a central axis and exhibits a generally hollow cylindrical form. In particular, the base 20 includes a lower wall 22 preferably substantially perpendicular to a central axis of the base 20 and port 10. A side wall 24 extends perpendicularly from the lower wall 22, with the side wall 24 preferably being substantially cylindrical. Male threads 26 preferably extend from this side wall 24. These male threads 26 are preferably only provided adjacent an upper end 28 of the side walls 24. The male threads 26 end at a stop 26 where an outer diameter of the side wall 24 transitions from a greater diameter adjacent the lower wall 22, to a lesser diameter adjacent the upper end 28 and with the male threads 26 thereon. In this way, female threads 44 on the collar 40 can engage with the male threads 26 of the base 20 and allow portions of the side wall 24 of the base 20 to be flush with the outer surface 55 of the collar 40 (described in detail below). The upper end 28 of the base 20 is open with preferably a bevel 29 defining a transition from the upper end 28 into the chamber 30. The chamber 30 defines a hollow cylindrical interior of the base 20 in the preferred embodiment. The chamber 30 could in fact have a variety of different shapes, sizes or configurations, with a cylindrical form being most preferred. The chamber 30 is substantially enclosed on all sides by the base 20 other than adjacent the bevel 29 and upper end 28 of the base 20 where the chamber 30 is preferably entirely open. The chamber 30 includes a floor 32 which is preferably substantially perpendicular to the central axis of the base 20, with the floor 32 preferably substantially circular in shape and parallel with the lower wall 22. Sides 34 of the chamber 30 extend perpendicularly up from the floor 32 to the upper end 28 of the base 20. An extension 35 extends from the lower end 22 of the base 20. This extension 35 extends downwardly and includes a conduit 37 therein so that the extension 35 is hollow. An outlet 36 provides for fluid communication between the chamber 30 and the conduit 37 within the extension 35. The extension 35 extends to a tip 38. Barbs 39 are preferably formed on an outer surface of the extension 35. The extension 35 can have catheter tubing T slipped over an outer surface thereof with the barbs 39 tending to keep the tubing on the extension. As an alternative, ribs could be provided on the extension for securing of the tubing T, either with or without separate clamping structures, such as described in attachment of tubing to the vascular access port described in U.S. patent application Ser. No. 11/651,770, incorporated herein by reference. The extension 35 provides a preferred form of a means to secure the chamber 30 to a vascular structure of the patient and to provide for fluid communication between the chamber 30 and the vascular system of the patient, along with the catheter tubing T. The extension 35 and outlet 36 are shown axially aligned with the central axis of the base 20, port 10 and chamber 30. Most preferably, this outlet 36 is offset at least slightly from this centerline, and possibly formed to extend at an angle to the central axis. The outlet 36 could alternatively be jogged or stepped so that it does not provide a purely straight axial form extending along a centerline of the port 10. By offsetting the outlet 36, the possibility that a needle passing through the aperture 50 and through the septum 60, and into the chamber 30 might possibly also pass through the outlet 36 and somehow damage the tubing T is precluded. Other techniques for avoiding inserting a needle too far and all the way through the port 10 include providing a stop on the needle so that the needle cannot be inserted too deeply or moving the outlet 36 so that it extends through one of the sides 34 of the chamber 30, rather than the floor 32 of the chamber 30. With particular reference to FIGS. 4 and 5, particular details of the collar 40 of this invention are described. The collar 40 preferably defines a portion of the body of the port 10 surrounding the chamber 30. Thus, in this preferred embodiment the base 20 and collar 40 together define the body of the port 10. As an alternative, the body could be a single unitary mass of material and the septum 60 could be compressed and put into place through the aperture 50. The collar 40 is preferably a substantially cylindrical rigid unitary mass of material preferably formed of a common material with the base 20, such as a biocompatible stainless steel. Other biocompatible materials could also be utilized for the base 20 and collar 40. The collar 40 is generally ring-like in form so that the collar 40 is open on either end thereof. The collar 40 includes a lower ring 42 defining a portion of the collar 40 which overlaps a portion of the base 20. This lower ring 42 has an inner surface 43 which preferably has female threads 44 thereon. The female threads 44 are sized to be complemental with the male threads 26 of the base 20 so that the collar 40 can be threaded onto the base 20. A rim 45 defines a lowermost portion of the lower ring 42 of the collar 40. This rim 45 preferably abuts the stop 27 of the base 20 when the collar 40 has been entirely fitted upon the base 20. A compartment is formed within the collar 40 between the lower ring 42 and the aperture 50. This compartment is sized to receive the septum 60 therein so that the septum 60 is adjacent the chamber 30 and generally interposed between the aperture 50 and the chamber 30. This compartment is preferably defined by a cylindrical wall 48 within the collar 40. Dimensions of the compartment, and particularly a length between the rim 45 and the aperture 50 is preferably less than a length of the septum 60 from a top 62 to a bottom 64. In this way, the septum 60 is slightly compressed between the aperture 50 and the stop 27 of the base 20, so that the septum 60 is pre-compressed within the port 10. Such pre-compression can assist the septum 60 in most effectively resealing after penetration by a needle and removal of that needle. The collar 40 preferably supports the aperture 50 at an end of the collar 40 most distant from the base 20 and an end of the port 10 opposite the extension 35 or other outlet from the chamber 30. This aperture 50 defines an opening through which a needle is passed to penetrate the septum 60 and pass into the chamber 30. The aperture 50 preferably includes a lip 52 which has a slightly lesser diameter than a diameter of the cylindrical wall 48 of the compartment within the collar 40. Thus, the lip 52 helps to keep the septum 60 from translating linearly along a central axis of the port 10 and out of the aperture 50. A face 54 defines an inwardly extending surface surrounding the aperture 50 and facing upwardly generally perpendicular to the central axis. This face 54 includes at least one slot 56 therein and preferably a pair of slots 56 on opposite sides of the aperture 50. These slots 56 can receive a torque applying tool, such as a screwdriver type tool. In this way, such a tool can be utilized to thread the entire port 10 into the hole H in the bone B for both insertion and removal of the port 10. An outer surface 55 of the collar 40 extends from the face 54 down to the rim 45. This outer surface 55 is preferably substantially cylindrical in form, but could have a variety of different forms. The outer surface 55 preferably supports a bone engagement surface configured as a means to fasten the port 10 to a bone B. Most preferably, this fastening means includes bone threads 58 thereon. These bone threads 58 can thread into sides of the hole H in the bone B to secure the port 10 to the bone B. The threads 58 can both be used to hold the port 10 securely in place and also allow the port 10 to be drawn more deeply into the hole H or be removed out of the hole H, depending on the positioning desires of the medical professional implanting the port 10. These bone threads 58 can be formed to be self-tapping so that they can be placed into a hole H which is not yet threaded. Alternatively, a tapping tool can be utilized to tap threads into the hole H in the bone B before insertion of the port 10 into the hole H in the bone B. As an another alternative, the outer surface 55 could merely be provided with a roughened surface and a close tolerance for friction fit to be provided between the outer surface 55 and the hole H, so that the port 10 is securely held within the hole H and the bone B. If desired, the outer surface 55 can be roughened or ribbed axially or circumferentially, or in other orientations, so that re-ossification and bone ingrowth to further secure the port 10 within the hole H in the bone B is further facilitated with or without the threads 58. With such re-ossification, the port 10 can also add strength back to the bone B which might have been reduced in strength due to placement of the hole H in the bone B. Other fastening means for the port could include clasps, such as those used to hold stud earrings, with a fastener below the hole H in the bone B adapted to be coupled to the port. The port outer surface could include a radially expanding structure to engage and secure to the bone B. The outer surface 55 could be barbed with fixed or movable barbs. A rivet type tool could be configured to hold the port in place or adhesive could be utilized. Such fastening means could be used alone or in combination. The septum 60 is preferably a solid mass of biocompatible silicone material. This material is preferably slightly resilient and able to be penetrated by a needle and has the particular property of being able to reseal after the needle has penetrated the septum 60 and then has been later removed. The septum 60 is preferably placed in compression to further enhance this resealing feature of the septum 60. The septum 60 preferably has a cylindrical form with a top 62 opposite a bottom 64 with both the top 62 and bottom 64 both being round in shape. A perimeter 66 defines a cylindrical wall extending from the top 62 to the bottom 64. While the septum 60 is preferably cylindrical, if the compartment within the collar 40 has a different geometric configuration, the septum 60 could be appropriately modified to fit modifications to the compartment within the collar 40. Because the septum 60 is pre-compressed somewhat, portions of the top 62 and bottom 64 bulge out of the aperture 50 and into the chamber 30. In use and operation, and with particular reference to FIGS. 6 and 7, particular details of the method of using the port 10 of this invention are described, according to a preferred embodiment. When a patient is to have the port 10 implanted, the medical professional first identifies a bone B into which the port 10 is to be implanted. Most typically in a preferred embodiment of this invention, the bone B to be utilized is the clavicle with the intention of coupling catheter tubing T between the port 10 and one of the carotid veins of the patient. The medical professional identifies the desired location within the clavicle for implantation of the port 10. The medical professional then provides an appropriate incision adjacent the clavicle and utilizes an appropriate hole forming tool to form the hole H within the bone B of the patient. This hole H can be later tapped with threads or the port 10 can be provided with bone threads 58 which are sufficiently self-tapping in nature so that the port 10 can be placed into the hole H in threading fashion. A torque applying tool, such as some form of tool screwdriver is caused to interface with the slots 58 in the face 54 of the collar 40 on the port 10 and the port 10 is placed into the hole H and then rotated until it has been located entirely down into the hole H (FIG. 7). Because the hole H passes entirely through the bone B and the tube T has first been placed upon the port 10 and extended through the hole H, the tube T now extends out a lower side of the bone B and is ready for a secondary medical procedure to provide vascular access between the tubing T and the particular vein or other vascular structure, where interface with the bloodstream of the patient is to occur. When a medical professional later needs to provide a dose of a medical preparation into the bloodstream of the patient, or draw blood, the medical professional first palpitates the clavicle to identify the depression or rise formed by the hole H and/or the aperture 50 in the face 54 of the collar 40 or the septum 60 of the port 10. Once this depression or rise has been found by such palpitation, the medical professional can align a needle with this location and insert the needle through the skin and through the septum 60 and into chamber 30 of the port 10. A syringe or other appropriate device coupled to the needle is then utilized to pass the liquid preparation through the needle and into the chamber 30. This preparation can then pass on into the bloodstream through the tubing T. The medical professional can then remove the needle allowing the septum 60 to reseal. This procedure can be repeated numerous times before the septum 60 wears out. At which time, the port 10 can be optionally replaced. When the port 10 is no longer needed, a surgeon will access the port 10 in a minor surgical procedure and utilize a torque applying tool coupled to the slots 56 to rotate the port 10. Such rotation in the proper direction will cause the port 10 to rotate and translate out of the hole H. The point of vascular access can also be appropriately repaired and the port 10 entirely removed. If desired, bone ingrowth media can be packed into the hole H before closing an incision through which the medical procedure is performed, to promote bone B regrowth to fill in the hole H. While the hole H is shown as a complete hole passing entirely through the bone B, it is conceivable that the hole H could pass through a side of the bone B so that it is not entirely surrounded by bone, but is only partially surrounded by bone B. If such bone surrounding nature for the hole H and the bone B is greater than half of a complete circle, the port 10 can still be securely held therein. Also, a bracket could provide at least a portion of the fastening means and fasten the port 10 to the bone B without any hole through the bone B. Such a bracket could clamp to the bone B or use a fastener (i.e. a screw) penetrating the bone B to secure the bracket to the bone B, with the bracket formed with or securely coupleable to the port 10. While the hole H is preferably circular in cross-section and cylindrical in form, it is conceivable that this hole H could have a square cross-section or some other cross-section. The port 10 could be formed to have a complemental cross-section with the hole H or the hole H and port 10 could have different shapes, provided that they are sized and shaped in a way that allows the port 10 to pass into the hole H in the bone B and be supported within the hole H and the bone B sufficiently so that the port does not exhibit substantial movement relative to the bone B, except during implantation and removal of the port 10. a bone engagement surface on said collar, said bone engagement surface adapted to be coupled to a bone to which the port is to be supported. 2. The port of claim 1 wherein said collar includes an outer surface which is substantially cylindrical, and wherein said bone engagement surface includes threads on said outer surface of said collar, said threads adapted to engage sides of a hole within a bone into which the port is to be located and supported. 3. The port of claim 2 wherein said threads on said outer surface of said collar are self-tapping in nature. 4. The port of claim 2 wherein said collar includes a face surrounding an aperture, said aperture providing access to said septum through said collar, said face having at least one slot therein, said slot adapted to engage with a tool for rotating said port and threading said threads on said outer surface of said collar into said hole in said bone. 5. The port of claim 1 wherein said collar includes an outer surface which is roughened in texture, such that said outer surface is adapted to encourage support of said port by said bone. 6. The port of claim 5 wherein said outer surface is generally cylindrical in form. 7. The port of claim 6 wherein said outer surface includes threads thereon, said threads adapted to facilitate secure positioning of said port into a hole in a bone to which said port is to be supported, as well as removal of said port from said bone when said port is to be removed. 8. The port of claim 1 wherein said port includes a substantially rigid base separate from said collar, said base having said chamber located therein, said septum adapted to be interposed between said base and said collar, said collar adapted to be attached to said base with said septum trapped between said collar and said base with said septum overlying said chamber, said collar having an aperture, said aperture adapted to provide access for a needle to said septum on a side of said septum opposite said chamber. 9. The port of claim 8 wherein said base exhibits a generally cylindrical form and said collar exhibits a generally cylindrical form with said base having male threads thereon complemental with female threads formed on said collar, such that said collar threads onto said base to secure said collar to said base with said septum between said collar and said base. 10. The port of claim 8 wherein said collar is adapted to slide over said base with a friction fit between said collar and said base such that said collar is held onto said base with said septum trapped between said collar and said base, said collar and said base sized to compress said septum between said collar and said base, such that said septum is pre-compressed within said port. said body adapted to be affixed to a bone, such that said port is held in fixed position relative to said bone. 12. The access port of claim 11 wherein said body includes a substantially cylindrical outer surface, said outer surface having threads thereon, said threads adapted to thread into a hole in a bone to which said body of said port is to be affixed. 13. The access port of claim 11 wherein said body includes an outer surface, said outer surface sized and shaped to fit into a hole in a bone, the hole having a size and shape adapted to allow said body of said port to reside therein. 14. The access port of claim 13 wherein said outer surface of said body includes threads thereon. 15. The access port of claim 14 wherein said outer surface of said body exhibits a roughened texture such that said outer surface is adapted to encourage bone re-ossification. 16. The access port of claim 11 wherein said body includes at least two rigid portions including a base portion and a collar portion, said septum interposed between said base portion and said collar portion. 17. The access port of claim 16 wherein said chamber is located primarily within said base and said septum is located primarily within said collar. 18. The access port of claim 17 wherein said septum is compressed between said base and said collar. 19. The access port of claim 18 wherein said chamber in said base includes an outlet leading to an extension extending away from a lower wall of said base, said extension having a hollow conduit passing therethrough, said extension adapted to be coupled to tubing, said tubing adapted to extend at least partially toward a vascular structure to which said chamber is to be placed into fluid communication. coupling the chamber to a vascular structure with fluid communication therebetween. locating the port within the hole. rotating said port with said threads engaging sides of the hole in the bone until said body of said port is at least partially affixed to said bone. extending said tube out of a first end of the hole in the bone and aligning the aperture of the port with a second end of the hole in the bone opposite the first end of the hole in the bone.
2019-04-18T19:54:31Z
https://patents.google.com/patent/US20070179456A1/en
A GRIEVING HUSBAND LOOPS THROUGH THE CEMETERY on his daily run to visit his wife’s grave. A grandfather who had a decades-long romance with his wife finds after her death that he can love again. A child decorates a pillow commemorating his father with his dad’s beloved silk neckties. Patricia Donovan-Duff, the founding director of the Bereavement Center of Westchester, in Tuckahoe, NY, has seen people express grief and healing in many ways. Her response is always the same: It’s all OK. There is no one way to mourn. Since opening in 1995, the Bereavement Center has provided a safe place for thousands of people to talk about the death of a loved one. They come for eight-week groups for children and their families at the Tree House, the center’s children’s program. They come for groups for adults mourning the loss of children, spouses, parents, or siblings, and for individual counseling. The non-profit organization also offers educational and on-site support programs for schools and communities. Donovan-Duff describes it as sacred work. It is done by a staff of social workers and nurses complemented by 70-plus volunteer facilitators trained by the center. The main requirement, she says, is to be a good listener. A registered nurse, Donovan-Duff previously was bereavement coordinator for the Phelps Hospital Hospice Program in Sleepy Hollow, NY. She is a founding board member of the National Alliance for Grieving Children, an organization for the more than 300 grief-support programs. The Bereavement Center is a program of Lawrence Community Health Services, which also operates Jansen Hospice & Palliative Care and Lawrence Home Care. I talked with Donovan-Duff about the grief process – a topic that is still relatively new in our culture – and how she came to this calling. QUESTION: When the Bereavement Center was started, there weren’t many programs like it. Did you have a model? Q: It’s remarkable that this field has grown from that one center in Portland to more than 300 today. Q: What is behind it? A: Elizabeth Kubler-Ross had a great deal to do with it. In her book On Death and Dying, she wrote about the stages of dying, which she later changed to phases – coming to terms with death is not a linear process. When I started in hospice work 24 years ago, it was very hard to talk with doctors about death and dying. Today people use words like “die,” and talk about the needs of dying people, like the need to not be in pain and not be alone. Hospice opened that conversation up. The grief movement, I think, came out of the hospice movement. If you talk with someone who went through a death in the family as a child 25-30 years ago, they remember pictures being taken out of the room. The person’s name wasn’t spoken. It was like nothing had happened. We see remnants when our volunteers come in to take training and talk about their experiences. They’ll say nobody ever talked with them. Some weren’t allowed to go to the funeral. Q: What happens when people don’t talk about their grief? A: I think it resurfaces when the next death happens. The psyche can do an amazing job of repressing. But the memory is still there. I think a lot of mental health issues are due to losses that weren’t attended to. Q: What are the biggest concerns of people dealing with the death of a loved one? A: That they’re going crazy. They don’t understand what they’re going through. Grief can be all-encompassing. People think there’s something wrong with them if, five months after a death, they can’t concentrate at their job. But it’s normal. That’s what we say all the time: Everything’s normal. There is no right way or wrong way to grieve. There’s just your way. Grief can be like a roller coaster. You can feel happy, then sad, then happy, then sad. When you’re going through those feelings, you don’t know they’re normal. You feel you should be getting better: better-better-better. But grief is better, not better, better…then you may hit a bottom. The other metaphor is that grief comes in waves: You turn the corner of the A&P, and burst out crying. The second task is to feel the feelings – experience the pain. That’s the hardest part. It’s when you’re missing the person who’s died. It hurts physically. It hurts emotionally. We ask people to tell their story again and again and again. People need to tell the story of someone’s death more than once. The more you tell it, the more real it becomes, and the more you remember. When I had my babies, I needed to tell people the story of everything that happened over and over again. The same thing needs to happen at the end of life when someone dies. Q: How do you help people access their feelings? A: We talk about how you are now. What are you going through? What are your worries and concerns? In talking about what’s going on now, feelings come out. The feelings may be good, but they also may be ones you’re afraid to talk about, like guilt or regrets. Sometimes there’s ambivalence. It might not have been a great relationship. Everybody is different. Sometimes families don’t understand the reactions of different children. One child is crying, the other’s not. We’ll ask, what were they like before? You grieve in character. If you were a crier before, you’ll probably be a crier now. The next task is to learn to remember, to commemorate the person who died, in your own way. You might put up a small shrine with pictures and candles. You might have pictures next to your bed. You might go to the cemetery. You might wear a heart necklace with with a photo of the person. Every way is OK. In a group I ran years ago, there was a young widower with little children. Midway through the eight-week group, he felt safe enough to share how he remembered his wife. He said, “I’m a runner, and the cemetery is in my town. Every morning, I run, and I go to the cemetery, and I lie down on her grave.” There was quiet in the room. He looked around the group. He knew he was revealing something that could go either way. Were people going to say he was crazy? And the group said, “Oh, that’s so wonderful.” He had such a sense of relief. When somebody dies, there’s a real fear that you’re going to forget them. You’re going to forget their voice, what they look like. In the beginning, when someone has just died, you think, “Where the hell are you? Where did you go?” Even if you believe in heaven, you ask, “Where are you?” One of the goals in grieving is to bring the memory of the person inside your heart. In the beginning the memory’s too painful – you can’t bring that person inside you forever yet. But eventually, they’re just with you. Q: We live in a culture that goes so fast. How do you help people slow down and hear what’s going on inside them? A lot of this is common sense. But I think in many ways, we as a society have lost our connection with our instincts. We don’t trust ourselves. We tell people, “Trust your gut that you know what you need. If you need to stay home from work one day because you just need to cry or go to the cemetery, do that. It’s OK.” It’s like taking an antibiotic. Attend to your wound. This doesn’t get better by itself. It doesn’t get better with time. It’s what you do with that time. The next task is to start to reinvest in the world. The focus is less on the person who died and more on you. You learn who you are without this person who died. People are different after a profound death. It changes them. They can become better people. They can learn through that process and grow. Q: Are there things that people have said, who have come out the other side of mourning, that have stuck with you? A: There was one wonderful man who came in after his wife died. They had an amazingly close, storybook relationship. He was grieving her so intensely. He really wanted to die some days. He wasn’t going to do anything with that feeling – he had grandchildren – but that’s how bad his pain was. He went to the cemetery every single day. I never would have imagined that he would have a relationship with another woman, but, today, he does. He’s never going to marry her. His wife was his one true love. In his wildest dreams, he probably never would have envisioned that he would be enjoying life again. He still misses his wife, and always will. But he’s different now. We’ve had people who have come back to volunteer at the center because they want to give back. I’m in the middle of a volunteer training right now. It’s amazing. The world just stops: We’re talking about death, dying and grief. There’s such silence and presence. Our goal is to teach volunteers how to be present. One of the nights of the training is about sharing a loss that you’ve had. We do a guided meditation, then divide into groups of two. For half an hour, the two people tell their story to each other. We then come back together and talk about what it’s like to have somebody really listen to us. Some people have never experienced anything like it. Our world today is so much about phones and computers and multitasking, we’ve forgotten how to be present for someone. The biggest gift you can give anybody is to let them know that you hear what they’re saying. “Our goal is to teach volunteers how to be present…. The biggest gift you can give anybody is to let them know that you hear what they’re saying. Q: What kinds of rituals do you use to help clients open up? A: Simple rituals. At the beginning of every session, people introduce themselves saying, “Hi, my name is ___, and my mom died.” It’s a ritual of articulating the death and accepting the reality. For children, this can be really hard. They may not want to say it. They can pass. There’s also a checking-in about how the week has been. Our rituals are more focused at the end of the group. One of our goals in these eight-week groups is teaching them all, children through adults, how to deal with loss. Hopefully we are planting seeds that they can use in the future. We have a goodbye ritual the last night. In the adult group, it might be having stones on a plate. You take a stone, hold it, and say a wish for yourself and a wish for the group. The stone will be passed around, and everyone will touch it and bring it back. It’s a way of saying goodbye to each other. In the Tree House, with the kids, we have a ritual at the end called the Memory Pillows. We start with blank canvas pillow cases. We put pictures of the person who died on the pillow case. For the last three weeks, the kids decorate the pillow cases in their own individual way. They draw pictures. They write letters to put inside the pillow. One little boy decorated his with his dad’s neckties; the dad had a magnificent collection of silk ties. Then we put pillows in and close them up. On the last night, we put up a painting of a tree on a big drop cloth. We’ll remember each person who died. The family will come up and hang their pillow on the tree. By the end we have a huge mural. In a very visual way, the kids see that they’re not the only one going through the death of a loved one. They see they’re all different and have done this work in different ways, and it’s all right. It’s good to remember, any way you want to remember. Q: In what ways is this spiritual work? A: It connects human beings on such a very, very basic level. I consider that sacred work. I think that’s what this world is about, being present and connecting with people. A: I became a nurse because I wanted to help people. Q: When did you first feel that? A: As a kid. I was raised Catholic. Along with the guilt – which everyone talks about – being raised Catholic made me want to be a better person. I always knew I’d be in a helping profession. I wanted to be a nurse all through high school. I liked healing, the hospitals, the white uniforms. I loved being in the middle of crisis and being with people. When I went to college, I majored in nursing. They were just starting nursing degrees. I discovered psychiatric nursing, and thought, “Whoa, this is great.” I loved it. I was drawn to it. I think I was also drawn to death. I was scared of death when I was young. There were no big deaths in my family. But my best friend died when I was six. She and I had measles at the same time. This was before the vaccine. I recovered, but she died. I have this memory of being in a dark room – when you had measles they kept you in a dark room – and emerging and asking, “Where’s Mary Elizabeth?” “Oh, she died.” I didn’t go to the church for the service. I’ve always been the kind of person that, when I’m afraid of something, I don’t run away from it. I go to it. I want to figure it out, so I won’t be so afraid of it. When I graduated from college, before becoming a psychiatric nurse, I worked for a year on an oncology ward of a hospital. Patients died every day, alone, in pain, in a very sterile setting. I remember going into the med room and just crying. Q: Did you think you’d wind up where you are now? A: No. Never. It’s been a process. Two big things that I’ve learned in the work that I’ve been doing the past 12 years – and I’m a different person because of it, I believe that – are the value of being totally present to the moment and that life is a process. Grief is a process, and life is a process. In a way, I feel everything has led me to this. I was a psychiatric nurse for years. One day, when I was working at St. Josephs Hospital in Yonkers, I was having a conversation with the social worker, and he said, “You know, my wife’s starting a hospice program at Phelps Hospital. Are you interested in a job there? They need a nurse.” It was pure coincidence. That year on the oncology ward was so horrible. Part of me thought I would go back to that and try to help make it better. I interviewed and everything fell into place. It was the infancy of hospice. It was all very grassroots. It was wonderful. We relied on volunteers. We had a chaplain. We brought in visiting nurses. I learned how to work with volunteers. I learned how to work on an interdisciplinary team. It taught me a lot about starting a program. I took a break at one point to spend more time at home, but continued to work with the hospice. Then Phelps asked me back to start a bereavement program to support families of hospice patients. We networked with other bereavement programs. One day I went to a talk at Jansen Memorial Hospice, and the chaplain approached me and asked, would you like to be a director of a new program for children and adults? They saw a need to bring bereavement work not just to people with loved ones going through hospice, but to the community at large. They felt there was a lot of unattended-to grief in the community. I thought about it long and hard. I never aspired to be a director of a non-profit, with the fund-raising and administration. But I took the job. It’s been an incredible growth process to build something from nothing. Q: Do you have things you that you do for yourself spiritually? A: I do yoga. Not as much as I want to, but I love it. When I get up in the morning, I have a semi-meditation to try to center myself. I get my cup of coffee and sit in my living room and try to be still for five or 10 minutes. Q: And you get spiritual experiences in your work. A: Absolutely. Usually every day there’s a moment – we call them moments – when we’re working with people, or working with volunteers, and you make a connection. It’s a gift. Q: Has this work changed your relationship with death? A: In a way, I think I’ve befriended it. I don’t want to die, but I now know I don’t have to die in pain, that I don’t have to die alone, and that millions of people have been through it. We don’t know what is on the other side, but I have faith that there is something. A: I try to keep a sense of balance in my life. A stable home life has helped me a lot. It helps me turn work off when I leave here. The times that are hard are when there’s not balance. Something is happening at home and my equilibrium is off. I have worked with incredible, amazing people with sad, sad stories. But I find that when I’m right there with them, things come into focus. It becomes clear that what a grieving person needs is someone to just sit with them and listen to them. What we do is very simple. We’re not trying to fix people. We don’t have the pressure of trying to make things better. We offer our presence. We listen and validate. We try to help people not feel so alone; there’s a healing when that happens. I don’t think everybody can do this work, just like not everybody can be a social worker or a doctor or nurse. But those people who can do it, and do it for a long time, can have a very full life. This is work that makes you pause and appreciate what’s important. The best part is to see someone when they are so fragile and so raw, and then see them a year later and they are so different. That’s why I don’t get burned out. I see the resilience of life, that people do go on. ← I’m back with a guest blog on clearing clutter with compassion…..
2019-04-26T11:51:48Z
https://frandorf.com/2015/06/22/in-honor-of-a-thoughts-on-bereavement-from-someone-who-knows/?shared=email&msg=fail
Autumn Greetings Sugar Pies!! It is officially Fall at my house! Yay!! I know that y’all love this time of year as I do! There is so many delightful things to look forward to and to be thankful for! 1. Sipping hot spiced cider on a blustery, apple-crisp afternoon. 2. The way my house smells when I’m baking Grandma’s Gingersnap Cookies. 3. Hayrides with my family at the pumpkin patch. 4. Feeling joyfully domestic as I cozy up my home listening to the Little Women Movie Soundtrack (an instant mood lifter!). 5. Delighting in simple things like little orange pumpkins sitting in a neat little row. 6. Tasting sliced green apples dipped in warm ‘n’ buttery caramel sauce. 7. Feeling the soothing warmth of a crackling fire. 8. Eating pumpkin pie with a dollop of fresh whipped cream. 9. Candy corn and peanuts. 10. The sweet aroma of wood smoke in the brisk evening air. 11. Watching the leaves swirl and twirl in a gust of wind as I drive along a country road. 12. Gazing in awe at a big butter-yellow harvest moon. 14. The way the light turns a golden-honey color at the end of the day. 15. Warming my family’s tummies with a steaming bowl of my mom’s Chicken soup with fresh grated Parmeasan Cheese. 16. Going to hometown craft shows with a friend. 17. Wearing my Ugg boots and colorful knitted scarves. 18. Looking forward to Thanksgiving and Christmas! 19. Antique Road-trip adventures with my sister-in-law Linda. 20. Decorating my house for Fall!! I so enjoy decorating for the seasons! It brings such cheerfulness into our daily lives. It revives and awakens our hearts to the glory of God’s creation and His faithfulness. Little touches of seasonal beauty placed thoughtfully throughout our home adds a sense of celebration, warmth and welcome to our loved ones. Galations 6:10 says ” Be mindful to be a blessing”, as homemakers, making our home feel cozy and delightful blesses our family! Every home needs a woman’s nurturing touch, it sends a message of love and care to all who enter it. It’s a troubled world out there and that’s all the more reason to make our homes a place of comfort and joy. Oh girls, we must never underestimate the significance of our role as a homemaker…we set the stage for our family’s sense of belonging, safety and well being. Ever since my hubby carried me over the threshold, 31 years ago, my passion was to make our home the sweetest and happiest place to be. That is still my passion. Decorating for the seasons is a tradition in our household, it’s something that my four children always looked forward to. I have found that even when I didn’t feel like it, once I got started and began changing things around, festooning the fireplace mantle and staircase, my creative juices starting bubbling up like soda pop! It’s such a refreshing feeling to stand back and see the delightful transformation that just a few touches can make. It’s because beauty inspires! When we make the effort to cozy up our home and fill it with an atmosphere that glows with the celebration of the season, it is a gift to our family and those who come to visit. It’s those extra little things we do, to create a feeling of warmth and whimsy, joy and goodness, that communicates a message to our family that says: you are loved and it is my pleasure to make you feel nurtured and cared for. It’s a message that hugs the hearts of those we love and it gives them a delicious affection for home. Remember we are planting seeds in everything that we do…plant happy moments and harvest a lifetime of happy memories. It’s harvest time on the farm, the “frost is on the pumpkin” , the apples are ripe for pickin’, and there’s a pumpkin pie freshly baked just for you! Y’all come on in now and take a peek inside Sugar Pie Farmhouse…. Come on into my kitchen and see how I gussied up my little lamp shades by hot-gluing a strand of pom-pom fringe around the bottom edge. Freshly Baked Pies: This is a favorite sign of mine that I love to bring out each Autumn. Pumpkin pie and Fall just go together! I attached a small white plate on the top of my two candlestick holders to support the pumpkins. Just a loop of duck tape…sticky side up…was all I needed to hold each plate on. I just wanted a temporary fix, that way I can use them another time to hold candles again. My chalkboard…which is actually an old twin size headboard…comes in handy all year long to declare the change of the season! This year my theme is “Harvest Home”. Everything in life is based on sowing and reaping. We will harvest what we plant. So girls, let’s be careful to only plant goodness, kindness, love, mercy, forgiveness, joy, peace, blessings, faithfulness, honor, patience, creativity, and thankfulness! I’ve been using chalkboard markers for a couple of years now and they are so fun! The best way that I have found to wash the board clean is with Mr. Clean Magic Erasers! They work great! Dear little pie pumpkins (from the market) sitting on a shelf, are such a simple and sweet way to add a festive holiday feeling to your country kitchen. It’s a very clean look! A few weeks ago, I squealed like a little pink piggy at feedin’ time when I found this old sign leaning up against the front of a local antique mall. It was old and chippy, and the letters were hand cut and homemade. EEEEEK! And how cute is this name? Cedar Hill Farm! The cherry-on-top was the owner came way down on the price! Woo hoo!! When I was dragging it in the house my hubby looked at me like Ricky Ricardo looks at Lucy! (He actually calls me Lucy…a lot…especially when I’m bringing in junkin’ treasures or getting myself into pickled predicaments.) Happily he loved the sign! I’m am so thankful for a hubby that allows me to express my decorating ideas throughout our home! He loves me. Helpful Junkin’ tip: Before I put the sign in my car to bring home, I asked the Antique store clerk if I could use their broom to sweep off any cob webs and critters. I’m so glad I did! There were two BIG spiders, and a fuzzy caterpillar (in the loop of the “a”) plus a lot of dirt. Actually keeping a small broom in the car when you’re out junkin’ is a good idea! I also had 2 small blankets to protect the trunk of my car. Anti-bacterial handwipes for grungy hands are a must too! Galvanized pails…one spilling out pumpkins and the other sprouting branches. I mixed some natural branches from our woods out back with some lighted ones that I got at Target last year and this year at Kirkland Home. Adding the lighted branches was my daughter Ashley’s idea…it really brightens up the mantle with a oh-so-festive glow! Now I’m just waiting for the weather to cool down enough to light a blazing fire! The dried corn in a vintage feed bucket was found very inexpensively at the local Feed and Farm store. When I change my decor to Christmas I’ll bring the corn cobs outside to feed the squirrels a lovely and bountiful Thanksgiving feast! This weathered milking stool was a sweet find right here in Branson, Missouri! It’s sturdy and heavy and looks like it was well used milking Ol’ Daisy the cow! And brought safe home, every load. This “Old Kentucky Home” scale was just $12.oo at a flea market in Springfield, MO. It’s mounted on a worn board and was probably used at a farm stand where it would need more support when weighing those heavy baskets of fresh picked peaches and apples for Grandma’s preserves and pies! (That sounds like a good story to me!) That reminds me…do y’all ever look at a darling rosy-cheeked-snow-haired-grandma and think She looks like an Emma Pearl and I bet she makes the best peach cobbler EV-AH! Or am I the only one that does that? Lol! I like to mix fresh pumpkins with pretend ones, it’s easier on the budget ( the faux ones I only buy once, where as the fresh I have to buy every year). Mixing the two makes them all look fresh picked. But I’m not thinking of the corn, I’m thinking pumpkin pie! My living room fireplace mantel during the day…. And at night! Adding white twinkly lights always makes a room feel festive. It landed on my head! to you for healing and rest. and it’s more than a palace to me. When the frosty north winds begin to howl it will be time to curl up with a mug of hot cocoa and good book! In this little cozy nook…an armoire turned book shelf… I created a mini library. Books for browsing stacked high…glowing lamplight…a vintage clock sitting close by with a soft and soothing tick-tock sound. A yummy candle brings instant cozyness! Well gals, the very best thing we can decorate our homes with is our cheery Farm-girl smile (with or without red lipstick!) Let’s honor our family by taking care of our home, keeping the “Home Fires Burning”, and looking for ways to be a blessing with a loving, joyful attitude! Being joyful is a choice. When we make our mind up to think positive and count our blessings the feelings will follow! A thankful heart is a happy heart! (I’ve never seen a grumpy thankful person!) Set the stage for happy results by turning on endearing music, put on a cute apron, simmer cinnamon, cloves and orange peels in a pan of water or light a scented candle to get the house smelling delicious, fill the cookie jar, clear the clutter and make room for your own unique and nuturing womanly touch to brighten every corner of your dear sweet home. P.S. I said this last year and I’ll say it again…Please know that I go a little overboard when it comes to decorating for the holidays….it’s a passion of mine…I just get giddy about it …..but you know what, a simple pumpkin on the kitchen table, a bowl of apples or a crayon drawing of an autumn leaf colored by your child to stick on the fridge is just as exquisite as anything. Sometimes it is the simple things that are the most beautiful. I share my ideas to hopefully inspire you not to overwhelm you. I just want to encourage y’all to embrace the beauty and excitement of the season in whatever way fits you, your home and your life. Just celebrate! Life is good but it’s short. You are in my prayers and you are loved! Your home looks just gorgeous! I really miss that beautiful fall weather back home and reading your blog always makes me feel better! I even featured you in my weekly post today! I hope you’ll stop by! Thanks Aunt Ruthie! Ruthann, that is the prettiest fall decorating I have ever seen. I have just recently been introduced to your website by an old friend. I really thoroughly enjoy reading your blogs and especially seeing photo’s of the ways in which you decorate your home. I am an interior designer and tho my home is decorated lovely, I have forgotten what fun it is to put seasonal things around. I do for Christmas but you put me into the Autumn mood and I bought some pumpkins and gourds and am doing things with more zest and the way I used to.. When I was much younger, I truly did all the charming things you do and it has made me realize that I need to keep doing that as it brings such cheer to me and the people around me. Most of all, I love your spirit and kindness. Thank you for being there to keep us on track with things we did years ago and reminding us that it is such a charming thing to do. Also thank you for being you! Thanks for your posts! They are so fun to read and inspire me to be a better mother and wife. You’re amazing, I hope you know that! OMG, I am so in love with your beautiful home! Your decorating ideas are fantastic. Soon, I hope to have a place to have my junky and beautiful decor displayed as well…..thank you for sharing with us!! i just come back to your site repeatedly just to look at your wonderful decorating! your kitchen is my dream! SOOOO beautiful!!! your posts ALWAYS inspire me…i started harvest decorating about a week ago..but now your post just makes me want to take it to new limits! thank you..i just adore your blog! Ruthie ~ what lovely photos of your Autumn Nest; beautifully cozy!! I especially embraced the end of your posting Ruthie which stated how a simple hand scrawled crayon materpiece brings in the magical Season of Fall’s Harvest Blessings ……. how encouraging of you to see that your gift of decorating might very well overwhelm the timid of heart, but, to grace a wee corner of a kitchen with simplicity most certainly turns any house into a haven of rest….Change of Season Style!! You are gifted not only in decor, but, also in the written word Ruthie….you’re a lovely “encourager” for certain! Oh wow! You and the first cool front of the season have put me in the mood for decorating!!!! And your ideas just blow me away! I thank my good fortune for having landed on your site (while looking for transferware bowls I spotted in the October 2003 issue of Bon Appetit!)! The virtual walk through your autumn wonderland is such a delight, I shall have to return here, over and over again. I just LOVE it all Ruthann! Love, love, love your Autumn decorating style!!! Everything looks wonderful!!! What a wonderful and warm post to get the creative juices flowing! Love the poetry and photos! A lovely place to visit; thank you. LOVE IT! we live in a half log home (which we have big plans for!), and this is in so many ways just what i wish i could do to my house! love your creativity!! it looks sooooo cute and cozy! Have a lovely, lovely Fall! You mentioned in a previous post that your plaid wool curtains are actually blankets – where on earth did you find them?! I love your blog it is one of my favorites. I would like to give you the Lovely Blog Award please contact me . I will be posting about it soon. You can go to my blog to copy and past the blog award for your blog. Im working on the post now. Keep up the great work. I really do love your lighted branches. My wife bought some recently, and they add a simple elegance to the living room. Plus, they’re lights, and sometimes having just a bit more light in a room goes a long way. My wife found our branch lights at a great online store called WorldToHome.com. C’est toujours un réel plaisir de regarder votre blog ! il est merveilleux…. Merci pour tous ces “moments de vie” si chers à notre coeur. Votre blog a un côté nostalique des années 50 et de l’Amérique profonde… c’est fabuleux ! Les photos sont magnifiques et font rêver ! ps : I’m not very fluent in english language, so, I hope you ‘ll understand me…. Just love your fall tour…thankyou. Would you be kind enough to share as to where you track down your vintage photos of family, gals, etc. I’d love to frame a few in my rooms -without the Sugar Pie Farmhouse on it. Hi. I have enjoyed your blog for awhile now. You are a great inspiration. I especially enjoy the pictures of your home. We are considering building a house and I was wondering if you would share your house plan name or where I might purchase it? I love your pantry! We have 6 children and are going to Africa soon to pick up 3 babies that we have adopted. I would like a bigger kitchen and a nice place to put all the additional food I’ll be buying! And yes, you live in a beautiful area. My daughter attends Evangel University in Springfield so we get down your way quite often. Thanks for the great blog and words of encouragement! I keep coming back: can’t ever get tired of seeing your beautiful home! Love your home, and your spirit!!! We live in Missouri also (north of springfield). I feel like we are kindred spirits. I feel the same way you do about my home but do not have the talent you do at putting it all together, nevertheless you have inspired me!!! I love your cupboard that is in front of your pantry and the beadboard in your pantry too!!! I just wanted to let you know I am so glad you are still doing this blog. I found you 3 or 4years ago while doing a Google search for aprons (I’ve always just loved them, they make my hart go pitter patter) and decided to put you in my favorites. I didn’t know to much about blogs but loved how you had old fashion values and loved how you decorated for fall and the holidays. Periodically I stop by to see what you have been up to. Well last January my husband and I, had a chance to buy a home with 2 acres here in Las Vegas, and all I could think about was, finally I can get horses again and also have my big garden that I’ve always wanted and an orchard of fruit trees and nut trees. I remembered your blogs and visualized myself canning fruit in the kitchen and taking it down to the basement. IT EVEN HAS A BASEMENT (and that’s unheard of here in Vegas). We just fell in love with the place. Well we got it in April and have been busy unpacking cleaning and getting organized. We’ve planted 50+ trees around the perimeter back in spring, and just purchased 14 fruit trees just to get us started with the orchard, and 100+ bushes for around the house. After seeing your blog today I can’t wait to go down in the basement and get my Halloween bins and start blessing my family with wonderful decorations. I’ve been organizing and cleaning so much that I hadn’t taken the time to decorate for fall/Halloween. Also we have a 4yr old and a 21month old, so to get anything accomplished is a miracle. But I wouldn’t change it for nothing. I love my babies and husband so much. I am so blessed to be able to stay home with them. I just wanted to thank you so much for inspiring me. A couple weeks ago it started to cool off for us so I can’t wait to use one of my fireplaces. O yah, I forgot to tell you, the house even has 2 REAL fireplaces. One looks like it should be up in your neck of the woods. Can’t wait, can’t wait, can’t wait!!! Thank you so much for this post. After thirty years of marriage I am now the single mom of two teenagers. Money is very tight, but seeing these pictures yesterday inspired me to decorate for fall. Thanks to your inspiration, I was able to bring some things out and make our home look festive. My thirteen-year-old daughter came home from school and remarked, “Mommy, I really like how you decorated the house for fall. I noticed!” Her comment made it very worth it! As the Lord heals my heart, I’m trying to be grateful for my blessings. One of those blessings is your sweet spirit. Thank you! Love your website. I’m from New England, have lived in Colorado for 26 years. I miss the fall colors, smells etc. Where do you get your fabulous necklaces? I’m so glad I found your blog! You are such an encouragement and I really love your positive outlook on life. Thank you and I look forward to seeing more from Aunt Ruthie. My goodness – my computer died, I lost all my favorites — but when we hooked up the new one, the first thing I did was check out your website – it was certainly worth the wait! We are retired military, stuck out on the east coast. We are one of the “lucky” ones with a house on the market….waiting…waiting..waitng.. to sell it and move back home to the midwest. Every time I see your blog, I feel a little bit better and a little bit less homesick! We spent our honeymoon at Branson, and took the children there just a few years ago. Thanks for the pictures and bringing back such wonderful memories. God bless you and for bringing such dignity and grace to homemaking. Aunt Ruthie, I sure enjoyed seeing Silver Dollar City again. I am a transplanted California girl (here since 1965) but I luv-v-v- the midwest. Friendly, simple times and beautiful change of the seasons. But CA is my home and I love it, too, especially my hometown!! My hubby and I really enjoyed S.D.C. about 20 years ago and would love to go back. Thanks for the great photos and my trip back in time. I love your blog and so does my “baby” girl, Mindi, whom you met in your last trip to CA. God bless!! You are such an talented person! I love the way you inspire my heart with a desire to be blessing to my family!! Have you seen the ‘keep calm and carry on’ prints before? I love the way you decorate your home. It is a real treat to see your ideas for fall. Whis I could find some of the things you did but live in a city now and no treasures to be found. Is there any way you might offer things to buy for the holidays for the rest of us. Living in Bakersfield, Ca. All I can say is “WOW”….so creative…. this definitely gets me in the mood…since I started working full time 1 1/2 years ago I’ve neglected my decorating for the seasons….your post reminds me of how important it is for my children. I have 4 days off next week and guess what I am gonna do? Decorate for Fall! Thanks for the reminder to make my home a sanctuary. I enjoyed your web-site very much. I loved what you said at the end about not meaning to overwhelm…it was very thoughtful. My visit here did exactly what I think your aim is…it warmed my heart and inspired me to want to make my home “hug” all who enter. Plan a visit to Springfield very soon. Which flea market is a good one? Are you an interior decorator? Normally, I do not like country kitchens, but you could convert me. Your vignettes are wonderful, and they just make me want to come for a cup of coffee. I want to learn how to do vignettes, but they never come together in a way that is warm and inviting. Thanks for the inspiration. my large building and with this very hot summer i am ready for a change.thank you so much for this i needed a kick in the pants to get me motivated. My name is Meghan Scholl and I am an intern at the American Profile Magazine based in Franklin, Tenn. I am currently working on an article for Thanksgiving decorations and I came across your blog. I was wondering if you would like to be a part of our article with your top 3 – 5 favorite Thanksgiving decorations. You will be credited and your blog will be mentioned. Please feel free to visit our website at AmericanProfile.com. I look forward to hearing from you and reading more from your blog! Hi. Ive just found your lovely house for Autumn and I hope I can find one for winter. Its so nice. We , here in Scotland dont do so much for Autumn but im going to make an extra special effort now. Thankyou. Your words are beautiful and inspring, and speak right to my heart, and I know to the hearts of many good ole home grown country girls like myself. You have a great gift! Thank you for sharing it with me! Hi! Love your house!! I was wondering if you made your “Freshly Baked Pies” sign yourself or if it was purchased somewhere? You clearly put as much passion into decorating your home as you do blogging about it. I enjoyed your post immensely. Thank you for sharing your talents with us! Thanks for all of the wonderful options to make a house really feel like “home”! It’s nice to feel like I can create, there’s nothing like the good old days, feeling. qyzgwtvhbsqjfgbsnipvtf/dpn, Online blackjack secrets, HZCHQCB. I LOVE your blog page! I’m in the process of planning on designing the buffet table at my sister’s wedding (Nov. 2nd). She wants there to be a “fall” theme and I found some really great ideas that I could adopt and possibly make It work. THANKS! I’ll be back!!! Just absolutely wonderful. Thank you! Wow, what a fabulous post! I absolutely loved it and can’t wait to share this. Thanks, Ruthie and Happy Fall! a lot of the subjects you write in relation to here. Again, awesome web site! I’m working on a blog post of inspiring fall decorating ideas, and I’d love to include your Autumn Home Tour in my post. Would you like to be included in my round-up? I’d use one image from your post and have a clear text link leading back to your post. It may also be used in a pinnable graphic. Let me know when you get a chance – thanks so much! I was so blessed reading all of your postive outlooks on this beautiful season! I love the joy that I sense and What a great reminder of being the blessing our family needs in our own homes. Blessings to you!
2019-04-25T01:52:38Z
http://www.sugarpiefarmhouse.com/aunt-ruthies-autumn-home-tour
Mitchley (O'Rafferty 61), Gregory (Parker 69). The Stags looked to continue their good pre-season form against Division 1 side, Tranmere Rovers, who were making their first visit to Field Mill since being thrashed 6-1 by the Stags in Division 1 in 2002. It was a tight game with both defences being on top and having the better of the match. Mansfield unluckily fell behind in the first half to a deflected goal from Ian Thomas-Moore. However, the Stags dominated the second half and, with the help of the substitutions, wore Tranmere down for Kyle Nix to eventually score a well worked equaliser with five minutes to go. They could then have gone on to win the game with new signing, Keigan Parker, missing a good chance with a minute to go. The Stags lined up with Alan Marriott in goal. Gary Silk and Paul Stonehouse started at full back with Tom Naylor and Steve Foster at centre half. Gary Mills and Bradley Munn were playing in midfield with Louis Briscoe on the right and Adam Smith on the left. Triallist, Danny Mitchley, was given a chance to impress up front alongside Lee Gregory. The two new signings, Keigan Parker from Oldham Athletic and Tyrone Thompson from Torquay United, were both on the bench. Tranmere put out a strong team with eight first teamers and three triallists, Matt Hollyoak, Nick Wood and Bakary Bojang. Ten of Tranmere's team had started in their 2-0 victory over Forest on Wednesday night. David Holdsworth made some changes to the defence at half time with Neil Collett replacing Alan Marriott in goal and Mark Preece and Chris Smith replacing Tom Naylor and Steve Foster at centre half. Eight minutes later, further changes were made when Paul Stonehouse, Gary Mills and Louis Briscoe were replaced by Kevin Sandwith, Kyle Nix and Ashley Cain. Tranmere nearly increased their lead at the start of the second half when Bojang hit the bar with a free header from a corner. Mansfield's first chance of the second half came after 55 minutes when the Tranmere keeper failed to clear Gary Silk's cross to the far post. Danny Mitchley was following up behind and did get his head to the ball but it went wide. A minute later, Kyle Nix shot wide of the goal from the edge of the area. Adam Smith and Danny Mitchley were then replaced by Ryan Williams and Niall O'Rafferty. The introduction of Nix and Williams meant that the Stags started to pass the ball a lot better and started to look more dangerous going forward. This produced a free kick when Gary Silk was fouled on the right. Kyle Nix curled in a cross with his left foot which was headed wide by Chris Smith who looked cross with himself for not scoring. With 23 minutes to go, there was a cheer from the Stags fans as we got our first look at new signings Tyrone Thompson and Keigan Parker. They replaced Bradley Munn and Lee Gregory. Neil Collett came out of his goal quickly to make a vital clearance from Ian Thomas-Moore. The Stags finally equalised with around five minutes to go. Gary Silk won the ball on the right and passed the ball inside to Ryan Williams who knocked it inside again to Tyrone Thompson. Thompson played a lovely ball to Ashley Cain on the left who ran forward and played the ball back across to Kyle Nix on the edge of the area who smashed it into the back of the net with the aid of a deflection. The Stags then charged forward for the remaining part of the match with Ryan Williams playing a major role and were unlucky not to score again. Firstly, Ryan Williams escaped on the left and crossed to Keigan Parker who pulled the ball back to create space for a shot. Unfortunately, he could not get much power on the shot and it was deflected wide. Kyle Nix then curled in a dangerous cross before Gary Silk was replaced by John Leonard. It was then Kevin Sandwith's turn to surge forward after he had intercepted a Tranmere clearance. He played the ball down the left to Ashley Cain who was fouled on the edge of the area. Kevin Sandwith took the free kick and his cross beat everybody at the far post. Parker chased after the ball, kept it in and laid it back to Ryan Williams whose cross was scrambled away for a corner. Ryan Williams took the corner and Chris Smith laid the ball back to John Leonard on the edge of the area who smacked it at goal but his shot was tipped over the bar by the Tranmere keeper. The corner was cleared to Ryan Williams whose curling shot was cleared for another corner but the Stags could not find the winner and the referee called a halt to an entertaining finale to the game. Alan Marriott – Made an excellent save in the first half and had no chance with the goal as he was beaten by a deflection. Gary Silk – Defended well throughout the game. Nobody got past him. Got forward well in the second half. My Man of the Match. Tom Naylor – Looked the part once again. Brought one Tranmere attack to a halt with a superb tackle. We are going to enjoy watching him this season. Steve Foster – Won everything in the air. Gives me confidence that our defence will be stronger this season. Paul Stonehouse – Looks very good at left back and probably has the edge over Kevin Sandwith at the moment. Louis Briscoe – Made a few surges forward and put in one dangerous cross but is not at his best yet which may not be a bad thing. He peaked too early last season! Gary Mills – Not as good as against Forest but worked hard to try and get the Stags going. Bradley Munn – Worked hard but does not look quite ready for the first team. Adam Smith – Looked lively and was fouled by the Tranmere defenders on at least three occasions. He will win plenty of free kicks when he attacks the opposition. Danny Mitchley – Had one good shot from the edge of the area but did not have any real chances to score. Lee Gregory – The same applies to Lee Gregory. Well marked by the Tranmere defence. Chris Smith – Looked good once again in the defence and nearly scored with a header. Mark Preece – Solid game in defence. I would have liked to have seen him bring the ball forward out of defence a little more when there was space in front of him. Kevin Sandwith – Did not put a foot wrong. His best game to date. Kyle Nix – Played well when he game on and took his goal well. Could be a big player for the Stags this season if he stays free of injuries. Ashley Cain – Another lively appearance off the bench. Could sometimes do better with his final ball but that applies to most wide players! Ryan Williams – Made a big difference once again when he came on. Popped up everywhere to keep the ball moving. Combined well with Nix and Thompson in midfield. Niall O'Rafferty – Did not have much chance to shine but could be a useful player to bring off the bench when defenders are getting tired. Keigan Parker – Has plenty of confidence and looked dangerous. Should have scored. Tyrone Thompson – Wanted the ball and was involved in the equaliser. Looks promising. John Leonard – Only came on with about three minutes to go. Nearly scored with a shot from the edge of the area. I would like to see more of him. Naylor - Very impressive; crunching challenges. Joint man of the match. Stonehouse - Looked alright; very one-footed. Briscoe - Looked reasonable. This needs to be his season. Mills - Alright; one particularly good pass. Munn - Excellent. Tremendous work-rate, bags of energy, harrying. Looks ready for first team on today's evidence. Joint man of the match. Adam Smith - Confident. Looks a proper footballer. Quality. Mitchley - One good shot, but otherwise didn't look like scoring. Collett - Did well, like Marriott. Leonard - Very late sub at right back. Good shot in last minute. Chris Smith - Looks quality. Nix - Played well. Deserved his goal. Thompson - Saw a lot of the ball. Williams - Good and sensible distribution. O'Rafferty - A bit clumsy. Poor first touch. Raw. Not ready for the first team on this half hour of evidence. Parker - One shot on the turn and nearly scored. Not involved much apart from that. 15 A great tackle by Tom Naylor, following an earlier fine tackle. Naylor is making an impressive start to the game. 17 Good shot from trialist Danny Mitchley, just over the bar from 20 yards. 26 0-1 A soft goal as a deflection from Ian Thomas-Moore's shot gifts Tranmere the lead. 30 Two bad fouls by Tranmere's Labadie in two minutes. Both of them sliding two-footed with studs in the air. Should have been sent off. 35 The Stags best bit of play so far: a long ball from Mills to Gregory, then to Adam Smith who is fouled. Briscoe's free kick is held under his own bar by the Tranmere keeper. 47 Terrible Stags marking from a corner, and a free header for Tranmere's Labadie hits the bar. 67 Chris Smith header is wide from a Nix free kick, following good link up play between Silk and Cain. 85 1-1 Nix equalises with a shot from the edge of the box. 88 Good play from Williams and Keigan Parker shot just wide. 90 Great shot from trialist John Leonard, just on as a sub, tipped over the bar by the Tranmere keeper. The Stags played some very nice football, on the floor, especially in the second half. It was impressive considering the quality of the opposition from the Championship. The Stags could have had three or four goals in the last 30 minutes. Youngsters Tom Naylor and Bradley Munn were tremendous. On this showing, the Stags have four really good centre-halves, and bags of cover at full back and in midfield and on the wing. However the balance of the squad looks slightly wrong with not enough strikers and too many midfielders/wide-men. There seems not enough cover for Duffy and Parker. I can see the Stags playing nice football, not conceding many goals, but not scoring enough goals. KYLE Nix's deflected 85th minute effort stole a deserved draw for Stags at home to League One Tranmere Rovers in the latest pre-season friendly this afternoon. It was the perfect way to mark his return to the fold after Nix's trial at Sparta Rotterdam failed to win him a contract this week. Ironically his strike evened out a deflected effort for the visitors by Ian Thomas-Moore. True, the Stags didn't provide a real test for visiting Faroe Islands international keeper Gunnar Nielsen until Nix's goal. But they bossed the second half possession and again showed the home fans some neat moves to give hope for the new campaign. And sub John Leonard almost grabbed a late winner but was denied by Neilsen. Thomas-Moore had scored the opening goal on 27 minutes after Alan Marriott had earlier saved well from the abrasive Joss Labadie while Bakery Bojang should have buried a free header just after the break but hit the bar. However, after that the visitors spent much of the second half penned in their own half defending their advantage until Nix struck to ensure the day ended all square. Stags gave a first start to promising youth team midfielder Bradley Munn as well as central defender Tom Naylor, striker Lee Gregory and on-trial ex-Blackpool striker Danny Mitchley. New signings Tyrone Thompson and Keigan Parker were on the bench as was midfielder Kyle Nix, back in the fold after his trial at Sparta Rotterdam failed to end in a contract. Both teams failed to capitalise on flicked-on early corners while Nielsen had to punch away a dangerous cross from Briscoe from the right. But on six minutes Marriott did well to block a 10 yard shot from Labadie, who had looked a certain scorer as the ball rolled towards him. When the corner came over Welsh sidefooted a volley wide. Stonehouse put Marriott in trouble with a short backpass, the keeper doing well to challenge Thomas-Moore and the ball flying back towards Bojang who headed over the gaping goal. A neat Rovers passing movement was then halted by a solid tackle by Naylor on Gornell which raised a cheer from the stands. Mitchley wasn't too far over for the home side with a dipping shot from 20 yards. Rovers finally broke the deadlock on 27 minutes from a free kick that Stags were angry was given. Referee Mr West allowed play to go on for some time before pulling it back for an earlier challenge. The ball was floated across towards Thomas-Moore whose 20 yard shot took a wicked deflection, wrong-footing Marriott and giving him no chance. Labadie was lucky when the referee allowed play to go on after his two-footed tackle on Mills and then escape even a lecture when, seconds later, he went in strongly on Silk to finally concede a foul. Briscoe had Nielsen stretching to hold his 25 yard curling free kick just under the angle on 36 minutes. Then Adam Smith headed over from a right wing corner. Bojang really should have doubled Rovers' advantage on 48 minutes when left completely unmarked from a corner, his header striking the crossbar. Chris Smith came even with a glancing header wide at the far post from a Nix right wing free kick as the substitutions continued to flow for the home side. But Stags were deservedly level on 85 minutes as Cain's half-blocked cross rolled invitingly to Nix 20 yards out and his shot took a deflection that sent it flying into the net. Soon after sub Parker almost won it with a neat bit of skill as he sidestepped two defenders before poking a goalbound finish that deflected just wide for a corner. Neilsen then saved superbly from a dipping Leonard drive in stoppage time as Stags finished with a flourish to earn warm applause. STAGS: Marriott (Collett ht), Silk (Leonard 90), Naylor (Preece ht), Foster (C. Smith ht), Stonehouse (Sandwith 54), Mills (Nix 54), Munn (Thompson 69), Briscoe (Williams 61), A. Smith (Cain 54), Mitchley (O'Rafferty 61), Gregory (Parker 69). TRANMERE: Nielsen, Mollyoak, Cresswell, McLaren, Goodison, Wood, Gornell, Labadie, Thomas-Moore, Welsh, Bojang (Jennings 79). Subs not used: Benson, Collister Fraughan, Bakayogo, Mackreth. KYLE Nix's late strike earned Mansfield Town a deserved draw against Tranmere Rovers at Field Mill this afternoon. The midfielder – who has just returned from a trial at Sparta Rotterdam, where he has failed to earn a contract – had the home fans on their feet when he blasted home to cap an excellent second-half Stags performance. The hosts had fallen behind to Ian Thomas-Moore's first-half strike. But they battled on to first level and then threaten to clinch what would have been an eye-catching victory. TRIALIST Danny Mitchley will lea the Mansfield Town attack in this afternoon's home friendly with Tranmere Rovers. The former Blackpool player – who spent part of last season on loan at Wrexham – was partnered in attack by Lee Gregory. Youth team player Bradley Munn was given the chance to impress in central midfield, along with Gary Mills. Tom Naylor came into the middle of the back four to partner Steve Foster. New signings, striker Keigan Parker and midfielder Tyrone Thompson, were on the bench. Tranmere looked certain to take the lead in the sixth minute when the ball broke in the box for Joss Labadie, but his powerful shot was blocked by Alan Marriott. After a promising Mansfield move, Lee Gregory volleyed well wide from a Gary Mills cross. At the other end, a short back pass from Paul Stonehouse saw Marriott and Thomas-Moore reach the ball at the same time and, as it rebounded out to Bakary Bojang, he headed off target. Danny Mitchley tried his luck from 20 yards following a half-cleared ball forward but his effort was always rising over the bar. Rovers took the lead in the 27th minute in fortuitous circumstances. Not only were the Stags aggrieved when a free-kick was awarded against them, but when the ball was delivered into the danger zone, Thomas-Moore's eventual shot from just outside the box took a wicked deflection to completely wrong-foot Marriott and find the net. Mansfield were awarded a free-kick on the edge of the box in the 36th minute, but Gunnar Nielsen was always well behind Louis Briscoe's curled shot. Adam Smith was disappointed soon after when he was first to Gary Mills' right-wing corner, only to head over the top. The visitors should have extended their lead soon after the restart when Labadie was left totally unmarked from Paul McLaren's corner but headed against the bar. Mansfield were not too far away twice in quick succession as Mitchley headed wide from Gary Silk's cross with Nielsen in no-man's land before Nix drilled past the left-hand upright. As the Stags made a raft of changes that eventually saw all 11 starting players replaced, Chris Smith was even closer when he glanced Nix's right-wing free-kick just past the left-hand post. But Mansfield were rewarded for their graft when they drew level with five minutes to go as Nix smashed past Neilsen from 18 yards with the aid of a deflection. And the Stags almost secured victory moments later when new boy Keigan Parker turned brilliantly from Ryan Williams' cross only to see his low finish deflect just wide of the right-hand post. And, in the dying seconds Neilsen had to be at his best to turn over a powerful long-range effort from John Leonard. THE crowd may have been disappointing, but at least the game itself delivered. Unlike in midweek against Forest, when more than 2,000 Mansfield fans turned out, this fixture did not capture the imagination. Some may have felt they had better things to do in the middle of a mid-summer weekend; others may have been saving their pennies. But the loyalists, numbering less than 1,000, who did turn out, were rewarded with a crisp, competitive match in which the Stags again underlined their promise in the build-up to the new season. There is no doubting it's going to be tough for the Stags considering the log-jam of clubs desperate to re-establish their Football League status. Nevertheless, David Holdsworth and his players are pushing hard to put together a winning formula. At this stage, there is still plenty of experimentation going on. Trialist Danny Mitchley started up front, for instance, as did youth player Bradley Munn, while a completely different team finished the game to the one which had started it. There will also be at least one more new face, maybe more, before the season kicks off on August 14. Yet the shape and balance of the team is starting to emerge, ensuring they could stand toe-to-toe with a Tranmere side featuring eight first-teamers and three trialists. Mansfield were trailing at half-time to the Birkenhead outfit, but stuck to their guns and bossed the second half. It was much-deserved when they managed an equaliser five minutes from time – and in the closing stages they could have nicked it. Still, the result was not important. The fact Mansfield have not been overawed or outplayed by three Championship sides and a League One club in pre-season is. The Stags worked hard to keep the ball on the deck in the first half, but it merely seemed to confirm what everyone already knows. With Rob Duffy not certain to start the season, the club need reinforcements up front in the shape of a recognised striker. Mitchley and Lee Gregory did their best, but both are still young professionals making their way in the game and with much to learn. It meant the Stags lacked a little punch in front of goal and did not test Gunnar Nielsen too often. Louis Briscoe's curling free-kick, that the Tranmere keeper easily gathered, and Adam Smith's header from a Gary Mills corner that flew off target were as close as they came. At the other end, Alan Marriott made an excellent save to deny Joss Labadie, but he could do nothing to prevent Rovers' 27th minute opener. An Ian Thomas-Moore shot from the edge of the box looked to be heading into his midriff until a wicked deflection totally deceived the former Lincoln keeper to find the net. The Stags fought back well after the interval and got closer and closer before drawing level. Kyle Nix – back from an unsuccessful trial in Holland with Sparta Rotterdam – and Chris Smith both went close. But Nix was not to be denied on his 'homecoming' as he smashed a deflected effort past Neilsen from the edge of the box. In the closing stages, it was all Mansfield as Tranmere hung on. Keigan Parker joined the action along with fellow new signing Tyrone Thompson and the Scottish striker was oh so close with a shot that deflected wide after a neat turn had earned him space to let fly. And in the dying moments, John Leonard tired his luck from distance and Nielsen was required to tip the ball over the bar. It all meant the home fans went home with smiles on their faces and reason to be optimistic. The hope is they will still feel that way when the campaign gets underway for real. Mansfield: Marriott (Collett 46), Silk (Leonard 88), Naylor (Preece 46), Foster (C. Smith 46), Stonehouse (Sandwith 54), Mills (Nix 54), Munn (Thompson 69), Briscoe (Cain 54), A. Smith (Williams 61), Mitchley (O'Rafferty 61), Gregory (Parker 69). Tranmere: Nielsen, Mollyoak, Cresswell, McLaren, Goodison, Wood, Gornell, Labadie, Thomas-Moore, Welsh, Bojang (Jennings 79). Subs not used: Benson, Collister, Fraughan, Bakayogo, Mackreth. MANSFIELD TOWN staged a 100th anniversary party on Saturday in which just about every player on the books at Field Mill was invited to take part. Manager David Holdsworth crammed 22 names onto his team sheet and used every one of them, making 11 second-half substitutions. The wholesale refreshment of the home side presented Tranmere with the most daunting physical challenge of the pre-season programme so far. The response of manager Les Parry was to make no significant changes of his own. He preferred to test the strength and resilience of the starting XI until the 79th minute withdrawal of triallist Bakary Bojang. The pattern of the contest was predictable. Tranmere, marginally the more effective of the two teams in the opening half, were comfortable at first in protecting the lead earned by skipper Ian Thomas-Moore's 27th minute goal. But they were pressed deeper into defence the longer the second half wore on, eventually conceding an 85th minute equaliser to substitute Kyle Nix during a heavy spell of home pressure. Parry was content to assess the team shape and pattern of play, not to mention a trio of triallists, and to identify areas of the team performance that can be worked on over the last fortnight of preparations for the League One campaign. Tranmere's creative football was less impressive than it was against Championship side Nottingham Forest the previous Wednesday. The passes did not flow, the movement was not quite so sharp. Set plays delivered Rovers' best scoring opportunities – and the goal. Bojang, the triallist from Denmark looking to make a big impression in his third outing, found few opportunities to create an impact. The Conference side were well organised in defence throughout. The two defensive triallists in Parry's line-up were busier. Matt Hollyoak, a full-back who has been playing his football in the USA for the last two years, will be given another run in the friendly at Chester tomorrow. Wood, who did well against Forest, impressed once again alongside centre-back Ian Goodison and may have done enough to earn the offer of a contract. Tranmere's last visit to Field Mill, a League One fixture back in 2002, resulted in a 6-1 defeat. But the Stags have fallen two divisions since then. Now they boast a ground, smartly developed on three sides, that is among the most impressive in the Conference. The problem is attracting enough spectators into it. Even the staging of a pop concert by the group Westlife at Field Mill in a few weeks' time is not generating the ticket sales that were hoped for. A crowd of 812, swelled by just 63 travelling supporters from Tranmere, were less than captivated by the entertainment on offer. Mansfield could make nothing more out of an enthusiastic opening burst than a sharp cross from the right by Louis Briscoe that forced goalkeeper Gunnar Nielson into an acrobatic punch in the fourth minute. Tranmere carved out the first clear cut chance three minutes later when striker Terry Gornell set up Joss Labadie just inside the box and the midfielder's shot was so fierce that goalkeeper Alan Marriott did know much about it as the ball struck his body and deflected to safety. Marriott's luck was out in the 27th minute however when Paul McLaren's free kick from wide on the right was won in the air by Woods, turned inside by Goodison and driven goalwards by Thomas-Moore. The goalkeeper may have been behind a shot but it took a deflection and flew into the net beyond his reach. Nielson's six-foot-four inches of height help the Faroe Islander make a catch from Briscoe's 37th minute free kick look easy. Bojang's best chance to stamp his name on the game arrived three minutes after the interval when he lost his marker from McLaren's right-wing corner and directed a header against the underside of the crossbar. The near miss marked the end of Tranmere's attacking threat. Mansfield tightened their territorial grip on the contest over the final 40 minutes as they introduced replacement players in batches. Nix and fellow substitute O'Rafferty narrowly missed the target on 55 and 65 minutes. The pressure was becoming relentless by the time makes Nix latched onto a sliced cross from Ryan Williams and drove a fierce shot into the net from 18 yards. Mansfield's new signing Keigan Parker missed a chance to win the game two minutes later after more good work by Williams, a diminutive winger who was once on Tranmere's books. But Parker shot wide of the target from close range. Nielson tipped over a rising 30 yard shot by Tyrone Thompson in injury time to ensure the final result reflected the overall balance of play. Returning midfielder Kyle Nix rescued a deserved draw for Mansfield Town after they had fallen behind to a first half strike from Ian Thomas-Moore. The 24 year old, who returned to the Stags' ranks after a trial with Dutch side Sparta Rotterdam, smashed home a long-range drive to level the game in the closing minutes. It caps the end of Mansfield's three home friendlies - all of which have produced encouraging displays. Stags started the brighter of the two sides when Louis Briscoe crossed from the right in the opening three minutes forcing Tranmere goalkeeper Gunnar Nielsen to dramatically punch clear at his near post. Then on the other flank, Adam Smith used his skill to get past Matt Mollyoak, but his cross failed to find anyone in the area. Alan Marriott used his legs to deny Joss Labadie from short range with five minutes gone. It was Adam Smith, continuing his fine pre-season form, who gained a Stags' corner two minutes later. Trialist Danny Mitchley fired at goal from 20 yards after Adam Smith chested the ball down. The move started with a long ball from the impressive Tom Naylor. Tranmere opened the scoring following a dubious free-kick on 26 minutes. As the ball fell to Rovers' star striker Thomas-Moore inside the area, he struck goalwards and the ball flew past Alan Marriott after a wicked deflection. Rovers' goalie Gunnar Nielsen was called upon to make a stop with ten minutes of the first half remaining, keeping out a Louis Briscoe free kick from 20 yards. Three changes were made to the Stags' line up at the break - Neil Collett, Mark Preece, Chris Smith entered the field. Alan Marriott and central defensive pairing Tom Naylor and Steve Foster took their place on the bench. Joss Labadie was allowed a free header from ten yards following a right wing cross just two minutes into the second period. His effort rattled against the bar and Stags managed to scramble the ball away to safety. On 53, Gary Mills, Paul Stonehouse and Louis Briscoe were replaced by Kyle Nix, Kevin Sandwith, and trialist Ashley Cain. Two minutes later, Kyle Nix opened fire after good work from Cain on the right. With 30 minutes remaining, club captain Ryan Williams and young striker Niall O'Rafferty came on for Adam Smith and Danny Mitchley. Shortly after, Chris Smith managed to get a head on a Kyle Nix inswinging free-kick, but his effort was off target. Mid-week signings Keigan Parker and Tyrone Thompson saw the last 23 minutes of the match, on for Bradley Munn and Lee Gregory. On 86 minutes, Kyle Nix rescued a draw with the aid of a deflection after a powerful strike from 25 yards. Moments later, Ryan Williams assisted Keigan Parker from the left, and the Scotsman's shot trickled past the post as Stags looked for the deciding goal. Trialist John Leonard, the only remaining substitute, replaced Gary Silk at right back in the dying moments. It was he who pulled the trigger to let fly with a blistering 25 yard drive which stung the fingertips of Nielsen in the final seconds, but in the end Stags had to settle for a draw. A goal from Ian Thomas-Moore earned Rovers a draw from their latest pre-season friendly against Mansfield Town. The Tranmere captain netted with a deflected shot - his third goal of pre-season - after half an hour following good work from trialist Nick Wood and Ian Goodison. Rovers dominated for much of the match and saw Joss Labadie head against the bar early in the second half, but a host of substitutes from the home side in the second half gave them fresh legs and Kyle Nix was on hand to equalise with five minutes remaining. Tranmere: Nielsen, Hollyoak*, Wood*, Goodison, Cresswell, Labadie, McLaren, Welsh, Thomas-Moore, Gornell, Bojang* (Jennings 79). Substitutes not used: Collister, Benson, Fraughan, Bakayogo, Mackreth.
2019-04-24T00:54:22Z
https://www.stagsnet.net/news/newsdetails.php?newsid=5545
KEPPRA XR® is indicated as adjunctive therapy in the treatment of partial onset seizures in patients 12 years of age and older with epilepsy. KEPPRA XR is administered once daily. Initiate treatment with a dose of 1000 mg once daily. The once daily dosage may be adjusted in increments of 1000 mg every 2 weeks to a maximum recommended daily dose of 3000 mg/day. KEPPRA XR tablets are white, oblong-shaped, film-coated extended-release tablets imprinted in red with “UCB 500XR” on one side and contain 500 mg levetiracetam. KEPPRA XR tablets are white, oblong-shaped, film-coated extended-release tablets imprinted in red with “UCB 750XR” on one side and contain 750 mg levetiracetam. KEPPRA XR 500 mg tablets are white, oblong-shaped, film-coated tablets imprinted with “UCB 500XR” in red on one side. They are supplied in white HDPE bottles containing 60 tablets (NDC 50474-598-66). KEPPRA XR 750 mg tablets are white, oblong-shaped, film-coated tablets imprinted with “UCB 750XR” in red on one side. They are supplied in white HDPE bottles containing 60 tablets (NDC 50474-599-66). The prescriber should be aware that the adverse reaction incidence figures in the following table, obtained when KEPPRA XR was added to concurrent AED therapy, cannot be used to predict the frequency of adverse reactions in the course of usual medical practice where patient characteristics and other factors may differ from those prevailing during clinical trials. Similarly, the cited frequencies cannot be directly compared with figures obtained from other clinical investigations involving different treatments, uses, or investigators. An inspection of these frequencies, however, does provide the prescriber with one basis to estimate the relative contribution of drug and non-drug factors to the adverse reaction incidences in the population studied. In the controlled clinical study using KEPPRA XR in patients with partial onset seizures, the most frequently reported adverse reactions in patients receiving KEPPRA XR in combination with other AEDs, for events with rates greater than placebo, were irritability and somnolence. Table 3 lists adverse reactions that occurred in at least 5% of epilepsy patients treated with KEPPRA XR participating in the placebo-controlled study and were numerically more common than in patients treated with placebo. In this study, either KEPPRA XR or placebo was added to concurrent AED therapy. Adverse reactions were usually mild to moderate in intensity. In the controlled clinical study using KEPPRA XR, 5.2% of patients receiving KEPPRA XR and 2.5% receiving placebo discontinued as a result of an adverse reaction. The adverse reactions that resulted in discontinuation and that occurred more frequently in KEPPRA XR-treated patients than in placebo-treated patients were asthenia, epilepsy, mouth ulceration, rash and respiratory failure. Each of these adverse reactions led to discontinuation in a KEPPRA XR-treated patient and no placebo-treated patients. Table 4 lists the adverse reactions seen in the controlled studies of immediate-release KEPPRA tablets in adult patients experiencing partial onset seizures. Although the pattern of adverse reactions in the KEPPRA XR study seems somewhat different from that seen in partial onset seizure controlled studies for immediate-release KEPPRA tablets, this is possibly due to the much smaller number of patients in this study compared to the immediate-release tablet studies. The adverse reactions for KEPPRA XR are expected to be similar to those seen with immediate-release KEPPRA tablets. In controlled clinical studies of immediate-release KEPPRA tablets as adjunctive therapy to other AEDs in adults with partial onset seizures, the most frequently reported adverse reactions, for events with rates greater than placebo, were somnolence, asthenia, infection and dizziness. Table 4 lists adverse reactions that occurred in at least 1% of adult epilepsy patients treated with immediate-release KEPPRA tablets participating in placebo-controlled studies and were numerically more common than in patients treated with placebo. In these studies, either immediate-release KEPPRA tablets or placebo was added to concurrent AED therapy. Adverse reactions were usually mild to moderate in intensity. In addition, the following adverse reactions were seen in other well-controlled studies of immediate-release KEPPRA tablets: balance disorder, disturbance in attention, eczema, hyperkinesia, memory impairment, myalgia, personality disorders, pruritus, and vision blurred. There are insufficient data for KEPPRA XR to support a statement regarding the distribution of adverse experience reports by gender, age and race. In addition to the adverse reactions listed above for immediate-release KEPPRA tablets, the following adverse events have been identified during postapproval use of immediate-release KEPPRA tablets. Because these reactions are reported voluntarily from a population of uncertain size, it is not always possible to reliably estimate their frequency or establish a causal relationship to drug exposure. The listing is alphabetized: abnormal liver function test, choreoathetosis, dyskinesia, erythema multiforme, hepatic failure, hepatitis, leukopenia, neutropenia, pancreatitis, pancytopenia (with bone marrow suppression identified in some of these cases), thrombocytopenia, and weight loss. Alopecia has been reported with immediate-release KEPPRA use; recovery was observed in majority of cases where immediate-release KEPPRA was discontinued. No significant pharmacokinetic interactions were observed between levetiracetam or its major metabolite and concomitant medications via human liver cytochrome P450 isoforms, epoxide hydrolase, UDP-glucuronidation enzymes, P-glycoprotein, or renal tubular secretion [see CLINICAL PHARMACOLOGY]. A total of 13% of adult patients and 38% of pediatric patients (4 to 16 years of age) treated with immediate-release KEPPRA experienced non-psychotic behavioral symptoms (reported as aggression, agitation, anger, anxiety, apathy, depersonalization, depression, emotional lability, hostility, hyperkinesias, irritability, nervousness, neurosis, and personality disorder), compared to 6% and 19% of adult and pediatric patients on placebo. A randomized, double-blind, placebo-controlled study was performed to assess the neurocognitive and behavioral effects of immediate-release KEPPRA tablets as adjunctive therapy in pediatric patients (4 to 16 years of age). An exploratory analysis suggested a worsening in aggressive behavior in patients treated with immediate-release KEPPRA tablets in that study [see Use in Specific Populations]. One percent of adult patients and 2% of pediatric patients (4 to 16 years of age) treated with immediate-release KEPPRA experienced psychotic symptoms, compared to 0.2% and 2%, respectively, in adult and placebo-treated pediatric patients. In the controlled study that assessed the neurocognitive and behavioral effects of immediate-release KEPPRA in pediatric patients 4 to 16 years of age, 1.6% KEPPRA-treated patients experienced paranoia, compared to no placebo-treated patients. There were 3.1% patients treated with immediate-release KEPPRA who experienced confusional state, compared to no placebo-treated patients [see Use in Specific Populations]. KEPPRA XR can cause hematologic abnormalities. Hematologic abnormalities occurred in clinical trials and included decreases in red blood cell (RBC) counts, hemoglobin, and hematocrit, and increases in eosinophil counts. Decreased white blood cell (WBC) and neutrophil counts also occurred in clinical trials. Cases of agranulocytosis have been reported in the postmarketing setting. In controlled trials of immediate-release KEPPRA tablets in patients experiencing partial onset seizures, minor, but statistically significant, decreases compared to placebo in total mean RBC count (0.03 x 106/mm³), mean hemoglobin (0.09 g/dL), and mean hematocrit (0.38%), were seen in immediate-release KEPPRA-treated patients. A total of 3.2% of KEPPRA-treated and 1.8% of placebo-treated patients had at least one possibly significant ( > 2.8 x 109/L) decreased WBC, and 2.4% of KEPPRA-treated and 1.4% of placebo-traeted patients had at least one possibly significant ( > 1.0 x 109/L) decreased neutrophil count. Of the KEPPRA-treated patients with a low neutrophil count, all but one rose towards or to baseline with continued treatment. No patient was discontinued secondary to low neutrophil counts. In pediatric patients (4 to < 16 years of age), statistically significant decreases in WBC and neutrophil counts were seen in patients treated with immediate-release KEPPRA, as compared to placebo. The mean decreases from baseline in the immediate-release KEPPRA group were -0.4 × 109/L and -0.3 × 109/L, respectively, whereas there were small increases in the placebo group. A significant increase in mean relative lymphocyte counts was observed in 1.7% of patients treated with immediate-release KEPPRA compared to a decrease of 4% in patients on placebo. In the controlled pediatric trial, a possibly clinically significant abnormal low WBC value was observed in 3% of patients treated with immediate-release KEPPRA, compared to no patients on placebo. However, there was no apparent difference between treatment groups with respect to neutrophil count. No patient was discontinued secondary to low WBC or neutrophil counts. In the controlled pediatric cognitive and neuropsychological safety study, two subjects (6.1%) in the placebo group and 5 subjects (8.6%) in the immediate-release KEPPRA-treated group had high eosinophil count values that were possibly clinically significant ( ≥ 10% or ≥ 0.7X109/L). Counsel patients, their caregivers, and/or families that antiepileptic drugs (AEDs), including KEPPRA XR, may increase the risk of suicidal thoughts and behavior and advise patients to be alert for the emergence or worsening of symptoms of depression; unusual changes in mood or behavior; or suicidal thoughts, behavior, or thoughts about self-harm. Advise patients, their caregivers, and/or families to immediately report behaviors of concern to a healthcare provider. Advise patients that KEPPRA XR may cause changes in behavior (e.g. irritability and aggression). In addition, patients should be advised that they may experience changes in behavior that have been seen with other formulations of KEPPRA, which include agitation, anger, anxiety, apathy, depression, hostility, and psychotic symptoms. Inform patients that KEPPRA XR may cause dizziness and somnolence. Inform patients not to drive or operate machinery until they have gained sufficient experience on KEPPRA XR to gauge whether it adversely affects their ability to drive or operate machinery. Patients should be instructed to only take KEPPRA XR once daily and to swallow the tablets whole. They should not be chewed, broken, or crushed. Inform patients that they should not be concerned if they occasionally notice something that looks like swollen pieces of the original tablet in their stool. Advise patients to notify their healthcare provider if they become pregnant or intend to become pregnant during KEPPRA XR therapy. Encourage patients to enroll in the North American Antiepileptic Drug (NAAED) pregnancy registry if they become pregnant. This registry is collecting information about the safety of antiepileptic drugs during pregnancy. To enroll, patients can call the toll free number 1-888-233-2334 [see Use in Specific Populations]. Rats were dosed with levetiracetam in the diet for 104 weeks at doses of 50, 300 and 1800 mg/kg/day. The highest dose is 6 times the maximum recommended daily human dose (MRHD) of 3000 mg on a mg/m² basis and it also provided systemic exposure (AUC) approximately 6 times that achieved in humans receiving the MRHD. There was no evidence of carcinogenicity. In mice, oral administration of levetiracetam for 80 weeks (doses up to 960 mg/kg/day) or 2 years (doses up to 4000 mg/kg/day, lowered to 3000 mg/kg/day after 45 weeks due to intolerability) was not associated with an increase in tumors. The highest dose tested in mice for 2 years (3000 mg/kg/day) is approximately 5 times the MRHD on a mg/m² basis. No adverse effects on male or female fertility or reproductive performance were observed in rats at oral doses up to 1800 mg/kg/day (6 times the maximum recommended human dose on a mg/m² or systemic exposure [AUC] basis). KEPPRA XR levels may decrease during pregnancy [see WARNINGS AND PRECAUTIONS]. Oral administration of levetiracetam to female rats throughout pregnancy and lactation led to increased incidences of minor fetal skeletal abnormalities and retarded offspring growth pre-and/or postnatally at doses ≥ 350 mg/kg/day (equivalent to the maximum recommended human dose of 3000 mg [MRHD] on a mg/m² basis) and with increased pup mortality and offspring behavioral alterations at a dose of 1800 mg/kg/day (6 times the MRHD on a mg/m² basis). The developmental no effect dose was 70 mg/kg/day (0.2 times the MRHD on a mg/m² basis). There was no overt maternal toxicity at the doses used in this study. Oral administration of levetiracetam to pregnant rabbits during the period of organogenesis resulted in increased embryofetal mortality and increased incidences of minor fetal skeletal abnormalities at doses ≥ 600 mg/kg/day (4 times MRHD on a mg/m² basis) and in decreased fetal weights and increased incidences of fetal malformations at a dose of 1800 mg/kg/day (12 times the MRHD on a mg/m² basis). The developmental no effect dose was 200 mg/kg/day (equivalent to the MRHD on a mg/m² basis). Maternal toxicity was also observed at 1800 mg/kg/day. Treatment of rats with levetiracetam during the last third of gestation and throughout lactation produced no adverse developmental or maternal effects at oral doses of up to 1800 mg/kg/day (6 times the MRHD on a mg/m² basis). Safety and effectiveness in pediatric patients 12 years of age and older has been established based on pharmacokinetic data in adults and adolescents using KEPPRA XR and efficacy and safety data in controlled pediatric studies using immediate-release KEPPRA [see ADVERSE REACTIONS, CLINICAL PHARMACOLOGY, and Clinical Studies]. A 3-month, randomized, double-blind, placebo-controlled study was performed to assess the neurocognitive and behavioral effects of immediate-release KEPPRA as adjunctive therapy in 98 pediatric patients with inadequately controlled partial seizures, ages 4 to 16 years (KEPPRA N=64; placebo N=34). The target dose of immediate-release KEPPRA was 60 mg/kg/day. Neurocognitive effects were measured by the Leiter-R Attention and Memory (AM) Battery, which assesses various aspects of a child's memory and attention. Although no substantive differences were observed between the placebo- and KEPPRA-treated groups in the median change from baseline in this battery, the study was not adequate to assess formal statistical non-inferiority between the drug and placebo. The Achenbach Child Behavior Checklist (CBCL/6-18), a standardized validated tool used to assess a child's competencies and behavioral/emotional problems, was also assessed in this study. An analysis of the CBCL/6-18 indicated a worsening in aggressive behavior, one of the eight syndrome scores, in patients treated with KEPPRA [see WARNINGS AND PRECAUTIONS]. The effect of KEPPRA XR on renally impaired patients was not assessed in the controlled study. However, it is expected that the effect on KEPPRA XR-treated patients would be similar to the effect seen in controlled studies of immediate-release KEPPRA tablets. Clearance of levetiracetam is decreased in patients with renal impairment and is correlated with creatinine clearance [see CLINICAL PHARMACOLOGY]. Dose adjustment is recommended for patients with impaired renal function [see DOSAGE AND ADMINISTRATION]. Bioavailability of KEPPRA XR tablets is similar to that of the immediate-release KEPPRA tablets. The pharmacokinetics (AUC and Cmax) were shown to be dose proportional after single dose administration of 1000 mg, 2000 mg, and 3000 mg extended-release levetiracetam. Plasma half-life of extended-release levetiracetam is approximately 7 hours. Levetiracetam is almost completely absorbed after oral administration. The pharmacokinetics of levetiracetam are linear and time-invariant, with low intra- and inter-subject variability. Levetiracetam is not significantly protein-bound ( < 10% bound) and its volume of distribution is close to the volume of intracellular and extracellular water. Sixty-six percent (66%) of the dose is renally excreted unchanged. The major metabolic pathway of levetiracetam (24% of dose) is an enzymatic hydrolysis of the acetamide group. It is not liver cytochrome P450 dependent. The metabolites have no known pharmacological activity and are renally excreted. Plasma half-life of levetiracetam across studies is approximately 6-8 hours. The half-life is increased in the elderly (primarily due to impaired renal clearance) and in subjects with renal impairment. An open label, multicenter, parallel-group, two-arm study was conducted to evaluate the pharmacokinetics of KEPPRA XR in pediatric patients (13 to 16 years old) and in adults (18 to 55 years old) with epilepsy. KEPPRA XR oral tablets (1000 mg to 3000 mg) were administered once daily with a minimum of 4 days and a maximum of 7 days of treatment to 12 pediatric patients and 13 adults in the study. Dose-normalized steady-state exposure parameters, Cmax and AUC, were comparable between pediatric and adult patients. The disposition of immediate-release levetiracetam was studied in adult subjects with varying degrees of renal function. Total body clearance of levetiracetam is reduced in patients with impaired renal function by 40% in the mild group (CLcr = 50-80 mL/min), 50% in the moderate group (CLcr = 30-50 mL/min) and 60% in the severe renal impairment group (CLcr < 30 mL/min). Clearance of levetiracetam is correlated with creatinine clearance. In anuric (end stage renal disease) patients, the total body clearance decreased 70% compared to normal subjects (CLcr > 80mL/min). Approximately 50% of the pool of levetiracetam in the body is removed during a standard 4- hour hemodialysis procedure [see DOSAGE AND ADMINISTRATION]. In vitro data on metabolic interactions indicate that levetiracetam is unlikely to produce, or be subject to, pharmacokinetic interactions. Levetiracetam and its major metabolite, at concentrations well above Cmax levels achieved within the therapeutic dose range, are neither inhibitors of, nor high affinity substrates for, human liver cytochrome P450 isoforms, epoxide hydrolase or UDPglucuronidation enzymes. In addition, levetiracetam does not affect the in vitro glucuronidation of valproic acid. Probenecid, a renal tubular secretion blocking agent, administered at a dose of 500 mg four times a day, did not change the pharmacokinetics of levetiracetam 1000 mg twice daily. Css max of the metabolite, ucb L057, was approximately doubled in the presence of probenecid while the fraction of drug excreted unchanged in the urine remained the same. Renal clearance of ucb L057 in the presence of probenecid decreased 60%, probably related to competitive inhibition of tubular secretion of ucb L057. The effect of immediate-release KEPPRA tablets on probenecid was not studied. The effectiveness of KEPPRA XR as adjunctive therapy in partial onset seizures in adults was established in one multicenter, randomized, double-blind, placebo-controlled clinical study in patients who had refractory partial onset seizures with or without secondary generalization. This was supported by the demonstration of efficacy of immediate-release KEPPRA tablets (see below) in partial seizures in three multicenter, randomized, double-blind, placebo-controlled clinical studies in adults, as well as a demonstration of comparable bioavailability between the XR and immediate-release formulations [see CLINICAL PHARMACOLOGY] in adults. The effectiveness for KEPPRA XR as adjunctive therapy in partial onset seizures in pediatric patients, 12 years of age and older, was based upon a single pharmacokinetic study showing comparable pharmacokinetics of KEPPRA XR in adults and adolescents [see CLINICAL PHARMACOLOGY]. All studies are described below. Study 2 was a double-blind, placebo-controlled, parallel-group study conducted at 41 sites in the United States, comparing immediate-release KEPPRA 1000 mg/day (N=97), immediate-release KEPPRA 3000 mg/day (N=101), and placebo (N=95), given in equally divided doses twice daily. After a prospective baseline period of 12 weeks, patients in Study 2 were randomized to one of the three treatment groups described above. The 18-week treatment period consisted of a 6-week titration period, followed by a 12-week fixed dose evaluation period, during which concomitant AED regimens were held constant. The primary measure of effectiveness in Study 2 was a between-group comparison of the percent reduction in weekly partial seizure frequency relative to placebo over the entire randomized treatment period (titration + evaluation period). Secondary outcome variables included the responder rate (incidence of patients with ≥ 50% reduction from baseline in partial onset seizure frequency). The results of Study 2 are displayed in Table 6. The percentage of patients (y-axis) who achieved ≥ 50% reduction from baseline in weekly partial onset seizure frequency over the entire randomized treatment period (titration + evaluation period) within the three treatment groups (x-axis) in Study 2 is presented in Figure 1. The first period of the study (Period A) was designed to be analyzed as a parallel-group study. After a prospective baseline period of up to 12 weeks, patients in Study 3 were randomized to one of the three treatment groups described above. The 16-week treatment period consisted of the 4-week titration period followed by a 12-week fixed dose evaluation period, during which concomitant AED regimens were held constant. The primary measure of effectiveness in Study 3 was a between group comparison of the percent reduction in weekly partial seizure frequency relative to placebo over the entire randomized treatment period (titration + evaluation period). Secondary outcome variables included the responder rate (incidence of patients with ≥ 50% reduction from baseline in partial onset seizure frequency). The results of the analysis of Period A are displayed in Table 7. The percentage of patients (y-axis) who achieved ≥ 50% reduction from baseline in weekly partial onset seizure frequency over the entire randomized treatment period (titration + evaluation period) within the three treatment groups (x-axis) in Study 3 is presented in Figure 2. The comparison of immediate-release KEPPRA 2000 mg/day to immediate-release KEPPRA 1000 mg/day for responder rate in Study 3 was statistically significant (P=0.02). Analysis of the trial as a cross-over study yielded similar results. Study 4 was a double-blind, placebo-controlled, parallel-group study conducted at 47 centers in Europe comparing immediate-release KEPPRA 3000 mg/day (N=180) and placebo (N=104) in patients with refractory partial onset seizures, with or without secondary generalization, receiving only one concomitant AED. Study drug was given in two divided doses. After a prospective baseline period of 12 weeks, patients in Study 4 were randomized to one of two treatment groups described above. The 16-week treatment period consisted of a 4-week titration period, followed by a 12-week fixed dose evaluation period, during which concomitant AED doses were held constant. The primary measure of effectiveness in Study 4 was a between group comparison of the percent reduction in weekly seizure frequency relative to placebo over the entire randomized treatment period (titration + evaluation period). Secondary outcome variables included the responder rate (incidence of patients with ≥ 50% reduction from baseline in partial onset seizure frequency). Table 8 displays the results of Study 4. The percentage of patients (y-axis) who achieved ≥ 50% reduction from baseline in weekly partial onset seizure frequency over the entire randomized treatment period (titration + evaluation period) within the two treatment groups (x-axis) in Study 4 is presented in Figure 3. 500 mg KEPPRA XR tablets are white, oblong-shaped, film-coated tablets marked with “UCB 500XR” in red on one side. 750 mg KEPPRA XR tablets are white, oblong-shaped, film-coated tablets marked with “UCB 750XR” in red on one side. are pregnant or planning to become pregnant. It is not known if KEPPRA XR will harm your unborn baby. You and your healthcare provider will have to decide if you should take KEPPRA XR while you are pregnant. If you become pregnant while taking KEPPRA XR, talk to your healthcare provider about registering with the North American Antiepileptic Drug Pregnancy Registry. You can enroll in this registry by calling 1-888-233-2334. The purpose of this registry is to collect information about the safety of KEPPRA XR and other antiepileptic medicine during pregnancy. Call your doctor for medical advice about side effects. You may also report side effects to FDA at 1-800FDA-1088. This Medication Guide summarizes the most important information about KEPPRA XR. If you would like more information, talk with your healthcare provider. You can ask your pharmacist or healthcare provider for information about KEPPRA XR that is written for health professionals. You can also get information about KEPPRA XR at www.keppraxr.com or call 1-(844) 599-CARE (2273).
2019-04-20T02:50:27Z
https://www.rxlist.com/keppra-xr-drug.htm
After the events of the 3rd Secret War Peter Parker achieves unprecedented success in his professional career. Parker Industries (a company spawned by SpOck) is a world-wide business leader in the technology sector, whilst also helping to support S.H.I.E.L.D. Aside from strategic and economic success, Parker Industries also helped fund the Uncle Ben Foundation which provides global humanitarian aid. So for all intents and purposes Peter Parker is now a global icon. Despite the global ambitions, Peter creates a presence for his company in New York City. In fact, he chose a location very close to his heart…the Baxter Building (former HQ of the Fantastic Four) to be the site of Parker Industries New York. As a quick aside, Peter mentions that Alchemax, Roxxon and H.A.M.M.E.R. put bids in on this property (how was H.A.M.M.E.R. able to do something like that aren’t they caput?). Even more intriguing (and arguably even more close to his heart) he appointed his best friend Harry Osborn to help run the business out of his New York offices. Three interesting facts about Harry at this point, he’s changed his name to Harry Lyman (taking his mom’s maiden name), he seems to be no longer in the witness protection program and he is (seemingly) still unaware that Peter is Spider-Man. However he is aware of his own past as the Green Goblin. So this all brings us to the now clandestine original Green Goblin…Norman Osborn. Norman had apparently lost his enhanced strength and stamina after the events of Superior Spider-Man #31. But what he lost in power he gained in stealth, Norman was using face-altering strategies to conceal his identity whilst wreaking havoc. A heavily face-bandaged Norman Osborn emerges from the shadows for the first time in Amazing Spider-Man V4 #3 in the African nation of Nadua. Osborn was summoned to Nadua by General Mwenye, the leader of that country. Mwenye, an obviously corrupt general, wanted the Uncle Ben Foundation out of his country, he did not want his people supplied with free solar power. Unfortunately for Mwenye, he did not want to fight Parker Industries head-on because his men are no match for someone who makes weapons for S.H.I.E.L.D. He wanted Osborn’s technology to take on this fight…Norman complies. In Amazing Spider-Man V4 #4, the Uncle Ben Foundation, chaired by Aunt May and her boyfriend Jay Jameson, prepares to unveil the completion of their first humanitarian project in Nadua. Suddenly pumpkin bombs rain down from the skies as the civilians scatter for shelter. Alarmed by his aunt’s dire situation, Peter bails on his S.H.I.E.L.D. responsibilities and rushes to Nadua to rescue May, Jay and the Naduans. When Peter arrives in Nadua he finds a half-dozen or so War Goblins (new term!) equipped with goblin gliders and pumpkin bombs wreaking havoc upon the landscape. It appears as though their targets, for the most part, are not the civilians but rather the solar panel grids. Using a combination of his Spider-Jet (or is it Spider-Plane?), help from his Avenger ally Mockingbird and an EMP (electromagnetic pulse), Peter is able to eventually diarm the the War Goblins and take them into custody. As Spider-Man, Peter vows to the village leader, Mr. Okiro, that Parker Industries will rebuild all the property that had been damaged by the Goblins’ attack. Shockingly, Okiro refuses his help or the help from an more humanitarian acts as he claims that all it does is make them targets of General Mwenye. Since Parker will not be there to constantly guard the panels, then he doesn’t want them at all. The return of Norman Osborn began in Amazing Spider-Man (Vol. 4) #25 and that story opens in a shady alley of Las Colinas Rojas, the drug capital of Delvadia. There's a sting operation underway and Spider-Man is leading the charge. However, unbeknownst to our webslinger there is another vigilante on site, but she's using some type of cloaking device so she's essentially invisible. After a few Spider-pods clear the riff-raff at streetlevel, Spider-Man, Mockingbird and two Delvadia-native super heroes (Tarantula and the Devil Spider) come crashing on to the scene ready to infiltrate Osborn's supposed hideout. As they make their way in to the compound they're greeted by some machine gun-toting Goblin soldiers...more proof that Spider-Man and his team are on the right path. Remember that Spider-Man was given Osborn's location from the intel that the Kingpin had provided in Dead No More: Clone Conspiracy Omega #1. Meanwhile, back at surface level our invisible female vigilante is preparing to blow up the underground hideout, but first she has to clear innocent bystanders. Back inside the bunker Spidey's frantic search to catch his old foe is summarized by the three words he screams out, "I want Osborn!" Spidey's intel has him searching for El Facoquero, Delvadia's foremost drug dealer/gun-runner. But Spidey believes Osborn and El Facoquero are one and the same. Suddenly, there's a tremendous explosion, perpetrated by the invisible vigilante who appears to recognize Spidey and who also seems to not care that she just left him for dead beneath the streets of Las Colinas Rojas. Despite the ceiling crashing down, Spider-Man and Mockingbird continue after El Facoquero who was attempting to flee. Spidey catches the drug runner then cleverly explodes a pack of pumpkin bombs beneath a pool allowing he, Mockingbird and the captured El Facoquero to evade the collapse through the sewage system. That was the good news, the bad news was that once they arrived back at S.H.I.E.L.D. HQ, the blood tests confirm that this is not Norman Osborn...Spider-Man smashes a table to pieces in anger at the results! The story shifts back over to Peter Parker aboard his private jet, plotting his next attempt to find Norman. Peter and Bobbi Morse (aka Mockingbird) decide to head to Hong Kong next because there had been El Facoquero sightings there and Peter's Uncle Ben Foundation would be hosting an event in the same city. Before heading to Hong Kong, Peter returns Uncle Ben to his original burial plot whilst contemplating the events of The Clone Conspiracy. As a quick aside, Peter insinuates that Gwen Stacy was his "greatest love"...what about Mary Jane?! Peter visits with Aunt May, Harry Osborn and Betty Brant (who were all together) just before leaving for Hong Kong. Betty mentions an odd phone call that she received from Ned Leeds, most likely made by the resurrected Ned during The Clone Conspiracy. The phone call led Betty to seek out a spiritual advisor. Soon after, Peter's aboard a plane with Bobbi en route to Hong Kong. Peter wakes Bobbi from her nap and asks her if she's ever considered dating him. Before Bobbi could answer, Aunt May pops in to their conversation and announces that she's coming to Hong Kong as well (Peter wanted all his friends to stay behind since he knew it would get dangerous whilst tracking Norman). It was not obvious to me how Peter would have noticed Aunt Many being onboard prior to that, but I digress. And Aunt May was not the only stowaway onboard, Harry Osborn was making the trip as well. Once they touch down in Hong Kong, Peter and Bobbi immediately switch to their alter egos and start knocking heads in order to shake down information on Norman's whereabouts. What followed was an odd scene where Spidey and Mockingbird feel "weird" beating up "asian people" so they decide to go to a place where the people wear masks and thus you wouldn't know that they're asian. Spidey and Mockingbird make a mad dash to the U.B.F. event, but its too late Osborn is already there...in disguise of course! Osborn is perusing the crowd and he spots Aunt May, he decides he can't pass up the opportunity to talk to Aunt May with a face "she'd never recognize." Before Norman can make his way to her, some impeccable timing and awkward dialogue contribute to Norman overhearing Harry telling a waitress that his name is Harry Lyman and not Harry Osborn. This, as you would expect, enrages Osborn to hear his son refuting the Osborn Legacy. Just then, the invisible vigilante is poised with a rifle ready to snipe out someone from the U.B.F.! Spidey swoops in, takes out the shooter and uses his electrified web coils to short circuit her invisible suit. To Spidey's surprise the sniper is revealed to be none other than Silver Sable! After Spidey exclaims "you're supposed to be dead, what's going on?!", the former mercenary's response is simply, "What's going on....is that you just saved Norman Osborn!" Amazing Spider-Man (Vol. 4) #26 continues with Silver Sable's misfired shot alarming the crowd attending the Uncle Ben Foundation Gala sending all the party-goers into a panic. Norman Osborn, in a disguise eerily similar to Tony Stark, attempts to cover his son and protect him from the attack. What appeared to be an altruistic act was nothing more than Norman using the opportunity to let his son know he's there and that he (Harry) will always be an Osborn. Norman is then scooped up from the rooftop by a crew of militants flying green and purple motorcycles (which Osborn refers to as Glide-cycles); he then announces to his soldiers that "we're starting the show ahead of schedule." Spidey, Silver Sable and Mockingbird head out in pursuit of Osborn. Back on the rooftop Harry Osborn, now aware of his father's presence at the gala, tracks down one of the attendees that his father had been conversing with, convinced that he was working in collusion with Norman. It turns out that Osborn had planned to use the gala as a cover for inviting a select few to preview his latest in weapons technology. The man handed Harry a business card with the Goblin insignia that contained a url, presumably a link to a live demo. Whilst in pursuit of Osborn, Mockingbird is forced to disengage from the effort after her boss, Nick Fury, orders her to return home. Fury cites that she is 'out of her jurisdiction' and working with an international terrorist (Silver Sable). S.H.I.E.L.D. cannot be associated with this type of espionage...especially since the Chinese authorities were unaware that S.H.I.E.L.D. agents had been operating in Hong Kong. Which leaves only Spidey and Silver Sable to follow Osborn. The duo eventually track Osborn to what appears to be a residential high-rise building, they both suggest that this is a trap...and they're both right! Osborn is waiting with a crowd of potential buyers as he boasts that the viewers this evening will witness his weapons eliminate Silver Sable and Spider-Man. Harry, Aunt May and Min-Wei watch the demo from the link that was listed on the business card. Sable and Spidey's initial presumption was that they would be battling the Glide-cycles, which they dismantle with ease. Osborn's pitch to the crowd is that the Kingslayer will defeat two superhumans (Sable and Spidey), one of whom is equipped with Parker Industries technology. The involvement of PI technology goes viral and the local branch leaders (Phillip Chang, Max Modell, Anna Maria Marconi, etc) report to Harry that the company's apparent involvement in weapons testing is not a good thing (no duh!). Even the newly minted Superior Octopus (aka Otto Octavius) is following the developments as he remarks to himself that Parker is destroying the company that he built! Spider-Man and Silver Sable are able to hold their own against the Kingslayer, Peter even manages to get under Osborn's skin suggesting that the Goblin isn't man enough to go face-to-face with the webslinger...prompting Osborn to cut the feed. A quick-thinking Spidey grabs one of the power cells from the Glider-cycles and uses it to blow up the Kingslayer, ending the live demo. Three developments wrap up the second installment of this arc. One, Peter and Harry discuss the use of Parker Industries equipment to invade Symkaria and take down a terrorist...which is a risky venture to say the least. But Peter is 100% committed to doing so in order to stop Norman. Second, Otto Octavius apparently has hacked Harry's Webware device so the Superior Octopus has a direct line to listen in on everything said between Harry and other PI company leaders. Otto then feeds that info directly over to S.H.I.E.L.D., which leads to our third and last point. Mockingbird, now back at S.H.I.E.L.D. HQ, listens as Nick Fury announces to his organization that Parker Industries is now a threat at the level of Hydra and A.I.M....and that S.H.I.E.L.D. is severing all ties with the company. Mockingbird is forced to comply. Amazing Spider-Man (Vol. 4) #27 opens with Doctor Dragovic unraveling the medical gaws wrapped around Norman Osborn’s face, he had just undergone another face-altering procedure. The doctor reminds Norman that he was against performing this procedure so soon, and that the face muscles were not meant to be altered so frequently and so drastically. Osborn ignores the doctor’s advice as he recalls Spider-Man’s taunts that Norman would not show his face in public or confront Spidey face to face (which happened last issue). Unfortunately for Norman, Dragovic was right and when Osborn’s face is revealed it looks like a melted, grotesque version of his real (original) face. Osborn then tells Dragovic that he no longer has use for him so he gases the doctor with a new version of the Goblin Formula. Dragovic collapses to the ground as Osborn reminds him that he (Osborn) is immune to the Goblin Serum and that he is no longer insane. Norman then joins Countess Karkov and she is completely unphased by his horrific appearance, in fact she compliments him on how “he looks like a man who has brought new life to [her] country.” The two then walk to the balcony of Castle Karkov and look down upon “their kingdom” as they enjoy the sweet success that Norman’s “ingenious inventions and revolutionary ideas” have brought to the people Symkaria….converting it to the largest weapons manufacturer in the world. The story then shifts over to Spider-Man and Silver Sable, sitting alone in the cargo hold of one of his Parker Industries planes. They’re sitting amongst various Spider-Mobiles and since they have time before they land in Symkaria, Spidey asks Sable to explain how she evaded death. She tells him that whilst Rhino held her underwater she activated her stealth suit (similar to the one we saw at the beginning of this arc). Rhino thought she had vanished, which gave her the upper hand and she was able to kill him and escape. With the world believing she was dead, Sable was able to take out her enemies one by one, but her absence also allowed Karkov to run Symkaria in to the ground. She wants to return her people to freedom. Back at a S.H.I.E.L.D. holding facility in Hong Kong, Fury interrogates Aunt May and Harry Osborn since he is convinced they are aware of Peter’s plans to attack Symkaria. He receives no useful information from the pair, nevertheless he readies his forces (led by Mockingbird) to infiltrate the Parker Industries plane once it lands. When the S.H.I.E.L.D. agents board the plane, they find it empty and Morse nowhere to be found. Mockingbird had double-crossed Fury as she worked with Spider-Man and Silver Sable to land a different plane far from the S.H.I.E.L.D. agents. Infuriated, Fury calls Mockingbird and she officially resigns from S.H.I.E.L.D. and joins Spider-Man, Silver Sable and the new Wild Pack as they prepare to storm Symkaria. Osborn and Karkov’s romantic dinner is interrupted as the Spidey-led siege on Karkov Castle begins. Spider-Man attempts to goad Osborn into fighting, but Norman doesn’t take the bait. Instead he unleashes his army of Goblins (on gliders) and tanks to confront the web-slinger. Sable convinces the civilians that they are the good guys and that they (the civilians) need to evacuate Symkaria immediately. An all-out brawl then breaks out between the Goblin Army and Spidey’s allies. Osborn and Karkov, watching the battle from their war-room tower, decide to unleash their ‘big-ticket item’ since Spider-Man and his forces have made inroads to the castle. Karkov then reaches out to the civilians (over city-wide speakers) and tells them to “seek shelter” and “lock themselves” in their homes. No doubt it was an eerie and ominous message from the Countess. Meanwhile, Spider-Man, knee-deep in a Goblin brawl, notices that the Goblin Soldiers quite resilient as they bounce back up immediately after taking some serious shots. Their strength surprises him and after removing the Goblin mask from one of them he finds that they have Goblin faces as well! The story concludes with Osborn reveling in his greatest achievement, the refinement of the Goblin Formula! Accompanied by the Goblinized-Dragovic, Osborn prepares a missile (presumably loaded with this new Goblin Serum) that he plans to detonate in Symkaria. This would turn every civilian in Symkaria into a member of Osborn’s invincible Goblin Army! As Spider-Man and his allies (Mockingbird, Silver Sable and her new Wild Pack) prepare to storm Castle Karkov, Norman Osborn launches a missile chock full of Goblin Serum at the Symkarian civilians. At the conclusion of the previous issue Osborn had ominously stated that he was going to create an invincible Goblin Army with this bomb. Spider-Man had deduced Osborn’s plan after he had unmasked a Goblin Soldier and realized that they were full-on Goblins underneath their masks. Spidey recognizes there’s no time to waste, he sends Mockingbird to dismantle the bomb mid-flight (she can fly…and she’s really smart!). Sable sends the Wild Pack to fight the Goblin Soldiers whilst she and Spider-Man took the fight the Castle Karkov. Mockingbird makes her way to the missile but soon realizes that she’ll need the help of S.H.I.E.L.D. if she wants to ensure the safety of the civilians. She contacts Fury, who was none-too-pleased to hear from her, but nevertheless decides to aid his former agent since innocent lives are at stake. Once inside the castle, Sable finds Countess Katrina Karkov and the two women decide to settle their beef the only way Symkarians know how…with a sword fight! Spidey leaves to the two to it and he heads off to find Osborn. He uses his Spider-Sense in reverse (ie, heading toward danger) in order to track Osborn within the castle and soon enough the two are face to…melted face. Osborn takes the upper hand at first, letting Spidey know that he’s holding the trigger for the bomb and he will detonate if web-slinger gets any closer to him. This gives Norman the opportunity to run and to have Spidey chase him right into a trap. Even though the web-slinger sees this coming a mile away, he has no choice but to chase Osborn through the castle. En route to Osborn, Spidey is exposed to gas that he immediately recognizes because it’s the classic Goblin weapon that dampens his Spider-Sense. Spidey immediately recalls the death of Gwen Stacy and an enraged web-slinger tackles Osborn through a window in the castle and the two fall multiples stories to the ground outside on the snowy-mountains below. Meanwhile, Mockingbird disables the bomb and tasks the Wild Pack, who were flying the Spider-planes, to “do something Spidery!”. They do, in fact, they catch the bomb with a web net that is a few-miles across. The civilians in Symkaria were saved! Back within the castle, Silver Sable and Countess Karkov continue their battle as Sable takes the upper hand in their duel. Eventually Karkov is forced to surrender. On the mountain slopes outside the castle, the powerless Osborn and the newly-powerless Spider-Man continue to duke it out mano y mano. Spidey questions why Osborn didn’t simply kill him after the gases removed his Spider-powers. In typical Norman fashion he retorts, “I wanted to make sure you knew that you were nothing compared to me. Just some dumb kid. That I can break you whenever I want. With my own two hands!” He goes on to say that he never planned to kill him that he wanted Spider-Man and all the people of Symkaria turned into his “loyal Goblin slaves” and that that would be the ultimate revenge on Spider-Man. The tables quickly turn for Osborn though, because he soon realizes that his missile had been deactivated. Spidey then catches Osborn off-guard and bashes his head with a rock whilst reminding him that he was not some “dumb kid”, he was a great student. And although Norman contends it was Spidey’s luck that led to his consistent victories over the Goblin, Spider-Man argues that it was due to the fact that he never gives up. Soon after, S.H.I.E.L.D. agents arrive and Osborn escapes, Spidey is too weak to chase him and the web-head takes a face-plant right into the snow. When he wakes up Osborn is long-gone and he’s accompanied by Mockingbird, Sable and Fury. The S.H.I.E.L.D. director informs Peter that they are severing all ties with Parker Industries because of this unauthorized incursion on foreign soil. That obviously not good news for Peter but the Uncle Ben Foundation (including Aunt May and Harry Osborn) is in Symkaria handing out food and provisions to the war-tormented civilians. Harry shares a quick moment with Spider-Man and the hero reminds the young Osborn that he is not responsible for Norman and that Harry should go home and be with his two sons. Some of the content featured on this page was also published in my reviews of Amazing Spider-Man (Vol. 4) #25, 26, 27 and 28 featured at SpiderFan.org. Content used with permission from SpiderFan.
2019-04-22T16:49:12Z
http://www.thegreengoblinshideout.com/the-norman-osborn-identity
The activities of the regiment during the month of January fall into two phases: the holding of strategic high ground which prevented the German forces from pushing their columns towards Liège. In this period, the regiment was committed to patrolling actively the enemy-heId terrain to their front. The last week of January, at which time the German bulge into Eastern Belgium had been reduced to nothingness, saw the unit drive against the enemy defenses in the Belgian sector and then into the outer defenses of the Siegfried Line in Germany proper. Both defensive and offensive assignments were carried out in the most skillful and efficient manner in the face of appalling weather conditions. The first day of the new year found the regiment still on the ridge of Dom Bütgenbach. The early hours of the morning passed without incident. Arrangements were made to strengthen the regiment defenses with minefields and wire defenses stretching in a belt from the 2nd Division elements on the right to those of the 1st Division elements on the left. During the afternoon, enemy batteries that had been subjecting the 3rd Battalion positions were silenced when friendly planes bombed and strafed the Northwest part of Büllingen in which the hostile batteries had been located. From prisoners captured on the previous day, Division believed that a new enemy unit was taken over the sector facing us, and a raid was planned to establish enemy identification of units, and to give the new men experience in penetrating enemy positions at night. The intense cold had brought out one valuable bit of information on the sticky grenades: the cold negatived their effectiveness. Several V-1 bombs fell in the area, but these proved duds. An enemy OP spotted to the southwest of the enemy-held town of Büllingen had been placing mortar fire upon "F" Company's positions, and a raid was planned by members of the "F" Company and several members of the 2nd Battalion Headquarters Company A & P Platoon. This group starting out at 0300 hours was driven back initially when it encountered an enemy group, but started out once more at 0525 hours, and this time succeeded in penetrating the enemy security guard flung about the OP, and blew it up with TNT blocks. A 3rd Battalion patrol from "L" Company investigated small-arms fire to their front, but discovered the enemy group attempting to attack an outpost had withdrawn. From "C" Company came information from one of its patrols that led to the artillery firing a mission upon an enemy OP that set it afire. The intense patrolling revealed the information that Division desired: the 89th German Infantry Regiment of the 12th Infantry division had replaced the 12th SS Panzer Division elements facing us. Work on the mine-belts in front of the regiment was held up pending investigation of mines that blew up when the safety pin was removed. The safety procedure called for the removal of the safety pin before inserting of the fuse, this precaution averting any explosion. Enemy groups in our sector were given little opportunity for rest as patrols from all three battalions again prodded at the enemy defenses. "B" Company worked a patrol to the crossroads at 930007, withdrew after a firefight that revealed enemy positions. "F" Company also stirred up enemy reaction to their probing, and after a firefight at 937010, brought back locations of several enemy mortar positions. "K" Company rescued an Company member who had been lost when that company's patrol had withdrawn after intercepting an enemy patrol headed towards our lines. Questioning of two prisoners from these forays revealed other mortar positions which gave our mortar and artillery batteries definite targets to pinpoint and take under fire. A hostile attempt to push against our lines was detected by 1st Battalion outposts and automatic rifle fire pinned down the enemy machine-gun crews of the enemy patrol, which withdrew after suffering several casualties. Enemy artillery fire increased during the afternoon and early evening. Harassing enemy artillery fire was laid in on the 2nd Battalion area during the night, but this caused little damage. The 3rd Battalion patrols worked to 948022, 949021 and turned back only when threatened with encirclement by alerted enemy patrols. Patrols from the 2nd Battalion reported machine-gun fire from two knocked out enemy tasks at 942015. The day passed without further incident. Artillery fire was placed upon the Northwest road leading out of Büllingen where "K" Company outposts had detected enemy movement. "L" Company called for mortar fire which caught an enemy patrol in the open and drove it back. "L" Company reported enemy tanks or field pieces and twelve to fifteen Germans at 945038, and these were taken under artillery fire which quickly dispersed the force. Patrols again took toll of the enemy. "F" Company located an enemy machine-gun emplacement, laid an ambush for the enemy and killed or wounded the entire six-man enemy crew. It withdrew. Another patrol returned with report of enemy OP at 945020, and this was set on fire by artillery. A platoon from the 1st Battalion proceeded to 917020 where it gave the enemy a busy time of it. One squad was pinned town by machine-gun fire. The rear squad worked to 922017 and then West where it too was pinned down. The third squad moved to 914017, and then ran into small-arms fire prior to being counterattacked and driven back. The whole platoon disengaged itself from the enemy and returned to the company. Definitely it had been established that the enemy held the wooded area to the 1st Battalion front in strength. Attempts were made throughout the day to find billets for the reserve elements of the regiment, but when it was discovered that the command would be split up due to lack of sufficient buildings to shelter a unit in one group, the decision was taken to keep the regiment in present locations on the ridge. Engineer School and Browning Automatic Rifle School initiated. The A & P officer of each battalion and selected non-commissioned officers were to learn from Engineer instructors the latest techniques in mine-laying, erecting of wire obstacles, and road blocks. The school on Browning Automatic Rifles concentrated on the maintenance and care of these valuable weapons. "G" Company patrols penetrated enemy lines as far as 935011, and were driven back after a sharp fire fight. More enemy weapon emplacements were spotted by "K" Company groups and mortar fire placed upon these at 945021. "A" Company sent a patrol out to 918017 but no contact was reported with the enemy. Both 2nd and 3rd Battalion patrols kept up their harassment of the enemy lines, with "E", "F", "G" and "K" Company patrols moving into enemy terrain but reporting little enemy movement in the intense cold. Companies "E" and "F" changed positions during the evening. A raid was planned for the following day with the mission of bringing in PW's for questioning. 3rd Battalion patrols probed as far as 952024, hit wire defenses, pushed through to the railroad station at which point they encountered heavy small-arms fire, but pressed on to the bridge near the station. Spotted by enemy mortar groups at 945026, they were driven back. A 1st Battalion patrol leaving our lines in the afternoon returned at 1800 hours with two prisoners and a machine-gun that they had captured. These prisoners were dressed in parts of American clothing, which they claimed was issued to them. Snow had been driven by the wind into such high banks that it was necessary for the 2nd Battalion to ask for a snow plow to keep roads to the company CP's open. Arrangements were made to relieve the unit. Arrangements were made for withdrawal of unit and billeting of the regiment. The 23rd Regiment of the Second U.S. Infantry Division sent its advance details to look over the positions on Dom Bütgenbach. A patrol sent out earlier in the day to place observed mortar fire upon suspected enemy OP had been driven back, with two of the patrol members reported wounded by booby-traps. A combat patrol sent out to rescue the two found that the German patrol had taken these with them, but managed to retrieve the 300 radio that had been left in a barn. Patrols and listening posts left the company lines as usual during the night and early morning. The 2nd Battalion reported an enemy tank warming up its motor in Büllingen. At 1045 hours Division notified the regiment of the postponement of relief. This order had emanated from higher headquarters, which stressed that not a single man, and not a single gun was to be removed from this highly important "hot spot" astride one of the main roads leading out of Belgium into Germany. Engineers and Browning Automatic Rifle Schools were resumed. The rest of the day proved quiet. Short of the objective it was assigned to investigate at 940013, "C" Company patrols ran into machine-gun and small-arms fire. Enemy patrols detected in the 2nd Battalion area were dispersed with mortar fire. Rest of the day passed without incident. To the East and Southeast, the German bulge into Belgium was being steadily compressed into a smaller area. Defenses in the battalion areas were farther strengthened throughout the day, with the engineers furnishing the mines and the timber. "I" and "K" Company patrols ran into enemy patrols, while 2nd Battalion reported that its patrols had not made any contact with the enemy in their sweep of the woods to their front. 2nd Battalion patrols reported enemy movement West of Büllingen, and artillery fired a mission on this group, and upon a house at 94800018. The constant probing and patrolling had stung the enemy into building up a strong line around 940013. "F" and "G" Company reconnaissance groups established this in their early morning patrols. "L" Company reached at the railroad station at Wirtzfeld, where it was turned back after a firefight. At 0800 hours a 2nd Battalion outpost brought in two PWs who were dressed in civilian clothing. "A" and "C" Companies changed position. "C" Company returned to the 1st Battalion, with "A" Company going into reserve. "G" Company took "C" Company's place in the 2nd Battalion line. Questioning of PWs revealed: two enemy companies in Büllingen and 100 civilians. Battalion CP at 94950192, Company CP at 94440160, Platoon OP at 94060188. These locations were turned over to the artillery for fire missions. An indication of the general state of information possessed by the German Army was the four-day pass to Bütgenbach found on a PW who had been taken by an "E" Company outpost. This was to be the first of similar cases. Interrogation disclosed nothing unusual. A duel between "F" Company's mortars and enemy mortars resulted in the silencing the hostile weapons. "L" Company patrol got to an enemy outpost in a farmhouse and routed the Germans out of it before returning to their own lines. "G" Company reached points 922012 and the crossroads 930007. On this day both the 16th Infantry Regiment and the 18th Infantry Regiment jumped off is the attack. Our orders were still to hold the ridge. Camouflaging of tank destroyers and anti-tank guns by painting them with white-wash was completed as the regiment still stood by and pushed two patrols out. Three prisoners were taken from the 10th SS Regiment. There had been a marked decline in morale since the beginning of the month. The most comprehensive picture of enemy defenses in and around Büllingen was obtained from a prisoner today. It placed the 6th Company, 1055th Regiment, north of Büllingen, the 7th Company to the West, the 8th Company in the town, and the 5th Company to the East. The enemy resistance had built up on the 18th lnfantry Regiment's flank, and it was planned to lay down mortar fire on the edge of the woods near the crossroads from 921014 - 928012 and from 920008 - 927012. Artillery fire was to pound 933997- 928001 - 935007 at 1040 hours. When mortar fire began ranging in on the woods, enemy mortars attempted to silence this and were instead silenced by our mortar fire. An enemy anti-tank gun firing at the 1st Battalion positions from an emplacement at 917017 was also neutralized. Despite the increased activity of mortar and artillery batteries, patrols were again pushed out, the morning patrols reporting no enemy contact. The snow had piled into such high drifts that a tank dozer was in use to push aside paths to the company CP's. The Engineer School was called off because of the scheduled meeting of battalion S-3's and the staff officers concerning plans to commit the regiment in the near future. Patrols again were pushed out to the woods. All patrols encountered the enemy, on alert against probes, and withdrew after heavy fire-fights. The 3rd Battalion of the 18th lnfantry Regiment had met heavy resistance, and the 1st Battalion was ordered to send out a patrol to its front to reconnoiter the terrain to ascertain what enemy defenses lay there. These returned with the information that the enemy had built up a line in the woods. The 3rd Battalion, 26th lnfantry was relieved by the 1st Battalion, 9th Infantry Regiment at 1300 hours, and assembled in the vicinity of Niedrum. In an effort to help the soldier dig in after securing his position, it was decided to give the soldier a pound block of TNT which was powerful enough to blast a hole in the frozen ground to the layer where soft earth was again encountered. The 2nd Battalion again was subjected to active enemy artillery fire upon its positions. "C" Company patrols to 928008 found prepared enemy defenses which were unoccupied, pushed on to 932001 where it scouted enemy positions. "F" Company probed as far as 943019 without drawing enemy fire. The 2nd Battalion relief was contemplated in the early afternoon. Definite plans took shape in the committing of the regiment. There were the usual patrolling activities. There was a final meeting of battalion leaders and staff officers as plans were laid out for the regiments attack on the morrow. The crossroads was the objective. At 0400 hours the 1st Battalion attacked. As planned, the drive developed South to the main road to secure the crossroads at 930007. "C" Company moved out in the lead, worked East to crossroads and above the crossroads to clear out the woods. "B" Company then pushed through "C" Company on the South down the main road and seized positions astride the road. "A" Company entered the woods at 926016, swinging South to clear woods, then moved to the Southwest road leading away from Büllingen at 950008. By 1000 hours the 1st Battalion reported it was on its objective. Light enemy small-arms and mortar fire had been met. Main obstacle had been snow. At 1100 hours the 3rd Battalion jumped off to seize the high ground at 927997. "L" Company led the attack, with "K" and "I" Companies bringing up the rear of the battalion column. By 1300 hours the 3rd Battalion had contacted the 1st Battalion and worked up on line on the high ground. An indication of the enemy knowledge of the situation was the incident of the two enemy linesman. The 3rd Battalion had captured a German aid-station with some wounded Germans in it, and shortly after it had been secured, two German wiremen laid a line right up to the aid-station. "K" Company pushed to crossroads, and secured its position without resistance, reporting contact with the 18th lnfantry Regiment on the right. Mine-fields were laid and tied in with the 16th and 26th Infantry Regiments. The mine-fields were extended to the 2nd U.S. Infantry Division and the 18th lnfantry Regiment mine-fields so that a continuous belt of mines lay in front of the regimental positions. Heavy mortar and artillery fire was placed on the 1st and 3rd Battalion positions. The heavy snow had held up vehicles from following the infantry to our objective, and dozers cleared a two lane road to the positions. Enemy reaction to the attack was directed at the 1st Battalion. But the company of enemy infantry was dispersed with artillery and mortar fire, and several PWs taken. Plans for furthering the attack gave the 3rd Battalion the town of Büllingen as its objective, and the 2nd Battalion the town of Mürringen. To secure better positions for the two battalion jumping off in the later attack, the 1st Battalion secured the woods to the Northeast corner at 943006. At 0200 hours the 3rd Battalion launched its attack. "L" Company moved North along the road from Möderscheid to Büllingen, with "K" Company driving from the South along the road running into town from the South. "I" Company brought up the rear of the battalion. When "L" Company ran into stubborn machine-gun fire, "I" Company swung to the left of the pinned down company and cleared the enemy from the Western outskirts of the town. By 0930 hours the town was cleared and the enemy pushed out of their positions at the crossroads Southwest of the town. Again the tank dozers cleared a path for the tanks and tank destroyers to get into the town. Continuing the attack, the 2nd Battalion attacked shortly before midnight and cleared the woods between Büllingen and Mürringen. "E" Company cleared the Northern part of the woods, "G" Company the Southern end. "E" and "F" Companies joined at the Eastern edge of the woods and then attacked the town together. Resistance was spotty, and the main obstacles in the path of the battalion were the deep snow, the blown bridges at the edge of town, and the mine fields before and in town. Mürringen was cleared by 1000 hours. Positions were secured during the day. The 2nd Battalion attacked once more, jumping off at 0045 hours. Resistance was light, and the battalion was reported closing in on the objective at 0900 hours. The Northwest corner of Hünningen held out until an assault by two battalions reduced the strongpoints there about one hour later, and consolidated positions. Pushing out of the town, the 1st Battalion passed through the 2nd Battalion position and pushed against the Siegfried Line defenses. Having secured the pillbox defenses assigned the battalion, the 3rd Battalion then passed through the 1st Battalion and by 1700 hours had secured its objective. In the swing through the fringe of enemy defenses, five enemy tanks had been trapped, and heavy artillery fire was called upon the enemy armor. The end of this first month had seen the regiment again piercing the Siegfried Line defenses to enter Germany the second time. Despite intense cold, driving winds, heavy snow, and the utmost efforts of the enemy to contain the forward movement of the unit, the regiment had performed its assignments brilliantly.
2019-04-22T02:59:42Z
http://home.scarlet.be/~sh446368/aar-26th-inf-jan.html
For the past seven years, Adirondack Pub & Brewery has hosted an annual Festival of Barrels. The Festival of Barrels is similar in fashion to many beer festivals, with three exceptions — it’s outdoors in March in Upstate New York, all of the beers (for the most part) are barrel-aged, and there’s an ABSOLUTELY GIGANTIC FIRE to keep you warm. If you’re a lover of imperial stouts, barleywines, porters and dark ales in general, this festival is a must-visit. Each winter the festival, which originated in the parking lot of the restaurant and now encompasses a field nearby, presents beer-lovers and campfire-lovers with a unique, Adirondack experience. As the festival grew, the fire grew, which now requires attendance from the local fire department as a safety measure. The good news is, despite slightly-below-freezing temperatures, you won’t find yourself too chilly — that’s in part due to the ~3-story flames which radiate heat nearly 100ft in every direction and in part due to the average alcohol by volume you’ll find in most barrel aged beverages. Not pictured is the Kegs & Eggs brunch offered beforehand in the brewery’s Barrel Room (free with a VIP ticket), giving event-goers the opportunity to fill their bellies before embarking on their high-abv sampling mission. Check out some of my favorite photos from the event below and view the full gallery here! Recently my friend Mike and I ran into each other at a local event and he mentioned that he wanted to update his professional business headshots. If you’ve been following along with my work, you’d know that I spend most of my time taking pictures outdoors. As I happened to be stocking up on lighting equipment recently in anticipation of the coming wedding season and the photobooth I’ll be hosting at Pet Fest, I asked Mike to stop by. Kind of makes you want to buy a suit, doesn’t it? Having a professional headshot for your LinkedIn, resume, business card and profile picture is a great way to set yourself ahead of the pack when comes to making an impression. You are your own brand. All of my equipment is purchased with travel in mind, so this studio is mobile. Get in touch with me and I’d be happy to travel to your workplace or home in Glens Falls, Lake George, Saratoga Springs and beyond to help you and your coworkers look their best! If you’re anything like me, your camera bag tells the story of the many lenses that have come and gone. Very few, if any, have stuck around from the beginning. The cheap sometimes leave to make room for the more expensive and vice versa. Sometimes it’s about upgrading to the latest and greatest, to meet budget constraints, or to adhere to philosophy. If you’re like me, you’ve parted ways with glass that has left you feeling sentimental and sometimes with regret. Maybe it’s graduation-lenses or perhaps you didn’t realize what you had until it was gone. In any case, it’s fair to assume that no lens is safe in your bag as camera technology continues to advance. For that reason, I think it’s important to reflect on what you have before you sell it. When I first started with photography, I fell into the trap that many do of thinking that my pictures would get better if my equipment got better. For a while I believed this to be true, because I was becoming a better photographer, but it had little to do with the gear I was shooting with. Now that my camera bag looks nothing like it did when I started, I’ve realized that I’ve made a few mistakes along the way. I’ve grouped lenses that I’ve sold (or haven’t) with into three groups; Regret Selling, Don’t Miss, and Probably Won’t Sell. A couple of disclaimers: This article is primarily of interest to Canon shooters, but the concepts apply to all gear. All of the opinions expressed below are based upon my personal experiences and needs as they apply to the lenses mentioned. I buy almost everything used and shop carefully. To see more of my work, follow me on Instagram! This section includes lenses that I generally feel sentimental about. Lenses that got me to the point that I’ve gotten to. I hold nothing against any of lenses and would recommend them, in most cases. This was one of the first purchases I made when I first started getting serious about photography. I bought mine off the gray market brand new for $300 as a replacement for the 18-55mm f4-5.6 STM kit lens that came on my Canon T4i 650D. I did the research and learned that the version without vibration control is actually a bit sharper. I honestly can’t recommend a better general-purpose zoom for crop sensors. This thing is ridiculously sharp. Like, red-ring sharp. For $300. It’s sharp wide open and the constant aperture of f2.8 makes it useful in many situations. The color and contrast are beautiful too. I shot my personal favorite photo ever with this lens (see the barn below). Why did I sell it?: This lens was among the first to go when I upgraded to a full frame camera. I wish I’d kept it to use on my 650D in conjunction with a set of primes on my 6D. The Old State House, Boston, MA. 650D with Tamron 17-50mm f2.8 non-VC. This one reminds me a lot of the Tamron 17-50mm. It covers a similar but broader focal range for full frame DSLRs. While it’s known as a “kit lens,” it doesn’t come with the kit lens reputation that many deserve. It is very sharp (at least my copy was) and produced similar looking images to the Tamron in terms of contrast and color reproduction. What makes this lens the better overall pick is the image stabilization and weather sealing. I picked this lens up used when I first starting shooting with my 6D because I needed something to cover all the bases. Many refer to this lens as the jack of all trades, master of none. I think that’s pretty fair to say. It’s not really the best lens for any particular situation (other than travel, maybe), but when you need something versatile and reliable, it fits the bill nicely. Why did I sell it?: I was lusting after the 135mm f2L and needed the cash. If I had the money lying around, I would probably consider buying this lens again, but I’m not sure that I would. The biggest draw back for me with the 24-105L is the size. I didn’t really love this lens until after I’d sold it and reflected on some of the images it had captured. When I was looking for a first wide angle lens, many were pointing to the Tokina 11-16mm f2.8 for wide angle photography on ASP-C sensors. I don’t think that’s a bad recommendation at all, but I opted for the Sigma 10-20mm f4-5.6 for whatever reason. They evidently don’t make this version of this lens anymore, as its been upgraded to f3.5 through the focal range. Likewise, the Tokina has been upgraded to an 11-20mm lens. On the longer end of either lens, you’re walking around with a near-35mm-equivalent, which makes either of these wide angle lenses a great walk-around lens. If you think you’ll spend more time photographing in low light or astrophotography, the Tokina is the better pick. Why did I sell it? This was the second lens to go in my upgrade from ASP-C to full frame sensor. My 6D came with a 17-40mm f4L attached. I don’t miss it, exactly, but I do have fond memories of our time together. After all, this was my first foray into wide-angle photography. This sale of this one stung the hardest. If you’re in the market for a 35mm prime but don’t want to spend $700 or more, there simply isn’t a better option for Canon shooters. This was my favorite lens for a long time and I never imagined that I would sell it. The 4-stop IS is unreal. Leave the tripod at home and go out at night for some street photography and you’ll see what I’m talking about. This was the lens that cemented 35mm as my favorite focal length. It’s the perfect focal length for a night out with friends, wedding receptions, group shots and more. Why did I sell it? I thought that I needed the 24-70mm f2.8L MKI to photograph weddings. I was wrong, but we’ll get to that. Jesse. 6D with 35mm f2 IS. Emily. 6D with 35mm f2 IS. This is an awesome piece of glass. Nearly as sharp as its L-counterpart, the EF 100mm f2.8 USM macro lens is the only lens the casual macrophotographer needs. The ability to focus at 1:1 will provide hours of fun photographing typically-uninteresting things around your home. This lens is also a fantastic portrait lens, though it is critically sharp. You may actually find yourself unsharpening headshots should you grab this one for that purpose. Some people have knocked this lens for focusing slowly, but I tend to disagree with that assessment. I think it focuses adequately fast for portraiture. The misconception, I feel, likely comes from the focusing range that this lens has to cover. Why did I sell it? It was spending a lot of time in the bag. After the novelty of macrophotography wore off for me (nothing against it, I just got over it), I found it was only coming out for 1-2 occasional ring shots, which I could accomplish with extension tubes and decided I’d rather have the funds for other investments. If I ever decided that I need a 1:1 lens in the future, this is the one I will grab. Beer. 6D with 100mm f2.8 USM Macro. This one has got to be the best value telephoto zoom on the market for Canon ASP-C sensor cameras. This is another lens that I never should have sold. I decided to part ways with this one in my switch to a full-frame compatible system and I really wish I hadn’t. I should have reserved my crop sensor for my telephoto zoom needs. After all, the 1.6x crop-factor gives me better reach. Full frame equivalents on a similar level of quality cost 2-3x more and now I’m stuck with a Tamron 70-300mm f4-5.6. The Tamron is a slightly cheaper, slightly slower-focusing and slightly less sharp version of the Canon. Why did I sell it? I needed the funds and didn’t think I’d continue to use my 650D as much as I do. Adirondack Balloon Festival 2014. 650D with 55-250mm f4-5.6 STM. The moon. Handheld with the 650D and 55-250mm f4-5.6 STM. The EF 40mm f2.8 STM pancake lens by Canon is a neat little thing. I picked my copy up for something like $150 on eBay and then resold it for roughly the same amount. It’s very sharp, fast, inconpicuous and built like a lens ten times more expensive. The size factor was probably my favorite thing about this lens. Slap it on the front of your camera’s body and you’ll hardly notice that its there. You can carry it around all day without putting any strain on your neck or worrying that someone might mug you to steal your big fancy camera. Why did I sell it? I had fallen in love with the 35mm focal length and my 35mm f2 IS outperformed the pancake lens in every category but compactness, it seemed. On top of that, I’m a big fan of the 50mm f1.8 STM, but we’ll get to that. When you’re shooting with 35mm and 50mm primes, 40mm starts to feel a little redundant. This is the fun section where I trash lenses that many people love. I won’t be too hard on these guys, I’m somewhat of a lens apologist, really. I could only think of two lenses that I truly regret buying. Before I say anything else, let me say that this lens is capable of taking fantastic images. Additionally, stopped down, it is one of the sharpest lenses I’ve ever owned. That said, I sold my nifty-fifty (50mm f1.8 ii) to upgrade to this lens and realized quickly that I had made a mistake. This lens is notorious for its sub-par build quality, often-breaking focus motor and delicate focusing element that protrudes from the front of the lens. The common recommendation is that you affix a lens hood and leave it on all the time just in case. Most of these qualities can be attributed to the fact that it is old, but it really wasn’t brilliantly designed. I had relentless front-focusing issues even after microadjustment. Nothing against Canon, but I honestly don’t see the value in paying $250+ for this lens when the nifty-fifty is on the market. Canon 6D with 50mm f1.4 USM. This thing feels less like a lens in your hands and more like…a brick. In fact, that’s its nickname. I mentioned early that I picked this lens up thinking that I would need a 24-70mm lens to shoot weddings. While the focal length and aperture make it pretty versatile in a wedding situation, I just wasn’t feeling it. I’m not going to knock the image quality, because my copy was pretty sharp at f2.8 and plenty sharp stopped down. The bokeh is also beautiful on this lens — one of my favorites in that category. The focus is quick and it’s built like it would survive a fall down the stairs. As great as it is, this lens had the quickest turnaround time of any that I’ve owned — one week, from purchased to sold. I’ve never used the MKii version of this lens, which I hear is improved in nearly every way. Maybe it was out of spite for the sale of my beloved 35mm f2 IS. I can’t really say, but I just didn’t feel the magic with this lens and felt it was way too expensive for what it offered. Downtown Glens Falls. 6D with 24-70mm f2.8L MKI. These are lenses that I still use on a regular basis for wedding and portrait photography, among others. This was the solution to hole in my heart left by the sale of my 35mm f2 IS. With a little microadjustment (+5 on my copy), the Sigma 35mm f1.4 Art is tack sharp wide open and just a pleasure to use. The contrast and color rendition is beautiful. It’s my favorite focal length and my most used lens. I really don’t have any complaints other than that it’s quite heavy, but that doesn’t bother me much. I don’t really have a favorite photo I’ve taken with this lens yet, but I use it all the time. Just check my Instagram. Emily. 6D with Sigma 35mm f1.4 Art. I’m a big fan of the 35/85 prime combo, so this lens doesn’t get used a whole bunch, but I still love it. It’s sharp and focuses quickly and quietly. On top of that, it’s cheap (~$125) and light. The only thing I would consider complaining about might be the build quality, but that’s what keeps it so lightweight. I’m a big fan. Elizabeth and Brock. 6D with EF 50mm f1.8 STM. This lens has been in my bag longer than any other. I bought it off Craigslist for $320 when I was first taking a serious interest in photography. I immediately fell in love with everything about it. It’s strong points are its cost, size, build quality, sharpness and focusing-speed. Group me into the camp of photographers that can’t justify upgrading to the 85 f1.2L or other f1.4 variant. The cost/quality and focusing-speed are the main reasons for me. If I photographed fewer dogs, I’d consider upgrading, but this has got to be one of the best lenses for pet photography available — even if the design is 20 years old. Some people will hate on the 85mm f1.8 for is purple-fringing or lack of sharpness in the corners wide open, but I think the images stand for themselves. The abberation is easily correctable and generally avoidable. The other “flaws” lend to the lens’ character. One additionally note, I love the way that this lens flares when your subjects are being lit from behind. I don’t know if I will ever sell this lens. Macon and Jonas. 6D with 85mm f1.8 USM. Marcy. 6D with 85mm f1.8 USM. I’ve heard a lot of fitting nicknames for this lens, but my favorite is probably the magic prime. Magic is the best word to describe what makes it so special. If you are a bokeholic, the 135mm f2L is a great place to get your fix. It’s just wonderful in every way. You don’t even have to take pictures with it to get enjoyment out of it. Just look at the front element and you’ll smile. When I have the space to work with, this lens gets more use than any other during my portrait sessions. If 135mm was a focal length with more general usability, it would be easy to call this lens my absolute favorite. Truth be told, I mostly shoot this one at f2. The First Dance. 6D with 135mm f2L. What would I do differently if I knew everything I know now when I started? For the most part, my answer would be: “not much.” I love trying new lenses and I’ve very rarely been disappointed with my decision to buy one. Used camera lenses hold their value remarkably well. Knowing this, I’ve always assumed that if I don’t like or use a lens for whatever reason, I can get my money back…or most of it. I’ve even turned a profit a few times when I happened to have snagged a really good deal. Experimenting with lenses that are new to you actually can make you a better photographer. You’ll learn to see in different focal lengths. Additionally, you’ll learn to love a lens not only for its precision or brilliance, but for its quirks that give it character and then know when that character is well-suited to a photograph or situation. My hope for this article is it might guide a new photographer in making good decisions in lens-buying and encourage them to experiment with different focal lengths. I love talking about gear (if you couldn’t tell) so feel free to shoot me any questions or comments you might have below! I’d also like to know — what lenses you’ve sold and felt regretful about? I’m not ashamed to admit it. I regularly use my fancy camera to photograph my cats. You probably do it too. A new lens or camera arrives in the mail and you immediately lose sight of all the daydreaming you’d done while waiting for your package to arrive. You may have envisioned yourself photographing a beautiful landscape or capturing that perfect moment in perfect lighting of a friend candidly laughing. Pet photography is the farthest thing from your mind. You tear off the bubble wrap and what do you shoot first? Cats. Nala. 6D with EF 85mm f1.8. Cats is always the answer. Maybe that’s just me, but as soon as I realized that this was happening (expectation vs. reality), I started to embrace it and I started to enjoy it. Cats are great for testing a lens’ sharpness. Also, they are adorable and people love them. Keep scrolling for the pet photography tips! In an age where you can make a living off of your Instafamous pet, there really isn’t any shame in hashtags like #catsofinstagram or #dogstagram. In fact, if you’re a working professional and you’ve got the itch to share your pet’s latest and greatest portrait, you ought to know what hashtags you should be using. Cats and dogs are family and unlike babies, you probably actually enjoy seeing them in your social media feeds. For that reason, they are a valuable marketing tool. Gracie. 6D with EF 50mm f1.4 USM. Red. 6D with 17-40 f4L. …or the pet that you are photographing. It’s best to try and capture your cat or dog in a moment where they are showcasing their personality. If you have a lazy pet, consider capturing them in their sleep. If your pet is high-energy, grab a favorite toy of theirs and catch them in action. The easiest time to get those dog-action shots is when they’re running back your way with the toy or stick that you threw for them. The easiest time to snag the perfect portrait is right after you’ve worn them out from a game of fetch. Molly. 6D with EF 35mm f2 IS. Thompson. 6D with 135mm f2L. Dixie. 6D with EF 85mm f1.8. This is a big one. Most of my favorite pet photography portraits have been taken when I’m literally laying on the ground. This puts you on their level and gives you and your viewer more of a perspective into what it’s like to actually be a dog or cat. The alternative is the human-pet perspective that we have with animals on a regular basis. A bonus to this perspective is that they tend to look at you funny too. Sometimes this comes at the expense of getting a little dirty when outside, but it’s worth it for the results. Nala. 6D with Samyang 24mm f1.4. Red. Fujifilm x100s 23mm f2. This is the more technical stuff. The same lighting that is flattering to humans is flattering to animals. Most of the time when I’m shooting cats, the light source is a window. With dogs, it’s the late afternoon sun. At mid-day you’ll have a hard time dealing with harsh contrast, which is especially difficult when shooting black dogs. I prefer natural lighting when available. If you must shoot mid-day, try to find a large shaded area. If your pet isn’t asleep, it’s a good idea to use as quick a shutter speed as is practical for the situation. Actually, that applies to nearly all photography. When indoors, I typically try for 1/125s or faster and compensate for the lack of light by shooting wide-open or close-to-wide-open with some of my faster primes and by bumping the ISO. With the Canon 6D I can get away with upwards of ISO 10,000 and still clean up the noise nicely in post. Never compromise on shutter speed with fast-moving pets, because you are compromising on sharpness. My favorite cat lens (if we’re going to call it that) is my Sigma 35mm f1.4 Art. My favorite dog lens is the Canon 85mm f1.8. When a dog is running at me full speed, I’m usually shooting somewhere between 1/1250s and 1/2500s. I find that both of these shutter speeds are acceptable for freezing a dog in motion. My aperture will be set to f2.8-f5.6 and my ISO often around ISO 1000. Auto-focus set to servo-mode if your pet is moving. Generally I use the center focus point and crop in post to make my compositions more interesting. If you bump the shutter speed a bit higher (1/3000 or 1/4000) you’ll start to freeze things like dirt being kicked up, water being splashed or rain/snow as it falls, which is AWESOME. Marcy. 6D with 50mm f1.8 ii. Gracie. 6D with 35mm f2 IS. Sometimes I like to get really creative with the lighting (as seen above). Firing a speedlite from off camera, I was able to not only highlight the steam coming from the humidifier, but the directional lighting helps to indicate just how fluffy the cat is. You can fire away at however many frames-per-second you want and hope to get the right shot, but the more I’ve practiced pet photography, the less I’ve found myself shooting this way. It think it pays off bigger to be patient and wait for the right moment. It helps to anticipate what your pet is going to do next and shooting in smaller bursts (2-3 shots). Don’t expect to get the perfect shot on the first try, just keep shooting until you know that you have. If you don’t get the shot, don’t get discouraged. Try again later. Mocha. 650D with Tamron 17-50mm f2.8 non-VC. It sounds really obvious, but the best photos will come when you put the most effort into being creative and having fun. This is another tip that applies well to photography as a whole. Create circumstances with toys and treats, use foreground and background objects to create environmental interest, get high and low, vary your distance from your pet, play with lighting, etc. You get the idea. Backlighting from the setting sun is my favorite. Did I mention treats? You definitely want to have some food on hand, if only to make the pet like you. If you’re photographing someone else’s pet, ask them the best way to get the pet’s attention. Better yet, ask them to play with the dog and get the attention drawn towards the camera. Marcy. 6D with Samyang 24mm f1.4. Thompson. 6D with 17-40mm f4L. I make it a point to photograph dogs with a wide angle lens at every shoot. The way that a wide angle lens pulls you into the photograph works well with the human-pet perspective, especially when you can see the leash. Not to mention the way the perspective distortion makes their noses look hilarious. Note: this is exactly why you do NOT photograph your girlfriend with a wide angle lens. Don’t hesitate to comment below with any questions you might have and get in touch with me if you’d like me to photograph your pet! If you’d like to see more of my photography, give me a follow on Facebook and Instagram! Note: The featured image was taken with a 6D and the EF 85mm f1.8. A couple of weeks ago I bought my first film camera on a whim in an eBay auction. The story of my progression with photography is not unlike many newer photographers’ in that I’d only ever shot a digital camera. I’m not sure exactly what prompted my purchase (probably an image I saw on /r/itookapicture), but I’d always felt regret in that I didn’t take photography in high school, where I could have learned to shoot and develop film. When I learned that Canon made film cameras with the EOS mount, meaning I could use all of my lenses on one, it was pretty easy to narrow down the selection. Note: all of the photographs in this post were taken with the Sigma 35mm f1.4 Art, with the exception of the one below, which was taken with the 6D and 85mm f1.8. The Elan 7e debuted in 2000 for $800. I picked one up 16 years later for $45 in like-new condition. I’m calling that a steal. The Elan 7e has auto-focus, aperture/shutter priority and many of the other modern features you’d find on any new DSLR, other than an LCD. This made for a relatively seamless adjustment in shooting-familiarity. It’s a modern trend to emulate the look of classic films [read: Instagram]. I emulate the look of Kodak Ektar 100 in nearly all my portrait photography having never actually shot a roll of Ektar 100. My other favorite films that I’ve never actually used include Agfa Vista 100, Kodak Gold 200, Kodak Portra 400 and Fujifilm Velvia 50. My knowledge of film-emulations made the shopping experience a lot easier. I picked up a 4-pack of Fujifilm Superia 400 (because it is cheap — $10.40) and started shooting. Crandall Public Library, Glens Falls, NY. First National Bank Building and Ordway Hall, Glens Falls, NY. If you’re doing the math, we’re about $55 invested. Shooting film becomes expensive as things develop (see what I did there?). It doesn’t have to be, however. You can develop B&W and C-41 color film at home pretty affordably, but I’m not at that point yet. Remember 1-hour photo development? Yeah, that doesn’t exist anymore. I paid $16 and it took eight days. Eight days…for 24 exposures. I could shorten the turnaround time to 3-4 days by shipping out my rolls to online-based film labs for web-upload. I figure on a 24-exposure roll of film, it costs me about $1.10 per exposure. Red rocking his red booties in City Park. Nala judging me for shooting film. Sennheiser HD 202s at work. Dan Miner and Pete Cloutier on The Morning Club, 98.5 WCKM. Sorry about the Eminem reference. My hope is that shooting film will make me a better photographer and to be honest — I feel it already has. Earlier this week I went out in downtown Glens Falls with my Canon 6D + 17-40mm f4L and took this photo in exactly one total exposure. I can’t remember the last time I went out and took one photo. Granted, my battery was about to die, but the practice of slowing down is present. In fact, if I’m counting, I would call 20/24 of my exposures a keeper. As in, the focus is sharp, the exposure is right and the subject or content is interesting. That is an exceptionally high keeper-rate for me. Especially if you consider the older auto-focus technology and my obsession with wide apertures. On digital, my keeper rate is much lower. Downtown Glens Falls, 1994…err, I mean, 2016. Red worn out from all the modeling of the red booties. I won’t be using my Elan 7e for any professional work, but for personal use and for the therapeutic process. If you’d like to see more of my photography, be sure to follow me on Instagram and Facebook. Also, if you’d like to see some more modern day film photography, I recommend checking out /r/analog.
2019-04-22T08:13:58Z
http://jasoncheckla.com/category/photography/
Occupational therapy, with a 27% job growth estimate and an annual, median salary of $80,150 is among one of the top healthcare careers according to the Bureau of Labor Statistics. The Accreditation Counsel for Occupational Therapy Education (ACOTE) is the accrediting body for educational programs offering Master of Science in Occupational Therapy (MSOT) and Master of Occupational Therapy (MOT). Best Medical Degrees listed Occupational Therapy as one of the 50 Top Paying Healthcare Careers. The MSOT and MOT programs below reviews school provided tuition costs, curriculum. Also considered in this ranking are ACOTE accreditation and U.S. News and World Report's Best Occupational Therapy Program rankings. Additional rankings are by The Princeton Review or Forbes Magazine are also examined. For the most part, MSOT and MOT entry level programs require a previous baccalaureate degrees and prerequisite courses. Applicants may be asked to submit to background checks prior to conducting fieldwork experiences; and, some schools require GRE scores for admission. The majority of programs are traditional, classroom and clinical experiences and include Levels I and II fieldwork experiences; although, there are a few hybrid programs available. Some schools are beginning to transition to the Doctor of Occupational Therapy (OTD) degree on the recommendation of the Accreditation Counsel for Occupational Therapy. Best Medical Degrees is currently working on ranking of the most affordable programs providing the OTD degree. Graduates of MOT/MSOT programs are eligible to sit for the National Board for Certification in Occupational Therapy. Licensure is required to practice; and, students should verify the program chosen will meet with state requirements. Schools may offer programs may offer departmental assistance for students in the form of fellowships or assistantships. Check with the academic department to see if you may qualify. Federal Financial Aid for graduate and professional degrees may be obtainable. Graduate students typically only qualify for student loans; and, you must complete the Free Application for Federal Student Aid. Schools, and other funding opportunities, may request the a FASA for any scholarship consideration. MOT/MSOT students be considering a MOT/MSOT program and currently employed, may want to investigate if your employer participates in an employment tuition program. However, it should be noted that the majority of occupational therapy programs require fulltime attendance, as well as fieldwork requirements. Active, or retired, service members should determine if your school of choice offers a tuition discount for your service. San Jose State University offers another exceptionally affordable Master of Occupational Therapy program which holds accreditation from the Accreditation Counsel for Occupational Therapy Education (ACOTE). The program consists of six "clusters" in Occupation: The Core of the Profession, Foundations for Occupational Therapy Practice, Professional Development, Practice in the Community, Research and Knowledge Development and the Practice of Occupational Therapy. Uniquely, the program also requires an international experience, designed to provides students a variety of social, political and economic factors impacting the occupational therapy profession. Ranked #37 by U.S. News and World Report's Best Occupational Therapy Programs and was one of the first occupational therapy programs in the West with its founding in 1943. San Jose State University is located in California traces its roots to 1857 and provides educational undergraduate and graduate degrees in 134 areas of study. Accredited by the Accreditation Council of Occupational Therapy Education (ACOTE), Salem State University provides a tuition price point that is attractive. This is a entry-level professional Master of Occupational Therapy program for students who have a previously obtained baccalaureate degree in another field. Prerequisites are required before students begin core courses in graduate occupational therapy studies. Courses will be occupational therapy profession practice, introductions to human occupation and the theoretical constructs of practice, occupational treatment planning, OT analysis and intervention, etc. A capstone project and Level II fieldwork complete the program. Located 15 minutes north of Boston in Salem, Massachusetts, Salem State University was established in 1854, and presently has nearly 10,000 students enrolled in undergraduate and graduate programs. Ranked #126 in the U.S. News and World Report's Best Occupational Therapy Programs, Salem State University holds national accreditation by the New England Association of Schools and Colleges (NEASC). Accredited by the Accreditation Council for Occupational Therapy Education (ACOTE), this Master of Occupational Therapy (MOT) program is an entry level professional program for post baccalaureate students. Prerequisites are required for admission. Coursework includes, among others, studies in physiology, medical conditions, neuroanatomy, general practice concepts, management in occupational therapy and Levels I and II fieldwork experience. Ranked in the top 100 of U.S. News and World Report's Best Occupational Therapy programs, the School of Allied Health Professions was established in 1931 as part of the state university of Louisiana and has a current enrollment of over 2000 students. The school is one of six at LSU New Orleans and began offering the Master of Occupational Therapy (MOT) program over 40 years ago. An ACOTE accredited MOT degree, this entry level professional degree program requires general prerequisites and pre-OT courses for admission and is offered through the College of Public Health and Health Professions. These prerequisites and may be taken at any accredited university, including community colleges. Coursework covers foundation of occupational therapy, theory, research, practicum and Level II field experience. The college has over 2,100 enrolled students in its eight departments; and the occupational therapy program has been ranked #17 in its Best Occupational Therapy Programs by U.S. News and World Report. The University of Florida was founded in 1857 and is located in Gainesville, Florida. This Maryland university provides a Master of Occupational Therapy degree accredited the AOTCE. Didactic studies in kinesiology of occupation, foundations in OT, academic and clinical education, adult and older adult neurological occupational therapy, geriatric rehabilitation, occupational therapy practice in children and youth, psychosocial aspects, a thesis and Levels I and II fieldwork. Students must have a previously earned baccalaureate degree and complete prerequisites before starting graduate coursework. Founded in 1865, in Towson (now a suburb of Baltimore), the MOT program received a #25 ranking in the Best Occupational Therapy Programs of U.S. News and World Report. The university has received high marks from Forbes, the Princeton Review and Kiplinger's Personal Finance for its academic efforts and low tuition costs. Over 22,000 students pursue a degree in one of the 100 programs offered at Towson University, the second largest university in the University System of Maryland. Texas Tech University Health Sciences Center offers a MOT ACOTE accredited program through its School of Health Professions. Coursework will involve studies in human anatomy, applied kinesiology, fundamental skills, psychosocial intervention in OT, assistive and adaptive OT, clinical reasoning for fieldwork, hand and upper extremity rehabilitation and Level I and II fieldwork experiences. There are five prerequisite courses required for graduation in anatomy and physiology, physics and/or kinesiology or biomechanics, abnormal and developmental psychology and statistics. Ranking #37 in the Top Occupational Therapy Programs by U.S. News and World Report, Texas Tech University Health Center is accredited by the Commission on Colleges of the Southern Association of Colleges and Schools. The center was established in 1969; and, the School of Health Professions was founded in 1983 and has three campuses in Amarillo, Lubbock, and the Permian Basin and enrolls over 1,100 students. Offering an ACOTE accredited MOT degree, Colorado State University College of Health and Human Sciences' prepares entry professional level students to practice in occupational therapy settings. Students must have obtained a baccalaureate degree and successfully complete OT program prerequisites. Core courses in the MOT degree include occupational rehabilitation sciences, Level I field work, occupational performance in adults to old age, occupational performance from infancy to young adult, evidence based practice and Level IIB fieldwork. Ranked in the top 10 of U.S. News and World Report's Best Occupational Therapy Programs and has offered occupational therapy education since 1945. The university was established in 1870 and now hosts over 33,000 students at its Fort Collins, Colorado campus. It has been recognized by the Princeton Review as one of the Best Western Colleges, Consumer Digest and Business Week. Cleveland State University provides a Master of Occupational Therapy two year program. Coursework includes medical conditions and occupational function, occupational therapy theory and practice, practicum and Levels I and II fieldwork. One fieldwork experience is conducted outside of Cleveland (100 miles or more) to provide students with a wider perspective of the occupational therapy field and opportunities. Fieldwork must be conducted within 24 months of completing academic coursework before sitting for the national board exams. This state university was founded in 1964 and its MOT degree holds accreditation from the Accreditation Council for Occupational Therapy Education (ACOTE) and has been ranked in the top 100 Best Occupational Therapy Programs in the nation. Approximately 12,000 students are enrolled at the university. This Chicago university provides a sequential course of study for Master of Occupational Therapy. Required courses include Levels I and II fieldwork, gross anatomy, neuroscience, kinesiology, psychosocial studies, OT assessment and intervention, theories and conditions in OT and human development and performance. Students are required to have a baccalaureate degree, is highly competitive and accepts a limited number of applicants each academic year. Governors State University was established in 1969 and has an estimated student body of over 6,000 students. The MOT program is offered through the College of Health and Human Services and has received recognition from U.S. News and World Report's Best Occupational Therapy Programs in the #106 ranking. This entry level professional Master of Science in Occupational Therapy, OT program at Grand Valley State University holds ACOTE accreditation and provides both an on campus and a hybrid program . Both options will follow the same curriculum for the MSOT degree and will follow four curriculum themes of Occupational Perspective of Human Nature and Health, Critical Reasoning and Independent Learning, Competent Service Delivery and Socially Responsive Practice. Prerequisite courses are required for admission. With over 22,000 enrolled students, Grand Valley State University is located in Allendale, Michigan and is the main campus and was established in 1960. U.S. News and World Report rated this occupational therapy program #88 in its Best Occupational Therapy Programs ranking; and, the school boasts a 100% pass rate for students sitting for the national occupational therapy exam. This is the only Master of Science Occupational Therapy program in South Carolina. The program has admission prereqisites for students holding a baccalaureate degree. A seven term program, students will study human anatomy, introduction to occupational therapy and science, neuroscience, occupational performance in musculoskeletal conditions, pediatrics, geriatrics, etc. Students also participate in clinical correlates during the course of study and complete the program with two clinical practicum. The Medical University of South Carolina has been rated #17 for its occupational therapy program by U.S. News and World Report. Founded in 1824, MUSC the university established the School of Allied Health Professions in 1966 and holds accreditation from ACOTE for its occupational therapy degrees. Celebrating 100 years of providing occupational therapy education, the University of Alabama Birmingham School of Health Professions offers a Master of Science in Occupational Therapy which accredited by the Accreditation Counsel of Occupational Therapy Education. Requiring seven semesters, this degree coursework covers occupation based practice models, therapeutic skills, research methods, neuroscience, introduction to infants, pediatrics and adolescents, occupations in adults and older adults, non thesis research and Levels I and II fieldwork experiences. The University of Alabama Birmingham traces its beginnings to 1936 as an academic extension program and became autonomous in 1969 as one of three institutions in the University of Alabama System. This OT program is ranked #25 by U.S. News and World Report. UAB has an enrollment exceeding 18,000 students. A Master of Occupational Therapy AOTCE accredited program. The curriculum is based on didactic courses, critical thinking/reasoning, evidence based practices, professional growth and development. Some of the courses involved study human anatomy, fundamentals of neuroscience, OT assessment and intervention and OT performance in children, adolescent and aging patients. Students also complete Level IIA and Level IIB fieldwork experiences. Rated #126 in U.S. News and World Report for Best Occupational Therapy Programs, Chatham University is located in Pittsburgh, Pennsylvania and was established in 1869. The university has received recognition by the Princeton Review, Association of American Colleges and Universities and as a Military Friendly School. Currently, the university has an enrollment of over 2,100 students. A Master of Science in Occupational Therapy degree, this program holds accreditation from the Accreditation Council for Occupational Therapy Education (ACOTE). Utilizing an interprofessional approach the program begins with a foundation in science, followed by concentrations in working with the aging population, pediatrics. Students will complete a clinical experience in the first three semesters. Levels I and II fieldwork are required after the first year. UNE's occupational therapy program has been recognized #52 by U.S. News and World Report's Best Occupational Therapy Programs. Located in Biddeford, Maine, the University of New England has received honors from the Brookings Institute, the Princeton Review and Chronical of Higher Education for its quality in education. The University of New England grew from its modest beginnings in 1939 into the Biddeford and Portland campuses, as well as a campus in Tangier, Morocco (students may spend a semester or year staying on track with their majors by taking courses offered in English). This is a Master of Arts in Occupational Therapy (MAOT) degree which holds ACOTE accreditation. Students will cover evidence based practices, neurology, skills level courses in OT, biomedical concepts, rehabilitation, OT for older adults and pediatrics. Levels I and II fieldwork experiences are also required. Nicknamed, "St. Kate's", St. Catherine University was started in 1905 by the Sisters of St. Joseph of Carondelet. St. Kate is a private, women's liberal arts university located in Saint Paul, Minnesota and has over 4,700 students enrolled in its undergraduate and graduate programs. The OT program is ranked #22 by U.S. News and World Report's Best Occupational Therapy Programs and the university rates a #15 ranking in the Best Midwest Regional Universities. Saint Louis University offers a MSOT degree accredited by the Accreditation Council for Occupational Therapy Education (ACOTE) of the American Occupational Therapy Association (AOTA). Requiring two years to complete, studies include courses in kinesiology, neuroscience for occupational therapy, occupational therapy for aging adults, professional development; as well as, Level II Fieldwork. Students are matched with faculty mentors who guide the students in the development of a comprehensive project. Founded in 1818 by the Jesuit Catholic order, Saint Louis, the university has over 12,000 enrolled students; and, ranks 25th in U.S. News and World Report's Best Occupational Therapy Programs. Additionally, the university has received recognition from the Princeton Review, Forbes and the Fiske Guide to Colleges. The MOT degree at Xavier University is an entry level professional program which will require prerequisites for those with a non OT baccalaureate degree. Prerequisite courses include anatomy & physiology, rhetoric, statistics, physics, developmental psychology, bioethics, kinesiology, neuroscience and all human occupation study courses. Core coursework for the MOT degree will involve adaptations and technology, research projects and Levels I & II fieldwork. ACOTE accredited, this program ranks #58 in U.S. News and World Report's Best Occupational Therapy Programs. Xavier University, located in Cincinnati, Ohio was founded in 1831 by the Jesuits of the Catholic Church. This private institution provides undergraduate and graduate degree for over 9,700 students and has received recognition from Forbes magazine as one of its #341 Top Colleges. A Master of Science in Occupational Therapy offered through the Auerbach School of Occupational Therapy, and is available through two tracks. The school provides a Bachelor of Health Science/MSOT track for students without a previous baccalaureate degree and the MSOT degree for those with degrees in a field other than occupational therapy. The OT program is accredited by the Accreditation Counsel for Occupational Therapy Education. Holding the #58 position in U.S. News and World Report's Best Occupational Therapy Programs, Spalding University was established in Louisville, Kentucky by the Sisters of Charity of Nazareth in 1814; and, has an enrollment of over 2,500 students. University accreditation is provided by the Southern Association of Colleges & Schools Commission. The Auerbach School of Occupational Therapy began its program in 1995. In 1999, Creighton University launched the first, entry-level Doctor of Occupational Therapy degree in the nation. The program is accredited by the Accreditation Council for Occupational Therapy Education (ACOTE) of the American Occupational Therapy Association. Students will study such areas as occupation and health, neuroanatomy, occupational therapy in mental health, disability and healthcare policy, clinical education; and, Level IIA and Level IIB fieldwork. Creighton University's School of Pharmacy and Health Professions traces its beginnings to 1905 with the establishment of its School of Pharmacy. The DTO program has been recognized in the top 25 of U.S. News and World Report's ranking of Best Occupational Therapy Programs. In addition to the campus OTD, the school also offers a distance, hybrid program that partners with the University of Alaska Anchorage, Regis University in Denver and one in the greater Omaha, Nebraska area. Check with the school for details. Accredited by the Accreditation Council for Occupational Therapy Education (ACOTE), Boston University provides a Master of Science Occupational Therapy degree. The Sargent College is transitioning the MSOT to a Doctor of Occupational Therapy degree in compliance with the 2014 recommendation by American Occupational Therapy Association (AOTA). MSOT students will study evidence-based practices, functional movement, orientation to practice, assistive technology, context and occupational performance, etc. Students will also complete Level II Fieldwork. There is also a thesis option from which to choose. Ranked #1 by U.S. News and World Report's Best Occupational Therapy Programs, this program dates to 1881 with the establishment of the Sargent School of Physical Training. The school became part of Boston University in 1929 and has a 99% first pass rate for the national certification board exam.
2019-04-22T16:34:21Z
https://www.bestmedicaldegrees.com/affordable-occupational-therapy-degrees/
Christina Alexopoulou, M.D.; Eumorfia Kondili, M.D.; Eleni Diamantaki, M.D.; Charalambos Psarologakis, M.D.; Sofia Kokkini, M.D.; et al Maria Bolaki, M.D.; Dimitris Georgopoulos, M.D., Ph.D. From the Intensive Care Medicine Department, University Hospital of Heraklion, Medical School, University of Crete, Heraklion, Crete, Greece. Submitted for publication January 29, 2014. Accepted for publication June 9, 2014. Address correspondence to Dr. Georgopoulos: Intensive Care Medicine Department, University Hospital of Heraklion, Medical School, University of Crete, Heraklion, Crete 71110, Greece. [email protected]. This article may be accessed for personal use at no charge through the Journal Web site, www.anesthesiology.org. Background:: Dexmedetomidine, a potent α-2-adrenergic agonist, is widely used as sedative in critically ill patients. This pilot study was designed to assess the effect of dexmedetomidine administration on sleep quality in critically ill patients. Methods:: Polysomnography was performed on hemodynamically stable critically ill patients for 57 consecutive hours, divided into three night-time (9:00 pm to 6:00 am) and two daytime (6:00 am to 9:00 pm) periods. On the second night, dexmedetomidine was given by a continuous infusion targeting a sedation level −1 to −2 on the Richmond Agitation Sedation Scale. Other sedatives were not permitted. Results:: Thirteen patients were studied. Dexmedetomidine was given in a dose of 0.6 μg kg−1 h−1 (0.4 to 0.7) (median [interquartile range]). Compared to first and third nights (without dexmedetomidine), sleep efficiency was significantly higher during the second night (first: 9.7% [1.6 to 45.1], second: 64.8% [51.4 to 79.9], third: 6.9% [0.0 to 17.1], P < 0.002). Without dexmedetomidine, night-time sleep fragmentation index (7.6 events per hour [4.8 to 14.2]) and stage 1 of sleep (48.0% [30.1 to 66.4]) were significantly higher (P = 0.023 and P = 0.006, respectively), and stage 2 (47.0% [27.5 to 61.2]) showed values lower (P = 0.006) than the corresponding values (2.7 events per hour [1.6 to 4.9], 13.1% [6.2 to 23.6], 80.2% [68.9 to 92.8]) observed with dexmedetomidine. Without sedation, sleep was equally distributed between day and night, a pattern that was modified significantly (P = 0.032) by night-time dexmedetomidine infusion, with more than three quarters of sleep occurring during the night (79% [66 to 87]). Conclusion:: In highly selected critically ill patients, dexmedetomidine infusion during the night to achieve light sedation improves sleep by increasing sleep efficiency and stage 2 and modifies the 24-h sleep pattern by shifting sleep mainly to the night. In selected critically ill patients, dexmedetomidine infusions at night to achieve light levels of sedation increases sleep efficiency and modifies 24-h sleep patterns by shifting sleep to nights. A widely held belief is that sedation in critically ill patients promotes sleep and thus reduces the detrimental effect of sleep deprivation or poor sleep quality. Indeed, it has been shown that in approximately 50% of mechanically ventilated patients, the dose of γ-aminobutyric acid receptor (GABA) agonists (propofol and benzodiazepines) is increased during the night (11:00 am to 7:00 pm).9 Recent data, however, suggest that this strategy may not be beneficial. In critically ill patients ventilated on assisted modes, propofol administration, to achieve the recommended level of sedation, does not increase sleep efficiency, whereas suppressing the REM sleep stage further worsens the poor sleep quality of these patients.10 These results do not support the use of GABA agonists to facilitate sleep in critically ill patients ventilated on assisted modes. Dexmedetomidine is a potent α-2-adrenergic agonist, with widespread action on the brain that includes sedation, anesthetic-sparing, analgesia, and sympatholytic properties.11 It has been shown that compared to GABA agonists, dexmedetomidine more closely resembles natural non-REM sleep.12–15 However, polysomnographic data on critically ill patients are scanty. The only study that performed polysomnography to assess sleep with dexmedetomidine sedation was that of Oto et al.,16 which concluded that, in mechanically ventilated patients, night-time infusion of dexmedetomidine induced severely disturbed sleep architecture since there was no evidence of SWS and REM sleep. Nevertheless, the absence of the control group and the fact that sedation depth was not tightly controlled ranging from light to severe (−1 to −4 on Richmond Agitation Sedation Scale [RASS]) complicate the interpretation of these results. The aim of this pilot study was to examine sleep quality in critically ill patients with and without dexmedetomidine sedation, titrated to achieve RASS −1 to −2. The study, performed between October 2011 and November 2013, was approved by the human studies subcommittee (Ethics Committee, University Hospital of Heraklion, Greece), and informed consent was obtained from patients and surrogates. Critically ill patients who had been receiving mechanical ventilation for at least 48 h before study entry and who were anticipated to be in the intensive care unit (ICU) for at least 5 days after study entry were enrolled. At the time of the study, the patients were hemodynamically stable without vasoactive and sedative drugs and were either ventilated on assisted modes of support (pressure support or proportional assist ventilation) or breathed spontaneously (t-piece) through cuffed endotracheal or tracheostomy tubes. In all patients, before the study, a morning blood sample was obtained to measure plasma levels of propofol and midazolam. Exclusion criteria were (1) Glasgow Coma Scale less than 11, (2) acute physiology score portion of the Acute Physiology and Chronic Health Evaluation II (APACHE II) greater than 15,17 (3) administration of any sedative drugs during the last 24 h, (4) detectable plasma levels of propofol or midazolam, (5) heart rate less than 50 min−1, (6) second- or third-degree atrioventricular block (unless pacemaker installed), (7) severe liver failure (bilirubin >100 μmol/l), (8) use of centrally acting α-2 agonists or antagonists within 24 h before start of the study, (9) history of epilepsy, (10) history of any other neurological disease that may potentially have significant effect on sleep quality, (11) history of sleep apnea, (12) ongoing sepsis, and (13) presence of delirium at the time of the study, as defined by the confusion assessment method for ICU.18 The mode of support and ventilator settings were determined by the primary physician, who was not involved in the study. Patients who received opioids for analgesia were not excluded, provided that there was no change in the dose throughout the study. Where necessary, nonsteroidal antiinflammatory drugs were used for additional analgesia. Administration of neuroleptic (antipsychotic) medications during the entire study period was a reason for patient withdrawal. Polysomnography was performed on each patient as previously described.19 Sleep data were processed automatically (Alice; Respironics, Pittsburgh, PA) according to established rules20 and stored in a computer disc for later analysis. Sleep architecture was scored manually using standard criteria.20 Sleep efficiency was calculated as the ratio between the total sleep time and the total recording time and expressed as percentage.20 Sleep fragmentation index was calculated as the sum of arousals and awakenings per hour of sleep20 (additional details are shown in Supplemental Digital Content 1, http://links.lww.com/ALN/B62). Each patient was studied for a total of 57 h, divided into three night-time (9:00 pm to 6:00 am) and two daytime (6:00 am to 9:00 pm) periods (fig. 1). The entire study started at 9:00 pm and ended 57 h later at 6:00 am. At 9:00 pm on the second night, a loading dose of dexmedetomidine was given (0.5 μg/kg over 20 min), followed by a continuous infusion at a rate adjusted (0.2 to 0.7 μg kg−1 h−1) to maintain a sedation level −1 to −2 on RASS. To prevent bias in dexmedetomidine administration, only two senior intensivists (C.A. and E.K.) were responsible for dexmedetomidine titration and did not have access to electroencephalogram. Continuous infusion was stopped at 6:00 am. Apart from this time interval, the patients did not receive any sedation throughout the study (fig. 1). If there was need for sedation, as judged by the primary physician, the patient was withdrawn from the study. Noise, nursing, and other interventions were minimized during the nights of the study. In addition, during the nights, light was decreased to a minimum level that did not interfere with patients’ assessment. Care was taken to ensure similar environmental conditions among the 3 study nights. In addition, the mode of ventilation and assist level remained unaltered during the study nights. Changes in the mode of ventilation or assist level based on the primary physician’s judgment resulted in patient withdrawal from the study. Patients who required a change in the mode of ventilation during the daytime periods were not excluded from the study but were analyzed only during the night-time. Study design. Dex = Dexmedetomidine. Arterial blood gasses were measured at the beginning and end of each study night. Heart rate, invasive arterial blood pressure, tidal volume (VT), and respiratory rate were recorded during the night at half-hour intervals. VT was recorded only in mechanically ventilated patients as measured by the ventilator. During the entire study, the patients were attended by dedicated research assistants (ICU nurse). In addition, the proper placement of the polysomnography leads was inspected periodically by one of the researchers. No a priori power analysis was conducted. The number of studied patients was a compromise between the difficulty in recruitment (due to study design) and meaningful statistical analysis. Data were analyzed using nonparametric tests (SPSS version 17; IBM, Armonk, NY). Continuous variables were expressed as medians (25th to 75th interquartile range). Variables were compared using the Friedman test for repeated measurements followed, when indicated, by a pairwise comparison with the Wilcoxon signed-rank test using Bonferroni post hoc correction. Categorical variables were compared using the Fisher exact test. Statistical tests were two sided, and a P value less than 0.05 was considered statistically significant. Sixteen patients were studied. All met the definition of difficult or prolonged weaning, having been on mechanical ventilation for several days before the study. None of the patients had detectable levels of midazolam (or any other benzodiazepine) or propofol. Three patients did not complete the study and were excluded from the analysis. The reasons for study interruption were bradycardia (<50 beats/min) during dexmedetomidine infusion in one patient and decision of the primary physician to use sedation with GABA agonists and mode change in the others. Baseline characteristics of the remaining 13 patients are shown in table 1. By study design, all had sleep data during the 3 study nights, and 10 patients had also sleep data during the daytime periods (i.e., no mode change during the daytime periods was performed in these 10 patients). Three out of 13 patients received opioids (transdermal fentanyl 25 μg/h [n = 1], morphine 0.5 mg/h [n = 1], and tramadol hydrochloride 50 mg every morning [n = 1]) for analgesia and/or respiratory distress. The starting maintenance infusion dose of dexmedetomidine was 0.2 μg kg−1 h−1 (0.2 to 0.2) and increased to 0.6 μg kg−1 h−1 (0.4 to 0.7) to achieve a score of −1 to −2 on RASS. APACHE II score (calculated before study nights) did not differ significantly among nights (14 [13 to 17], 15 [13 to 18], 14 [12 to 17], P = 0.161). Throughout the entire night, arterial blood gasses, VT, respiratory rate, and arterial blood gasses remained stable and without significant differences among nights (see these results in tables 1 and 2, Supplemental Digital Content 2, http://links.lww.com/ALN/B63). The maximum dose of dexmedetomidine was associated with a significant decrease in heart rate (see table 3, Supplemental Digital Content 2, http://links.lww.com/ALN/B63). Sleep efficiency differed significantly among the 3 study nights; compared to nights without dexmedetomidine infusion, sleep efficiency was significantly higher during the night with dexmedetomidine (fig. 2). Six patients during the first night and seven patients during the third night had sleep efficiency less than 10%, whereas in none during the second night (dexmedetomidine infusion) sleep efficiency was less than 10% (P = 0.006, Fisher exact test). One patient did not achieve sleep during the second or third night. Overall, three and four patients, during the first and third night, respectively, did not achieve sleep (see table 4, Supplemental Digital Content 2, http://links.lww.com/ALN/B63, for sleep architecture during the three study nights). (A) Box-whisker plot of sleep efficiency during the 3 study nights. Data pertain to 13 patients. (B) Individual sleep efficiency during the three study nights. Each color denotes an individual patient. *Significantly different from sleep efficiency during the second night. TRT = total recording time. Because in patients who achieved sleep both during the first and third night (n = 7), sleep architecture did not differ between these 2 nights, sleep architecture data were analyzed as follows. The sleep stages, expressed as percentage of total sleep time, and sleep fragmentation index were averaged during the 2 nights (first and third) in patients in whom sleep was observed on both nights (n = 7), whereas in patients in whom sleep occurred only on one of these nights (n = 5) the corresponding single value was used for analysis. Thus, each patient (n = 12) had sleep architecture data pertained to nights without dexmedetomidine, which was compared to that with dexmedetomidine. With dexmedetomidine, sleep fragmentation index and stage 1 of sleep (N1) were significantly lower, whereas stage 2 (N2) was higher than the corresponding values observed during the nights without dexmedetomidine (figs. 3 and 4). SWS (N3) and REM sleep did not differ with or without dexmedetomidine. (A) Box-whisker plot of sleep fragmentation index with and without dexmedetomidine infusion. Data pertain to 12 patients. (B) Individual sleep fragmentation index with and without dexmedetomidine infusion. Each color denotes an individual patient. *Significantly different from the corresponding values without dexmedetomidine. (A) Box-whisker plot of night-time sleep architecture with and without dexmedetomidine infusion. Data pertain to 12 patients. (B) Individual percentage of total sleep time of stages 1 and 2 of sleep with and without dexmedetomidine infusion. Each color denotes an individual patient. *Significantly different from the corresponding sleep stage without dexmedetomidine. REM = rapid eye movement sleep; SWS = slow wave sleep (N3); TST = total sleep time. In 10 of 13 patients polysomnography was performed for two consecutive 24-h periods (first and second periods). Sleep efficiency did not differ during the daytime periods before and after dexmedetomidine (14.3% [6.5 to 25.5] vs. 17.3% [5.8 to 28.0], P = 0.695). All patients achieved sleep during the daytime period before (first day) and nine of them achieved sleep after dexmedetomidine (second day). Compared to the previous night (first night), sleep efficiency during the first day did not differ significantly. Sleep efficiency during the second day was significantly lower than that during the previous night when dexmedetomidine was given (second night) (see these data in table 5, Supplemental Digital Content 2, http://links.lww.com/ALN/B63). Compared to sleep architecture during the first day (before dexmedetomidine infusion), sleep architecture during the second day (after dexmedetomidine infusion) was characterized by less stage 1 and more stage 2 and REM sleep, the difference, however, being nonsignificant (see fig. 1, Supplemental Digital Content 3, http://links.lww.com/ALN/B64). Sleep was equally distributed between day and night in the first period (no dexmedetomidine infusion during the night), while it mainly occurred during the night in the second period (dexmedetomidine infusion during the night); 48% (32 to 71) of total sleep time occurred during the night in the first period and 79% (66 to 87) in the second (P = 0.032). The main findings of our study were that in critically ill patients, dexmedetomidine infusion during the night titrated to achieve light sedation (RASS −1 to −2) significantly increased sleep efficiency and improved sleep architecture by reducing the sleep fragmentation and stage 1 and increasing the stage 2 of sleep. Furthermore, our study showed that without sedation, sleep was equally distributed between day and night, a pattern that was modified by night-time dexmedetomidine infusion with more than three quarters of sleep occurring during the night. The RASS was used for titration of dexmedetomidine administration.21,22 This scale has been validated properly, has excellent interrater reliability, is relatively simple, and is used extensively in ICUs worldwide. Furthermore, in our study, to avoid errors in sedation depth, the titration of dexmedetomidine was performed by two senior intensivists (C.A. and E.K.). In addition, the physicians responsible for titration did not have access to electroencephalogram, which guarantees that the titration of dexmedetomidine followed the usual clinical practice (i.e., use of sedation scale) and was not influenced by electroencephalogram. Our study reconfirmed previous studies showing that critically ill patients exhibit disorganized and poor quality sleep as evidenced by the lack of sequential progression through sleep stages and low percentages of SWS and REM sleep.2,3,10,19 Dexmedetomidine infusion at doses titrated to achieve the recommended sedation depth in critically ill patients increased sleep efficiency and improved the sleep architecture by decreasing the stage 1 and increasing stage 2 of sleep. Notwithstanding that few patients exhibited SWS and REM, dexmedetomidine did not affect SWS and REM sleep. In addition, sleep became less fragmented with dexmedetomidine. These results contradict those obtained with the GABA agonist propofol, which worsened sleep quality because the drug virtually eliminated REM sleep with no effect on sleep efficiency, sleep fragmentation, and stage 1 and 2 of sleep.10 Nevertheless, the fact that dexmedetomidine sedation does not increase the most restorative sleep stages (SWS and REM)23 indicates that sleep quality of critically ill patients remains low even during sedation with this agent. It is not known, however, if longer or more often (i.e., every night) administration of this sedative might further influence sleep quality in these patients. Recently, Oto et al.16 infused dexmedetomidine during the night in mechanically ventilated patients and concluded that the drug induced severely disturbed sleep architecture without evidence of SWS and REM. However, in this study, night-time sleep without dexmedetomidine was not studied. In addition, daytime sleep before dexmedetomidine infusion was also characterized by the absence of SWS and REM. Our study did not show any evidence of dexmedetomidine-induced sleep disruption in critically ill patients; compared to no sedation, dexmedetomidine did not affect SWS and REM sleep, and on the other hand, sleep became deeper (increased stage 2, decreased stage 1) and less fragmented. Also, daytime and night-time data after dexmedetomidine infusion did not show any hard evidence of REM rebound phenomenon, although there was a trend for increased REM after sedation. Finally, it is of interest to note that sleep architecture with dexmedetomidine is quite similar to that reported by Oto et al. (relatively high sleep efficiency and stage 2 of sleep and low stage 1 and SWS, see table 2 in Oto et al.16 study). It is well documented that circadian rhythm is abolished in critically ill patients due to pronounced temporal disorganization or disturbances in melatonin secretion.24 Our study showed that dexmedetomidine may preserve the day–night cycle of sleep, partly restoring the normal circadian rhythm. Compared to a 24-h period with no sedation in which sleep was equally distributed between day and night, dexmedetomidine infusion during the night resulted in a night-time shift of sleep; when dexmedetomidine was infused during the night, less than one-quarter of the total 24 h of sleep occurred during the day. However, we believe that these findings are largely due to study design (i.e., administration of dexmedetomidine during the night) since there is no known reason to expect different effect of dexmedetomidine on sleep if the medication would be given during daytime (although this issue should be formally studied). Our results may have clinical implications. Studies have shown that delirium and posttraumatic stress disorder, common morbidities in critically ill patients and ICU survivors, may be linked to sleep abnormalities during the ICU stay.23 In addition, GABA agonists, which worsen sleep in these patients,10 are an independent risk factor for both delirium and posttraumatic stress disorder.9,25,26 On the other hand, some studies have demonstrated that compared to GABA agonists, dexmedotimidine may be associated with a decreased incidence of delirium,27–29 and this might be partly explained by the achievement of better sleep, as our study demonstrated. Nevertheless, further studies are needed to clarify these issues. This study has several limitations. First, in order to facilitate sleep classification using the standard criteria,20 a highly selected group of critically ill patients were studied. These criteria have not been developed for critically ill patients in whom atypical sleep pattern, such as electroencephalogram features of SWS and absence of typical stage 2 sleep (i.e., absence of K complexes and sleep spindles), may be observed.30 In our study, patients with conditions known to be associated with this pattern (i.e., ongoing sepsis) were excluded. Thus, the results of this study should be applied with caution to a general population of critically ill patients in whom acute critical illness may cause encephalopathy and atypical sleep patterns.30 Second, because of the study design, patients not requiring sedation were studied. In patients needing sedatives for various reasons (i.e., agitation, patient–ventilator dyssynchrony), the results might be different, and this is also certainly a limitation. Third, because of the strict selection criteria we applied, the recruitment rate was very low (annual rate of ICU admission approximately 500 patients), and thus, the number of patients studied over the 2-yr period was small. Nevertheless, the effect of dexmedetomidine on sleep was rather consistent between patients, partly overcoming this limitation. In conclusion, this pilot study shows that night-time dexmedetomidine administration to achieve the recommended level of sedation in highly selected critically ill patients increases sleep efficiency and improves sleep quality by reducing the sleep fragmentation and shifting the sleep from stage 1 to stage 2. In addition, dexmedetomidine modifies the 24-h sleep pattern by shifting sleep mainly to the night, partly restoring normal circadian rhythm. This study was supported by a grant from Orion Pharma (Espoo, Finland) through research contract with the University of Crete, Heraklion, Crete, Greece. Dexmedetomidine was supplied by Orion Pharma. Orion Pharma was not involved in any aspect of the design or conduct of the study, the data analysis, or the article preparation and presentation. Dr. Georgopoulos received lecture fee (honoraria) from Orion Pharma (Espoo, Finland). The other authors declare no competing interests. Christina Alexopoulou, Eumorfia Kondili, Eleni Diamantaki, Charalambos Psarologakis, Sofia Kokkini, Maria Bolaki, Dimitris Georgopoulos; Effects of Dexmedetomidine on Sleep Quality in Critically Ill Patients: A Pilot Study. Anesthesiology 2014;121(4):801-807. doi: 10.1097/ALN.0000000000000361.
2019-04-18T10:53:16Z
https://anesthesiology.pubs.asahq.org/article.aspx?articleid=1921556
Google hasn’t even decided whether or not it will bring its high-speed Fiber broadband and TV service to Louisville. The Kentucky city is currently listed as merely a “potential” Fiber market. But that hasn’t stopped AT&T from suing Louisville administrators in an effort to make sure that Google will have a tougher time if it chooses to launch there. Yesterday, AT&T filed a lawsuit [PDF] against the Louisville government over a recently passed ordinance that amends existing city rules about the use of utility poles and rights-of-way to give a new “Attacher” — like, say Google Fiber — the right to rearrange or relocate the existing physical facilities and pole attachments of other communications providers, which basically means AT&T. If AT&T doesn’t own a pole in question and readjusting the existing AT&T hardware wouldn’t interfere with service, Google wouldn’t need to provide any notice before moving things around. But if shuffling AT&T hardware around will impact service, Google would need to give 30 days written notice to the telecom giant. “The Ordinance thus purports to permit a third party… to temporarily seize AT&T’s property, and to alter or relocate AT&T’s property, without AT&T’s consent and, in most circumstances, without prior notice to AT&T,” reads the lawsuit, filed in a federal court in Louisville. AT&T argues that not having prior notice of these pole adjustments would deprive the company of “the opportunity to assess the potential for network disruption.” The company further contends that if a hardware move does indeed impact AT&T service, it “may be hampered in locating and correcting that trouble” because it did not have any notice about which poles were being worked on. The lawsuit also points to existing FCC regulations stating that when a utility is prepping to do its new pole attachments, it “shall notify immediately and in writing all known entities with existing attachments that may be affected by the make-ready.” AT&T argues that the FCC rules would also require that it have 60 days after receiving that notice to make its own adjustments before anyone else can touch the AT&T hardware. There is a catch in the law that does allow states to have different standards regarding pole attachments, but AT&T maintains that only state law — and not a city or county ordinance — has the authority to override the FCC rules. AT&T is seeking an injunction to prevent Louisville from enforcing the new pole attachment rules, and for the court to declare the ordinance invalid and unenforceable. Of course, there isn’t exactly a horde of bandit broadband and telecom providers looking to string their cables on Louisville utility poles; just Google, and even then that’s only a possibility. So AT&T’s claim that this is “not about Google” rings slightly disingenuous. Who foots the bill, because I would bet my left leg that Google will shrug and say it wasn't their fault. I'm firmly with att here, it's their equipment, they should be the ones that touch it. Not someone else. No, the law as it stands says they can only rearrange the boxes on the pole, not open them or disable them in any way. They could make ATT go to each pole and move the boxes themselves since the city owns the poles. They could even make att put up their own poles if they decided that google fiber is better for the city than ATT is. Well in Australia at the moment we have the NBN (National Broadband Network) rolling out. Now if they want access to the infrastructure, ducts and pits, They needed to get permission from Telstra & Optus who own the majority of the copper and cable networks so that NBNCo can use them for their FTTN and HFC networks where FTTP/H will not be rolled out. I am lucky where I live as in my neighborhood we are getting FTTP/H and the state government owned electricity company has given permission to NBNCo and its contractors to use our power poles to save digging up the footpaths to run the fibre to the utility box. But yes I agree that ATT should be the one to say who can touch and play with their equipment and infrastructure. If fibre is already in the area then Google should just use that. from the way you say things like "only rearrange" I can only guess that you've never taken a bunch of equipment in an IT room and "just moved it slightly and had that gone wrong. or you've never seen the affect of sunlight on wires strung from poles, where the UV tends to make the casings brittle, and where moving them could cause all manner of issues. Sure ATT can't just say my stuffs there, and it's the only stuff allowed to be there. BUT at the same time. AT&T own that equipment, and those wires, it's their property and nobody else should be touching it. I guess that is of course unless google are willing to indemnify AT&T against any issues. seems like a massive risk, of course google won't agree to indemnify AT&T, so why should AT&T just let google have free reign with their equipment. especially when a few "accidents" whilst moving would make the AT&T service look pretty bad and generate google fibre a few customers? Obviously Google is responsible for their actions. I suppose the city can tell ATT they have a week to move all their equipment off city property or it will be removed for them at their expense and they will be fined if they want to hold the city in check. But that's where it gets even more complicated. What if an outage is caused by a guy from google dropping a box off of a pole? Pretty straight their fault? So if it's not ok, are Google liable if improper strain relief wasn't used from the start? Are Google liable for tha acts of nature (sun, heat and cold extremes) that will degrade the insulators on the wire? And even if it was, a lot of those customers are going to be happy customers, they want AT&T. And those that don't want AT&T at least want something more than the nothing that they would get if all AT&T equipment was taken out and then google fibre starts to roll out. Basically this is a case of poor planning. Multiple providers should have been thought of from the start, not as the case is where huge companies like bell were broken up into a handful of companies each handed a regional monopoly. City's equipment (the poles) rightly should be for everyone to use. So from the start they should have told AT&T they get to use only a percentage of the pole, and must leave space for competitors. As it stands, it may be that the only way out of this for all concerned would be for the city to renew poles with bigger poles (ie more space at the top) allowing AT&T to use the space that they are currently using, and create more space for competitors in the market. Bookmark§ 116.72 RIGHTS-OF-WAY MANAGEMENT AND FACILITIES REQUIREMENTS. (A) Encroachment permit. A franchisee shall be subject to and comply with the additional or supplementary terms and conditions of Louisville Metro’s “Encroachment on Rights-of-Way Permit,” as may be amended from time to time, which is incorporated herein by reference and such provisions and the provisions of said encroachment permit shall be deemed a condition of any franchise. (B) Additional facilities requirements; planned infrastructure. When a franchisee installs any new underground facilities, the franchisee shall, unless waived by Louisville Metro, simultaneously install conduit provided by Louisville Metro (“Louisville Metro Conduit”). Louisville Metro shall reimburse franchisee for any marginal or additional costs incurred by franchisee in connection with installation of the Louisville Metro Conduit. Louisville Metro Conduit shall be installed in accordance with Louisville Metro specifications and consistent with sound engineering practice. No Communications Franchise Fee shall apply to any Louisville Metro Conduit. (C) Removal of facilities. Upon expiration of a franchise, whether by lapse of time, by agreement between the franchisee and Louisville Metro, or by forfeiture thereof, the franchisee shall remove, at its sole cost, from the rights-of-way any and all of its facilities that are the subject of such franchise within a reasonable time after such expiration, not to exceed 90 days, and, it shall be the duty of the franchisee immediately upon such removal to restore the rights-of-way from which the facilities are removed to as good condition as the same were before the removal was effected and as required by Louisville Metro. Notwithstanding the foregoing, Louisville Metro may allow facilities to be left in place when Louisville Metro determines in its sole discretion that it is not practical or desirable to require removal. (D) Relocation of facilities. Whenever Louisville Metro shall in its exercise of the public interest request of the franchisee the relocation or reinstallation of any of its facilities, the franchisee shall forthwith remove, relocate, or reinstall any such property as may be reasonably necessary to meet the request and the cost of such relocation, removal, or reinstallation of the facilities shall be the exclusive obligation of such franchisee. A franchisee shall, upon request of any other person requesting relocation of facilities and holding a validly issued building or moving permit of Louisville Metro, temporarily raise, lower, or relocate its wires or other facilities as may be required for the person to exercise the rights under the permit within 48 hours prior to the date upon which said person intends to exercise its rights under said permit; provided, however, that the franchisee may require such permit holder to make payment in advance for any expenses incurred by said franchisee pursuant to such person’s request. (E) Franchisee responsible for costs. A franchisee shall be responsible for all reasonable costs incurred by Louisville Metro that are directly associated with the franchisee’s erecting, installing, maintaining, operating, repairing, replacing, removing or restoring its facilities in the rights-of-way. A franchisee shall be responsible for its own costs incurred in removing or relocating its facilities when required by Louisville Metro due to Louisville Metro requirements relating to maintenance and use of the rights-of-way for Louisville Metro purposes. (F) Insurance and bonds. During the term of any franchise, a franchisee shall obtain and maintain at its sole expense, all insurance and bonds required by this subchapter. Nothing contained in this subchapter shall limit a franchisee’s liability to Louisville Metro to the limits of insurance certified or carried. (1) Upon being awarded a franchise, Franchisee shall immediately file a Franchise bond in the amount of $1,000,000, and a performance bond in an amount to be determined by the Director of the Department of Public Works and Assets. In no event shall the amount required by the Department of Public Works and Assets exceed the reasonable costs of repairing the rights of way in the event of non-performance by the franchisee. Said performance bond shall provide for the faithful performance of construction and installation of franchisee's system. Two years after demonstration of the completion of the construction of the system by franchisee to Public Works and Assets Department, Public Works and Assets Department shall release the performance bond. (2) Said performance bond shall indemnify Louisville Metro in its own right and as trustee, from any damages or losses arising out of the failure of franchisee to faithfully perform and satisfactorily complete construction of the system in accordance with this subchapter. (3) The failure of franchisee to comply with its obligations under this subchapter or the franchise as determined by Louisville Metro shall entitle Louisville Metro to draw against either or both of Franchisee’s performance or franchise bonds . (4) The rights reserved to Louisville Metro with respect to the performance and franchise bonds required hereunder are in addition to all other rights of Louisville Metro, whether reserved by this subchapter or authorized by law, and no action, proceeding or exercise of a right with respect to such performance or franchise bonds shall affect any other rights Louisville Metro may have. (a) General Liability Insurance , via an occurrence form, covering bodily injury, including death, personal injury and property damage, and including completed operations, contractual liability, independent contractors protective liability and personal injury liability protection. The minimum acceptable limit of liability amount is $5,000,000 per occurrence and aggregate under a combined single limit. This policy must include the Louisville/Jefferson County Metro Government, including its Mayor and Metro Council members, as Additional Insureds as respects all operations of the Insured Franchisee. This policy must cover Metro Government for damages resulting from the transmission of any communication over the cable communications system. The Metro Government reserves the right to make reasonable increases in the required amount of insurance coverage herein at anytime. Nothing herein is intended as a limitation on the extent of any legal liability of the franchisee. (b) Copyright Infringement Liability insurance covering any alleged infringement of patent or copyright of any other legal infringement in the transmission of materials through the cable franchise system. This coverage may be written as part of the General liability Insurance, or through a stand-alone policy, however, if written separately, it must have a minimum limit of liability amount of $5,000,000 per occurrence and aggregate under a combined single limit and include the Louisville/Jefferson County Metro Government, including its Mayor and Metro Council members, as Additional Insureds as respects all operations of the Insured Franchisee. The Metro Government reserves the right to make reasonable increases in the required amount of insurance coverage herein at anytime. Nothing herein is intended as a limitation on the extent of any legal liability of the franchisee. (7) Franchisee shall maintain on file with Louisville Metro a certificate of insurance certifying the coverage required under this subchapter, which certificate shall be subject to the approval of Louisville Metro as to the adequacy of the certificate and of the insurance certified under the requirements of this subchapter. Metro may at its sole discretion require a certified copy of the insurance policy(s) required under this subchapter, specifically endorsed to include all liability assumed by franchisee hereunder. Such policy(s) and certificate shall be identified on their face by the name of franchisee, and shall be submitted to Louisville Metro, in accordance with the terms and conditions of this subchapter. Failure to maintain adequate insurance as required under this subchapter shall be deemed a breach of the franchise. (8) Metro Louisville reserves the right to make increases in the amount of insurance coverage referred to in this section at any time. (G) Permits. Prior to performing any construction or installation work in the public rights-of-way, franchisee shall apply to the Public Works and Assets Department for a permit, and shall include descriptive information about the specific location of any lines, facilities, boxes, or related equipment. All terms and conditions of the permit application shall apply and be adhered to. (1) Franchisee shall furnish detailed plans of the work to be done within the public rights-of-way and provide other such information as required by Louisville Metro. (2) Franchisee shall coordinate any construction work within the public rights-of-way with the Public Works and Assets Department and shall begin construction work only after approval of the Public Works and Assets Department. (3) All permits issued by Louisville Metro shall be conspicuously displayed at all times at the indicated work site and shall be available for inspection by Louisville Metro personnel. (H) Notification. Franchisee shall notify Public Works and Assets Department, in writing, at least 15 days prior to construction. Such written notification shall contain the location of the construction, the starting date and the estimated completion date. (I) Underground construction. Except as provided in § 116.72(J), all of franchisee's facilities shall be installed underground and all street crossings installation shall be made by trenchless technology. (1) Franchisee shall register any and all underground line locations with the local “Before You Dig” or “BUD” office for tracking specific underground line locations. (b) To the satisfaction of Public Works and Assets Department, and, if not acceptable, may be completed by Louisville Metro at franchisee’s expense. (3) At any time franchisee disturbs the yard, residence, or other real or personal property in Louisville Metro, franchisee shall ensure that the yard, residence, or other personal property is returned, replaced, and/or restored to a condition that is sufficiently comparable to the condition that existed prior to the commencement of the work. (4) The costs associated with both the disturbance and the return, replacement, and/or restoration shall be borne by franchisee. (J) Aerial construction. Aerial construction of facilities must be specifically authorized by Louisville Metro prior to construction and located to minimize interference with the other uses of the rights-of-way and other public properties, and interference with the rights and reasonable convenience of property owners whose property adjoins any of the rights-of-way and other public properties. The decision to authorize above ground construction shall be applied in a non-discriminatory manner. If other franchisees have facilities above ground and there is capacity available, above ground installations shall be permitted until such time as all franchisees are required to relocate underground. Aerial facilities shall be moved underground at franchisee’s own cost upon request from Louisville Metro or when other users of the same rights-of-way convert to underground facilities. (K) Standards. Any work required or performed pursuant to this subchapter shall be done in accordance with federal, state and local law, and the National Electric Code. (1) In the event that franchisee leases space on the poles or in the conduits of an electric or other utility, franchisee shall abide by the construction and other requirements of said utility, and the granting of a Communications Franchise by Louisville Metro shall not be construed or interpreted in any way to alleviate franchisee’s responsibilities and obligations to the pole or conduit owner. (2) Franchisee, its contractors, sub-subcontractors and anyone directly or indirectly employed by franchisee, shall conduct such operations so as to promote and preserve the public safety and general welfare of the citizens of Louisville Metro. (3) All construction, installation or maintenance by franchisee shall be completed with diligence and with respect to all property, contracts, persons, rights and the interests and rights of the public. (4) During any phase of construction, installation, maintenance, and repair of the system, franchisee shall use materials of good and durable quality and all such work shall be performed in a safe, thorough, and reliable manner. (L) Traffic. Franchisee’s work in the rights-of-way shall be accomplished with a minimum of disruption and interference to the free flow of vehicular and pedestrian traffic on the public rights-of-way or public land. (1) Franchisee shall maintain lanes of vehicular traffic in each direction at all times during construction, installation or maintenance activity. (2) Traffic control devices to protect and control pedestrian and vehicular traffic in any construction, maintenance or installation areas may be prescribed by Louisville Metro in accordance with the Manual on Uniform Traffic Control Devices. (M) Delay. Louisville Metro required improvements to Louisville Metro rights-of-way shall not be delayed by work authorized by this subchapter. (3) Franchisee demonstrates that the requirement unreasonably discriminates against franchisee in favor of another person. (4) Any special exceptions shall be granted in a non-discriminatory manner. (O) Inspections. All construction, installation and operation of franchisee’s system in the rights-of-way are subject to inspection by Public Works and Assets Department. (P) Repair of sunken pavement over excavation. In case the pavement or the surface of the rights-of-way over any excavation should become depressed or broken at any time within five years after the excavation has been completed and before resurfacing of the rights-of-way, natural wear of the surface excepted, franchisee shall, upon written notice from Public Works and Assets Department, immediately proceed to inspect the depressed or broken area over the excavation to ascertain the cause of the failure. Franchisee shall make repairs to the installation or backfill and have the pavement restored as specified by Public Works and Assets Department, within such time period as may be specified by Public Works and Assets Department. If the pavement is not restored as specified by Public Works and Assets Department within the time period specified by Public Works and Assets Department, and unless delayed by a strike or conditions beyond franchisee’s control, Louisville Metro may cause the work to be done after giving franchisee 24 hours final notice. The cost thereof, including, but not limited to, any inspection costs and administrative overhead incurred by Louisville Metro, shall be assessed against franchisee. (A) Administration of franchise. Louisville Metro shall be responsible for the continued administration of this subchapter and any franchises granted hereunder. (B) Non-enforcement by Louisville Metro. A franchisee shall not be relieved of its obligation to comply with any of the provisions of this subchapter or its applicable franchise by reason of any failure of Louisville Metro to enforce prompt compliance. (C) Publication of notices. A franchisee shall be responsible for all costs of publication that may be required with respect to its franchise or any amendments or renewals thereto. (D) Severability. If any material provision of this subchapter or of any franchise granted pursuant to it is held by a governmental authority of competent jurisdiction to be invalid or unlawful as conflicting with applicable laws now or hereafter in effect, or is held by a court or competent governmental authority to be modified in any way in order to conform to the requirements of any such applicable laws, such provision shall be considered a separate, distinct, and independent part of this subchapter or the franchise, and, to the extent possible, such holding shall not affect the validity and enforceability of all other provisions herein or therein. (A) Revocation of licenses to use the rights-of-way. Any and all licenses and other authority which: (1) Louisville Metro may have extended to any person prior to the effective date of this subchapter to erect, install, maintain, operate, repair, replace, remove or restore Communications Facilities or provide Communications Services by use of facilities in the rights-of-way in Louisville Metro; and (2) are expressly revocable at the will of Louisville Metro, are hereby revoked and deemed null and void as of 11:59 p.m. Eastern Standard Time on the date which is 90 days after the effective date of this subchapter. Within 90 days after the effective date of this subchapter, any person holding such revocable license or other authority may file an application for a Communications Franchise and, by doing so, shall be deemed granted a temporary license to continue erecting, installing, maintaining, operating, repairing, replacing, removing and restoring Communications Facilities or providing Communications Services by use of facilities in the rights-of-way in Louisville Metro under the same terms and conditions during the pendency of such application. Upon award or denial of the Communications Franchise for which such person applied, all authority under which such person was erecting, installing, maintaining, operating, repairing, replacing, or removing facilities or providing Communications Services by use of facilities in the rights-of-way in Louisville Metro as of the effective date of such award or denial shall be deemed immediately revoked, null and void without further notice as of the effective date of the award or denial of the Communications Franchise. (B) Existing franchises. No telecommunication franchise previously granted shall be revoked or terminated by this amended subchapter, but the holder of any prior franchise shall be entitled to apply for a new franchise hereunder and shall not be required to pay a new application fee. Upon written request to Louisville Metro such previous franchise holder shall be automatically deemed to have complied with all application and qualification requirements hereunder. Upon grant of a new franchise, the holder of a prior franchise may surrender the prior franchise and receive a pro rata credit for any fees paid under the prior franchise against any costs, bond requirements or charges assessed under the new franchise. (C) Transitional provisions to be narrowly interpreted. It is the intent of Louisville Metro to apply the provisions of this subchapter to Communications System operators, including local exchange carriers that now occupy or may in the future occupy rights-of-way, except to the extent federal or state law prevents it from doing so. the law reenforces AT&Ts position. your first post says that the city decided that google should be able to come in and mess about with other peoples equipment. without even telling them when and where they will be moving stuff. and of course that since AT&T will be doing work at the say so of google, google need to pay AT&T to move their stuff. you see the difference there? if I was AT&T and I'd signed a contract to provide services based on the premise that nobody could touch my stuff, and that if my stuff needed to be moved, I would move it and be reimbursed for the time and materials taken to move it, then I too would be distinctly unhappy if the city decided that they'd change the contract to "anyone" can mess with your stuff, and they won't even tell you (so no notice at all).
2019-04-18T13:16:40Z
http://www.computerforums.org/forums/social-lounge-off-topic/t-sues-louisville-make-city-less-attractive-google-fiber-227768.html
This is a new listing that I thought you might be interested in. Visit this listing online to see more photos of the property, Google™ Earth satellite images, and much more. Feel free to call me at (941) 628-6768 or e-mail me at [email protected]. Gorgeous Lake Zappa Home with all the Bells and Whistles and beautiful panoramic views! Come take a look! Ceramic Tile Flooring in main living areas, granite kitchen counters with decorative backsplash, and stainless steel appliances. This home features a very large extended patio area, under screen, which is adjacent to the hot tub and heated pool. The entire interior of home is protected under Pulse, a motion detector security system, and is monitored by ADT for a quarterly fee. The Roof was replaced in 2016. New Pool Salt Generator 2017. Pool Heater replaced in 2016. Full House Gutters 2016. New Hot Water Tank 2016. New Washer/Dryer 2016. Pool Cage Rescreened 2014. Full House Accordian Hurricane Shutters installed in 2014. AC Replaced 2012. Windows and Front Door Replaced in 2010. Pool Pump replaced 2010. Garage Door Replaced in 2009. This beautiful home is priced to sell. Visit this listing online to see more photos of the property, Google™ Earth satellite images, and much more. Beautifully upgraded Bayberry floor plan with numerous upgrades and a Gorgeous Long Lake sunset view. This two bedroom, with den single family home offers a gourmet kitchen with maple wood cabinets, pull out shelving, granite counter tops, and stainless steel appliances, with a French door refrigerator. The kitchen features a large stainless steel sink, with pendant lighting over the breakfast bar and under cabinet lighting with a fashionable backsplash.There is Ceramic Tile throughout with the exception of Carpet in the Master Bedroom. The Window treatments include custom made decorative valences and blinds in all rooms. Upgrades are too numerous to mention and also include a roman style shower enclosure in the master bath, huge walk in master bedroom closet, grab bars in the guest bathroom tub, cabinets in laundry room above the front load washer and dryer, (which are included in the sale). There is a utility sink in garage, garage shelves, and an extended pavered lanai with a bird cage, backing up to a peaceful and beautiful Long Lake view, which offers the most breathtaking sunsets. Prepare to be AMAZED!Cypress Falls at the Woodlands is an 'Active' Adult resort style community for 55 Plus, and offers an activities director, clubhouse with large fitness center, billiard room, card room, ballroom, and catering kitchen. The swimming pool has a beach entry and there is a second resistance pool for exercise or to 'lazy' lagoon'. There are tennis courts,bocce ball,a Resident's garden area, and more. Located approx 10 miles to Englewood Beach. One Mile to Duffys Golf Course. SR 776, toward Englewood, Left on Seamist Dr, Left on Jennifer, Left on Gretchen Ave. House is on Right. Must SELLL!! This one won’t last long! Visit my website to see the details or call me today! Cascadia Villa offers numerous upgrades and 3 full bedrooms. Enter through the leaded glass front door to this High End villa which offers a Gourmet kitchen with 42'' cabinets (soft close droors), an additional built in buffet cabinet with granite counter tops and stainless steel appliances. The kitchen features a large under mount stainless sink with pendant light over breakfast bar, with under cabinet lighting. Throughout the villa, there are 8 Foot interior doors, Crown Molding, and the lighting has been upgraded with dimmer switches. The Ceramic Tile is laid nicely with a 45 degree angle, and the third bedroom features a hard wood floor. The Window treatments include Hunter Douglas Plantation shutters on all windows, and there are ceiling fans in all rooms. Upgrades are too numerous to mention and also include a heavy glass shower enclosure in the master bath, tray ceiling with crown molding in master bedroom, cabinets in laundry room, upgraded wood closet shelving in all closets including a california closet style in the master closet; utility sink in garage, and an extended pavered lanai with ceiling fan and a bird cage, backing up to a peaceful preserve view. Why build when you can purchase this new villa with light fixtures, fans, plantation shutters, and personalized touches already in place? Villa is available for immediate possession, no long wait for closing. This Beautifully upgraded Cascadia floor plan located in 55 Plus Active Adult Resort Style Community of Cypress Falls at the Woodlands. Cypress Falls offers Resort Style Amenities with Clubhouse, Tennis, Large fitness center, Full time activities director, a large beach entry swimming pool with separate resistance pool for exercise, bocce ball, residents garden, putting green, spa.. and many many activities!! Call Tammy Vaughn 941-628-6768 or Email: TammyVaughnSells@gmail .com to schedule a showing! The best season in SW Florida has finally approached us! Fall is the time of the year where pumpkins grow, temperatures drop, and celebrations last all day. Everything in sight is beautiful as the temperature drops to the low to mid 70’s and humidity slowly disappears. A slight breeze blows that keeps you refreshed while the sun warms you when you feel a slight chill. Fall is the perfect season in SW Florida and is great when planning outdoor events; such as, camping, canoeing, and festivals! Every year hundreds of people come down to Punta Gorda to attend the “Dragon Boat Festival” at Laishley Park, on October 29. As adults watch manually boats racing, kids play on bouncy houses while taking a big bite into a snow cone. A variety of booths are set up during these festivals to entertain you with games, face paint, and inform you about more upcoming events in SW Florida. For instance, the International Airshow and Haunting on the Harbor in Punta Gorda. The International Airshow fly’s jets in a sequence giving a spectacular show on October 21-23. Haunting on the Harbor is a spooky way to get everyone in the spirit for Halloween. It includes a haunted house, costume contest, and live music/entertainment held on October 28-31 in downtown Punta Gorda. At the end of the day people listen to music and hang out at many of the beautiful parks or Harbor front restaurants to watch Fall’s most colorful sunsets in Punta Gorda. Many have stated that the sun looks exactly like a pumpkin during Fall at sundown. Go to www.TheVaughnTeamSells.com for more information about Punta Gorda and SW Florida. Hi All!! Well, we are at the end of April, after an early Easter this year… and looking forward to Mother’s Day! The SW Florida Real Estate season has only slowed down minimally, but we do have another good month of season left. The expected season is typically from November to May, with the busiest Real Estate months from January to May. Temperatures in the SW Florida area this week are expected to be in the high 80s (The Highs) ; and being 6:30 AM the temperature now is 68, degrees. As summer approaches, the traffic will slow down, the restaurants will have readily available seating, and the Florida sun will heat the air. The boaters in the area are already spending weekends out at the sandbars and packing coolers to spend a day on any one of our beautifully natural barrier islands. I am reminded everyday what a paradise I live in, in SW Florida, every time I talk to you, the customers about the area, and what is so great about living here. A couple of the Summer Highlights in the SW Florida area are.. At Fishermen’s Village, 1200 W. Retta Esplanade, May 14th 10-4 is the Annual Key Lime Festival, packed with KEY LIME, and more Key lime, as village merchants offer samples of many key lime products. There will also be live music, face painting, a fun photo booth, and FREE admission. Last year Key Lime Fudge and Key Lime Margaritas were my favorites. Also at Fishermen’s Village, King Fisher Military Appreciation Month in May is offering half price admission to any of the sightseeing cruises to for all those who served in the Army, Navy, Marine Corps, Air Force, and Coast Guard, with a valid Military ID or proof of service. Call the ticket office at 941-639-0969 for more information. The Punta Gorda Blues Brews and BBQ Fest will be on June 24 to 26th, located behind the Four Points Sheraton at 33 Tamiami Trail, Punta Gorda, FL, 33950, featuring singer and songwriter Randy McAllister, and brews from local kraft beer brewers. That’s just a small taste of the upcoming summer adventures in SW Florida. Where to eat? For Fine dining I have to recommend Turtle Club, 139 W Marion Ave, Punta Gorda, mainly because this is where my husband took me to dinner on Saturday and everything was superb, from the waiters, waitresses, and hostesses. The food was delicious (I had the salmon) and the staff was happy to personalize my dinner, upon my request. Before our amazing dinner, my husband and I enjoyed the First Wine Tasting at the Turtle Club. This was the first Wine Tasting I have experienced, and ironically, my first Boss, Jerome Presseller, from my first Job, at Howard Johnsons, (30 years later) was offering the cheese samples from The Big Cheese Gourmet Shop and Sunart Gallery located at 307 Taylor St, Punta Gorda. His lovely wife and local artist, Patty Presseller, Sunart Gallery, was also offering cheese samples with their daughter Julie. It’s such a small world. So, to sum it up, the location is Amazing! The area is Spirited! And the Real Estate Market is strong. New construction and newly built is still the most popular choice with many home buyers. Most primary and second home buyers that I have had the pleasure of working with recently, have been purchasing 55 Plus or Deed Restricted Neighborhoods with Villas/ and Single Family Homes in the $225,000-$300,000 price range in local Communities with a clubhouse, community pool area, activities, and with monthly Dues of less than $300. There are still new construction villas available for very close to $200,000 in 55 plus communities in SW Florida. As a Realtor, I appreciate working with you, my customers and providing the Information you are looking for . I make every effort to offer a positive experience through to the closing of your new Florida Home. Give me a call for more detailed information on pricing and Communities in the Area… 941-628-6768. I look forward to it! Here in Florida we have an assortment of natural attractions such as beaches, swamps, forest, and large grassy fields which animals will graze in. Of course we’ve all wanted to see animals in their natural habitat yet some animals can’t return to their native homes due to severe injuries from predators and poachers. Even littering has caused some animals to be sent to the Peace River Wildlife Center in Punta Gorda, Florida, a non-profit organization that focuses on preserving the wildlife of Florida. The majority of animals here are birds yet squirrels, rabbits, and turtles are also in their care. Here animals with injuries that would overall impact their life in the wild can live peacefully with the care of the volunteers. Now out in the wild birds don’t really want to flamingle with us humans but at the Peace River Wildlife Center we can get a close up view of some of Florida's elusive birds. Birds like Pelicans, sometimes called ‘penguins’ by the volunteers as a joke, will happily splash in their lazy river pool for onlookers and during feeding time even come right up to the fence as if they’re asking us “More fish please!” Graceful Sandhill Cranes and cormorants share this space with the Pelicans as well in the open air enclosure. This means wild birds can visit the PRWC resident birds anytime during the day; this creates good social bonds for the animals and allows children of the birds to visit their parents. One resident doesn’t have any kids but a wild posse instead. A fish crow named Spirit, who use to be a pet, has enlisted the help of several other wild fish crows to bring her food such as wild berries and even little fish. You can ever catch her saying ‘Hi!” or “Hello!” to visitors once in a while. There are 100 and more birds living at the PRWC each with their own story such as Luna the leucistic screech owl, Flat Stanley the turtle, and Squiggy the squirrel but these are stories best told by the tour givers. Tours are given every day from 11am - 4pm and if you want to watch the Pelicans being fed it starts at 2:30pm. The feeder will share some information about the Pelicans on who they are and what their daily life is like at the center. If you’re looking for something more when visiting these birds consider becoming a volunteer where you can help prepare food, feed, and clean up after all the birds. PRWC also have events to help raise money to continue caring for all the birds that live there, click here for their event calendar. So if you’re looking for a place to see animals up close as well as hang out in the shady park nearby consider stopping by the Peace River Wildlife Center. The gentle kiss of spring wind is finally here in Punta Gorda, Florida. Along with this breeze is the smell of blooming Jasmine, Rose, and wait…crawfish??? Either this means my lobster claw flowers are blooming nicely or PGs Seafood Festival is upon us! Well if you’re hoping for the later, you’re in luck! March 7th- 8th at Laishley Park will be Punta Gorda’s Seafood Festival. Come with empty bellies for there will be a fresh feast ahead of you once you pay the 2$ admission fee. Once you have your food sit down and enjoy the live music or water ski show! There are also craft vendors and a kid’s playground for those children who always have extra energy, but don’t seem keen on sharing it with their tired parents. If you’re one of those tired parents or just a general seafood lover click here for more information. My oh my I smell another scent on the wind…it’s the smell of kilts and bagpipes; I didn’t know they had a smell that’s odd. Anyways! This must mean one thing! We have a new superhero, CelticMan! Oh wait no CelticMan is holding up a sign, it says that there will be a Celtic Festival on March 8th. Ah that makes much more sense, or should I say scents. The 15th Annual Peace River Celtic Festival will be held at The Celtic Ray Public House, 145 Marion Avenue, Punta Gorda. Here we will celebrate the Celtic heritage with food and drinks as well as live performances! Admission cost 5$ and is from 12pm-7pm. Here’s a link with more information for ye Celtic lovers. Gasp another scent! Just kidding this event is a free visual one. On March 8th will be the 13th Semi-annual Art Fest on the Farm. Come see over 50 artists portray their beautiful artwork (that’s hopefully not haunted) at 25370 Zemel Road. Stroll around and see art that is worth discussing and inquiring about, like Claude Monet once said “Everyone discusses my art and pretends to understand, as if it were necessary to understand, when it is simply necessary to love.” This event is hosted by Inspiration Studios, which sells jewelry and also offers classes for Jewelry making and painting and Pottery Express/ Bamboo Farms which sells beautiful pottery, statues, and fountains. Food and drinks will also be sold at this event. For more information click here. For the first time in Punta Gorda is the new Short Film Festival! I cannot contain my excitement for this two hour event showing comedies, dramas, and animated “Best of show” films collected from other previous Film Festivals since 1987. Imagine being enraptured into a story of such depth and character to find out it’s only five to ten minutes long. This is what a short film is and artists and directors have honed this gift to create the best of the best short films to be shown on the 11th. This event will be held at the Punta Gorda Event Center on March 11th starting at 7:00 make sure to get there early though to grab good seats! Admission is 15$ plus fees but you can order tickets early here For more information on the Film Festival click here. If March is filled up with plans here’s an event starting on April 24th, the Country Life Music Festival! Country music star and recording artists Reba McEntire will be opening the stage with our talented people like Tracy Lawrence, Chris Young, Chris Weaver and our own local band the Jack Michael Band! More bands will follow up as well as some new songs unheard of until this festival. If you’re ready to rock with your friends and family then drive on over to the new Tracks and Trails in Punta Gorda. Tickets right now are on sale for 49$ (originally 79$) and can be preordered from here. For more information check here or here. With all of these event’s going on remember to be safe and have fun! Bring a friend and happy partying! The Newest Member of the Vaughn Team. Wouldn’t you like to get away? To a place where everybody knows your name and they’re always glad you came? This cozy place isn’t Cheers but instead Fishermen’s Village! A resort and shopping center on the Charlotte harbor located at 1200 West Retta Esplanade. It’s hard to decide where to begin when talking about Fishermen’s Village. From the stores to the comfy looking rooms and the view everything about Fishermen’s Village is amazing. Yet possibly the most amazing thing is the multitude of events happening here. Grab yourself an ice cream cone from one of the sweet shops and sit down to listen to a musician with your family on Fridays 5-9pm. For an event list click here. If adventuring is more of your thing walk on down by the marine for information on a cruise, boat rental, or fishing tours or click here. Careful though! You might encounter one of Florida’s many silly looking birds. If you keep following the path by the Marine you’ll end up at a restaurant known as Harpoon Harry’s. Find a stairway and go up it to a fancy buffet restaurant called The Captain’s Table. If you’re hanging out with friends or meeting up with some family members that you haven’t seen in a while both restaurants are perfect places to go. Harpoon Harry’s has more or a bar theme and sometimes live music. If you have little kids with you worry not! For there are arcade games a’ plenty as well as Pool and Air Hockey to entertain them. Upstairs The Captain’s Table isn’t set up for a rock and roll band but does have a large grand piano with almost always someone caressing a song out of it. In both restaurants I have been met with friendly smiles and a lovely staff that knew how to take care of their customers. While walking around Fishermen’s Village it’s common to feel relaxed and at ease. Something about the large walkways, tall ceiling and the open building remind me of being in a forest with nothing to do but relax. Of course forests don’t have shops and a harbor right next to them. Of these shops Fishermen’s Village has ice-cream, clothing, furniture, gag-gifts, knick-knacks, olive oil, and the Military Heritage Museum. Shops like Bella Balsamic & The Pressed Olive have professional mixologists to create perfect olive oils and vinegars for everyday use. Or if you’re here with your lil dog check out Salty Paws! An adorable shop filled to the top with dog treats and apparel. My favorite shop is the Dragonfly Gallery which sells beautiful blown glass ornaments, ones that are perfect for hanging in front of a sunny window. The way the glass catches the light it just puts the perfect touch to a creative room. Today was another day well spent at Fishermen’s Village! With family and friends around it’s impossible to feel alone when I’m here. Yet even if I do let times of sadness catch up to me I just remember “Hey! I live in Florida!” and that tomorrow is another sunrise. At the bottom of this blog is a link to a very useful Newspaper Article in the Sun Newspaper, which gives all of the Particulars of the Punta Gorda Isles Waterfront Canals. Back in the 70s, when I was still a single digit, my Mom worked for Punta Gorda Isles during the developmental stages. Of course as a child, I was not too concerned about the housing market, population growth, or boating access. But, it was a time of many firsts for me. THEN: From the viewpoint of a child in growing Punta Gorda Isles: I saw my first Helicopter.. as the developers flew into Punta Gorda Isles Administration; I hopped my first hump back bridge on my bike; I saw my first waterfall inside a house, my first waterfall for that matter ..'House of the Waterfall' model; copied my hand with the xerox machine.. that was cool; and caught my first fish in a PGI Canal. Much of my days as a Realtor in Southwest Florida is spent talking on the phone to customers from states North of Florida, who have decided that they no longer want to endure the cold winter. They plan to retire soon, going to sell their home and head down to Florida to take a look around! First decision to be made is... where to visit and why? Any certain town or county of interest? Planning to live near the beach, to walk the beach and watch the sunset every night? Or.. maybe the preference is to live closer to the Interstate to have great access to explore different areas of Florida? After determining the County and general location that fits within their lifestyle, the next step is to decide upon the features of the home! This is the point of the decision-making process, which I will call 'The Crossroads'. I can come up with many reasons why it is better to build new, and I can come up with many reasons why it is better to purchase resale. Ultimately, what it comes down to is buyer preferences, time frame before moving, and budget. There are many advantages of new construction, including improved Energy Efficiency Standards; most current Building Codes; Higher Land Elevation for properties that are built up.. which could result in lower flood insurance rates; Flexibility of upgrades and ability to customize; and typically the builders will offer a Structural and Mechanical Warranty upon completion of construction. Costs for new construction are higher than the costs for resale, without a doubt, but how much higher? Of course the percentage difference would be determined based upon the particular home to be built vs the particular resale market.. as every area has a variance of values. I'm finding within some communities the cost to build is only 10% higher than the resale market. In this case, if the Floridian-to-be has time, patience, and enough money.. then Build! Build! Build! Now on the flip side, a buyer has expressed interest in buying a Florida home, and is within a tighter budget or possibly even enjoys the thrill of a remodel project or would like to move into a particular mature, established neighborhood, with a lake view. But.. .often times, there is no vacant lake view land in mature neighborhoods, because the best locations are usually the first to be built, in which case, a resale home would be a better option. Another great attribute of a mature neighborhoods is lush landscape and mature trees within the area gives the neighborhood a warmer feel. Neighbors who have lived in an area for many years, within an established neighborhood promotes the feelings of safety and security. And with the money that can be saved on the resale pricing, there could be some room in the budget for updating and upgrading. One more comment... resales are often more of a complete package, including the blinds on the windows, the fence in the backyard, the doggie door, etc. To Review some pictures of new construction upgrade options, www.TheVaughnTeamSells.com and click on Pictures of Area Attractions: PGI Homes . For More information about PGI Homes or other local builders, please call me direct at (941)628-6768 or Email [email protected] . I look forward to hearing from you! Bobble Fest is another way to describe the continuing tradition of 23 years... The Charlotte Harbor Freedom Swim. For those who don't live in Charlotte County, in the areas of Punta Gorda, and Port Charlotte .. yet.. you would probably just think everyone who lives here is a little bit nuts on Independence Day. For a small town though, Punta Gorda has got some serious Spirit! The story goes, 23+ years ago, local Attorney Michael Haymans and some buddies decided to take the plunge, and swim the Charlotte Harbor on Independence Day. Rumor has it, the swim was swum Au Natural.. or Free-style by the Attorney, and ever since has been called the Charlotte Harbor Freedom Swim. All ages of children and adults, meet on the Northern side of the Bridge with Noodles, Rafts, Canoes, Kayaks, SUP boards, and any other potential water craft that will make it from side A to side B. Mostly everyone is dressed in some sort of red, white and blue, from speedos to- one guy sported a Captain America suit on a Sup board this year. Over the past couple of years the swim has included about 600 participants, of which about 300 actually swim. I also swam across the Charlotte Harbor this year, with my husband, and Real Estate partner, Chuck, as my spotter in a kayak along side. The distance is 1.6 miles, straight across from Charlotte Harbor Northern side of the bridge to Fishermens Village on the Punta Gorda side. To me, this event, gives me such a feeling of Pride, pride in myself for swimming across a pretty large body of water, but also pride in my hometown of Punta Gorda, and pride in the residents, who make the event so fun. When I made it to the other side, at Fishermens Village, to see all of the smiling, happy faces, music playing, people laughing, and just pure happiness all around.. that's what it's all about! That is why, I love, love, love Punta Gorda! Did I mention.. I love Punta Gorda! So, maybe next year, I'll see you all there ! One main reason I enjoy living in the Punta Gorda area, is the wide variety of beaches that are a short distance away, to the North and to the South! The waves breaking on the shore may look similar from beach to beach, but each beach has obvious differences. Some beaches offer more of a touristy environment, with lots of shopping, hotels, bed and breakfasts, tiki bars and restaurants, while other beaches offer the beauty of an untouched natural setting with plenty of wildlife. One can appreciate the raw beauty and serenity these beaches have to offer. Lovers Key is one of the more natural beaches located between Fort Myers Beach and Bonita Beach in Lee County. Last weekend I ventured out to Lovers Key and was reminded why I love where I live... I posted some pictures of the trip on my website www.TheVaughnTeamSells.com click on Pictures of Area Attractions. A friend was out to the Island a week earlier and found starfish and sand dollars, at low tide, about four feet out. These are the largest starfish I have seen.. pretty amazing! In the past, Lovers Key was accessible by boat only and it has been said that only lovers traveled to the island to appreciate the quiet solitude of the beach. Now, Lovers Key makes up one of four barrier islands within the state park, which is a home for wildlife, such as West Indian manatees, bottlenose dolphins, roseate spoonbills, marsh rabbits, and bald eagles. The beach is two miles long, and accessible by a boardwalk or tram to get to the South side of the island. Until next time... Stay Warm! Riverwood Golf and Country Club is one of my FAVORITE communities in all of SW Florida, nestled right along the Myakka River, a short distance to the beaches, with 1300 Acres, 300 of which is preserves and lakes, and includes 29 different communities, including Golf Club, 18-Hole Championship Course, Activity Center, Tennis, 6 Har Tru Lighted Courts, Resort Style Swimming Pool, Myakka River Walk (# Fishing), a private Beach Club, Lawn Bowling, Bocce Ball. The list goes on.. The community was designed so each homesite has a view.. greenbelt, lake, preserve, golf course. The houses are not situated back to back, so you have privacy on the back patio, and the natural wildlife in your own back yard. Just the peaceful and serene feel, of driving into the community, beyond the (24 Hour) Guarded Gate with the Tree lined streets, and natural settings of preservation land and wildlife through out the community is enough to induce a one with the self moment. There are plenty of walking paths, bikers, joggers, golfers, tennis players, and not to mention the sun-bunners who enjoy laying out by the pool in this beautiful sun filled location. Many residents within Riverwood are active adults with a motivation to be physically fit, and active. With a full time activities director, there is always an event in the working.. and a buzz amongst the residents, who love to be involved in the many activities. New construction is available, however almost sold out, starting in a range of low $200,000 +. The deals on New Construction are phenomenal, and newly constructed properties are built to a higher elevation resulting in the lowest possible rate for Flood Insurance. When you plan to visit the area to purchase your Florida Home, be sure to contact me to show you around! (941)628-6768 Tammy Vaughn. I'll be in touch soon.. after my next adventure :-) ! I have not blogged in a while, but this deal is too good to keep quiet. Cypress Falls is offering new construction Paired Villas starting at $152,000 including the lot premium! For a 2 bedroom 1363 Living square feet, including lots of upgrades within the Standard Features. This is the best deal I have come across for new construction in a 55 plus community, yet! What I like about Cypress Falls, is the resort style pool with lots of mature palm trees and pavered decking. There is always music playing poolside... and also a second pool with resistance, for exercise. (or you could use the pool as a lazy lagoon) There are always activities going on, and an activities director who works full time. The fitness center is larger than any of the other communities in this area, and there are walking paths throughout the entire community! When I bring customers to this community to show the area, we often come across the Sandhill Cranes with their babies, walking throughout the subdivision. I was out to Cypress Falls yesterday to take pictures of the area, so if you click into my website.. www.TheVaughnTeamSells.com and click on the Tab on the left ' Pictures of Area Attractions', you will see a link for Cypress Falls with a few pictures. There are also pictures of Boca Grande Island and the City of Punta Gorda. I am pleased to introduce a very valuable and new member creating the Vaughn Team. Charles has a significant history of sales experience and will prove to be a great asset to our Real Estate business. We plan to continue to offer exceptional service to our past, present and future customers. Our services include listing and selling properties in the Southwest Florida area. No job is too big, and no job is too small!! We are available for a complementary Market Analysis and for Personal Buyer Consultation. Also, we are both members of the Remax Referral Service, so we can find you an agent in another state or country to handle your real estate needs. And we love to receive referrals as well! Thank You 'so much' for your continued support! This beautiful waterfront pool home has been RECENTLY REDUCED making it a great value in today's market. Built in 1999, this 3/2/2 home is the best priced newer home in desirable Punta Gorda Isles. It features the popular great room floor plan that is spacious and open to the formal dining room and eat-in kitchen. The attractive glass double entry doors and tall sliders make this home bright and airy in the inside. The property has 85 feet on the canal, an extra long 45 foot dock with concrete poles, and a heavy duty 13,000 lb boat lift. It has wonderful paver sidewalks around the house and down to the dock, and a circular driveway. Other features include a heated gunite pool, caged lanai, manablock plumbing, central vacuum, plantation shutters, generous walk-in closets in all of the bedrooms, mature tropical landscaping, and too much to list here. Another big plus is that the home has newer carpets and tile and fresh paint. Although this home is aggressively priced, it is not a foreclosure or short sale, a quick closing is possible. Move in ready. Make this a must see... you won't be disappointed. The US News and World Report Lists Port Charlotte as one of the 10 Best Places to Retire in 2012... the article explains..."Port Charlotte home prices were battered by the housing bust, which could mean bargains for retirees new to the area. The median home sale price was a shockingly low $59,950 in 2010. And many of these homes are located along canals and waterways. "There are a tremendous number of houses on the water, and everybody's got their boats in their backyard," says retiree Chris Zwirner, 78. "All the people who live on water essentially have access to the Gulf of Mexico, and from there you can go around the world." The Charlotte Harbor Preserve State Park spans 42,000 acres, including 70 miles of shoreline along the Charlotte Harbor. An added bonus: Florida has no state income tax." Not to brag. . . Well, OK, I'm bragging!! Port Charlotte, Florida, on Thanksgiving morning is 72 Degrees, warm, sunny, nice breeze. My windows are open. My sliding door is open, and I'm cooking away for a Great Family Gathering!! Someone told me there was snow up North, so I did a google search, and it's true! I would expect one would have to shovel the snow out of their driveways, or scrape ice off their windshields. I'm not so sure, cause I've always lived here in Florida, but I could NEVER imagine. Hopefully, after Thanksgiving Dinner, my family and I can all head out to Englewood Beach and watch the sunset. That would be really cool (figure of speech, because it's really warm). A picture of my backyard is below, incase you don't believe me about the weather!! Happy Thanksgiving ALLLLLL!!!!!!!
2019-04-22T11:56:37Z
http://www.tammyvaughn.com/MyBlog
Message from the Chair - Why don’t we have more rooftop solar in Georgia? With 2019 dawning, speculation has risen about why the largest state East of the Mississippi has not supported its solar industry as proactively as some of its surrounding states. In 2013, interest in solar surged in Georgia primarily because of support from the PSC and Georgia Power. That support provided amazing economic benefits for the state as the nation emerged from its most painful recession since the Great Depression. The investment and job creation provided by the growing solar industry brought long-needed relief to many hard-hit parts of the state, putting Georgia on the map as a viable solar market. The lion’s share of credit for this economic boost goes to the elected members of the PSC. Those commissioners, led by the vision of Commissioner Lauren “Bubba” McDonald, crafted programs that have served our state well. Starting with the Advanced Solar Initiative (ASI) and evolving into the REDI program, solar initiatives such as these created a well-deserved enthusiasm for the benefits of solar and helped debunk many myths that previously hindered solar adoption. How can solar energy help my community? The Georgia Solar Energy Association invites students in Grades 6 – 10 to enter the GA Solar Essay Contest. This year’s topic: How can solar energy help my community? Must be able to attend and read essay at the 2018 GA Solar Holiday Luncheon on December 13, 2018 at Mason Fine Arts Center with a parent/teacher/guardian. Deadline for submission is DECEMBER 5TH, 2018 at noon. The winner will be contacted on December 7, 2018 and will be invited/required to read his/her essay at the GA Solar Holiday Luncheon on December 13, 2018. Winner will also receive a cash prize. All essays become the property of GA Solar and cannot be returned. Essays will be judged using the rubric provided. Message from the Chair - 10th Anniversary Southern Solar Summit! Tariff-ed out? Let’s talk about the 10th Anniversary Southern Solar Summit! Yes, I agree. Concerns about the potential effect of tariffs on imported cells and panels seemed to dominate every solar conversation over the last year. We have all become a bit numb to talk of cost effects and a possible damper on growth. So, now the time has come to talk about the future of Solar in Georgia. We have a lot going on. What better way to get a plethora of information in one day regarding key topics on the current and future of solar than a day with fellow solar professionals and advocates? Along with new trends in Georgia at our 10th Anniversary Southern Solar Summit on October 25th at the Carter Center, we will have discussions of national trends. This is our second Summit at the historic, solar-powered Carter Center. Russell Seifert Chairman's Remarks - "GA Solar Elects a New Chair" These are exciting times in the solar industry. Ten years ago, in 2008, the cost of a solar panel installation was $8.82 per watt. The solar industry today looks very different: in addition to solar panel efficiency increasing dramatically, solar panel producers have significantly improved their manufacturing processes. Solar installers, too, can deploy solar PV across the United States more efficiently now than they could 10 years ago. The result: the price of solar has fallen by over 60 percent, to just $3.14/watt. This market has followed the pattern of Moore’s Law in the computer and semi-conductor industry. Solar energy is creating more jobs than any other sector of the economy. Plus, energy storage is becoming more mainstream. Homeowners and business owners alike see the “Real Value” in a sustainable product that lasts longer than most other investments they make in their lifetime. Last year, GA Solar joined with other stakeholders in successful negotiations with Central Georgia EMC to alleviate punitive and discriminatory fees aimed exclusively at solar customers. Since then, our members and their customers have encountered similar charges in other locations throughout the state. Growing numbers of homeowners and businesses are looking for cleaner, and more economical, energy resources. As they do, these practices are increasingly coming into question, even as they quietly discourage local economic development. In my own work helping communities organize cost-saving, bulk-buying Solarize programs, I have encountered difficulties in the cities of Covington and Oxford, GA, for example, where some residents would like to organize a Solarize Newton County initiative. The City of Oxford operates its own power utility, which charges solar customers an additional $11.15 per kilowatt of installed solar per month on their electric bill. This means a solar customer with a 5 kW solar array would pay an additional $55.75 every month on their power bill before they use a single watt of electricity. This discriminatory charge clearly presents a daunting barrier to any consideration of solar adoption by residents and businesses in Oxford. The Georgia Public Service Commission: Why Your Vote Matters! Two seats on the five-member Georgia Public Service Commission are on the ballot this year. So, what is the Georgia Public Service Commission or “PSC”? The Georgia Public Service Commission (PSC) is the governing body that regulates the rates and services of “public utilities” in the state, including telecommunications, electricity (meaning our Georgia Power bills) and natural gas. Current PSC Commissioners include H. Doug Everett, Commissioner, District 1; Tim Echols, Vice Chairman and Commissioner, District 2, Chuck Eaton, Commissioner, District 3, Lauren “Bubba” McDonald, Jr., PSC Chairman and Commissioner, District 4 and Patricia Pridemore, Commissioner, District 5. As a nonprofit, the Georgia Solar Energy Association (GA Solar) cannot recommend any specific candidate. However, we urge Georgia residents to do your homework! Your vote matters! Georgia has some of the lowest utility rates in the nation. However, that is about to change. Electricity rates are set to resume a historic rate of increase over the next six years. Two seats on the five-member Georgia Public Service Commission are on the ballot this year. So, what is the Public Service Commission or “PSC”? The Georgia Public Service Commission (PSC) is the governing body that regulates the rates and services of “public utilities” in the state, including telecommunications, electricity (meaning our Georgia Power bills) and natural gas. Now is Still the Best Time to Go Solar! In spite of President Trump’s 30% tariff, now is still the best time to go solar! The cost of solar has come down 70% since 2010 and there is a 30% tax credit available to help reduce the upfront cost. As you can see in the chart above, the tax credit will phase out entirely for homeowners in 2023 and level out to 10% for businesses. So, if you are considering going solar anytime in the next few years, and you want to maximize the use of the tax credit to reduce the upfront cost and your tax liability, you will want to purchase and install sometime before the end of 2019 to get the full 30% tax credit. Looking back on 2017, the solar industry has confronted a challenging year from the local to the national level. We are waiting to see if President Donald Trump will impose the International Trade Commission’s recommendations for tariffs on imported panels and modules. Currently, the President has until January 26 to make his decision. While the recommendations are less punitive than Suniva sought in its petition to the ITC, the effect of these tariffs would still be a serious blow to the jobs and investment the solar industry has created in the U.S. Tariffs also would inhibit the investments that bring needed revenues to many economically underserved Georgia communities and the control solar offers many Georgia consumers for their energy consumption. The solar industry is facing its greatest threat to date. So, the time couldn’t be more perfect to gather and recommit to what protects our vitality in the market. Unquestionably, the recent ruling from the International Trade Commission that imported solar modules have caused injury to domestic manufacturers could end up imposing a painful new burden on our thriving market. A forty-cent increase in the cost of modules, for example, would erase the gains made in recent years by increasing the cost of utility-scale solar by about 25%, C&I market 20%, and residential market 15%. But no tariffs are in place yet, and time remains to mitigate the harm that this misguided action could have on our state, cities, industry, and thousands of working family jobs and welfare. In short, we can hope for the best but we should prepare for the worst. “The thriving solar industry is sure to suffer the loss of as many as 2,000 good, local jobs in Georgia and more than 88,000 nationwide if tariffs are imposed on imported panels as a result of this decision. This will be far more damaging to a growing economic sector of the state’s economy than the jobs lost in Suniva’s bankruptcy. At a time when citizens, elected officials and utilities in Georgia demand more clean energy solutions, this decision will potentially disrupt established supply chains and erase years of progress that has made solar power the cost-effective clean energy solution it is today. We at GA Solar will continue to fight against tariffs this decision may bring. We hope that state leaders, including Sen. Johnny Isakson, Sen. David Perdue and our Georgia congressmen, will join us in urging President Donald Trump not to adopt tariffs that will throttle a growing domestic industry and the jobs it has created. For more information and contact information, visit www.gasolar.org. Back in November, solar professionals realized we were in for a period of uncertainty. What we didn’t expect was that the greatest threat would rise from within our own industry. On August 15, the International Trade Commission (ITC) heard testimony on a petition filed by bankrupt Georgia panel manufacturer Suniva asking the commission to recommend the imposition of steep tariffs on all panels imported to the U.S. The tariffs would roughly double the cost of panels to the U.S. solar industry. The Solar Energy Industries Association (SEIA) has been joined in opposition to this request for tariffs by a wide range of political and financial interests. All of these pro-solar allies, including the conservative Heritage Foundation, want to protect the more than 250,000 solar jobs and billions of dollars in solar investment that are threatened by this petition. The continued health of the U.S. solar industry depends on access to low-cost components, many of which come from foreign manufacturers. In a case now pending before the International Trade Commission, that access is threatened. The letter below, jointly drafted by Georgia's solar nonprofits and the national solar trade organization, outlines the implications of the ITC case and its devastating potential effect on the growing solar industry. Because the case was initiated by a Georgia company, opposition from the solar industry in Georgia can do a great deal to prevent the imposition of pricing premiums on the solar components we all rely on to make our projects viable. WE NEED YOUR SIGNATURE ON THIS LETTER. A delegation of solar professionals will be traveling to Washington this month to deliver the letter and its signatures to our Georgia Senators, Sen. Johnny Isakson and Sen. David Perdue. Sign it today and show your support. Your future business prospects may be hanging in the balance. With Georgia’s solar market ranked 4th in the U.S. and job growth up 23% in 2016, solar is on the move in Georgia. Now a new solar bill (HB 431) aims to remove barriers to rooftop solar, protect consumers, and unlock the free-market potential of solar promising continued growth for years to come. GaSEIA is pleased Representative Buzz Brockway introduced HB 431, which ensures customers’ right to manage their electric bills with onsite solar and ensure that solar customers are not subject to extreme and unjustifiable costs. HB 431 will improve the outlook for distributed generation (rooftop) solar, create thousands of jobs, protect consumers, promote economic development, and increase Georgia's energy security. HB 431 makes commercial system size limits more reasonable in light of economic and technological changes since the Co- Gen Act was passed in 2001. Importantly, the legislation does not preclude utility fees but provides that customers have notice before fees are imposed and that such fees are not just and reasonable. This is important because customers need more transparency to make informed decisions about whether or not to install solar. This legislation follows a special subcommittee hearing and report of the House Energy Committee in the fall of 2016. President-elect Donald Trump's victory in the November 8 election was a sobering event for all of us in the solar industry. During the campaign, Trump repeatedly expressed his disdain for renewable energy and solar in particular. He has persistently promised to increase government support for coal and other fossil fuels and eliminate programs that encourage solar adoption. Like you, I am disappointed in the incoming president's uninformed dismissal of solar's potential. This consciously denigrates the significant solar investments worldwide and the solar industry's 200,000+ American workers, more than all fossil fuel extraction combined. Clearly, an enormous challenge awaits our industry over the next four years as we work to hold onto our recent gains and find new opportunities for growth. The new president will have a Republican majority in both houses of Congress. This gives him almost unlimited opportunity to enact the policies that reflect his views and repeal those that don't. Among other things, the recent extension of the ITC may be affected. Florida's deceptively worded Amendment #1, which would have allowed that state's utilities to impose punitive charges on solar customers, was defeated. That vote underscores the ongoing popular support solar enjoys across political lines. Here in Georgia, we are lucky to have our solar-friendly Public Service Commission, especially Republican Commissioner Bubba McDonald. The PSC's work and support has created a robust solar market in Georgia without mandates or incentives at the state level. This point is very important, because the authority to determine energy policy lies primarily with state government. Our Republican majority legislators have demonstrated that they are open to commonsense solar-friendly policies. They understand a robust solar market helps create good jobs and long-term investment with no upward pressure on utility rates. In the current political environment, however, educating elected officials and the public about the economic and environmental benefits of solar has never been more critical. And that is what GA Solar does best, in cooperation with a wide range of stakeholders. We communicate most effectively when we speak together. The cost of solar is now at grid parity with other fuel sources at utility scale. Costs are projected to come down further over the next five years. Storage technology has arrived and is rapidly improving making solar plus storage a 24/7 generation technology and a clean alternative to traditional energy resources. Consumers have a financially viable choice of how they generate and consume energy and consumer choice is a bedrock principle of Georgia's historic property right tradition. The electrification of the transportation sector will require more capacity to be added to the grid. Because solar is Georgia's #1 source of domestic energy production and at grid parity, solar should play a significant role in additional capacity moving forward. Policymakers recognize that solar creates jobs, promotes economic development, and increases Georgia's energy security and independence. This is the biggest opportunity for innovation in generations. Georgia can become a leader in the emerging solar market, creating thousands of jobs and lucrative economic investments that will benefit communities statewide for decades. Your continued support for GA Solar is essential to this mission. We are feeling especially grateful at this moment for the support we have had in these years of enormous progress. We hope you will continue your contribution to enable us to meet the challenges ahead. Let's join hands with all our solar allies and stakeholders, including consumers, environmentalists and trade organizations, to focus our efforts on tangible goals such as getting a fair value for solar (known as the Renewable Cost Benefit framework (RCB) currently before the PSC) and eliminating barriers to intended use of HB 57 contained in the Co-Gen Act. And, let us hear from you on what you think we can do to keep solar strong in Georgia.
2019-04-22T11:04:29Z
https://www.gasolar.org/index.php?option=com_dailyplanetblog&category=news
Physician assistant studies, first created to address a shortage in primary care doctors, is one of the fastest growing fields in health care. The TCU and UNTHSC School of Medicine begins classes in July, but it already has served as a catalyst to change health care in North Texas. 2018 was a year of increasing momentum in philanthropic investments, which topped $21 million and touched every corner of campus. NTHSC has always had a mindset of entrepreneurship and innovation. Fifty years ago, we were a startup medical school called the Texas College of Osteopathic Medicine. The school had a crazy vision that we’ve since fulfilled: to become the top producer of primary care doctors in Texas. Today, our campus sits on 33 beautiful acres in the heart of Fort Worth’s Cultural District. We’ve added a Graduate School of Biomedical Sciences, a School of Public Health, a College of Pharmacy and graduate programs for physical therapists and physician assistants. We invest in innovative research projects. We invest in our students, educating and training them to become providers of the future. And we invest in our community, partnering on projects that create a healthier Fort Worth. We also invest in entrepreneurship, an increasingly necessary skillset for physicians in a changing health care environment and scientists in a changing environment of discovery. In this issue, you can read about our latest startup: the TCU and UNTHSC School of Medicine. The first classes don’t begin until July, but already the school is transforming health care in North Texas by serving as a catalyst for the creation of hundreds of new residency positions. In 2017, our economic impact on the Dallas-Fort Worth community measured at nearly $700 million. With that kind of footprint – and a mentality of innovation – we are living our purpose of transforming lives in order to improve the lives of others. For the young, how much is too much? egular exercise slows the effects of aging. But the news is less positive for antioxidant supplements, another popular intervention often adopted by health conscious adults. The positive effects of vitamins E and C are not clear, said Nathalie Sumien, PhD, Associate Professor, Department of Pharmacology and Neuroscience, Institute for Healthy Aging. “If you’re going to pick one intervention, choose exercise,” she said. “And you don’t have to exercise like crazy or go to the gym every day to see some beneficial results.” Dr. Sumien spoke on the pros and cons of combining interventions to improve individuals’ health span at the 47th Annual American Aging Association meeting where she delivered the James A. Joseph Memorial Lecture. Dr. Sumien, who has studied aging for 22 years, said walking regularly at a moderate pace for three miles on the treadmill or outside is enough to make an impact. omplicated medical literature, stacks of discharge orders and convoluted prescriptions can frustrate patients and lead to costly hospitalizations or even death. SaferCare Texas, a team of interprofessional patient safety experts, wants to change that landscape by giving patients information they understand, simplifying medical forms and teaching health care providers how to communicate more effectively, said Jessica Maack Rangel, RN, Nurse Executive and Director of SaferCare Texas. interview Meet Frank Ssentamu, a second-year pharmacy student who was the personal chef to Uganda’s president before coming to the United States to start life anew. As a boy growing up in rural Uganda, how did you get interested in health care? When I was little, we had very limited access to modern medicine. All of our health problems were taken care of with herbs. I got interested in understanding the mystery behind the healing herbs that restored people’s lives. I also had a chance to assist my area herbalist and got to know those medicinal plants. I had hoped to grow up, become a health care professional, take advantage of our rich herbs, and help people in better ways. After high school, I was fortunate to secure a spot at the nation’s best culinary arts program. Although it was not my first choice, it turned out to be very rewarding and interesting. While still in college, I was recruited as a trainee cook at the luxurious 4-star Nile Hotel International. I finished school and I was recommended to serve as the personal chef to the president of my country. I had a chance to travel to different parts of the world. I cooked for many distinguished people, including President Clinton and his family and the late President Nelson Mandela among others. What was your life like when you came to the United States? Transitioning and assimilating into society here had some challenges, but many great Americans made it possible. However, working for Albertson’s became the “seminal” moment that resurrected my childhood dream of joining the care industry. My family joined me after two years, and we started all over with a new life. What led you to the pharmacy school? One day I fell sick and went to Albertson’s Pharmacy to seek a remedy. The pharmacist, Robert Moulds, RPH, was gracious with his time. That initial interaction later translated into the start of my long journey to pharmacy school. He encouraged me to consider a pharmacy technician position, walked me through the process and gave me stacks of information study. He and other pharmacists encouraged me to forge ahead. I want to give back and make a difference in our community. I hope to do something with diet and nutrition and, if I am lucky, pursue a post-grad residency. Surely, I know how to make food look and taste good, but I also know that sometimes food is not safe for people. I hope to help people with better ways of preparing healthy meals. or decades, UNT Health Science Center has been a leader in delivering highquality health care directly to underserved communities in Fort Worth. But 40 years ago, that care was delivered a little differently. “Sometimes I wonder if they’ve replaced all the street signs I knocked over yet,” joked Chuck O’Toole Jr., DO, a 1975 medical school graduate. In the 1970s, after the founding of the Texas College of Osteopathic Medicine, the school purchased a shaky old Winnebago and converted it into a mobile medical clinic. Students and a school pediatrician drove it into underserved communities to provide free screenings and care. The student with the highest grade point average got to drive. That was usually Dr. O’Toole. “It had no power steering,” he recalled. “To stop you basically had to stand up on the brakes. We were all over the road.” However, the mobile clinic (nickname: Rattletrap) allowed students to provide care to low income families from Samson Park to Stop Six to Northside. A card tucked into the Winnebago’s sun visor mapped the pay phones in each neighborhood. academy created in 1993 to encourage medical schools to increase the number of graduates entering family medicine residencies. The shortage of primary care physicians is a growing problem in Texas. Earlier last year, TCOM was granted a 10-year Accreditation with Exceptional Outcome, the highest level of accreditation given by the American Osteopathic Association’s Commission on Osteopathic College Accreditation. A.J. Randolph, left, and Katy Kemp congratulate Dr. Robert Richard. obert Richard, DO, told UNT Health Science Center medical student Sarah Hmaidan exactly what she should expect from him as her preceptor. “He told me if he wasn’t inspiring me to be the best doctor I could be or challenging me to see the whole patient, then he wasn’t doing his job right,” said Hmaidan, a member of the 2020 class. Dr. Richard always does his job right. That’s why medical students nominated him for the first Outstanding Preceptor Award from the UNTHSC Texas College of Osteopathic Medicine. Medical preceptors serve as mentors and teachers to medical students. They offer personal instruction, training and supervision and allow students to shadow them in clinical settings. “Dr. Richard is always patient and took his time explaining concepts or working through patient plans with me, even if this meant staying hours past our last patient of the day,” Hmaidan said. or the fourth straight year, every graduate of the Physician Assistant Studies Program at UNT Health Science Center passed the national certification exam on the first attempt – the second-longest streak among the eight programs in the state of Texas. Since 2013, only one of about 450 total PA graduates from UNTHSC did not pass the exam on the first try. The Physician Assistant National Certifying Examination administrated by the National Commission on Certification of Physician Assistants assesses basic medical and surgical knowledge. “It all starts with exceptional students,” said Kirk Barron, PhD, PA-C, Chairman of the UNTHSC PA program. “We recruit intelligent, talented and determined students into our program, and that is reflected in our exam scores.” The flexibility to move between specialties, potential for a strong work-life balance and quality starting salary places the PA field on many national best jobs lists. The UNTHSC program receives more than 1,900 applications for just 75 spots each year. Assistant Professor Tamara Willmoth, left, speaks with PA students Julia Forsberg, Molly Berrier and Emily Lau. hey have been dubbed digital natives, and they are the first generation to cut their teeth on technology. Theirs is a world of tablets and texting; blogs, videos and all things digital. “These are the kids who have never even known a world without cell phones,” said Brandy Roane, PhD, Associate Professor of Physiology and Anatomy and a certified behavioral sleep medicine specialist. For all the good that technology has delivered, the digital age has brought with it some serious side effects for the nation’s youth. Dr. Brandy Roane, with son Elijah, says children who spend too much time staring into computer screens can come away ill-equipped to handle social interactions. To control screen time, Dr. Roane set up a token system for her children. By doing chores, they earn tokens that can be exchanged for screen time. At a glance SCREEN TIME GUIDELINES • Children 18-24 months – Choose high-quality programming and watch it with your children. • Children 2 to 5 years – Limit screen use to 1 hour per day of high-quality programs. Parents should co-view media with children. with their peers, typically a small group of neighborhood friends, said Witold Migala, PhD, Associate Professor of Biostatistics and Epidemiology. “Now that circle of friends is everyone online,” he said. And not everyone is so friendly. Cyberbullying is one of the biggest threats children face online. Stacey Vanvliet, MD, Physician Development Coach for the TCU and UNTHSC School of Medicine, said cyberbullying and the immense pressure that social media puts on teens are taking a terrible toll on their mental health. “It’s really tough for young minds to navigate this world where there is so much pressure from social media,” said Dr. Vanvliet, who is also a hospitalist at Cook Children’s Medical Center. “I see multiple patients a week in the hospital for suicide attempts,” she said. Dr. Roane and husband Arch work with their son, Joseph, to manage screen time. Dr. Tracey Barnett stands in front of a vape shop located across the street from Paschal High School. Tobacco Survey reported a 900 percent increase in e-cigarette use by U.S. high school students during the years 2011-2015, with 1.7 million high school students and around 500,000 middle school students saying they had used e-cigarettes in the previous 30 days. The industry is huge and growing. E-cigarette advertising expenditures have increased dramatically in recent years, from $12 million in 2011 to $125 million in 2014, and it is estimated that more than 460 e-cig brands are currently on the market, with more than 7,700 vapor flavors to choose from. “With flavorings packaged like juice boxes and candy, and youth-oriented, fun names like gummy bear, cosmic cranberry and very berry blue, it’s clear who is being targeted,” Dr. Barnett said. “Many of these products are loaded with nicotine and contain other chemicals that may be dangerous.” Dr. Barnett’s research is focused on the health risks of nicotine, tobaccorelated products and now the youth vaping epidemic. At a glance VAPING PROBLEMS AMONG THE YOUNG THE SCOPE From 2011 to 2015, e-cigarette use increased 900 percent among U.S. high school students. THE DANGER Health experts warn that toxic chemicals in vaping products may cause more health problems than the nicotine in regular cigarettes. Like others in public health, medicine, the research field, education and consumer safety, she has serious concerns and is working to address this problem. Dr. Barnett has published articles on the topic and is active with parent groups, educators, school staff and counselors, community organizations, legislators, the media and especially students, to share the facts about e-cigarette use. Vaping is widely marketed through social media, gaming sites and youthoriented radio. The products can be purchased online or through vape shops. “Users must be over 18, but we all know there are ways around that,” Dr. Barnett said. Parents like the Fort Worth mother, who chooses to remain anonymous, often are caught unaware, with little knowledge of how their kids are getting the products. “My husband and I were shocked to find out that our son had been vaping for three or four months or maybe even longer,” she said. “We learned that the football field at his school was pretty much a lunchtime marketplace for obtaining JUULs. Older students were ordering the products online and selling them to younger kids.” Her family alerted their high school principal, and they have been monitoring their son in new ways since. “Trust has become a big issue. We changed to a non-cash system for his spending money,” she said. “There were times when we wouldn’t let my son close the door to his room, and I still check the nightstand drawers by his bed. But how can parents really fix the problem when practically anything can be found on the internet and there are vape shops on just about every corner?” Not all vape shops check IDs for age, and many internet sites only require a “yes, I’m over 18” click for access. “Sometimes it’s as simple as knowing a friend of a friend, or someone’s older relative who doesn’t mind making the purchase,” said a local high school administrator. How does it work? “Electronic nicotine delivery systems go by different names,” Dr. Barnett said. “E-cigs, vapes, vape pens, e-pens, mods, e-hookahs and tanks are all common terms, and most recently, new names have popped up around specific brands like JUUL, which looks deceptively like a USB device or flash drive.” E-cigarettes have been marketed as a safer alternative to smoking, a way to reduce smoking and a tool to help users quit, although this has not been backed by the FDA. Rather than burning tobacco and producing smoke or odor, they release a vapor. The steam inhaled is made up of nicotine and liquid chemicals, which can include added scents and flavor juices. Early research has found that some of these smokeless tobacco products contain three to four times more nicotine than cigarettes. But because this trend is still relatively new to the United States, the industry remains largely unregulated, and little is yet known about the long-term health effects, Dr. Barnett said. THE SOLUTION Education, parental involvement and new legislation are needed to control the dramatic rise in e-cigarette use among the young. As e-cigarette use has increased, researchers, the medical and public health industries, and agencies like the CDC and World Health Organization have rejected the products as a safe alternative to smoking, warning the toxic chemicals may cause more health problems than the nicotine in regular cigarettes. In December 2018, the U.S. Surgeon General called the problem a serious epidemic among youth and stressed the importance of “protecting children from a lifetime of nicotine addiction and associated health risks.” “Here’s what we know. Nicotine is addictive,” Dr. Barnett said. “Nicotine can harm the developing brain, especially during adolescence. Teenagers are much more susceptible to addiction, and withdrawal can bring on anxiety, irritability, depression, physical symptoms and loss of concentration.” “Some vapes being marketed as having zero percent of nicotine have actually been found to contain nicotine,” she said. “But that’s not all. Particles of other dangerous substances have also been detected, such as metals like nickel, cadmium and lead, and carcinogens like formaldehyde.” Even the seemingly harmless flavor additives are suspect. “Very little is known yet about the long-term effects of inhaling flavor ingredients. While they might be approved for ingestion, that doesn’t necessarily mean they are safe to take into the lungs,” Dr. Barnett said. omentum is a word used often at UNTHSC. It speaks to a desire to accelerate the pace and quality of education and research we conduct, and the patient care we deliver. And while this momentum may at first seem disconnected given the array of activities in play, a closer look proves otherwise. There is unity when understanding that the common goal at UNTHSC is to “transform lives in order to improve the lives of others.” That is our PURPOSE statement, and with every wave of momentum comes a transforming opportunity. 2018 was a year of increasing momentum, with much of the energy coming from alumni and community friends. Philanthropic investments topped $21 million and touched every corner of the campus. Likewise, our students and faculty spawned transformative change through their service. Whether through formal outreach and screening programs or through the 47,000+ hours of volunteer time logged, UNTHSC investments touched and improved the lives of neighbors young and old. The next pages feature just a few of the highlights from 2018. We share them out of gratitude to those who made them possible, and with the hope that you will remain on our team – or choose to join us – in 2019 and beyond. Our accelerating momentum depends on you! Learn more by visiting unthsc.edu/giving. ith America’s aging population increasing, our Seniors Assisting in Geriatric Education (SAGE) program was introduced in 2009 as an experiential education model helping prepare our medical-professions students to better meet the health care needs of older adults. The program partners 1st and 2nd year medical-professions students from across seven disciplines in teams of three to four students, and then pairs each team with a senior citizen volunteer for home visits. The interdisciplinary student teams make six home visits over a 1½ -year period during which they apply their classroom education and clinical skills to the same patients long term. Naturally, many of our students and senior volunteers develop long-lasting bonds that only amplify the core benefits of the program for both students and seniors. With its proven popularity among both students and senior volunteers, the SAGE program has seen tremendous growth in its first 10 years from just 189 student participants in 2009 to over 1,300 in 2017, and with over 440 enrolled active senior volunteers. The popularity and effectiveness of the program has garnered local and national recognition that resulted in a $1 million gift from an anonymous Fort Worth donor to place a permanent endowment behind the program. In total, the program to date has educated over 4,800 students, engaged over 1,700 senior volunteers, and accounted for over 7,700 home visits. hen the ribbon was cut last fall on UNTHSC’s Interdisciplinary Research and Education Building (IREB), a dream was realized for students and faculty alike. Yes, the desperate need for additional classroom and research space was addressed, but the magic of the IREB is in the way it delivers on that need. True to its “interdisciplinary” name, the facility is designed with teambased, collaborative learning and research in mind. The IREB features a totally different look for its classrooms, teaching labs, and research spaces. Traditional lectures will rarely take place, replaced with scores of collaboration spaces and with technology that allows reference materials and teaching aids to always be within easy reach via plug-ins and suspended monitors. As home to the UNT System College of Pharmacy and the TCU and UNTHSC School of Medicine, future physicians and pharmacists will more frequently interact, and with purpose. The spaces aren’t exclusive to those programs, however, as students from all six UNTHSC schools and colleges will be welcomed for activities planned and spontaneous. Community donors have provided more than $8.5 million in funding for capital or program needs associated with the IREB, with leadership commitments received from Quest Diagnostics, the Sid W. Richardson Foundation and the Amon G. Carter Foundation. he goal of research at the UNT Health Science Center is to translate discoveries made in the laboratory into diagnostic tools and medical therapies. Today, this bench-to-bedside approach means that scientific discoveries will provide patients with cutting-edge therapies quicker. The newly formed Institute of Translational Research is working to reduce the time between discovery and patient access beginning with Alzheimer’s disease. With the focus of research on precision medicine, researchers have a unique opportunity to quickly move discoveries to human trials that have the highest possible chance of success. But discovery requires investment. In 2018, UNTHSC received research awards of $52 million, with government grants comprising more than $48 million of that total. Generous support from individuals and private foundations also has helped to move the needle forward. With support from the Cure Glaucoma Foundation, the North Texas Eye Research Institute is getting closer to unlocking the secrets of glaucoma. Gifts from the Virginia M. Kincaid Foundation and the Rutledge Cancer Foundation continue to support the efforts of Andras Lacko, PhD, to treat cancer with targeting therapies that attack diseased cells without damaging the surrounding healthy cells. Pediatric cancer research also has been funded by Leukemia Texas and the TeamConnor Foundation. And Sid O’Bryant, PhD, continues to conduct ground-breaking Alzheimer’s research that will change how the world diagnoses and treats this debilitating disease. A One University strategy for translational medicine is moving the UNT Health Science Center closer to meaningful discoveries that will transform the lives of many in Fort Worth and beyond. Continuous giving Q: What about UNTHSC motivates you to give year after year? A: Again, for us it is about supporting students or as the UNTHSC Purpose statement includes, "Transforming Lives." Furthermore, supporting students is critical as the cost of higher education continues to spiral upward. Q: What particular programs or areas at UNTHSC interest you the most? A: Scholarships, aging/geriatrics/population health education and clinical service programs. Q: What impact do you hope to make through your continued giving? A: Support of future osteopathic physicians with less debt who may then decide to enter primary care and/or geriatrics. Hopefully, by receiving this support, they in turn will support future generations of medical students. or 21 consecutive years, Thomas Fairchild, PhD, and his wife, Janice Knebl, DO, loyal supporters of the UNT Health Science Center mission, have contributed to UNTHSC fundraising efforts that are most meaningful to them. Through their consistent support, they have directly impacted the lives of students, patients and our community. Learn more about what inspires them to support UNTHSC scholarships and programs year after year. Q: Why did you first give to UNTHSC? A: We both received several scholarships for our graduate degrees, and receiving these academic scholarships to assist in tuition inspired us to want to support Texas College of Osteopathic Medicine students with tuition scholarships. Also, having spent our careers at UNTHSC and UNT, we wanted to support the education/academic programs that directly impact students. Q: How would you describe UNTHSC to others, including potential donors? A: UNTHSC is a valuable educational resource to the North Texas community that has developed a national reputation by the high quality of graduates that have gone on to significantly impact their respective fields. Supporting UNTHSC is a commitment to not only the future of the higher education, but also to the larger good of our community and nation. Q: Do you mind sharing anything from your personal background that shaped your attitude toward giving? A: Receiving scholarships during undergraduate college and medical school influenced our strong commitment toward giving. My attitude toward giving is rooted in what I learned from my parents. They always gave of their time, talent or financial resources to support our church and community. Their charitable behavior left a lasting impact on me that I attempt to stay true to today. UNT Health Science Center relies on generous consecutive supporters like Dr. Fairchild and Dr. Knebl to be the catalyst in helping us continue to transform lives. Join them and others in supporting our mission to create solutions for healthier communities. Making a difference V olunteerism provides people an opportunity to make a difference and connect, as well as serves as a valuable and renewable resource for communities. Since 1970, UNT Health Science Center students and employees have given back to the local community through service, education and philanthropy. Almost 50 years later, the spirit of volunteerism at UNTHSC is no different. UNTHSC students and employees embrace the value of serving others first through patient education at local non-profits or Fort Worth ISD schools, providing basic first aid and emergency medical services at local events such as Cowtown Marathon, Fortress Festival, and by administering hands-on screening services such as cholesterol, BMI and blood-glucose checks at various health fairs and community events. In 2017-2018, students, faculty and staff members volunteered a total of 47,736 hours, saving the community an estimated $572,800 in labor. UNTHSC is deeply invested in the growth and betterment of Fort Worth. By volunteering our time and talent, together, we are part of the solution to creating a healthier community. rs. Alan and Marianne Levine practiced medicine for a combined 54 years, and UNTHSC was fortunate to have both on faculty at one point or another over the course of these years. Following her beloved husband’s passing in 2012, Marianne had a big decision to make regarding the proceeds from her husband’s life insurance policy that were earmarked to support UNTHSC. After establishing The Alan and Marianne Rose Levine TCOM Pediatric Award to support senior students moving into pediatric residency, Marianne collaborated with UNTHSC President Michael Williams to decide how best to use the balance of the proceeds. They decided to establish the Alan and Marianne Levine Presidential Endowed Scholarship to annually award scholarships to four students in each of UNTHSC’s six colleges and programs, which include the Graduate School of Biomedical Sciences, Physician Assistant Studies, Physical Therapy, School of Public Health, the Texas College of Osteopathic Medicine, and the UNT System College of Pharmacy. Each of the 24 scholarships awards $1,000 and renews each year at this sustained level until the student recipient graduates. Dr. Alan Levine practiced medicine for 34 years and retired from UNTHSC in 2006 after teaching for 28 years. Dr. Marianne Levine, TCOM class of 1985, practiced as a pediatrician for 20 years. Dr. Sajid Surve examines dancer Dara Oda. to recognize movement that would be considered pathological and find ways to intervene, which could, in theory, lengthen a dancer's already short career.” As Gaiera and other dancers moved through jetes and plies, an enormous volume of data was transferred to the computer where it appeared as stick figures on the screen. Each camera records 120 frames per second, collecting data that later will be analyzed by engineering students at the University of North Texas in Denton. By December, some dancers were feeling the strain of performing, with some developing minor injuries because of wear and tear. So far, researchers have focused on feet and stability. Dancer Celesta Gaiera demonstrates a dance move. Dr. Rita Patterson adjusts a motion-sensor reflector on dancer Adeline Melcher. Dr. Linda Siy, born and raised in Missouri, performed her residency training in Fort Worth and stayed to practice medicine. At a glance MEETING THE PHYSICIAN SHORTAGE THE NEED Where young doctors spend their residencies often determines where they practice. Only 2 percent of the total residency slots in Texas are located in Fort Worth. THE RESULT When their local residencies end, more doctors will stay in North Texas area to practice, helping alleviate the doctor shortage locally and statewide. THE REMEDY A new agreement between UNTHSC, TCU and Medical City Healthcare will create 500 new residency slots in the Dallas-Fort Worth area in the next seven years. More such agreements are ahead. ensuring that future Dr. Siys don’t have to leave home to establish their medical careers. The School of Medicine, working in partnership with UNTHSC’s original medical school, the Texas College of Osteopathic Medicine, will help make sure that more Texas-trained medical school graduates stay here. The philosophy is simple, said Stuart Flynn, MD, founding Dean of the TCU and UNTHSC School of Medicine. “Train them locally, keep them locally,” Dr. Flynn said. Fort Worth Mayor Betsy Price congratulates Dean Stuart Flynn at the celebration held when the TCU and UNTHSC School of Medicine received preliminary accreditation. A white coat from the new school frames a scene from the accreditation celebration. Melody Josserand took an at-home DNA test to find out where her ancestors came from. She learned much more. genome. For some, the results can be life changing; for others, a waste of money. Beyond identifying living relatives, the athome tests have become popular ways to fill in family trees, trace lineages back for centuries or even learn the exact breed of your pet dog. They also have garnered attention for helping solve crimes and mysteries spanning decades. Along with the tests’ growing popularity have come concerns about privacy, legal issues or the prospect of personal data getting into the wrong hands. People are often ill prepared for the Pandora’s box of possibilities that DNA tests can open. “Before anyone takes one of these tests, they should think twice about what it could reveal,” said Michael Coble, PhD, Associate Professor of Microbiology, Immunology and Genetics. THE DOWNSIDE The tests’ growing popularity has raised privacy concerns, and some people are not prepared for unexpected results. Many are disappointed at the range of accuracy in some tests. THE RIGHT SIDE Law enforcement has used the tests to close unsolved cases and bring the guilty to justice. Josserand, who is adopted, sent an email introducing herself to a person identified in a DNA test as sharing her genetic signature. This is the message she got in return. THE UPSIDE At least 12 million people have purchased DNA kits to trace their ancestral roots. One site claims it has helped 10,000 adoptees find their biological parents. Joseph James DeAngelo, who has been charged for crimes connected to California’s Golden State Killer, might have escaped justice except for the fact that a relative decided to take an in-home DNA test. Dr. Jeff Beeson has seen plenty of change at UNTHSC over the years. Now he is leading a transformation in patient care. As a kid, Dr. Jeff Beeson, left, watched Fourth of July fireworks from this roof with his dad, Don Beeson, UNTHSC’s former police chief. company that provided cutting-edge mobile care. “Everything I have done was as part of a team — on ambulances, in emergency rooms or on search and rescue,” Dr. Beeson said. “We have a great team to meet our goal at the Health Science Center.” Innovative learning labs UNTHSC is known as a premier postgraduate medical education institution in North Texas. Perhaps less recognized is the high-quality clinical care it has long provided. UNT Health, the university’s clinical arm, operates clinics serving family medicine, pediatrics, osteopathic manipulative medicine, cardiology, dermatology, gastroenterology, allergy, geriatrics and vascular surgery. The clinics have about 120,000 patient interactions a year. Physician Assistant Monica Summerhill cuts the ribbon at the opening of the Priority Care Clinic in the Health Pavilion, aided by Dr. Beeson and HSC President Michael Williams. TCOM student Chelsee Greer watches as Dr. David Mason treats patient Georgia Roberts. Carole Young, center left, and her mother, Barbara Brown, seated on her right, discuss her mother’s treatment with a group of UNTHSC geriatrics experts. Dr. Sid O’Bryant is Director of the Institute for Translational Research. to the Alzheimer’s Association. For most patients, the blood test could be done in their doctor’s office and provide relief from the fear of having Alzheimer’s. For those whose results are positive, there would be the benefit of early detection and treatment planning. Dr. O’Bryant also oversees one of the largest and most comprehensive studies ever conducted in the United States focused on Mexican-Americans and dementia. This five-year study began in 2017 and is funded by a $12 million grant from the National Institutes of Health. The globe-trotting Migala brothers don’t often find themselves in the same place. When they do, as they did here in 2009, Withold, Henri and Alexandre, from left, have interesting stories to tell. Alexandre Migala treated injured international peacekeepers during the Bosnia war in the 1990s. A family resilience Like any great adventure movie, the story of the Migala brothers would have a prequel. It would be about their parents, Marian and Anne. Marian was a Polish resistance fighter against the Nazis during World War II. After Germany lost and the Soviets assumed power, he resisted Communist rule until fleeing to Paris. There, he discovered widespread poverty. But he met Anne, who had aided the resistance movement by hiding and transporting soldiers and Jewish refugees on her family farm. Marian and Anne married and had three kids — sons Witold and Henri, and a daughter Therese. Marian learned French and put himself through architecture school. In the 1960s, he immigrated his family to the United States, though he spoke no English. He learned his third language and got a job designing military bases for the Army and Air Force Exchange Service. Marian and Anne had two more sons — Arthur and Alexandre. Military projects moved the family of seven around the world, from Thailand to Germany, before settling in Texas. The fearlessness and resilience of Marian and Anne was not lost on their children. From surgeon to special forces In an old Nazi tank base near the Bavarian Alps, Dr. Alexandre Migala crept up a grassy slope littered with hidden explosives. Henri Migala worked in a program in South Africa that helped mothers with HIV stay alive and healthy. Marian Migala, patriarch of the Migala clan, fought the Nazis as a Polish resistance fighter and eventually came to the United States to forge a new life. A lasting impact Every morning a 90-year-old man wakes up and dresses faithfully in suspenders and a bolo tie. Marian Migala, the family patriarch, lives in a Dallas suburb. Anne died in 2010. More than a half century ago, Marian brought his family to America, and he is proud his children succeeded. His daughter, Therese Migala Moncrief is a Fort Worth community leader, philanthropist and filmmaker. The fourth son, Arthur Migala, is a college mathematics professor. During the holidays, Witold surprised Alexandre and Henri with a framed photo of a single brick donated to support renovation of Alumni Plaza at UNTHSC. Inscribed on it are the brothers’ names and graduation dates, the closing credits to this story about three men who have made a lasting impact on the world. Withold Migala organized a polio vaccination campaign in northern Nigeria in 2012.
2019-04-24T00:55:36Z
https://issuu.com/unthsc/docs/solutionsspring2019
Squaring off against NBC’s Game One of the Stanley Cup Finals instead of the finale of The Voice, ABC’s The Bachelorette added a bit of ratings punch to its second two-hour episode on Memorial Day night. Aided by a local angle in rose-peddler Rachel Lindsay (a Dallas attorney), The Bachelorette won its 7 to 9 p.m. slot in both total D-FW viewers (152,693) and advertiser-prized 18-to-49-year-olds (54,521). Game One of the Stanley Cup between the Pittsburgh Penguins and Nashville Predators averaged just 65,440 total viewers. But a nice-sized chunk of them were 18-to-49-year-olds (38,485). ABC’s 9 p.m. premiere of Still Star-Crossed dipped to 65,440 total viewers, with 22,450 within the 18-to-49 age range. On Sunday, the final round of the Colonial PGA tournament, with Dallasite Jordan Spieth in contention to the end, peaked at a very smallish 109,067 total viewers between 4:30 and 4:45 p.m. CBS’ entire three-hour telecast averaged 87,263 viewers. Just 25,657 were within the 18-to-49-year-old motherlode. Here are Friday’s local news derby numbers, (with all but TEGNA8 then taking a Memorial Day holiday exemption for their 6 a.m. and 5, 6 and 10 p.m. newscasts). Fox4 won at 6 a.m. in total viewers but NBC5 had the edge among 25-to-54-year-olds. The Peacock also ran the table at 6 p.m., drew the most total viewers at 5 p.m. and tied Fox4 for the spot at that hour in the 25-to-54 realm. Fox4/NBC5 again score the most newscast wins while TEGNA8 retains 10 p.m. total viewers crown in tightly fought May "sweeps" The May “sweeps” newscast spoils again were split among three stations, but with the victory margins thinner compared to a year ago while audiences continued to fall off. Fox4 repeated its 6 a.m. sweep and also again won at 10 p.m. in the key 25-to-54-year-old demographic (main advertiser target audience for news programming). NBC5 had twin wins at 5 and 6 p.m., while TEGNA8’s lone victory was a defense of last May’s 10 p.m. title in total viewers. CBS11 again went scoreless, particularly with 25-to-54-year-olds. But the station came close to outpointing TEGNA8 in total viewers at 10 p.m. and might well have done so had the CBS network saved some of its big season finales for the final six days of the sweeps instead of exhausting most of its ammunition by mid-May. More than its rivals, CBS11 is dependent on sizable 9 p.m. network lead-ins to goose the ratings for its late night newscasts. Here are the complete May 2017 sweeps results in total viewers and 25-to-54-year-olds, with year-to-year audience losses or gains in parentheses. Comments: Across-the-board shortfalls in the bread-buttering 25-to-54 age range mark the second straight year that’s happened. And CBS11 was the only station to show an increase from May 2016 in total viewers. The weather didn’t “cooperate.” It again was relatively uneventful compared to May 2015, when all four stations got ratings bumps from stormy skies. TEGNA8 deserves some credit for trying to differentiate itself with longer-form “Original” stories throughout the sweeps. But some of them were too gimmicky, and the station soiled itself down the stretch by paying a highly questionable source for secret audio tapes tied to alleged absentee voter fraud. NBC5 and CBS11 also were pitched the same “story,” but didn’t bite. Comments: It was the same order of finish as last year in both ratings measurements. Still, TEGNA8 flashed a little momentum after getting off to a fast start while CBS11 made smaller year-to-year gains while still running far out of the money. Fox4 remains in charge, but its grip loosened, particularly in total viewers. Comments: -- The 6 p.m. race among 25-to-54-year-olds had to be extended to an extra ratings decimal to determine a winner. It was that close (1.11 to 1.07). But Fox4 also can claim at least a moral victory after trailing NBC5 by almost 19,000 viewers a year ago. On the other hand, Fox4 hemorrhaged total viewers, falling from third place last year to last place this time out. Comments: Pee-yew, particularly in the 25-to-54-year-old demographic, where all four stations again had diminishing returns. Fox4 had the worst time of it in both measurements while still managing a second place finish among 25-to-54-year-olds. But in a D-FW market with a population of 3,006,700 viewers in the 25-to-54 age range, the four stations managed to collectively lure only 99,221 of them to their early evening newscasts. ***NBC5 won the three-way local newscast race at 4 p.m. in both ratings measurements. Fox4’s double dose of the syndicated Judge Judy edged the Peacock in total viewers but trailed among 25-to-54-year-olds. ***TEGNA8’s Good Morning Texas continues to more than pay for itself with built-in pay-for-play mini-infomercials. Otherwise, the program ran fourth in total viewers in the 9 a.m. hour (with the third hour of NBC’s Today on top). In the 18-to-49-year-old demographic (main advertiser target audience for entertainment programming), GMT moved up to third place from 9 to 9:30 a.m., nipping CBS’ competing Let’s Make a Deal. GMT then slipped to fourth from 9:30 to 10 a.m., with Deal barely in third. ***The venerable Wheel of Fortune, now in its 108th season (heh-heh), again easily won the 6:30 p.m. slot in total viewers against the competing syndicated rag mags on Fox4, NBC5 and TEGNA8. Pat and Vanna also held their own with 18-to-49-year-olds, tying NBC5’s Extra for the top spot. ***CBS’ Trump-bashing Late Show with Stephen Colbert tied Jimmy Fallon’s Tonight Show in total viewers, with ABC’s Jimmy Kimmel Live close behind. But Colbert fell to third place with 18-to-49-year-olds, although he wasn’t far behind Fallon and Kimmel. NBC’s two-hour season finale of The Voice throttled ABC’s latest two-and-a-half-hour Dancing with the Stars ender in their Tuesday night face-off. The Voice, won by a dude named Chris Blue, pulled in 283,573 D-FW viewers while DWTS had 189,049 and also was beaten from 8 to 9 p.m. by CBS’ new episode of Bull (218,133 viewers). The Mirror Ball trophy went to NFL running back Rashad Jennings and his pro partner, Emma Slater. The Voice crushed DWTS in the advertiser-coveted 18-to-49-year-old demographic by a score of 73,763 viewers to 19,243. DWTS also was whipped by Bull, Fox’s Prison Break, Fox4’s 9 p.m. local newscast and the second half-hour of The CW’s The Flash. But now let’s get to ABC’s Downward Dog, whose second episode beat all competing broadcast network programming from 7 to 7:30 p.m. in the key 18-to-49-year-old range while drawing almost twice as many viewers (35,278) as DWTS. The talking, philosophical mutt and his oft-vexed owner (played by former Dallasite Allison Tolman) ran second in total viewers with 138,151 compared to 218,133 for CBS’ first half-hour of an NCIS repeat. Both are major improvements over Downward Dog’s feeble numbers last Wednesday, when it was sneak-previewed following the season finale of Modern Family. Good boy. NBC5 and TEGNA8 tied for the lead in total viewers at 10 p.m. while Fox4 won fairly comfortably with 25-to-54-year-olds (the main advertiser target audience for news programming). It was otherwise a day of sweeps within the sweeps. Fox4 cruised to twin wins at 6 a.m. and NBC5 dominated at 5 and 6 p.m. in both ratings measurements. It’s been a long, winding, bumpy road for NBC5’s lead investigative reporter and his behind-the-scenes teammates. Scott Friedman has been the face of Big Buses, Bigger Problems for the past six months, working full-time since last fall on “one of the more complex stories that I’ve ever been involved with,” he says in a telephone interview. NBC5 is giving Friedman, producer Eva Parks and photojournalist Jose Sanchez an extended showcase on Wednesday, May 24th. The station is bumping the syndicated Extra in favor of a half-hour of hard news in the 6:30 to 7 p.m. slot. Those with an inclination to overwhelm the station’s “switchboard” might want to think twice and buckle in. These are the kinds of stories and investments that local TV news operations should be making in the interest of “differentiating” themselves rather than succumbing to the latest health scare, diet regimen or neighborhood crime scene. NBC5 vice president of news Mark Ginther says that Friedman and his team have done close to 60 stories on what appear to be serious problems and possibly corruption within Dallas County Schools, the taxpayer-bankrolled agency in charge of the daily transportation of 75,000 North Texas students. The half-hour special, which will be hosted by Friedman and anchors Brian Curtis and Meredith Land, further investigates a highly questionable land deal that could end in the dissolution of the 171-year-old DCS. “There are a lot of twists and turns to this whole web,” Friedman adds. Officials in charge of the DCS typically have spurned his advances, refusing to comment on-camera. But the State Legislature lately has taken an avid interest in what Friedman has uncovered, with Senate and House committees both voting to shut down the DCS. Passage by the full body still hangs in the balance. NBC5 will rebroadcast Big Buses, Bigger Problems : The Land Deal on Saturday, May 27th, again at 6:30 p.m. The station’s nbcdfw web page has an exhaustive chronology of how this investigation began and where it might be going. You can dive in right here. Dallas attorney Rachel Lindsay, first African-American star of ABC’s The Bachelorette, began sifting through her gaggle of men Monday night. The D-FW Nielsen ratings were slow on the draw, at least in total viewers. But the numbers picked up among advertiser-prized 18-to-49-year-olds. Airing from 8 to 10 p.m., The Bachelorette averaged 130,880 total viewers after inheriting 319,928 from the closing 15 minutes of Dancing with the Stars. That was good enough to beat Fox’s 8 p.m. episode of Lucifer, but nothing else among competing attractions on the Big Four broadcast networks. The top draw, NBC’s second hour of The Voice, pulled in 312,657 viewers after narrowly losing to DWTS with its opening hour. In the 18-to-49 numbers,The Bachelorette perked up and outdrew everything except The Voice and Fox4’s 9 p.m. local newscast. Overall, The Bachelorette averaged 51,314 viewers in this key demographic, but the audience fell off for the show’s rose-peddling second hour. Here are the local news derby results for the 18th weekday of the May ratings “sweeps,” which end this Wednesday. TEGNA8 all but locked up a 10 p.m. win in total viewers with its fourth straight first-place finish. Only a total collapse would knock the station from that perch. TEGNA8 also won among 25-to-54-year-olds (main advertiser target audience for news programming). Fox4 notched another pair of 6 a.m. wins and NBC5 stayed strong in the early evening with sweeps at both 5 and 6 p.m. The weekend’s big upset wasn’t just on the Preakness track. NBC’s telecast of the Triple Crown’s second leg also outdrew CBS’ climactic 15 minutes of the homegrown Byron Nelson golf tournament over the weekend. The 10-horse Preakness field went off at 5:51 p.m. Saturday, with longshot Cloud Computing nipping one of the favorites, Classic Empire, while Kentucky Derby champ Always Dreaming faded to eighth. Nielsen Media Research measures in 15-minute increments. And from 5:45 to 6 p.m., ratings for the Preakness peaked at 174,506 D-FW viewers. On Sunday, Billy Horschel beat Jason Day on the first playoff hole at the Byron Nelson. Their match ended just a few second before 6 p.m. From 5:45 to 6 p.m., ratings peaked at 159,964 viewers. In Sunday’s prime-time Nielsens, ABC’s three-hour Billboard Music Awards topped all TV attractions with 189,049 viewers and 86,592 in the advertiser-prized 18-to-49-year-old age range. The Texas Rangers’ Sunday night road win at Detroit on ESPN’s featured game finished a close second in total viewers with 174,506. Friday’s prime-time ratings leaders were CBS’ 7 p.m. hour of Undercover Boss in total viewers (159,964) and NBC’s 8 to 10 p.m. edition of Dateline in the 18-to-49 demographic (41,692). On Thursday night, Fox4’s 9 p.m. local newscast was the top draw in both measurements, with 232,675 total viewers and 70,556 in the 18-to-49-year-old realm. Here are the Thursday/Friday local news derby results for the 16th and 17th weekdays of the May ratings “sweeps,” which end this Wednesday. Thursday -- TEGNA8 drew the most total viewers at 10 p.m. while Fox4 news won with 25-to-54-year-olds (main advertiser target audience for news programming). NBC5 ran first in total viewers at 6 a.m., but Fox 4 was tops with 25-to-54-year-olds. The Peacock enjoyed ratings sweeps at both 5 and 6 p.m. Friday -- TEGNA8 swept the 10 p.m. competitions and Fox4 did likewise at 6 a.m. NBC5 and TEGNA8 shared the total viewers lead at 6 p.m., but Fox4 had the edge with 25-to-54-year-olds while CBS11 registered “hashmarks” (no measurable audience). NBC5 again had twin wins at 5 p.m. TEGNA8 reporter Jason Whitely & news director Carolyn Mungo. TEGNA8’s heavily touted series of stories on alleged absentee voter fraud in Dallas County elections became tainted Friday when The Dallas Morning News published a front page story saying that the station’s whistleblower also is a “person of interest” under investigation and that the Dallas-based ABC affiliate paid him for exclusive rights to audio recordings. Respected reporter Jason Whitely is not named in the lengthy piece by Naomi Martin (with contributions by Robert Wilonsky). But he’s been the point man for the ongoing series, which is airing during the competitive May “sweeps” ratings period. The station so far has made no mention on the air of its payments to Sidney Williams, whose secret recordings have fingered another man, Jose Barrientos, as the primary perpetrator of voter fraud. Barrientos has denied any wrongdoing and claims there’s an ongoing “witch hunt” directed at him. From a television criticism perspective, it’s an ethical misdemeanor at best to pay sources for information. But it’s appreciably worse not to disclose such payments. Or to belatedly claim they’re something other than what they were. Williams told The News that TEGNA8 paid him $2,500 for the tapes under the provision that he not share them with anyone else. The News said he showed the paper a $1,000 contract with TEGNA8 but declined to show another contract that allegedly showed the station paying an additional $1,500. TEGNA8 news director Carolyn Mungo termed the station’s payments a “licensing fee,” but for less than the $2,500 that Williams is claiming. A source at rival CBS11 said the station was pitched the same story, but declined after learning it had a price tag attached. Williams has a minimal criminal record, but in 2007 was sentenced to 75 days in jail for misdemeanor theft, The News reported. He also pled guilty later that year for knowingly filing a false official report in Bexar County, the paper said. Mungo does not talk to this reporter, and in fact sometimes steers interviews with station personnel to Fort Worth’s Star-Telegram after unclebarky.com makes inquiries, according to sources at TEGNA8. The station has a “content sharing” arrangement with the Star-Telegram, as does The News with NBC5, which regularly features several of the paper’s reporters in on-air segments. TEGNA8 is locked in a tight “sweeps” battle for first place in total viewers at 10 p.m. Through the first 16 of 20 weekdays measured by Nielsen Media Research, TEGNA8 is averaging 159,964 viewers per newscast, with CBS11 (152,693) and NBC5 (145,422) close behind. Among 25-to-54-year-olds (the main advertiser target audience for news programming), TEGNA8 also is in the thick of it. Fox4 leads with 45,101 viewers, followed by TEGNA8 (42,094) and NBC5 (39,087). It did better in the national Nielsens, but ABC’s Wednesday night sneak preview of Downward Dog got treated like rabies by D-FW viewers. The critically praised saga of Martin the philosophical talking mutt and his owner, Nan (Baylor grad and former Dallasite Allison Tolman from Fargo) ran a distant last among the Big Four broadcast networks following a lead-in from the season finale of Modern Family. DD drew just 72,711 total viewers and a measly 9,621 in the advertiser-prized 18-to-49 age range. Prime-time’s overall top dog, Fox’s 8 p.m. hour of Empire, had 232,675 total viewers and 115,456 in the 18-to-49 demographic. Here are Wednesday’s local news derby results for the 15th weekday of the May “sweeps” ratings period. TEGNA8 won at 10 p.m. in total viewers while Fox4 ran first among 25-to-54-year-olds (main advertiser target audience for news programming). Fox4 and NBC5 shared the 6 a.m. lead in total viewers, but Fox4 won outright with 25-to-54-year-olds. NBC5 swept the 5 p.m. competitions. At 6 p.m., CBS11 pulled in the most total viewers; Fox4 and TEGNA8 shared the 25-to-54 gold. The latest NCIS season finale as usual topped all D-FW programming in total viewers Tuesday while also setting up CBS’ two following crime dramas for time slot wins. NCIS drew 349,013 viewers in handily defeating NBC’s competing hour of The Voice (276,308). Bull (276,302 viewers) and NCIS: New Orleans (254,489) then breezed to wins from 8 to 10 p.m. The advertiser-prized 18-to-49-year-old demographic again told a different story. The Voice won from 7 to 8 p.m. with 73,763 viewers before the Peacock’s first of two Great News episodes led from 8 to 8:30 p.m. with 57,728. Fox’s second half-hour of Prison Break then took over with 48,107 viewers in this key audience measurement before Fox4’s 9 p.m. local newscast pulled in 36,561 viewers to scratch out a narrow win over NCIS: New Orleans (34,637 viewers). ABC’s 9 p.m. attraction, Marvel’s Agents of S.H.I.E.L.D., typically bottomed out with just 9,621 viewers in the 18-to-49 motherlode. For whatever reason, ABC has renewed it for another season anyway. One of Marvel’s innumerable superheroes must have super duper mind-melding power. Or perhaps just incriminating pictures. CBS11 remained in contention for a big morale-boosting 10 p.m. win by placing first in total viewers while TEGNA8 overcame the skimpy S.H.I.E.L.D. lead-in to win with 25-to-54-year-olds (main advertiser target audience for news programming). Fox4 swept the 6 a.m. competitions and NBC5 likewise ran the table at 5 p.m. The 6 p.m. golds went to the Peacock in total viewers TEGNA8 in the 25-to-54 realm. ABC’s Dancing with the Stars bested The Voice in total D-FW viewers for the second straight Monday before again “skewing old” with a vengeance. From 7 to 9 p.m., DWTS pulled in 247,217 viewers, with The Voice close behind (239,946). But it was another slaughterhouse among advertiser-prized 18-to-49-year-olds, with The Voice drawing 76,970 to just 25,657 for DWTS. In the 9 p.m. hour, CBS’ Scorpion had the most total viewers (218,133) and NBC’s The Wall prevailed with 18-to-49-year-olds (41,692). CBS11 won at 10 p.m. in total viewers, but TEGNA8 drew the most 25-to-54-year-olds (main advertiser target audience for news programming). The spoils also were split at 6 a.m., with Fox4 running first in total viewers and NBC5 on top with 25-to-54-year-olds. NCIS: Los Angeles, getting a big second wind on Sunday nights, led all of D-FW’s weekend TV attractions in total viewers while ABC’s afternoon Game 1 of the Golden State Warriors-San Antonio Spurs Western Conference finals easily won among advertiser-coveted 18-to-49-year-olds. NCIS: LA totaled 261,760 viewers after inheriting 210,862 from the network’s 60 Minutes. But both programs otherwise again “skewed old” and were whipped in the 18-to-49 motherlode by Warriors-Spurs (83,385 viewers). The Spurs had built up a 23-point second half lead on Golden State’s home floor when their principal star, Kawhi Leonard, left the game after re-injuring his ankle. Absent Leonard, the Spurs deflated and ended up losing by two points in a down-to-the-wire thriller. Fox offered the two-hour Miss USA pageant Sunday night. It drew just 72,711 total viewers and 25,657 in the 18-to-49 age range. On Friday night, CBS’ 8 p.m. episode of Hawaii Five-0 led all prime-time programming in total viewers with 203,591. It also edged ABC’s competing Shark Tank (renewed for a ninth season Monday) for that night’s overall lead among 18-to-49-year-olds. TEGNA8 won in total viewers at 10 p.m., with CBS11 a close second. NBC5 comfortably led among 25-to-54-year-olds (main advertiser target audience for news programming). Fox4 remained in total control of the 6 a.m. competitions with another sweep. TEGNA8 enjoyed a prosperous early evening, running the table at 6 p.m. and drawing the most total viewers at 5 p.m. NBC5 won with 25-to-54-year-olds at 5 p.m. CBS11 adds reporter MaryAnn Martinez; ex-WFAA anchor/reporter Debbie Denmon is now with the Home Shopping Network. CBS11 has hired reporter MaryAnn Martinez (left/above), who joins the station from Fox-owned KTTV-TV in Los Angeles, where she barely stopped long enough for a cup of coffee and a scone. Martinez, who joins CBS11 on Monday, May 15th, left San Antonio’s KENS-TV for KTTV in mid-March of this year. “It’s definitely going to be an adventure,” she told San Antonio Express-News TV writer Jeanne Jakle at the time. But the Baylor University graduate only freelanced for KTTV, CBS11 director of communications Lori Conrad said Friday. So after a little over two years with KENS and a little under two months with KTTV, she’s back in her native Texas. Martinez also has worked at TV stations in El Paso, Miami, Las Vegas and San Diego. She was a nightside reporter with KENS. ***Debbie Denmon spent 12 years at WFAA before the station declined to renew her contract in July of 2012. She was dropped after losing a discrimination suit filed against the station, which was then owned by Dallas-based Belo Corp. It’s now run from afar by TEGNA. Denmon since got married and for a while was director of communications for the Dallas District Attorney’s office. She’s now newly in St. Petersburg, FL as an on-air personality for the Home Shopping Network. “It’s a great opportunity for me that marries two of my favorite things -- TV and shopping,” she said in a message to unclebarky.com. Denmon said that her husband, Richard Greagor, and their son, Kingston, will be joining her when the school year is completed. CBS’ latest season finale of The Big Bang Theory topped all Thursday programming as usual before the Texas Rangers came alive and won prime-time’s closing hour. BB drew 334,471 D-FW viewers and also paced all TV attractions in the advertiser-prized 18-to-49-year-old age range with 102,627. A 7:30 p.m., a BB repeat won its time slot in total viewers (225,404) but was beaten by the second half-hour of ABC’s Grey’s Anatomy among 18-to-49ers (67,349). CBS’ Mom took the 8 to 8:30 p.m. slot in total viewers (218,133) before the network’s Life In Pieces fell to second place behind the closing half of NBC’s Chicago Med (189,049). But Life In Pieces won its slot with 18-to-49-year-olds while Mom was runner-up to the first half-hour of ABC’s Scandal. The Texas Rangers’ walk off home win against San Diego, capped by Mike Napoli’s three-run homer, rose up to take the 9 p.m. hour in total viewers (174,506) while also nipping CBS’ The Amazing Race for the top spot with 18-to-49-year-olds (38,485). TEGNA8 drew the most total viewers at 10 p.m. but Fox4 was narrowly No. 1 among 25-to-54-year-olds (main advertiser target audience for news programming). Fox4 racked up another pair of 6 a.m. wins and TEGNA8 likewise swept the 6 p.m. competitions. The 5 p.m. golds went to NBC5 in total viewers and Fox4 in the 25-to-54 realm. CBS11 has been wandering in the ratings desert for several ratings “sweeps” periods, with a nary a glimmer of hope anywhere. There now appears to be a glimmer. The station has won or tied for the 10 p.m. top spot in total viewers for three straight weeknights. And at the midpoint of May’s warfare, CBS11 has five wins in 10 tries, with 10 more weeknights remaining. Without question, the station has benefited from generally strong CBS network “lead-ins” at 9 p.m. But all four combatants usually excel when given such boosts. The bottom could still fall out for CBS11, which otherwise has no chance at all to win at 10 p.m. among 25-to-54-year-olds (the main advertiser target audience for news programming). But for now, the station is very much in the total viewers game, with a win still somewhat unlikely but certainly possible. We’ll get to the full local news derby results in just a bit. But first, a brief look at prime-time. Fox’s Empire isn’t nearly the juggernaut it was during its first two seasons. But a new 8 p.m. episode still had enough juice to rank as Wednesday’s No. 1 attraction in both total viewers (225,404) and advertiser-craved 18-to-49-year-olds (96,213). Tuesday’s prime-time pacesetter in total viewers again was CBS’ NCIS with 334,471. NBC’s competing The Voice led all prime-time programming in the 18-to-49-year-old realm with 70,556 viewers. Tuesday -- CBS11 cashed in on a bounteous lead-in from NCIS: New Orleans to win by a significant margin at 10 p.m. in total viewers. TEGNA8 edged Fox4 for the top spot with 25-to-54-year-olds. Fox4 continued to cruise at 6 a.m. with two more wins. The spoils were split at 5 and 6 p.m., with NBC5 winning at both hours in total viewers while Fox4 ran first among 25-to-54-year-olds. Wednesday -- TEGNA8 and CBS11 shared first place at 10 p.m. in total viewers. But here’s where there could be additional hope for CBS11. The station grabbed a share of first place despite getting the worst lead-in among the four stations from CBS’ 9 p.m. episode of Criminal Minds: Beyond Borders. Fox4 won solidly at 10 p.m. in the 25-to-54 demographic. Fox4 also cashed in two more 6 a.m. wins and ran first at both 5 and 6 p.m. among 25-to-54-year-olds. NBC5 drew the most total viewers at 5 p.m. and TEGNA8 took the 6 p.m. gold in that measurement. On most Mondays, NBC’s The Voice both out-shouts and outdraws the semi-celebrity hoofers on ABC’s Dancing with the Stars. Not this time. DWTS fox-trotted past The Voice by a half-step in D-FW’s total viewers Nielsens, winning by a 247,217 to 239,946 score. It otherwise was business as usual among advertiser-craved 18-to-49-year-olds, with The Voice luring 76,970 to DWTS’s 35,278. The closing 9 p.m. hour of prime-time was won by CBS’ Scorpion in total viewers (203,591) and NBC’s The Wall in the 18-to-49 motherlode (57,728). The struggling Texas Rangers, who dropped another late night road game, this time at San Diego, continued to languish on Fox Sports Southwest with 79,982 total viewers and 16,036 in the 18-to-49 realm. CBS11 edged NBC5 for the top spot in total viewers at 10 p.m. while Fox4 won among 25-to-54-year-olds (main advertiser target audience for news programming). Fox4 had twin wins at 6 a.m. and TEGNA8 ran the table at 6 p.m. Fox4 and TEGNA8 tied for the most total viewers at 5 p.m., with Fox4 alone on top with 25-to-54-year-olds. Following the usual interminable NBC buildup, the Kentucky Derby finally sprang into action at 5:52 p.m. Saturday and ended two minutes later. During the applicable 15-minute window measured by Nielsen Media Research -- 5:45 to 6 p.m. -- the win by Always Dreaming drew 327,200 D-FW viewers to rank as the weekend’s most-watched TV attraction. A rather smallish number of those viewers -- 86,592 -- were within the advertiser-coveted 18-to-49 age range. But that was still the weekend’s top haul. On Sunday night, CBS’ 7 p.m. episode of NCIS: Los Angeles led all prime-time programming in total viewers with 283,573. NBC’s competing Little Big Shots ranked No. 1 among 18-to-49-year-olds (73,763). ABC’s The Last 100 Days of Diana, which ran from 8 to 10 p.m., performed solidly among total viewers with 189,049. It was beaten by CBS’ Madam Secretary (218,133) in the first hour but won from 9 to 10 p.m. Diana cratered with 18-to-49-year-olds, though, luring just 16,036 of ‘em. It was beaten by everything except NBC’s 9 p.m. episode of Shades of Blue in the Big Four broadcast network universe. Fox4’s 9 p.m. local newscast was the No. 1 performer with 48,107 viewers in this key demographic. On Friday, prime-time’s top draws were the season finale of CBS’ Blue Bloods in total viewers (239,946) and the network’s Hawaii Five-0 in the 18-to-49 realm (41,692). Here are Friday’s local news derby results for the seventh weekday of the May “sweeps” ratings period. It was a day of sweeps within the sweeps. NBC5 nipped CBS11 for the most total viewers at 10 p.m. and edged Fox4 for the top spot with 25-to-54-year-olds (main advertiser target audience for news programming). Fox4 had twin wins at both 6 a.m. and 6 p.m. NBC5 ran the table at 5 p.m. It’s not unusual for TEGNA8’s newscasts to rank first at 10 p.m. in total D-FW viewers. But it’s been a much tougher sell with the key news demographic, 25-to-54-year-olds. The station altered that course -- at least on Wednesday and Thursday -- with late night sweeps in both demographics despite less than stellar lead-ins from ABC’s 9 p.m. dramas. On Thursday, ABC’s The Catch ran last in both audience measurements. On Wednesday, Designated Survivor was third in total viewers and second among 25-to-54-year-olds. These are just two nights and the May “sweeps” have a long way to go. But TEGNA8 is on the right course, at least from this perspective, with a steadier diet of longer-form feature stories billed as “Originals.” It’s an effort to differentiate and stand out from all the same-old, same-old. Reporter Kevin Reece, hired in September of last year, excels at these kinds of stories, and TEGNA8 is making good use of him. So we’ll see if viewers in fact are starting to take long-term notice of TEGNA8’s more textured efforts in the key 10 p.m. slot. In Thursday’s prime-time Nielsens, CBS’ 7 p.m. new episode of The Big Bang Theory again led all programming in both total viewers (334,471) and 18-to-49-year-olds (109,041), the key demographic for entertaining programming. Wednesday was paced by Fox’s Empire, which drew 232,675 total viewers and 89,799 in the 18-to-49-year-old realm. Here are the other local news derby results. Wednesday -- NBC5 and Fox4 shared the spoils at 6 a.m., with the Peacock narrowly winning in total viewers and Fox4 edging NBC5 with 25-to-54-year-olds. NBC5 had the most total viewers at 6 p.m. while Fox4 and CBS11 tied to the top spot among 25-to-54-year-olds. The 5 p.m. firsts went to TEGNA8 in total viewers and Fox4 in the 25-to-54 demographic. Thursday -- Fox4 had twin wins at 6 a.m. TEGNA8 led in total viewers at both 5 and 6 p.m., but NBC5 took the 25-to-54 crowns at both hours. The Press Club of Dallas’ new group of 12 North Texas Legends includes (from top left clockwise) Janet St. James, Dale Hansen, Tom Joyner and Norm Hitzges. Induction ceremony is Saturday, June 3rd. A quartet of on-camera luminaries and a trio of radio standouts are among the dozen new North Texas Legends being honored next month by the Press Club of Dallas. Tickets are now on sale for the seventh annual event, being held on Saturday, June 3rd at the historic downtown Dallas Sixth Floor Museum. This year’s ceremony includes an inaugural posthumous induction, with D-FW’s first television meteorologist, Harold Taft, being honored for a 42-year stint at WBAP-TV, which later became KXAS-TV and now is billed as NBC5. Taft died of cancer on Sept. 27, 1991, shortly after his last weathercast on Aug. 30th of that year. His son, Rafael Taft, now a Grand Prairie police officer, is scheduled to induct him. The TV contingent also includes three WFAA stalwarts -- sports anchor Dale Hansen, retired investigative reporter Byron Harris and former medical reporter Janet St. James, who is now assistant vice president for strategic communications at Medical City Healthcare. Country and western radio’s “Midnight Cowboy,” Bill Mack, who early on dubbed Taft “The World’s Greatest Weatherman,” is a part of a radio contingent that also includes nationally famous “fly jock” Tom Joyner and D-FW sports talk dean Norm Hitzges. ***Mike Blackman, who was the longtime executive editor of Fort Worth’s Star-Telegram. ***Bill DeOre, the former featured editorial and sports cartoonist for The Dallas Morning News. ***Yolette Garcia, former award-winning producer at KERA-TV and now an assistant with Southern Methodist University. ***John Jenkins, recently retired as news operations manager at NBC5 after breaking into television as one of D-FW’s first African-American photographers at both KDFW-TV and WFAA-TV. ***John Lumpkin, longtime Associated Press bureau chief in Dallas before becoming instrumental in launching and sustaining the Bob Schieffer School of Journalism at TCU. Last year’s event was completely sold out, and capacity at the Sixth Floor Museum is restricted to 225 because of fire marshal restrictions. All admissions ($25 for Press Club members and $30 for non-members) include food, beer, wine and soft drinks at an opening reception scheduled to start at 6 p.m. Induction speeches will begin around 7 p.m., with Harold Taft’s son and all 11 living Legends confirmed as attendees. Note to readers: Your friendly content provider is a second-year Press Club of Dallas board member and co-chair of this year’s Legends event. Local Nielsen ratings snapshot (Wed.-Sun., April 26-30) -- delfated ratings for NFL draft on opening night of May "sweeps" The NFL’s annual meat market, which started Thursday, again coincided with the first night of the May “sweeps” ratings period -- as it did last year. Otherwise there was no comparison. The first round of the draft got sacked in the D-FW Nielsen ratings compared to 2016’s picks and pans. ESPN, barely removed from a firing squad that took out 100 employees earlier in the week, averaged 174,506 viewers while the NFL Network pulled in 58,169. Last year’s totals were 240,802 viewers for ESPN and 99,154 for NFL Net. The draft also took a big hit in the advertiser-prized 18-to-49-year-old demographic. ESPN averaged 80,178 viewers for its coverage, down from 152,434 last year. The NFL Net drew 25,657 compared to 47,636 last year. In football-crazy North Texas, these are pretty remarkable downturns. Thursday’s biggest overall ratings draw, CBS’ The Big Bang Theory, had 298,115 total viewers and 96,213 in the 18-to-49 realm (second to the entire combined draft averages on ESPN/NFL Net). OK. let’s jump to the most recent D-FW numbers -- for Sunday night. CBS’ 7 p.m. episode of NCIS: Los Angeles led all prime-time attractions with 276,302 total viewers while NBC’s Little Big Shots and Chicago Justice and ABC’s America’s Funniest Home Videos shared the 18-to-49-year-old lead with 57,728 viewers apiece. Friday’s top draw again was CBS’ Blue Bloods with 232,675 total viewers; NBC’s Dateline drew the most 18-to-49-year-olds (44,899). On Wednesday, Fox’s Empire led in both ratings measurements with 254,489 total viewers and 80,178 in the 18-to-49 demographic. Here are the Wednesday-Friday local news derby results. Wednesday -- On the eve of the May sweeps, NBC5 and TEGNA8 tied for the most total viewers at 10 p.m., but Fox4 won among 25-to-54-year-olds (main advertiser target audience for news programming). Fox4 also swept the 6 a.m. competitions and NBC5 did likewise at 5 p.m. The 6 p.m. firsts went to the Peacock in total viewers and Fox4 with 25-to-54-year-olds. Thursday -- TEGNA8 notched the first 10 p.m. sweeps win in total viewers and tied NBC5 for the top spot with 25-to-54-year-olds. Fox4 scored twin wins at 6 a.m. and NBC5 again swept the 5 p.m. competitions. NBC5 and TEGNA8 shared the 6 p.m. lead in total viewers while Fox4 won outright among 25-to-54-year-olds. Friday -- NBC5 ran the table at 10 p.m. and Fox4 notched another pair of 6 a.m. wins. TEGNA8 continued to make some early morning noise in the early going of the sweeps by placing a solid second in both ratings measurements. On Thursday, TEGNA8 also ran second in total viewers while tying NBC5 for the runner-up spot with 25-to-54-year-olds. TEGNA8 won in total viewers at both 5 and 6 p.m. The 25-to-54 golds went to NBC5 at 5 p.m. and Fox4 at 6 p.m.
2019-04-20T04:46:27Z
http://www.unclebarky.com/dfw_files/archive-may-2017.html
The S. H. Taylor party pulled out Thursday morning for Washington Territory. The party consists of S. H. Taylor, wife and 2 daughters, Perry Taylor, wife and child, Elijah Ledington and family, Daniel Ledington and family, Alfred Cory and family, C. W. Stewart and family, Oliver Godlove, Leason Cory and some others whose names we did not learn. They go to some place in the interior of Washington Territory. 1)Merrie Pinick, Havensville, Pottawatomie Co, Ks. Area working database (Pottawatomie: October 18, 2004), http://awt.ancestry.com/cgi-bin/igm.cgi?op=GET&db=mp648&id=I21151 , Ancesry.com search, 10-27-04. Frank Mosley listed “other pioneers” that came to the Salubria and Mann Creek areas, settled a bit earlier than the upper Weiser River areas. James Colson, William B. Allison, Edward Jewell, and Andrew Abernathy were some of these men and were found living near each other on the 1870 Census of the area. 2)Frank P. Mosley, History of Idaho the Gem of the Mountains, Vol. 1 (no data), Chap. 33, p. 684, Images. Ancestry.com, search, “emigrants Washington County” 10-27-04; Money Stafford, 1870 U.S. Census (June 18-19, 1870), Boise City Pct., Ada Co., Territory of Idaho, pp. 2-3. It is not unreasonable to believe by the evidence that the road through Crane Creek was fairly good and open to emigrant wagons even earlier than 1867, and that settlers emigrating from the east that early came this route. Though we have not discovered a lot of journals or direct records, we ultimately find emigrants with eastern origins settled all along the Weiser River. James Colson emigrated from Iowa to Idaho in1864, after moving to Iowa from Indiana, with a wife and three children. He later moved to the Salubria Valley. Two children were born in Salubria. He followed the Goodale North from Boise. He filed for homestead land, completed in 1877, and his 16 year old son, Anthony, also filed about 1880. He became a County Commissioner, and James Colson was also a delegate to the Idaho State Constitutional Convention in 1889. Ed Jewell completed a homestead in 1881, after emigrating with a wife from Wisconsin in 1868. He had one son, William, born in Salubria. Most others on that Census living near each other were farmers, but Jewel was a blacksmith! In 1890, he became a Senator to the Idaho Legislature. One James M. Patton also came from Wisconsin, on the same wagon train as the Jewell family, and remained a bachelor for several years. Henry Harrison Abernathy came to the Weiser River area with the Goodale Train in 1862. When a teenager on the Goodale Train, Martha Roberts, died in the valley he prepared the wagon-tailgate marker for her grave. He and his brother, Andrew, stayed in the area in 1862 and began mining, but by 1864, they moved to Weiser and homesteaded. By 1868 they moved back to Salubria, and the 1870 Census record indicated they had come from Indiana. William Allison came to Idaho with his Father’s family (Alexander) before 1865. They moved to Salubria in 1868. By the 1870 Census he had married with one daughter, Mimmie, born in Idaho, and filed had for his homestead about that time. 3)Money Stafford, 1870 U.S. Census (June 18-19, 1870), Boise City Pct., Ada Co., Territory of Idaho, pp. 2-3; BLM, General Land Office Records, Internet, Search on 10-28-2004; OCTA, Emigrant Names (Independence, MO, 2002), CD published with emigrant names from many sources; Sandra Hansen, “Goodale North,” E-mail reply of December 02, 2004, to James McGill. Her husband is a descendent of some of the Salubria families, including the Allison family, and she sent information on the Allison and Abernathy emigrants. Woodson Jefferys originally came to Oregon City, OR on October 10, 1853, from St. Joseph, MO. A little more than a decade later, he returned east to Idaho, to the Weiser River area and was one of the first settlers near the city of Weiser. He had influence and money, and assisted many emigrants that followed him to Salubria. His son, Thomas, became the first Washington County Superintendent of public schools. Some information about his original emigration came from the Diary of George N. Taylor, 1853 Oregon Trail Emigrant. Kate Sharp, sister of William Allison who also emigrated with that family, was 28 years old in 1870, and was the fourth emigrant to complete a homestead in the area in 1979, behind John Cuddy in 1874, Duke Burrel in 1876 and James McGinnis, earlier in 1879. 4)Frank P. Mosley, History of Idaho the Gem of the Mountains, Vol. 1 (no data), Chap. 33, p. 684, Images. Ancestry.com, search, “emigrants Washington County” 10-27-04; Money Stafford, 1870 U.S. Census (June 18-19, 1870), Boise City Pct., Ada Co., Territory of Idaho, pp. 2-3; Money Stafford, 1870 U.S. Census (June 18-19, 1870), Boise City Pct., Ada Co., Territory of Idaho, pp. 2-3; BLM, General Land Office Records, Internet, Search on 10-28-2004; OCTA, Emigrant Names (Independence, MO, 2002), CD published with emigrant names from many sources. Information was mixed and came from all these sources for emigrants in all the above three paragraphs. There is a great deal of history written about John Cuddy, who with Edward Tyne opened the first gristmill and sawmill in the Salubria area. He was born in Ireland and emigrated from there with his parents. He came to Salubria from Boise after first moving to Boise from Washington State. He had moved to Boise in 1864, and moved to Salubria in 1869, a bachelor. He and Tyne traveled up the Goodale North, and he soon became one of the wealthiest and most influential men in the area, buying out his partner. In 1871, he married Delia Tyne, sister of Edward, and 13 years younger than himself. By 1880, they had 2 sons and three daughters. According to the Department of the Interior records, he received the first completed land Patent in the area in 1874. 5)Mosley, “Biographical,” History, Vol. 3, pp. 234-235; Ibid, BLM, GLOR, “Cuddy” search; V. D. Hannah, 1880 U.S. Census (June 7, 1880), Middle Weiser Valley Pct., Washington Co., Idaho, p. 369. Soon emigrants began to move into the area on up the Weiser River. Indian Valley, 12 miles east of Salubria, was the next area to begin to be populated. One of the early emigrants was a sickly man, Albert ‘Olly’ McDowell. He and his wife, Francis Brown, had six children and came from Dubuque, IA. Albert had tuberculosis, and his doctor had advised him to move to a warmer climate. It could be argued that the Weiser River valleys were probably no warmer than where he had come from, but in 1867, he and two brothers, with a friend, Isaac Spoor, formed a wagon train, and the family came first to Salubria. 6)Geneva Gibbs Barry Jewell, “Indian Valley and Surrounding Hills” (1990), p. 6. Only 4 pages of a typed copy, unpublished paper, obtained by mail from Gary Frankin, Cambridge, January 20, 2003. Idaho Death Records, Ancestry.com, 10-27-2004. These all traveled up the Crane Creek variant. Albert’s two older girls, Elizabeth and Elvira, stayed in Salubria where Elizabeth found a school teacher’s position in need of her skills in 1868. She met Taylor Cole, a young, earlier emigrant to the area, who was also teaching in the school, and soon married him. (Two teachers in one school offers a hint of how large the school had become with the influx of those early pioneers.) Albert tried Indian Valley for a short time, but evidently it was not helpful to his health. His family picked up their things and moved on to Monterey, CA, the same year they came to Idaho, in 1867. Isaac Spoor, on the same train as the McDowell family, had stopped and settled in the Payette Valley. In the spring of 1868, Spoor’s friends, Albert McDowell and family, once again emigrated from California back to Idaho, and again traveled back up the old Tim Goodale road, and settled in Indian Valley. In the winter of 1868, Albert died at Indian Valley. Albert’s youngest son, Albert Warren, was 4 years old when he lost his father. “Fannie” Francis McDowell soon married Isaac Spoor, and later they moved to Pioneer City, ID. She was about 38 years old and Isaac was 62. Some years later, about 1883, the son, Albert Warren, moved back to Indian Valley. The records show that this McDowell son also died there on May 26, 1927, after living in Indian Valley more than 40 years! 7)Geneva Gibbs Barry Jewell, “Indian Valley and Surrounding Hills” (1990), p. 8. Only 4 pages of a typed copy, unpublished paper, obtained by mail from Gary Frankin, Cambridge, January 20, 2003. Indian Valley became a large ranching region, and though there was a Post Office there by 1873, it remained only a small town. Other emigrants came to the area over the next few years. “William McCullough, three finger Smith (Sylvester), William Marsberry, Woods brothers (Elisha, Elijah, Samuel and William), and William Coriell came to that location. These people all arrived from 1869 to 1880. There were many others that came later.” 8)Geneva Gibbs Barry Jewell, “Indian Valley and Surrounding Hills” (1990), p. 5. Only 4 pages of a typed copy, unpublished paper, obtained by mail from Gary Frankin, Cambridge, January 20, 2003. Some emigrants moved on north to later form Council, ID, in a ranching region. Although it would be almost another decade before the Council Valley would be settled, it did acquire at least one non-native occupant in 1868: a 32 year old bachelor named Henry Childs. He built a home and did some farming about 2.5 miles up Hornet Creek from the present site of Council. 9)Adams County Historic Preservation Commission, “A History of the Council Valley Area,” ACHPC Web Site (Council, ID, n.d.), p. 4, Obtained 10-21-04. The Creek was named after Childs had a nasty encounter with hornets there. Before the whole area was known as Council Valley, it was called “Hornet Valley! George and Elizabeth Moser and children immigrated to the Council Valley in 1876. They were the first white family, and their homestead later became the beginning of the location of the town of Council. Moser had moved from Tennessee to Kentucky to Arkansas, and then came on a wagon train to Idaho with 4 children. Two more children were born at the new homestead. He had left a wagon train in Boise, and his family came alone to the Hornet Valley, up the Goodale North! By the time of the 1880 Census, the Moser family had at least two close neighbors, the Robert White family with 2 children and the Alexander Kesler family with 9 children! Mr. White was Scottish, and had come to America, met his wife, Ellenor, in Alabama, settled in Arkansas, and then followed the Moser family to Idaho on a second wagon train from Arkansas in 1876. Alex and Martha Kesler were both from Kansas, but had also moved to Arkansas. They arrived about the same time as the White family and may have come on that same wagon train later in the summer, up the Goodale North variant-also following the Moser family. They were all close neighbors on the 1880 Census. 10)Adams County Historic Preservation Commission, “A History of the Council Valley Area,” ACHPC Web Site (Council, ID, n.d.), p. 4-5, Obtained 10-21-04; V. D. Hannah, 1880 U.S. Census (June 19, 20, 21, 1880), Council Valley Pct., Washington Co., Idaho, p. 372. William and Helen Kinning Shaw immigrated to the Salubria valley from Iowa in the early 1870s. John Roberts and his wife Ruth Saphronia came in 1875, and these and other emigrants are found on the various records of the area, new arrivals all up and down the Weiser River. This was an emigrant valley, though settled a bit later than other areas of Idaho, and many followed the Goodale North. If more of these emigrants wrote journals, we have yet to discover them. These and many other emigrants came to the Boise Basin and to the Weiser River areas over the years, some directly in wagon trains from distant areas, and some indirectly by way of not-so-distant areas, Oregon and California. During the years from 1862 on to the 1880s and 1890s, westward emigration slowed, but travelers still used parts or nearly all the Goodale North route. The few direct records and primary accounts of emigrant travel to these areas, which have been preserved and discovered to this date, do not complete the whole picture. However, the scattered partial accounts and later recollections, with the historical facts that have been recorded in histories of the Gem State do well supplement the primary diaries and journals. What more would be needed to prove that the Crane Creek variant became a more heavily used emigrant road by 1867, and later? The limitation of the routes available to the moderate numbers of Idaho bound emigrants, miners and all others going to these two important main destinations in central Idaho, helps to fill in the blanks. We have not only a reasonable estimate of the numbers of those who followed the Jeffrey-Goodale Cutoff, but also an idea about the somewhat reduced numbers who did not go on to Oregon, taking instead the Goodale (North) Cutoff variant to the central part of the Idaho. Emigrants seemed to have used that Emmett to Salubria wagon route, with greatly increasing usage about 5 years after Goodale followed his original route, partly because it was more direct and partly because the road from Weiser to Middle Valley was a poor and rough route. 1. ↑ Merrie Pinick, Havensville, Pottawatomie Co, Ks. Area working database (Pottawatomie: October 18, 2004), http://awt.ancestry.com/cgi-bin/igm.cgi?op=GET&db=mp648&id=I21151 , Ancesry.com search, 10-27-04. 2. ↑ Frank P. Mosley, History of Idaho the Gem of the Mountains, Vol. 1 (no data), Chap. 33, p. 684, Images. Ancestry.com, search, “emigrants Washington County” 10-27-04; Money Stafford, 1870 U.S. Census (June 18-19, 1870), Boise City Pct., Ada Co., Territory of Idaho, pp. 2-3. 3. ↑ Money Stafford, 1870 U.S. Census (June 18-19, 1870), Boise City Pct., Ada Co., Territory of Idaho, pp. 2-3; BLM, General Land Office Records, Internet, Search on 10-28-2004; OCTA, Emigrant Names (Independence, MO, 2002), CD published with emigrant names from many sources; Sandra Hansen, “Goodale North,” E-mail reply of December 02, 2004, to James McGill. Her husband is a descendent of some of the Salubria families, including the Allison family, and she sent information on the Allison and Abernathy emigrants. 4. ↑ Frank P. Mosley, History of Idaho the Gem of the Mountains, Vol. 1 (no data), Chap. 33, p. 684, Images. Ancestry.com, search, “emigrants Washington County” 10-27-04; Money Stafford, 1870 U.S. Census (June 18-19, 1870), Boise City Pct., Ada Co., Territory of Idaho, pp. 2-3; Money Stafford, 1870 U.S. Census (June 18-19, 1870), Boise City Pct., Ada Co., Territory of Idaho, pp. 2-3; BLM, General Land Office Records, Internet, Search on 10-28-2004; OCTA, Emigrant Names (Independence, MO, 2002), CD published with emigrant names from many sources. Information was mixed and came from all these sources for emigrants in all the above three paragraphs. 5. ↑ Mosley, “Biographical,” History, Vol. 3, pp. 234-235; Ibid, BLM, GLOR, “Cuddy” search; V. D. Hannah, 1880 U.S. Census (June 7, 1880), Middle Weiser Valley Pct., Washington Co., Idaho, p. 369. 6. ↑ Geneva Gibbs Barry Jewell, “Indian Valley and Surrounding Hills” (1990), p. 6. Only 4 pages of a typed copy, unpublished paper, obtained by mail from Gary Frankin, Cambridge, January 20, 2003. Idaho Death Records, Ancestry.com, 10-27-2004. 7. ↑ Geneva Gibbs Barry Jewell, “Indian Valley and Surrounding Hills” (1990), p. 8. Only 4 pages of a typed copy, unpublished paper, obtained by mail from Gary Frankin, Cambridge, January 20, 2003. 8. ↑ Geneva Gibbs Barry Jewell, “Indian Valley and Surrounding Hills” (1990), p. 5. Only 4 pages of a typed copy, unpublished paper, obtained by mail from Gary Frankin, Cambridge, January 20, 2003. 9. ↑ Adams County Historic Preservation Commission, “A History of the Council Valley Area,” ACHPC Web Site (Council, ID, n.d.), p. 4, Obtained 10-21-04. 10. ↑ Adams County Historic Preservation Commission, “A History of the Council Valley Area,” ACHPC Web Site (Council, ID, n.d.), p. 4-5, Obtained 10-21-04; V. D. Hannah, 1880 U.S. Census (June 19, 20, 21, 1880), Council Valley Pct., Washington Co., Idaho, p. 372.
2019-04-25T15:47:15Z
https://idahogenealogy.com/goodale/onaga_journal.htm
We arrived in Mexico City Sunday evening after flying from Oakland International Airport via LA on Delta and Aeromexico. The flight was uneventful, and that perhaps is the problem with flying these days – it is an ordeal to get through. However, the flight did not begin that way. We had three months of clothes for Mexico. Both Nancy’s and my bag were overweight. We had left our spring/fall wardrobe either in Victoria or our one week traveling bag with my nephew in Marin County. We had packed our summer bags separately, but obviously not very carefully. The result – we both brought too much stuff. If we were not to be charged US$480 for each of our overweight bags, we would have to buy two small carry-on bags to reduce the weight – which we did from an airport store around the corner. Luckily, both small bags were on sale. We repacked our luggage in front of the check-in counter. I find more ways to humiliate Nancy than you can imagine. The trip from San Marin County to Oakland International Airport was exactly one hour as my nephew had advised. However, in spite of his excellent directions, once we got on the spaghetti highway system north of and around Oakland, we would have become lost a number of times if it were not for GPS, the new navigator that has reduced me to an unemployed extra when we drive. THAT is truly humiliating. You can see why I have to find other ways to exact revenge. We arrived after 8:00 p.m. in Mexico City and it took us about an hour to clear customs and retrieve our luggage. We thought one large bag had been lost, but someone had presumably simply taken it off the belt at the other side, perhaps thinking it belonged to him or her, but, since it still weighed a lot, did not bother putting it back on the belt. We were taken to the apartment by a wonderful driver, Antonio, who met us at the airport. The cost of a trip was only 300 pesos or about CAN$25 for a trip that he said would take 20-25 minutes on late Sunday evening, but took about 45 minutes and seemed endless as we traveled through city block after city block. Mexico City is like Tokyo or Bangkok, an agglomeration of cities. For those who know Mexico City, the apartment is located in Zona Rosa just adjacent to the very busy Reforma district. Nancy found the apartment on VRBO (Vacation Rentals by Owner). In the pictures, it looked lovely. It was extremely well located in a district positioned between the historic centre of Mexico City on one side and the Museum of Anthropology and the Museum of Fine Arts on the other side. This two bedroom two bathroom furnished apartment cost only $700 for the week. Two couples would be very comfortable and the apartment would cost each couple only $50 per night in an excellent location. When we arrived, I was expecting the worst – an apartment advertised with pictures intended to deceive. But Nancy was still batting one hundred percent. The apartment was even better than its pictures. We have since discovered some minor flaws. Day time temperatures in Mexico City may rise to 19 degrees, but at night on this high plateau they drop to 6 degrees and the apartment is not heated. We offset that by turning the burners of the stove on for an hour in the evening. Second, the apartment is not outfitted with toiletries or the best large bath towels. Totally minor inconveniences in a wonderful place to stay. There is one other characteristic. The windows are frosted. The apartment is on the fifth floor. When we opened the windows, the views were atrocious – back alleys and the rear of other concrete buildings. No wonder the windows are frosted. What a shocking contrast with the views from my nephew’s house in Ross in Marin County. The next morning (yesterday morning) I found an excellent bakery around the corner. I had to learn to traverse the Mexican City sidewalks. For though the streets were clean and the roads well paved, the sidewalks were often broken, with sudden changes in height and with foot-holes rather than potholes. I quickly learned to be very dexterous in walking and to keep my head down rather than forward. Uninjured and without a sprained ankle, I brought back a coffee (Americano) and croissant for Nancy. We intended to visit the city centre on the first day. En route, we inquired about sight-seeing with concierges at two classy hotels near us, a Sheraton and a Marriott. Both told us that all government offices and museums were closed on Mondays. I clearly had not done my homework for this trip and was humiliated once again. We were advised that Mondays could be spent shopping. We took their advice and decided to explore the Reforma District. We also wanted to visit a centre for designers and a set of shops selling antiques – not that we had any intentions of purchasing anything. The problem was that we only managed to find them near the end of our walking the streets. By then, I was exhausted. We decided we would return this morning en route to catching the subway to Zocato and the historic centre of the city. Almost always, because of her hip, Nancy wears out first. This time I could not go on. We took a taxi back to the apartment. That just showed how tired I was – and the taxi only cost 30 pesos or about CAN$2.50. It was not even 4:00 p.m. when we got back. Immediately, I stripped, got under the covers and fell asleep instantly. That is, of course, not so unusual for me. But stripping and, even more importantly, sleeping for an hour and a half instead of 5-10 minutes was. If that had been the only problem, I would have just presumed that I was more tired than normal and missed my short daily nap. But twice – when I went to bed on Sunday evening and when I returned from going to the bakery yesterday morning – my heart was beating rapidly and almost explosively. I actually became very worried, but intentionally and consciously relaxed. I soon fell asleep on Sunday evening. The arrhythmia also went away again fairly quickly Monday morning. I was worried that something had gone wrong and I would have to fly back to Toronto for medical treatment. I gave no indication of what was going on in my body to Nancy. This is a test of whether she reads my blog. If she does, I will be berated strongly for not reporting on the state of my health. I then developed one of my very profound philosophical theories for this sudden seeming switch in my health, for I have not had an incident in eight months with my heart. The pacemaker and the pills manage the pump excellently. What had happened? As anyone knows who reads my philosophical writings, they are always strongly grounded in reality and experience. This was even truer of my initial theory explaining my sudden extreme fatigue, a theory which was even more grounded than usual. I thought it must be my sneakers. I hardly ever wear sneakers, but had taken them this time because I anticipated a lot of walking. They were heavier than shoes I normally wear. Though they might have been responsible for my excessive tiredness, they were not responsible for the extra weight in my luggage since I had worn them on the plane and not packed them. I convinced myself it was the running shoes and would test that theory out today. However, my philosophical speculation seemed peculiar even to me. I decided to do some research on line this morning. Lo and behold, there was an answer, which most of you, I am sure, already know. Tiredness is often experienced by tourists after they first arrive in Mexico City. The explanation is very simple. Mexico City is on a plateau over 7,300 feet (almost a mile and a half) above sea level. The altitude often makes visitors from much lower altitudes very tired. Some even develop altitude sickness. I had just become very tired. I had no dizziness and no nausea and, certainly, no loss of appetite. Breathless to some degree, and certainly exhausted, but not from heat. And some swelling of my feet – it was hard to get on my better shoes when Nancy insisted that I not wear my sneakers when we went out to dinner last night. However, for the next two days, Nancy cannot insist that I control my carbohydrate intake as that is advised when first acclimatizing to Mexico City. Visitors to Mexico City are also advised to limit their activities on the first day. That was forced upon me. They are also advised to drink a lot of water. I consumed more than usual – a whole pint at dinner – but not nearly enough. I will do better today. I do not have to watch my alcohol intake. There is, perhaps, another source of tiredness – breathing in air full of exhaust from cars with diminished oxygen. That may have been the case but, in fact, I did not smell or sense the air in Mexico City as very polluted in spite of the enormous amount of traffic. The good news is that the acclimatization takes, at most, a few days. Evidently, your rate of breathing and pulse increases to meet the demands of an atmosphere with lower pressure and less oxygen in the air. Soon, your body is engaged in producing more red blood cells. However, my pacemaker and my pills control my heart rate. Would they not prevent the normal adjustment process? I will see. appears to be a small mountain, but is probably just a very high hill. Though it may not reach the 2,500 feet height of Mount Tamalpais just north of San Francisco’s Golden Gate Bridge, I bet it was over 1,500 feet high. In Mexico City, I was only a mile higher. It was not like traveling from Boston to Tibet. But, as indicated above, I was not acclimatized. Acclimatizing to altitude is one thing. Acclimatizing to another culture is a different order of business altogether. The tiny municipality of Ross where my nephew lives is just an old and independently incorporated very small municipality within San Rafael (first established as a Catholic mission at the beginning of the nineteenth century). Both municipalities are part of Marin County just across from the Golden Gate Bridge north of San Francisco. Ross has a population that, at most, is 2,500; it is as if Rosedale in Toronto was a separate municipality. What a contrast with Mexico City itself with a population of over 20 million and with a much larger population in Greater Mexico City! With the population of two-thirds the whole of Canada, Mexico City itself has a population over 10,000 times greater than Ross. That is not the only contrast. Marin County is very rich. It is a very small county, but has a tax base of almost forty billion dollars, three quarters of that from private homes. Some of the homes on the hills are just spectacular. We arrived in Marin County from the north by traveling down highway 101, the Redwood Highway, and through a forest of giant redwoods just before you enter wine country. There is nothing in Mexico, or perhaps anywhere, that I know of, comparable to the giant redwoods in northern California. Marin County lacks population diversity. I do not think I saw a single Black, though I did see a few Asians and many Hispanics. The population is overwhelmingly white. I also have not yet seen a single Black yet in Mexico City, but perhaps when we go to the old city centre today, we may see a number of Black American tourists. I also have not seen many Mexicans who I would describe as looking white. The overwhelming vast majority of Hispanics in Mexico City look like Spanish Amerindians or predominantly Amerindians. There also seemed to be an unusually large number of Asians, mostly Japanese, that we saw, but they may include many tourists and Japanese in Mexico on business. Or there may be many Mexican citizens of Japanese origin living and/or working in the Reforma district. We have yet to see any sign of last month’s political protests and the violence that erupted after 43 students were abducted. This is in spite of the fact that yesterday the world learned that the tests from the pile of ashes from a pyre proved to match the DNA of one of the missing students. In day-to-day life, for tourists, there seems to be no sign of the widespread corruption that supposedly infuses politics, the state police and possibly even the federales, the Mexican Federal Police. The latter are everywhere. They are dressed in their black uniforms, bullet proof vests, machine guns and electric stun sticks at the ready. I think I only saw one police car while we were in Marin County. Mind you, we were not walking as we are here, another difference between an exclusively car culture and a combined foot and car culture. However, though late September’s Iguala massacre of the forty-three students – the massacre confirmed by more DNA tests – the calm exterior barely hides the turmoil underneath. That turmoil broke into the open when raging students set fire to the governor’s palace in the city of Chilpancingo, capital of the state of Guerrero in September. Yesterday, at the Ibero-American Summit in Veracruz, Mexico, the leaders of Bolivia, Venezuela and Nicaragua, and, most importantly, Brazilian President Dilma Rousseff and Argentinean President Cristina Kirchner, were no-shows in protest. President Enrique Peňa Nieto belatedly acknowledged the crisis resulting from the students’ deaths. However, he has yet to call for a day of national mourning let alone initiate a realistic concerted effort to do something about the problems of Mexico. The issue is not just of students in rebellion and political administrations and police evidently rife with corruption and in bed with violent drug cartels. In the three months between April 1 and 30 June of this year, 87 journalists were attacked. In spite of its evident growth and increasing prosperity, Mexico may only be a democracy on the surface. This is in stark contrast with Marin County. Of course, comparing Marin County and Mexico City is not even like comparing apples to oranges. It is more akin to comparing a grape to a watermelon. Marin County is the watermelon. It is a fabulously rich place where the median household income exceeds US$110,000 per annum. There has been hardly any unemployment in recent years. My nephew Zach has plans to renovate his house and told me his overall budget. Only when he explained the economics of Marin County and the hourly wages of carpenters, electricians and plumbers did I comprehend what I at first believed to be a huge discrepancy between the renovations he was planning and what I initially perceived to be a very inflated budget. Another thing I learned about Marin County is not only its unrepresentative demographic make-up and its unrepresentative economic status, but that a great many of Zach’s friends were Jewish even though Jews did not even constitute 2% of the Marin County population. However, the bagels we went to buy on Saturday morning were as good – or, almost as good – as any to be bought in Toronto. Yet, though the population of Jews in Marin County was very small, the citizens of Marin County voted like Jews, or, at least, as Jews traditionally voted and still tend to, if not nearly as strongly. The population was well above average in income, but were liberal. A majority supported the Democratic Party – though small municipalities like Belvedere were still evidently strongly Republican. Marin County has shifted from what was once a staunchly Republican stronghold to a staunchly Democratic one. In part, this was due to re-districting. But in good part it is due to the fact that the young entrepreneurs and dot.com specialists here are overwhelmingly liberal with a major concern with the environment. Zach, my nephew, is on the verge of trading in his Audi for an electric car. Megan, his wife, is a vegetarian. This is tree hugging country. George Bush received almost 60% of the Marin County vote in 2000, and even McCain received 55% of the vote in 2008. However, in 2012 Obama won the presidential election with over 68% of the vote, an even larger majority than he received from his home district in Chicago. Diane Feinstein received 72.6% of the vote. I also learned that the tiny municipality of Ross attracted these young well-off liberal high earners because it had an excellent public and high school. The only thing I knew previously about Ross was that Julia Child went to a boarding school here, The Branson School. I learned this when I was doing research on the bio-movie on her life for which Meryl Streep, who is not particularly tall, won an Academy Award playing the 6’2” Julia Child. Meryl Streep did so with an excellent imitation of Julia Child’s high warbly voice, infectious laugh and her extraordinary optimism. Of course, in the movie, we never learn that she was a very good athlete, an excellent student and very ambitious and disciplined. After all, during WWII she quickly rose in America’s predecessor to the CIA, the OSS (the Office of Strategic Services), to become General William J. Donovan’s top secret researcher. However, Meryl Streep captured her unstoppable cheerfulness and her unaffected manner even if her voice did not exactly come across that way. Luckily, this food revolutionary was wrong in her fear that America’s new obsession with health would be the death of culinary art in America. North Americans continue to take great joy in great cooking that has become far more cosmopolitan, well beyond the love affair she taught Americans for French cooking. Yesterday noon I wanted to order French onion soup, one of Julia Child’s favourites; it made up her last meal before she died at the age of ninety-two. However, I was told the preparation would take 20-25 minutes and I opted for another choice Yesterday evening, our meal at an Italian restaurant was an excellent testimony to the spread of the culinary arts from all cultures across the world. My minestrone soup was the best I ever had and the pepperoni pizza I chose was excellent, except I prefer a thin crust. Nancy’s shrimp pasta was superb. Mexico has a wide variety of excellent restaurants. We look forward to another great day. However, we will not be attending the huge MEXSEC Convention on the construction industry that is opening at the Cancun Center. Hopefully, I have become sufficiently acclimatized to leisure and can avoid one of my favourite hobbies. This entry was posted in Musings and tagged altitude sickness, demography, Marin County, Mexico City, protets.
2019-04-25T20:37:33Z
https://howardadelman.com/2014/12/09/from-ross-marin-county-california-to-mexico-city/
“Me, myself and I,” a phrase commonly known to us all. It usually comes on the heels of an aggravating event or from dealing with the frustration of a letdown because one depended on someone else to do something for them and they didn’t follow through. Or, how about this one, “If you want something done right you have to do it yourself!” Another frustrating sentiment spurned by the letdowns of others. Here we just see them as phrases, just something we blurt out because of the emotions that stir within us when we feel we can’t get that help we need from someone. The sad part of it all is the reality that this has become the prevailing attitude in the world today. It is a mindset that has become detached from the cares of humanity; not in a good way. I believe God likes goal-setters. I believe God loves to see His people be filled with the zeal of being a real go-getter. I say that because God has never, ever promoted laziness. God has equipped mankind with a mind to think and gifts to operate in and He wants to see the fulfilling of all of that to come to pass. But, and here’s where the warning bells go off, when one tries to operate independently of God with an “I don’t need Him” attitude, buddy, that’s when we got a problem! “Can I get some help around here?” Oh, if that isn’t a familiar cry to us all. When life feels at loose ends and everything just seems to be unraveling before us we often wonder where can we get help from? The writer of this psalm found his help by lifting his eyes up. The human eye tells one where to focus. As I sit here on my couch writing this I keep peeping out of the window. In line of my view are a bunch of beautiful trees that are gently swaying with the occasional breeze. Every time I look out at them I feel a certain little measure of restfulness and peace. Because this is what my eyes see it relaxes me. How much more for the one who chooses to focus on that Sovereign, Omnipotent Presence and truly realize He’s there? Not only is He there but He is ready to be our help. “The righteous cry, and the LORD hears, and delivers them out of all their troubles,” Psalm 34:17. Deliverance is there. Help is here. God loves a “can do” attitude, but not a “can do it without Him” attitude. Especially, since He loves us so much as to be the offering for our much needed help. I have to receive of His help daily. Zeal, and even talent, will only get you so far. I can’t be so high and mighty to think that I can do even the basic things without His help. So, today I want to receive God’s help. What about you? There will always been adversity against God’s anointing, but if God anointed you choose today to walk in all that He has blessed you to be. Your anointing may seem dangerous at times, but in the end it is well worth it. Prayer: Where real problems meet my real GOD! Prayer is and of itself a discipline where one places themselves at the feet of the Almighty; to draw to Him; to get to know Him more. Yet, prayer is often as well a plea of desperation when the times and trials of this life are too hard to bear. When we are at the end of our rope; or, when we just don’t understand what is happening or the road we should take – we pray. We pray because deep within ourselves we know that try as we might, we can find no better help. Nor, is there any higher intervention than that which comes from God. Therefore, through prayer we seek the release of His help and power into our problems, our lives, and the lives of those whom we intercede for. Therefore, in prayer we declare, “Real problems meet my very real God!” There is no better help for what you are facing right now; there is none other that rescue, restore, and redeem you out of any situation like my wonderful God can. His power shows forth in great strength, in any situation, when we pray. “And all things, whatsoever ye shall ask in prayer, believing, ye shall receive,” Matthew 21:22. Here is this week’s lesson once again. Have a blessed weekend everyone! I feel renewed with the turning of the season. There is a sense of this is how it was supposed to be. The trees were made for green and so were we. I could be wrong but when God placed man in the Garden of Eden I don’t think there were any winters there (just my opinion, but check out Adam and Eve’s clothing attire, or lack thereof). I don’t think the trees were to ever be bare. I don’t think the branches were to ever cease having fruit sprout from them. I think paradise was just that, a never-ending green that sings to the symphony of one’s heart that they are where God placed them. for You are my strength,” Psalm 31:4, NKJV. I would venture to say that no one intentionally falls into a trap. Or, at least, I hope not. As our verse indicates traps, by nature, are devices designed to work secretly. That’s their goal. A few years ago we started having a critter issue. You know, the kind that only looked cute on cartoons when outwitting cats, but in your house they are the scum of the earth. Yeah, that kind! Once they’re in, it’s hard to get them out. I mean, really hard! We tried every conceivable thing from poison to sticky traps to snap traps. While some snap traps seemed to work it never eliminated the problem while in that residence. There was even times when the little critters would amaze me. One little smart guy did everything possible to avoid the traps that were laid for him. I even watched it climb over a snap trap without it shutting because he used the baseboards. Genius little guy! Eventually, we acquired cats. A lot of good they did, but that’s a whole new story. Traps are no more fun for us than they are for those critters we try to catch in them. No matter the cause or the reason, traps are designed to steal, kill and destroy. Now, where have we heard that before? O yeah, when Jesus warns us that, “The thief does not come except to steal, and to kill, and to destroy . . .” (John 10:10a, NKJV). And, a thief is a master at being sly enough to set those unforeseeable traps so that he can obtain what does not belong to him. It is so easy in the day to day scurrying about to become victim to the many insidious traps that are laid to snare the unaware. With technology the way it is one would never have to even see the thief or the trap set in order to be robbed. That’s why, we as a people, go through great lengths of installing anti-virus’ and firewall protection. We try all sorts of password protected ways to keep what is ours. We can now even hire a service to watch over and safeguard our valuables because we realize that we don’t have eyes in the back of our heads. We realize we are not omniscient (all-knowing). And, we realize we can’t be omnipresent (everywhere at the same time). Because we are so limited in capacity and strength, we outsource the responsibility to others to help keep us from the snares. Our spiritual life should be no less protected. How often do we go through our days completely oblivious to the spiritual dangers that have been laid in our pathway? And, before we know it, our feet are in a “net” of trouble and we don’t know how to get out. That’s when the reality sets in that we don’t know everything and our own personal strength is very limited in trying to pull us out and keep us out of those nets. That’s why the psalmist recognized the only escape from the net was by the strength of God. He who knows all and who has never floundered in anything can keep our feet on solid ground. How many traps in life could have been avoided if we had gone in His strength first? How many times would our eyes have been opened to the devices of the enemy, (2 Cor. 2:11), if our spiritual eyes had looked first to Him who is able to “pluck my feet out of the net,” (Ps. 25:15b, NKJV)? Spiritually speaking, I don’t want to see those traps rob us of life like it does for those little critters. Especially, when Jesus, after giving the warning of the thief, admonishes us to believe, “I have come that they may have life, and that they may have it more abundantly,” (John 10:10b, NKJV). I like that thought better. How about you? “My eyes are ever toward the Lord . . .” (Ps. 25:15a, NKJV). That’s how we have abundant life and avoid the traps! I don’t know what you think about when you think about the idea of a Promised Land, but I can tell you what I think about. I think about a place of hope. I think about the word destiny. I think about stepping into something new and embracing the opportunity to leave the old behind. The Promised Land was, for the children of Israel, exactly as its name describes. It was told hundreds of years before that this land would belong to them. This was going to be a place of ownership. This was going to be a place of heritage. Their inheritance, blessings, and promise for a pleasant, abundant and happy life would be in this land. God already had it made up in His mind that this land; this promise was theirs. “I’m giving it to them,” He said. So, with great joy, I’m assuming, these men marched forward, chosen to be the first to view the promise of God. They would be the first to walk on its soil; the first to see the land; the first to see the people; and, the first to see the rewards of the fruit. The Bible says they went up and searched the land and they returned from searching after 40 days and they brought back a little show and tell segment. They brought back proof of the promise. They had evidence of their future blessing right in their hands and it was HUGE! A cluster, not many clusters, but a cluster (one cluster, one branch) that was so big it took two men to carry it on a staff between their shoulders. What God had in store for them was phenomenal. So, when the Bible says, “Eye hath not seen, nor ear heard, neither have entered into the heart of man, the things which God hath prepared for them that love him,” oh, honey, you better believe it. But, here’s the kicker. They had the evidence in their hands but still didn’t believe the promise was for them. The world says, “Seeing is believing.” Right here is proof that the world is lying to you. They saw and still didn’t believe. On the other hand the Bible says, “The just shall walk by faith and not by sight,” (2 Cor. 5:7) and here’s why because it is always better for you to believe in what God said than what you can see with you natural eyes. With their natural eyes they could see the promise, but they could also see a problem. They said, “We came into the land and surely it flows with milk and honey and fruit,” (Num. 13:27). Surely means without a doubt it’s there. Without a doubt everything that God described it to be for us, it’s there. How did they move from “surely” to “nevertheless?” Immediate doubt moved in. Doubt is a robber of dreams and a drainer of possibilities. Doubt causes you to be uncertain when God already said it is certain. Doubt causes you to hesitate when God already said to move forward. Doubt causes you to give up when God says you can do this. Who are you going to listen to: doubt or God? Unfortunately many of us are making the same mistake as the children of Israel and they listen to the voice of doubt; they listen to those who speak against their possibilities instead of God. In verse 28, their doubt turned into excuses. It doesn’t take long for your doubt to convince you that it’s right and you have a legitimate excuse not to pursue that passion; that dream; that promise. “The people” became their excuse to keep them from their possibilities. When push comes to shove, more often than not, it’s always more about “people” than it is about God. That’s why many of us don’t see the results of Promised Land living because of the “people.” Usually it’s their criticism or fear of rejection or dealing with their jealously that lets people get in the way. For them, their excuse was they “are strong.” We see the land but we can’t have it because they are bigger than us; they are better than us; they are stronger than us; they are greater than us, and we can’t match up to that expectation. Who told you to match up to man’s expectation when God who created you and gifted you and said, “But ye are a chosen generation, a royal priesthood, an holy nation, a peculiar people; that ye should shew forth the praises of him who hath called you out of darkness into his marvellous light,” (1 Pet. 2:9). When God said at other times, “This people have I formed for myself; they shall shew forth my praise,” (Is. 43:21). He stuck with the word “surely” and threw off the “nevertheless!” Get a Caleb mentality and refuse to let a bad report rob you of your destiny. Don’t let anybody speak a “nevertheless” into your situation. Don’t let anybody get away with putting “buts” and “what ifs” in your mind. Don’t let anybody speak negative about your promise. Take a Caleb stand and protect your possibilities. He could have just said, “we are able,” but he went a step further in his faith and declared, “we are well able.” Adding that word “well” to the equation means we’ve more than got this. Doesn’t our Bible tells us that we are “more than conquerors?” (Ro. 8:37). What Caleb was saying is the destiny of reaching and claiming the Promised Land is for us. The problem is we need to take it out of the song and apply it to our lives. Start thinking like Caleb and refuse nothing less than your promise. Take a stand against negative people speaking about your possibilities! “I wish I may, I wish I might, but it’s not a wish I’ll have tonight.” They couldn’t see themselves in it. “Without a vision the people perish!” (Pro. 29:18). There was one father in the Bible who had a vision to see his son made whole again. His son was demon-possessed and came to Jesus seeking deliverance, declaring, “Lord, I believe. Help my unbelief,” (Mark 9:24). He was not going to let a seed of doubt get planted into his spirit and erase his blessings because that’s what doubt does; it cancels out blessings. But, the men in today’s text couldn’t see through the lens of belief. God can do it for this one and that one, but not for me. Not only did they not see that God’s blessing was for them, but they brought themselves low with their speech. They talked about how “great” they are, and at the same time said they themselves were nothing. Listen, God doesn’t bring you to the edge of the promise just to turn you around and say, “Sike! I was just playing. Go back.” If God brings you to it, He will bring you through it. God’s intention was for them to go in, take the land, and possess it. But, they lost the battle in their mind before they ever set foot in the land. Too many of us feel too small for where God wants to take us. God has big plans but we don’t see ourselves as big enough. We feel outsized by what lies ahead. We can’t get past what others are speaking about our possibilities, and so, we close up the door of faith; we slam shut the way to victory never fully realizing the greatness of His promise for your life. Yes, there are always going to be barriers (real or imagined). Yes, there will always be giants. But, you and I have to have enough faith not to be overwhelmed by what we see with our natural eyes. We have to have enough in us to look past how we view ourselves; how they view us, and see something bigger! The promise may seem too big for us, but it’s never too big for the God in you. “Greater is He that is in you!” God is never outsized by anything. God dwarfs to nobody, and He’s working in you! Stop listening to the negativity about your promise. Stop paying attention to the naysayers. You are NOBODY’S GRASSHOPPER! Therefore, stop listening when they speak against your possibilities. What is your personal testimony that draws you to Jesus? How, when, and what circumstances did He touch your heart to convince you He is Lord? We all have a beginning of our faith. Even if you were raised in church from the cradle there has to be a time when you interacted with Jesus on a personal level and welcomed Him into your life as Savior. As days go by and hardships intrude upon the peace that drew us to believe in Him, space opens up and that initial faith that was once strong may take a blow, making one feel disparaged and weaker than before. What then? Every once in a while our faith needs a spiritual tune-up. We need to remember why we believe. We need our personal revelation of heart to center us anew on our Savior. Lazarus’ raising from the dead may have encouraged some to embrace the way of this faith in his day, but what swayed you? Through the trials and storms remember why you believe. Remember what He has done for you before and let those sweet memories pick your heart up and carry you closer to Jesus today.
2019-04-23T06:32:30Z
https://wordforlifesays.com/2016/06/
All NIH documents and audiovisuals must be prepared in accordance with professional and ethical standards, as well as generally accepted standards of good taste. They must be appropriate for dissemination by this Federal agency, and must undergo appropriate review and approval prior to release. NIH must adhere to the laws and regulations applying to publications and audiovisuals, including OMB Information Quality Guidelines, the HHS Printing Handbook, and relevant NIH Manual chapters. NIH efforts to ensure and maximize information quality begin at the preparation stage, and continue through the review and approval stages. Existing NIH policies developed in concert with Federal computer security laws provide appropriate security safeguards to ensure integrity of NIH documents, i.e., ensure that the information is protected from unauthorized access, revision, corruption, or falsification. The NIH has many quality control measures embedded in the scientific process to ensure that the information disseminated is of the highest quality. NIH grant applications undergo rigorous scientific review. Scientific journals do not publish articles until they have gone through a similar peer review process. There is a tension inherent in biomedical research between releasing information in a timely fashion and waiting for the peer review process to result in a published article. Sometimes the NIH provides "late breaking news" to the public on research findings prior to publication in scientific journals and prior to peer review by the journals. However, when it does so, there is an internal review process that routinely draws upon external expertise and monitoring/advisory review boards to ensure that information disseminated to the public summarizes the facts as they are currently known, and that appropriate disclaimers are attached. The policies and procedures to be followed in the preparation, review, approval, and distribution of NIH information materials, including scientific and professional materials, can be found in NIH Manual Chapter 1183: NIH Publications and Audiovisuals: Preparation, Review, Approval, and Distribution and NIH Manual Chapter 1184: Scientific and Professional Information Presented By NIH Employees: Review, Approval, and Distribution. The procedures currently in place were developed to be sensible, workable, flexible, and timely, and were updated in February 2002 to better articulate OMB, HHS, and NIH information quality guidelines. In the scientific and research context, technical information that has been subjected to formal, independent, external peer review is generally presumed to be of reasonable quality. The general principles concerning the responsibilities of the NIH research staff in the collection and recording of data, publication practices, authorship determination, peer review, confidentiality of information, collaborations, human subjects research, and financial conflicts of interest are exemplified in the "Guidelines for the Conduct of Research in the Intramural Research Programs at NIH." These guidelines can be found on the Web (www.nih.gov/news/irnews/guidelines.htm). NIH recognizes the scientific need for replication of findings, and encourages data sharing as appropriate. After publication, the research data, any unique reagents, and any supporting data that form the basis of the communication in question should be made available promptly and completely to all responsible scientists seeking further information. Exceptions may be necessary to maintain the confidentiality of clinical data or if unique materials were obtained under agreements that preclude their dissemination. Investigators should retain research data long enough to allow replication of study results -- in general, 5 to 7 years. A document that has obtained publication clearance for paper printing is often posted on the sponsoring IC's Web page for greater accessibility. NIH/IC Web documents derived from IC-approved printed publications should not need additional approvals. NIH/IC Web documents with no print counterpart require content clearance by the appropriate IC office or contact person to ensure that the information observes all applicable requirements governing information for release to the public. These include the requirements provided in NIH Manual Chapter 1183. When IC Web pages are related to more than one IC (e.g., trans-IC publications, special interest groups), the appropriate IC office or contact person for the primary IC responsible for creating the Web page should be notified regarding clearance requirements. This section describes NIH procedures and practices in place for review and approval of substantive scientific information that is meant for dissemination primarily to the public, and that NIH considers being subject to the OMB Information Quality Guidelines (see Section II above). NIH encourages professional dissemination of scientific research and other information on behalf of public health by its employees. Professional and scholarly writing, lecturing, editing, and publishing are an essential part of research, are in the public interest, and bring credit and distinction to NIH and to the employees themselves. In assisting employees to share information about their official and professional activities, NIH seeks to advance scientific knowledge and contribute to professional education. Ordinarily first report of any scientific research results or other professional findings is made by publication in a scientific or professional journal or presentation at a meeting of a professional organization. The choice of the journal or meeting to which reports are offered is the prerogative of the author(s). There are many quality control measures embedded in the scientific process to ensure that the information disseminated by NIH employees is of the highest quality. Publications or presentations by NIH employees are expected to meet high standards of quality, make a substantial contribution to the field, and contain sufficient information for the informed audience to assess its validity. To ensure and maximize the quality of information disseminated by NIH employees, any non-extemporaneous presentation (written or electronic) by an NIH employee on a subject related to his/her NIH duties must be reviewed and approved through an internal NIH process prior to submitting for publication consideration. With few exceptions, non-extemporaneous oral presentations on health policy or practice, or presentations with policy implications, must also be cleared in advance. Manuscripts intended for publication are customarily subjected to an external peer review process directed by the interested publisher, volume editor, or journal editor. All Institutes have either formal or informal internal operating procedures for identifying printing requirements and tracking publications. These procedures come in a variety of forms such as policy issuances, internal Web sites, memos, or annual requests for printing requirements. In addition, the concept clearance process for new publications is often the vehicle that Institutes use to track the development of a new publication and to identify its attendant printing requirements. The requirements for clearance of prospective publications are contained in NIH Manual Chapter 1183. These requirements state that each prospective publication must be cleared through the Communications Office within the originating NIH component and then be approved by the Office of Communications and Public Liaison, OD/NIH and the Office of the Assistant Secretary for Public Affairs (OASPA), HHS. In brief, the NIH Manual Chapter 1183 requires that any official publication (including book, bibliography, chapter of a book or textbook, booklet, brochure, collection of abstracts, fact sheet, house organ, index, leaflet, manual, monograph, newsletter, pamphlet, review, periodical, proceeding, recurring report, statistical compendium, Internet document, audiovisual, or the like), prepared by any NIH component directly or through a contract must be sent for HHS clearance through the Editorial Operations Branch, using form HHS-615, Publication Planning and Clearance Request. This clearance requirement does not apply to publication of articles in journals. The authority to permit the initial publication of articles written by NIH employees in privately published journals, encyclopedias, and textbooks can be delegated according to NIH Manual Chapter 1130 (Delegation of Authority). All NIH Audio/Visual projects and exhibits must be cleared through OASPA, whether produced in-house or under contract. To obtain clearance for all NIH audiovisual products, including exhibits, Form HHS 524A must be completed. It can be obtained on the Web (http://www.nih.gov/icd/od/ocpl/resources/audiovisual.htm) and must be filed with the Office of the Assistant Secretary for Public Affairs and approved before actual production may begin. If the cost exceeds $50,000, a written evaluation plan is required. If more than $100,000 is involved, a written evaluation and formal message testing are required. No subsequent change in terms, dollar amounts, conditions, or additions can be made to the product without written approval of OASPA. Statistical compendiums, including statistical analyses, aggregated information by program, IC, or for NIH, including funding information and histories (by disease, funding mechanism, dollars, or other criteria), do not require approval by the Office of the Director, NIH. However, the Director of the originating IC is required to determine that the data conform to the accepted quality standards, and if applicable, that the reported statistics be substantially reproducible (see NIH Manual Chapter 1183). In general, any writing by an NIH employee on a work-related subject, whether intended for electronic or print publication, or for oral delivery, must be prepared according to accepted NIH standards of quality, reviewed for substantive content, and administratively approved. The purpose of the NIH clearance process is to improve the quality of information, and to ensure the accuracy, objectivity, utility, and validity of information. NIH Manual Chapter 1184, states the policy and procedures to be followed in the review, publication, and distribution of scientific, technical, and other professional manuscripts and speeches by NIH employees. IC Directors (or their delegates) are responsible for establishing and maintaining controls to ensure competent and timely clearance of professional writing and presentations by developing procedures appropriate to the type of information. They are also responsible for maintaining files of requests for approval and actions taken. Individual ICs may determine how best to meet these requirements. Written presentations by intramural scientists are reviewed and approved by Laboratory/Branch Chiefs and sometimes by Scientific Directors. The intramural approval process also ascertains that all animal, human subjects, and technology transfer requirements are met, that major press and policy implications are noted, and that at least one supervisory scientist finds the work to be of merit. (See the Intramural Research Sourcebook at www1.od.nih.gov/oir/sourcebook/oversight/pub-clear.htm). Materials requiring review in the Office of the Director, NIH, should be approved by a designated review officer within the originating IC, or by a person in a supervisory relationship to the author, prior to submission to the Office of the Director, NIH. No such preliminary review is required for writing by an IC Director. Any statement, commentary, or discussion of Federal policies or practices related to the employee's position or duties that might be construed as reflecting an official position by NIH, HHS, or the Federal Government must be approved in the Office of the Director, NIH. For scientific and technical documents, the scientific community recognizes peer review as the primary means of quality control. According to OMB Information Quality Guidelines, material subjected to formal, independent, external peer review may generally be considered to be of acceptable objectivity. However, this presumption of objectivity is refutable based on a persuasive showing to the contrary by a complainant in the particular instance. The single most important determinant of a scientific review group's competence and credibility is its members. Reviewers must have scientific excellence (as demonstrated by their grant and publication records, and academic degrees and honors), and must merit respect in the scientific community. They must possess a wide breadth of expertise, be fair and objective, and should not be influenced by inappropriate personal interests (competition, scientific bias, personal antagonisms, and other irrelevant factors.). Reviewers should review materials for propriety, accuracy, completeness and quality (including objectivity, utility, and integrity). Consistent with HHS Standards of Conduct (73.735-705 Writing and Editing), employees are encouraged to engage in outside writing and editing when such activity is not otherwise prohibited. If the writing or editing activity is related to the employee's official duties or other responsibilities and programs of the Federal Government, the employee must (i) make no mention of his or her official title or affiliation with the Department, or (ii) use his or her official title or affiliation with the Department and a disclaimer, or (iii) submit the material for clearance within the operating component, under procedures established by the component. When clearance is denied at any lower level, the employee shall have recourse for review up to the head of the principal operating component. This clearance will show there are no official objections to the activity and the employee may then use his or her official title or affiliation usually without a disclaimer. Except where the requirement for disclaimer is waived as a result of official clearance, disclaimers shall be used in all writing and editing related to the employee's official duties or other responsibilities and programs of the Federal Government: (i) in which the employee identifies himself or herself by official title or affiliation with the Department, or (ii) when the prominence of the employee or the employee's position might lead the public to associate him or her with the Department, even without identification other than name. Disclaimers shall read as follows unless a different wording is approved by the Assistant General Counsel, Business and Administrative Law Division, Office of the General Counsel: "This (article, book, etc.) was (written, edited) by (employee's name) in (his or her) private capacity. No official support or endorsement by (name of operating component or of Department) is intended or should be inferred." Normally, the need for a disclaimer is eliminated through the clearance process. However, a disclaimer may still be needed even after official clearance to clarify that the presentation should not be construed as necessarily representing NIH views, and/or to distinguish the status of information (e.g., preliminary, based on partial data set). The Department's regulations (Standards of Conduct) to which the NIH subscribes, require that disclaimers be used in all unofficial writing and editing related to the employee's official duties and/or affiliation with programs of the Federal Government in which the employee's identification with NIH is to be shown, can be inferred, or is well-known. Any statements, comments, or discussion of Federal policies or practices that are relevant to the employee's position or duties, draw conclusions, advocate or oppose professional practices or positions on subjects related to NIH duties, or might otherwise be construed as reflecting an official position by NIH, HHS, or the Federal Government, are covered by the OMB Guidelines, and must be approved in the Office of the Director, NIH. An NIH employee may respond orally to questions and requests for information from any source, including the news media, without prior review and approval but must adhere to internal IC guidelines for informing the IC Information Officer, Congressional Liaison Officer, or other appropriate official about the nature of the information to be discussed. An employee may appear as a member of a discussion panel or seminar and on radio, television, and Web broadcasts without prior approval if the appearance does not require a manuscript or written text or statement, and if there is no conflict with NIH Policy as provided in Manual Chapter 1184. An employee should limit his/her statements and responses to subjects about which he/she has official knowledge and should present only official HHS and NIH positions in discussion of policy matters. No review or approval is required for nonofficial and private writing, speaking, and publishing by an employee unless his/her NIH employment is likely to be regarded as influencing the content. "This material is presented from my own perspective, and should not be taken as representing the viewpoint of the Department, NIH, or [IC]." NIH employees shall not identify themselves as NIH employees in unofficial materials prepared for dissemination to nonprofessional audiences, such as a letter-to-the-editor. These materials must be reviewed prior to presentation in the Office of the Director, NIH, if an employee's identification with NIH is to be shown, can be inferred, or is well known. The NIH Office of Disease Prevention (ODP) manages the NIH Consensus Development Conference (CDC) Program, the focal point for evidence-based assessments of medical practice and state of the science on behalf of the medical community and the public. Under this program, ODP organizes major conferences that produce Consensus Statements and State of the Science Statements on controversial issues in medicine important to healthcare providers, patients, and the general public. NIH Consensus Statements and State of the Science Statements are disseminated widely, and more than 120 NIH Consensus Statements and State of the Science Statements have been issued since the program's inception in 1977. Organizationally, ODP is under the Associate Director for Disease Prevention in the Office of the Director, NIH, and works closely with NIH Institutes, Centers, and Offices to assess, translate, and disseminate the results of biomedical research that can be used in the delivery of important health services to the public. An NIH Consensus Statement is a report evaluating scientific information on a given biomedical or public health intervention with the purpose of resolving a particular controversial issue in clinical practice. Each NIH Consensus Statement answers a series of four to six questions concerning efficacy, risk, and clinical applications, and recommends directions for future research, and is the product of an NIH Consensus Development Conference. NIH Consensus Statements synthesize new information, largely from recent or ongoing medical research, that has implications for reevaluation of routine medical practices. They do not give specific algorithms or guidelines for practice. NIH Consensus Statements are written by broad-based, independent panels of non-Federal, non-advocate individuals knowledgeable in the field of medical or public health science under consideration. The makeup of each panel represents various sectors of professional and community life and typically includes research investigators, healthcare providers, methodologists, and a public representative. Following circulation of the draft statement to the conference audience for comment, the panel resolves any conflicting recommendations and releases a revised statement at the end of the conference. The Web site for the Consensus Development program can be found at: consensus.nih.gov. If a suggested topic does not have an adequately defined and available base of scientific information, conference planning and implementation may still proceed. However, rather than being designated a Consensus Development Conference, the conference will be designated as a State of the Science Conference. NIH State of the Science Conferences and Workshops generally adhere to the NIH CDC format because the process is useful for evaluating complex issues. Usually, speakers present findings or perspectives on the issue. The public is invited to address questions to the speakers, and policy implications may be discussed. A report of the findings can emerge in one of a variety of formats including publication in a clinical or scientific journal. The Web site for the State of the Science Statements can be found at: consensus.nih.gov. Although it is difficult to quantify their impact, the NIH Consensus Statements and State of the Science Statements are intended to influence important public health discussions on topics affecting or broadly applying to a significant number of people. The severity of the problem (morbidity and mortality) and the feasibility of intervention are key considerations. For example, the program has had measured success in influencing reimbursement policy and specialty organization policy, thereby indirectly affecting physician behavior. Each conference is jointly sponsored and administered by one or more ICs of NIH and by ODP. Depending on the topic, other Federal agencies with biomedical components may join in sponsoring a CDC. In conjunction with each conference, the Agency for Health Care Research and Quality (AHRQ) provides a systematic review of the literature on the conference topic through one of its Evidence-Based Practice Centers. Both the Consensus Statements and the State of the Science Statements are independent reports of the convened panel; none are policy statements of the NIH or the Federal Government. However, NIH funds and disseminates the Consensus Reports, and considers these Statements to be subject to OMB's higher standard of substantial reproducibility. These Statements meet the OMB's quality standards because of the balanced, rigorous, and systematic procedures that ODP has in place to develop them. The panel makes available the evidence on which the Consensus Statement is based. If consensus cannot be achieved, minority or alternative views are included. The systematic literature review conducted by AHRQ is published with their explicit methods. The reports are peer-reviewed by expert panels, and posted on the Internet for at least one month for public comment. To make environmental health research findings more applicable to human risk assessment, NIH works in partnership with the CDC and the EPA to develop better ways to monitor and assess human exposure to specific chemicals. One of our most visible publications is the Report on Carcinogens (RoC), a congressionally mandated document that lists agents, substances, mixtures or exposure circumstances that are known or reasonably anticipated to be human carcinogens, and to which a significant number of persons residing in the United States are exposed. Responsibility for producing this report has been delegated to the National Toxicology Program (NTP) and the Director NTP also serves as the Director, NIEHS, NIH.6 The RoC is a composite of Summary Profiles that describes the carcinogenicity, exposure, and regulatory information for each listing with relevant tables and appendices. The NTP follows a published, multi-step process to review and evaluate selected substances and to develop the NTP’s recommendations to the Secretary, HHS, regarding whether or not the substances should be listed in the report. Upon review and approval by the Secretary, HHS, and submission to Congress, a notice of the RoC publication, indicating all newly listed or de-listed agents, substances, mixtures or exposure circumstances is published in the Federal Register, NTP newsletters and web pages and other appropriate publications. The current review process was finalized and released to the public on January 11, 2012 [http://ntp.niehs.nih.gov/go/rocprocess]. It is important to note that the RoC does not present assessments of carcinogenic risks. Listing of substances in this Report, therefore, does not establish that such substances present carcinogenic risks to individuals in their daily lives. Such formal risk assessments are the purview of the appropriate Federal, State, and local health regulatory and research agencies. However, for each effluent, ambient, or exposure standard established by a Federal agency with respect to a listed substance, the RoC is required to state the extent to which, on the basis of available medical, scientific, or other data, the implementation of such standard decreases the risk to public health from exposure to the substance. This requires quantified information on the extent of protection from cancer that the public receives from established Federal standards. Only in a few instances, where studies of long-term human exposures and cancer incidence in restricted environments are available, can risk be estimated with complete confidence. NIEHS and NTP procedures conform to accepted NIH scientific practices where quantitative and qualitative scientific conclusions are based on: (1) The best available science and supporting studies, particularly peer-reviewed studies, conducted in accordance with sound and objective scientific practices; and (2) data collected by accepted methods or best available methods (if the reliability of the method and the nature of the decision justifies use of the data). The NIEHS and NTP make every effort to ensure that the presentation and dissemination of information about environmental health is comprehensive, informative, and understandable. Scientific results that can directly affect risk assessment and risk management activities are often published in the NIEHS journal Environmental Health Perspectives (EHP), but do not necessarily represent the viewpoints of NIEHS. EHP also publishes perspectives in the form of editorials, commentaries, reviews, and correspondence, as well as workshop summaries. Workshop summaries are reports by expert scientific committees that include reviews of existing information and that summarize research findings on specific topics, present new information, and recommend methods, courses of action, or further research needs for the scientific community. All scientific articles, including workshop summaries, are subject to rigorous peer review. The criteria for publication are weighted toward scientific quality and environmental significance. A submission is assessed according to its originality, scientific merit, and experimental design; the manuscript is evaluated for its conciseness, clarity, and presentation. These standards are thus consistent with the requirement that the presentation of information on risk effects be comprehensive, informative, and understandable. EHP also addresses certain ethical problems during the review process and requires assurances that all human and animal subjects have been treated humanely and with regard for the alleviation of suffering. The review also considers scientific integrity as part of the process. Clearinghouses often serve as the public's point of contact and access to information about IC programs, conferences, and research activities. At NIH, clearinghouses have been contracted to provide varying levels of service, including development and distribution of fact sheets, information packages, and publications; storage of materials; conducting outreach and promotion; and performing training and quality control for the clearinghouse staff. Some clearinghouses respond to inquiries about particular diseases or conditions, ranging from information about available patient and professional education materials to statistical data. Clearinghouses are challenged to ensure accuracy and reliability of information, while continually striving to improve performance and response times. Some clearinghouses also wrestle with how to determine which organizations are worthy of referral when customers need information that is not available at the clearinghouse and how to avoid implying endorsement. Clearinghouse inquiries may also be answered by searching the Combined Health Information Database (CHID), an NIH/CDC database that provides bibliographic references of both NIH and non-NIH materials on various health topics. This database represents a shared data archive, and as such is not covered by the new OMB guidelines. The NIH Manual chapter 1183 requires that official materials or information prepared by any NIH component directly or through a contract must be sent for HHS clearance through the Editorial Operations Branch, using form HHS-615, Publication Planning and Clearance Request. This clearance requirement does not apply to publication of articles in journals. Information developed by a clearinghouse for an NIH IC is subject to the OMB Guidelines. See NIH Manual Chapter 1183 for further information regarding this requirement. At NIH, there are essentially three types of materials being disseminated through information clearinghouses to the public: (1) Materials produced by NIH staff or contractors that undergo usual NIH review and approval processes; (2) materials produced by NIH grantees that are subject to policies and procedures in the Public Health Service (PHS) Grants Policy Statement; and (3) other materials not produced by NIH but available through libraries, whether in print or in electronic format, with appropriate disclaimers attached. Virtually all NIH ICs direct their clearinghouses to distribute only materials produced by the IC or other NIH ICs or Federal agencies. Non-Federal materials typically undergo careful IC scientific review before they are authorized for dissemination by the clearinghouse, and those materials are accompanied by appropriate disclaimers. NIH has developed World Wide Web (WWW) Guidance (April 15, 1998), which is available on the Internet (http://ocio.nih.gov/docs/policy/guideli2.html). Each IC has a designated IC contact/reviewer for information and approvals related to developing Web pages and operating a new Web server. The list of IC contacts/reviewers is available on the website (www.nih.gov/employee/weblist.htm). NIH/IC Web page creators periodically review material on the Web page to determine whether it is accurate and up to date. Information, particularly time-sensitive information, should be posted as soon as possible. Web page creators are expected to promptly update or remove out-of-date information. Unless noted otherwise, it is safe to assume that information posted on public Web sites within the "NIH.GOV" domain is considered to be "in the public domain." As such, others are free to establish links to NIH online resources. In establishing such links, NIH requests that others avoid creating the impression that NIH is endorsing or promoting any particular product or service. In the same vein, any outside link to an external resource from an NIH Web site needs to be examined on a case-by-case basis. In general, the Web developer of each site determines when links to outside entities are justified. NIH Web managers are urged to exercise caution when linking to non-NIH, external websites. Professional judgment should be used to weigh the benefits against the possible risks of linking to other resources. In particular, links to sites providing medical and scientific information needs to be on par with the standards used at NIH to ensure the credibility of the information offered there. Steps should be taken to ensure that such links do not give the impression of endorsing the organizations we link to. NIH/IC Web pages containing links to external Web pages not located on NIH servers should include a link to a statement that releases NIH from responsibility for the material included in the external Web page. Again, it is important to avoid giving a user the impression that NIH is endorsing information or a commercial product described in an external site. Disclaimers on copyright, endorsement (general and external links), liability, and medical information are also used, as appropriate, for individual IC Web sites. The IC designates a main office or contact person for information and approvals related to Web pages and the operation of Web servers. NIH personnel, contractors, and other authorized users of NIH networks must notify this office or contact person prior to setting up a Web server. Information about appropriate security measures regarding Web Servers is available at: http://ocio.nih.gov/security/sec_policy.html. The IC or the OD Information Office can provide detailed information on required approvals including both NIH and IC-specific policies relating to publication of documents. NIH/IC documents derived from IC-approved printed publications should not need additional approvals (see Section V.2). The NIH Center for Information Technology (CIT) is charged with providing, coordinating, and managing information technology for NIH, and with advancing computational science. In terms of computer security, CIT has three distinct objectives: Confidentiality -- ensuring that there is no deliberate or accidental improper disclosure of sensitive automated information; integrity -- protecting against deliberate or accidental corruption of automated information; and availability -- protecting against deliberate or accidental actions that cause automated information resources to be unavailable to users when needed. Information is accorded protection against disclosure, alteration, loss, or destruction based on the degree of sensitivity. CIT staff use appropriate safeguards to protect data from improper disclosure by backing up critical data periodically, and, if a security incident occurs, by following proper incident response procedures. In 1994, CIT adopted a security incident response policy and procedures statement that establishes the responsibilities of CIT staff in responding to and reporting computer security problems. Supervisors are responsible for ensuring that employees, both Government and contractor, observe all security requirements, and that employees receive appropriate security training. CIT has instituted a structured management control review process that applies throughout the system life cycle. Risk analyses are conducted to strike a balance between an acceptable level of risk and the costs and inconvenience associated with safeguards. A system recertification/accreditation must be conducted at least once every 3 years. Additional information about NIH computer security measures can be found in The Computer Security Handbook of CIT (http://ocio.nih.gov/security/sec_policy.html).
2019-04-26T01:48:21Z
https://aspe.hhs.gov/report/hhs-guidelines-ensuring-and-maximizing-quality-objectivity-utility-and-integrity-information-disseminated-public/v-agency-quality-assurance-policies-standards-and-processes-ensuring-quality-3
About 4 hours’ drive southwest of Hanoi, the Mai Chau valley provides a perfect way to experience rural Vietnam. There are a few hotels available in the valley or homestays with a local village family are popular in the area. Many of the local villagers have Thai heritage and the wooden homes are built on stilts. Biking and hiking are popular activities for visitors, but the real attraction of Mai Chau is the scenery and a chance to relax and enjoy a bit of nature especially if you have been in the hustle and bustle of Hanoi. Phu Quoc is the largest island of Vietnam, however, surprisingly enough it’s actually located just 15 kilometers off the coast of Cambodia. When I visited this lovely little island back in 2015 it was still unspoiled, with beautiful beaches, little villages, and red dirt roads. I rented a scooter and explored the island for three days. I drove the Southern, Western and Eastern loop, which were all beautiful and showed me a different side of the island. In Duong Dong you’ll find lots of restaurants and accommodation, but also the night market which is fun to visit. The Northeast of the Island is where you can find Phu Quoc National Park, a dense jungle with tropical trees and monkeys (if you are lucky!). In the South, you can find famous Sao beach, with crystal white sand and a beautiful blue ocean. Altogether Phu Quoc is a wonderful place to spend a couple of days! Out of all of the South East Asian cities or towns that I have visited, there is nowhere prettier than Hoi An Old Town and An Bang Beach. Although the town and beach are a mere 6 kilometres away from each other, if you stay at one or the other you get the best of both worlds – a beautiful stretch of white sandy beach and a world heritage-listed ancient town that exudes charm and grace. Strolling around Hoi An Old Town is an absolute delight. The streets are blocked off to cars and motorbikes, but you do need to watch out for cyclists and rickshaws. There are striking bougainvillea vines draped off historical buildings and ferny leafed trees that provide a little shade as you walk along the streets. Hoi An’s historical buildings reflect a fusion of indigenous and foreign cultures (principally Chinese and Japanese with later European influences). Most of the old wooden buildings now house shops selling everything from silk fabrics, brightly coloured paper lanterns, artworks to souvenirs. Once the sun sets the streets of Hoi An take on a whole different look. Paper lanterns light up the streets and reflect off the river transforming the town into a shimmering wonderland like you’re in some sort of fairytale. Halong Bay is definitely one of the most beautiful places in Vietnam known for its emerald colored waters, hundreds of vegetation-topped limestone islands, and numerous caves. It is a UNESCO World Heritage site and one of the most popular tourist attractions in northern Vietnam. In addition to the scenery, the area offers kayaking, SCUBA diving, hiking, biking, and other outdoor activities. One popular hiking area is Cát Bà National Park on Cát Bà island. Halong Bay is located about 3.5 hours from Hanoi and most people choose to visit Halong Bay by taking a tour, shuttle, or taxi to Halong Bay, and then exploring the bay by cruise. Cruises range from a few hours to a few days in length. We ourselves took a 3 day Halong Bay cruise and we definitely recommend taking a longer cruise to have more time to relax and see more of the scenery offered in both Halong Bay and nearby areas. The Mekong Delta is located in the south of Vietnam and is a warren of rivers, rice fields, and floating markets. Much of the transportation in the area takes place on boats. It’s easily accessible as a day trip from Ho Chi Minh City, but staying overnight will give you more of a taste for the “rice bowl” of Vietnam and all it has to offer. Bustling towns contrast with the calmness of floating down the rivers that maze across the lush green landscape. Take a boat trip to the working floating markets and see floating and stifled houses. Life in the Mekong revolves around the waterways. Don’t forget to try a freshly cut coconut! Located in Lao Cai Province, Sapa has been hailed as one of the best trekking spots in Southeast Asia. It is home to five main ethnic groups – the H’mong, Dao, Tay, Giay and Xa Pho. Homestays with the tribes have been a popular choice for travelers, as you get to understand the culture of each tribe and trudge through the iconic rice paddies with an amazing mountainous view at the same time. During the homestay, the H’mong tribe will whip up a delicious home cooked feast, and share life experiences over bottles of ‘happy water’, allowing you to immerse into the local culture almost immediately. A choice of a 3-day, 2-night tour may bring you to Ban Ho village where you stay with the Tay tribe – which exposes you to a completely different experience relative to the earlier homestay. Hiking past villages and a wide array of farm animals, you will be rewarded with a scenic view of green rice paddies at Ban Ho village where the skies are clearer at a lower altitude. Visiting large cities in Vietnam can be a bit overwhelming until you get used to them. You may need even a getaway from the hectic pace. One good escape is the town of Nha Trang, located in the middle of the country on the coast. It’s well-known for having some of the best “beach culture” in the country and is also a diving destination for scuba divers looking for decent diving in Vietnam. Years of poverty and wars have turned the once pristine Vietnam coastline into somewhat of a less-desirable diver destination. However, there are still plenty of places to dive in Nha Trang, where enthusiasts will find everything from small critters to turtles and cuttlefish. Not a beach person? Head out to see some of Nha Trang’s historical sites, like the famous Big Buddha. Immerse yourself in the cultural experience and take a Vietnamese cooking class at Lanterns Restaurant. You’ll cook great food and visit a busy market the locals use – all while learning more about Vietnam’s daily life. It means that today you’ll find a city where Asian and European influences blend together with historical sites, cultural centres, and modern national monuments to create a beautiful urban landscape. The prettiest parts of Hanoi are around Hoan Kiem Lake. To the north is the Old Quarter where markets take over the streets, lanterns hang between trees, and decorations cover the wooden balconies. In the French Quarter to the southeast of the lake, you’ll find wide facades with balconies surrounded by wrought ironwork, impressive government buildings painted with pastel yellows, and even French-style cafes. With green parks, lots of lakes, and the large Red River cutting through the city, there’s also plenty of nature to give this chaotic Vietnamese city a calmer atmosphere than you might expect! This beach resort is located within an easy travelling distance of Ho Chi Minh City, making it a popular choice for a weekend getaway or for travellers taking a coastal route on their Vietnam trip. Mid-range resorts are spread along the beachfront, with a few cheaper guest houses also available. Mui Ne is the perfect destination for adventure-seekers, as it has world-class windsurfing conditions throughout the dry season from October to April. The sand dunes in Mui Ne are also a uniquely beautiful destination in Vietnam, giving the appearance of a desert, with both white and red dunes nearby. Tours include options to ride across the sand dunes in an ATV or to try sandboarding down them. Located near Da Nang, the Son Tra Peninsula is one of the most beautiful places in Vietnam. It has escaped the development of other coastal areas after being named a natural reserve in 1997, making it a beautiful scenic trip from nearby resorts. Motorbike is the best way to see the Son Tra Peninsula, as the roads are narrow but can also be very steep, so good brakes and some power are a must! There are plenty of sites to stop and see, including the Linh Ung Pagoda, a 1000-year-old Giant Banyan Tree, and Monkey Passage with its stunning views. There’s too much to see in one day, so if you do want to stay over then you would need to stay in one of the two resorts at the beginning of the peninsula. Located in far-northern Vietnam, northeast of Sapa along the Chinese border, Ha Giang Province is the country’s ‘final frontier’. It was the last part of Vietnam to open up to tourism, and foreign visitors still require a special permit to enter the border zone. Isolated and rugged, Ha Giang offers some of the most magnificent mountain scenery in the region. Motorcycling is the transport mode of choice in Ha Giang—beloved by young Vietnamese and growing in popularity among backpackers. Most travel by the Dong Van Loop, a 350km circular road that leads you through Ha Giang’s precarious rice terraces, lush valleys, limestone karst plateaus and deep gorges. Heaven’s Gate and the Ma Pi Leng Pass are two of the most picturesque areas. It’s also possible to do the Loop by car or explore Ha Giang on foot by trekking between ethnic Tay, Dao and Flower Hmong villages. A 45-minute flight away from Ho Chi Minh city lie the pristine islands of Con Dao. Think green forests, sandy beaches and secluded bays, and a good variety of coral reefs and marine life in Vietnam Sea that will make snorkelling or diving worthwhile. These islands have a violent history, they were used as a prison for thousands during the French rule in the mid-20th century, but now they are protected as a national park. Con Son is the largest island in the chain with an airport, where we spent 4 blissful days, lying on the beach, having a thrilling time on mountain bikes exploring the stunning views, diving near the coast to see all the colourful corals and fish and taking it slow. I had an amazing experience at the Luxury beach resort – Six Senses, Con Dao. Vietnam is already known for its world-class cuisine, those who are foreign to this country probably don’t know yet that this place is also a must-visit destination. After living and travelling on and off in Vietnam for the past three years, I’ve come to the conclusion that my favourite place here is Ninh Binh. Ninh Binh offers a lot of things to everyone who decides to travel here or move here. The beauty of Ha Long Bay can still be appreciated from this part of the country, all you have to do is go to Trang An which also known as the Ha Long Bay by land. Ninh Binh is also famous for all the beautiful caves you will come across too. Are you also a nature lover? Hiking in a very natural environment is definitely an option without going too far out of the city. Ninh Binh also let you travel the North of Vietnam and all the way to the South with not much of a hassle! Located in Vietnam’s Red River Delta, Trang An is known as the “Ha Long Bay on Land.” Protected by UNESCO as the “Trang An Landscape Complex,” it is a stunning area of limestone karst peaks, similar to what you see at Ha Long Bay. A boat ride through the grottos is magical. You paddle through caves and emerge in gorgeous pockets of limestone peaks along with Confucian temples, apple fields, and even an old movie set. Music flows over the water, echoing against the rocks, giving the air an extra bit of enchantment. There are three different options for boat rides. Option 1 is the longest and takes about two and a half hours. At the end of the ride, I felt like I could have kept going. The landscape is just so beautiful, it was hard to make myself leave. Afterward, I went to the open-air market across the street and grabbed a delicious and inexpensive lunch with my new found friends. I hired a private car from Hanoi and went on as a day trip. However, you can also stay overnight in the area, as there are many other lovely places to visit if you have more time. Quy Nhon is a coastal city located almost exactly halfway between Hoi An and Nha Trang, although it is often overlooked as travellers pass between the two. The lack of heavy traffic and industry makes the city feel much smaller than it is, and it’s relatively undiscovered on the tourist trail, so offers a more authentic Vietnamese experience. The beautiful boulevards and coastline are popular with Vietnamese retirees who want to enjoy the coastal life. Travellers will be able to enjoy the fresh seafood dishes in many of the restaurants, and the recent emergence of more cafes and bars that are giving the city a more cosmopolitan feel. While the beach and sea at Quy Nhon are unfortunately affected by some pollution, the beaches in the surrounding villages are much more pristine, and nearby Bai Xep is a popular place to stay for travellers. People often ask me “where is the most amazing place I’ve ever visited” and my answer is always Hang Son Doong, the world’s largest cave! This magical destination is tucked away in the Vietnamese jungles of Phong Nha and was only discovered at the turn of the millennium which makes it that much more remarkable. The massive cave takes about a week of jungle trekking to fully explore and can only be seen on one of Oxalis’ exclusive tours. These pristine landscapes are quite literally untouched by human hands and they found a number of new species crawling through the caverns. Words barely describe all the geological marvels that await inside of Hang Son Doong with enormous stalactites, cave shields, cave pearls and more throughout the cavern. You’ll be tempted to swim in all the wonderful cave pools and although they won’t let you in ALL of them these natural springs are the only place for a jungle bath in this week-long adventure. Two dolines have created lush jungles that fill a number of chambers with unexpected greenery and even create an ecosystem where you might get rained on inside of the cave! Vibrant, full of life, fashionable, chaotic yet incredibly beautiful, Saigon is one of the most interesting places to visit in Vietnam. It’s the kind of city that one either love or hates at first sight, and most end up loving it. What makes Saigon a must when traveling to Vietnam is the fabulous mixture of modern and ancient sites, all next to each other. Aside from the temples scattered around town, the city is packed with examples of French colonial architecture: the theater; the Notre Dame cathedral; the Central Post Office are only a few. One of the most interesting places to visit is the War Remnants Museum, to learn more about the American War that had such a strong impact on the history and life of the country. Last but not least, what makes Saigon a must is the incredible food scene – restaurants and street food offer great meals at unbeatable prices; and the fantastic nightlife. The temperate climate of Da Lat made it a popular French resort in the early 1900s, as people would seek an escape from the heat of the south. The city gained the name of “The Eternal Spring” and still retains many of the French colonial villas built then, giving it a different feel to many of the other cities in Vietnam. Surrounded by coffee plantations, flowers and fruit orchards rather than the traditional rice fields adds to its charm. It has been a popular destination for Vietnamese honeymooners and couples looking for a romantic break but has also become an adventure capital of late, with hill walking, canyoning, white water rafting and mountain biking all available in the surrounding areas. In the middle of the Central Highlands of Vietnam is the serene Lak Lake. Surrounded by rice fields, rolling hills and minority villages, it’s a relatively undeveloped area but a beautiful one to visit. The local tourism office can help you to organise a boat trip on Lak Lake, the largest freshwater lake in the area, or a homestay with a local family if you’d like to stay overnight. You’ll also notice many of the houses have a phone number outside that you can call to speak to someone in English and help organise a stay with the family or you can try the Lak Lake Resort for a standard hotel. Easily reachable from both Da Lat and Buon Ma Thuot, the drive to the lake either way is worth the trip! Hue was the capital of Vietnam from 1802 to 1945, and was once home of the Nguyen Dynasty emperors. The city still has an imperial feel, with a sprawling Citadel complex being one of the main attractions to see. There are also several impressive gates, imperial tombs and temples. The Thien Mu Pagoda overlooks the Perfume River and is another beautiful place to visit in the city. Although a complex has been there since the 1600s, many of the buildings have been destroyed and restored over time. Visit earlier in the morning to avoid the crowds! My Son is the site where a unique culture based on Indian Hinduism existed from the 4th to 13th centuries. The kings of Champa constructed an elaborate collection of temples that are unfortunately mostly in ruins after carpet bombing during the war. Despite this, it’s still a stunning site surrounded by lush jungle and streams. It’s a peaceful spot and is now recognised as a UNESCO World Heritage Site. It can be easily reached from Hoi An by motorcycle. Reading all of these brought back so many amazing memories of my time in Vietnam, and I really can’t wait to go again one day! If you’re hesitating on visiting Vietnam, DON’T, add it into your South East Asia itinerary and you won’t regret it. Hoi An was loads of fun. We spent 2 months in a home besides the rice fields, and enjoyed awesome restaurant meals every night. So many good eats there. Like magic, this scene. Then you have a sweet beach, rice field bike rides, all that good stuff. Loved it. What an inspired list. Omg I LOVE the food in Hoi An. SO SO good. I was missing Vietnam so much putting this post together! Sounds like you had a magical experience. I really love Vietnam! Not far from My son is an island called Lyson – very cool! blue, blue waters! beautiful! Me too! Ooh will have to check it out thank you! I’ve been to Hoi An a few times and I really LOVE that town. It has a peaceful feeling, and the food is just amazing. Me too! It’s such a lovely place, I wouldn’t hesitate to go again!
2019-04-25T04:20:24Z
https://www.migratingmiss.com/beautiful-places-in-vietnam/
 "AKATHA has always existed in time and space but is not always public. Sometimes the public presentation ironically may not exist for a very long time. That fact exists that before Eckankar (the name of AKATHA from 1965 to 1971), the teaching had not been public since the 16th century under Master Kabir calling it "Kabav" at that time. Of course, as Paulji (Peddar Zaskq or Paul Twitchell - founder of Eckankar and co-founder of AKATHA) in his writings (included as present scripts of AKATHA) pointed out that Kabir was hounded in his day for revealing truth to the masses and was finally killed for his troubles. Still not all masters die as martyrs wherein Paulji went that way as of being poisoned in Spain in 1970 whilst living a year with enough caustic substance in his body for killing ten elephants. Yet I am showing the last two masters being martyred, the present one will not be. As masters, we know these things as the past, present, and future are in the palms of our hands. It is not arrogance, just fact. Furthermore, the history of AKATHA shows it the most ancient teaching of Sahaji as it comes and goes in time and space. Albeit it always exists just a hairsbreadth away from manifestation. We think it is there and just a glimmer and then disappears. Thus, we find the opportunity in grasping it so fine as to be ineffable, but so vast in scope and practise leaving us in eternal ecstatic vision for the fortunate few. Now we have AKATHA before us with 1% (one percent) of the earth's population ready at this time. This one percent has existed since 3100 B.C. and will remain for a long time yet as the Iron Age generally lasts 428,000 (four hundred twenty-eight thousand) years. We are only 5,111 years into it, but it must be known that time does not necessarily plague us with remaining linear as torchbearer master Rebazar Tarzs said, but can be very random. The consciousness raising of the people can change a history's era whilst being an ancillary factor to the liberation of Souls. This factor of Souls firstly as a priority is very critical and why eras fade with just one Soul being liberated at times. We show here how very important each Soul is in coming to AKATHA. The Soul reading this passage must know that we will stop everything for you, just for you, in order for your liberation if necessary. Nothing is more important than you and the proof is step onto the path and find out how very important you are. History is you as the creator and what will you make of the present history and the most ancient history of AKATHA that has existed before the dawn of time that we cannot even fathom. Still, we think of these long lost times and wonder how we ever survived without AKATHA in our lives. Of course, we did not many times and still it is before you the reader now. Moreover, Kabir's Kabav existed for a short time about 18 years from 1500 until the former's death in 1518. Its present off-shoots are the Bhakti and Sant Mat movements. Jalal al din Rumi in the 13th century founded the form of AKATHA called the Melvev Order until his death in 1273. These bringing the teachings public (called "prakasana") and taking non-public ("aprakasana"s) is the method called "avaksa" that Paulji did also with Eckankar resulting in AKATHA fifteen years later in 1986, publicly presented two years later in 1988. Avaksa does not always happen as some masters maintain the teaching appointing the next master. In actuality avaksa is not that common, but ironically it has happened the last three times the teaching has been public; yet I am showing a microcosm of the near eternal presentation of the path. I obviously cannot give an entire assessment dating back to the dawn of time and this one will have to do for now." Please note: The following pages have been taken word for word from the preface of the Hadjis Book III, (known in Eckankar as the Shariyat-Ki-Sugmad) 15 such volumes of the Hadjis (manuscript form) have been written by Sri Kahtifji. "Firstly, I wish to say that Sri Peddar Zaskq (Sri Paul Twichell) is my mentor and spiritual guide and also, I consider him and Fubbi Quantz (changed the Eckankar terms to AKATHA as 972nd Master in 1988) as co-founders of AKATHA with me in 1988 (Fubbiji is still living, over 1,100 years old at the AKATHA Katsupari Monastery in Northern Tibet and Paulji translated [died] in 1971 - Paulji is the Guardian of the Kazi Dawtz AKATHA Temple of Golden Wisdom on the Ninth Plane). I consider Paulji the greatest man whoever walked the earth! He finds my opinion of his greatness amusing and unimportant as of his pure humbleness. But nevertheless, these are my sentiments and in writing emotion falls short as an expression for love. I most dearly love this man as my spiritual guide as he saved my life and enabled me to find Leslie, my true love and wife! He changed my life through the book, “In My Soul I am Free”, as I was floundering in a sea of misery until reading it. It put my vibrational polarity in order as it still does today. If one can just feel the essence of what I am saying, they will know the only Truth. But still Paul’s teaching of Eckankar has gone away as the high path, but has been recreated in AKATHA - thank you Paulji and SRAOSHA! Paulji, in being a master, his written words could be separate from Eckankar. The leaders changed and ruined the high path as planned after Paulji died. SRAOSHA is the conscious manipulator behind the scenes doing the AKSHAR’s WILL. As paltry humans, we cannot interfere in this divine work. Those fortunate ones who have now made transition to AKATHA, the present highest path, understand quite clearly what is said here. A lot of confusion exists sometimes between the time a teaching goes non-public or when a master changes hands. I wish to clear-up the matter honestly and most humbly in my opinion. False masters in Eckankar and branching from Eckankar appeared after Paul Twitchell died (translated) in 1971. Paul is called Paulji as “ji” is a title of endearment meaning “good friend or loved one.” It is something like a childish baby-talk thing (we like it). “Peddar Zaskq” is Paulji’s spiritual name. He is now guardian of the Kazi Dawtz Temple of Golden Wisdom on the Ninth Plane and can be visited by any Akathist with outer or inner permission of the Living SRAOSHA Master or Paulji, himself, unless, of course, one is a Ninth Initiate or Higher. When Paulji left, the path was in disarray purposely. God has ITS purpose and clarifying is the responsibility of the true Living SRAOSHA (Eck) Master. I left the country in 1998 and travelled the earth world physically meeting Rebazar Tarzs, Fubbi Quantz, and Yaubl Sacabi in India. That was my purpose for leaving just as Paulji’s was as of the Guardianship of Kazi Dawtz. Those opportunities are rare, but Paulji knew that he had duplicated the high path in his Soul Body visitations to me during the latter 1960’s. Therefore, Paulji’s responsibility in passing on the teaching had been accomplished, but not in Eckankar. Anya Foos (a popular Higher Initiate in Eckankar years ago before disaffiliation – a lot of sad things take place when confusion reigns in a Kali Yuga) asked Paulji right before he died in her arms (well-known by many people), what path she was to follow and he told her not Eckankar, but nothing else was said. Anya told me this in 1992, twenty years after Paulji died. Now with this proper perspective on motives for non-public and public presentations, we can proceed to the history because Paulji and I were channels for Spirit and we did not do anything vindictive to anyone. Any false judgements by others must be checked with this present explanation. Paulji did not explain his departure and never established a successor as his prerogative as the Mahaji, the 971st Living SRAOSHA Master. However, a higher initiate council existed at the time and they were left with wondering what to do and did it. On October 22, 1972, they fabricated non-contrivantly naively without malice – just false revelation, the experience of Sri Darwin Gross as master not, in reality, knowing what to do with the path in naiveté. Paulji left no instructions to anyone except the January 1971 Illuminated Way letter(Eckankar stopped publishing them under Harold to avoid the issue of the proper successor – hidden agenda). Darwin was a Ninth initiate, never a master(Tenth Initiate). As a Ninth, Darwin was the highest one in Eckankar at that time (I was a young chela having been in Eckankar only a few months) and therefore, a powerful self-realised being. Darwin was (died recently - March 2008) a good man and I considered him a friend after meeting him physically when we both worked at the EIO (Eckankar International Office in Menlo Park, Cal.). These outer leadership things did not matter to me then, for I was interested and still today only in spiritual matters. The reason for this preface remains solely the fact that confusion does exist and it will clear-up the matter. Paulji established Eckankar publicly in 1965, but no one knows how long he was master prior to that time. In other words, Paulji never chronicled the exact year when he received the Rod of Power. All we know is that he brought Eckankar public in 1965. Those six years of Eckankar as AKATHA today in its purest form were joyous and wonderful times! Some believed they had come to a golden age and there is some truth in it, but a derivative attitude was that Paulji nearly was being worshipped. However, Paulji’s departure was a test for the chelas (students), albeit a difficult one. He had predicted my mastery in his January 1971 “Illuminated Way Letters,” but few chelas comprehended the matter. My wife, Leslie and I, are dedicated (many years) daily contemplators, and sometimes we believe and know that perhaps we were the only ones doing them daily, never missing (very important), in Eckankar. It would be heartening to hear of someone else never failing to do their contemplations each day in all these years. We also believe our dedication to the practice enabled us to find the bridge to AKATHA whilst all the other Eckists (some made it) did not make it. Those who went to other paths also did not make it (making it to the highest path). It should be emphasized that no one loses initiations and if anyone says this, they simply are wrong. All initiations given by Paulji are inviolable. Also, any Paulji Mahdis can initiate anyone to the Fifth plane (Darwin Gross initiated to the Ninth plane whilst Harold Klemp only to the Fifth), but no further. Darwin Gross, the second leader after Paulji, had a Sixth Initiation given by Paul. I acknowledge he was a Ninth Initiate after, and know that one of Paul’s Ninth Initiates gave it to Darwin. Therefore, Darwin’s initiations are inviolable (also Harold as a Fifth but not a master). Albeit Paulji tells of the Ninth as Mastery in Hadjis Books I&II, he means at the end of this circle when one becomes the Tenth Initiate of the Anami Lok, the Adepiseka. No one was an Adepiseka during Paulji’s tenure as master. Still the Mahaji (Mahanta in Eckankar) must be at least a Twelfth Initiate and neither Harold nor Darwin is near that. It is true that the God-Realised (Eighth Initiate) and Self-Realised (Fifth Initiate)are powerful beings, they still are not masters and subject to flaws. All humans err, but not masters. Anyone who judges a master as flawed is subject to much karma. Darwin was greatly loved by the Eckists during his reign as master of Eckankar from 1972 to 1982 (his history strangely eliminated by Eckankar after Darwin was disaffiliated), but aforesaid he was not the real master. He had been selected by the Board of Trustees of Eckankar. Paul did not select him. Darwin was a good man and tried to hold Eckankar together but their turn-over rate was tremendous going from nearly two million followers to about fifty thousand, losing nearly all their people. It was a ninety-nine and three quarter percent(99.75%) loss. Statistically, that means everyone as the former effectively is ninety-eight percent (98%) considered as the total loss percentage. The two percent is important for a statistics category, but it is not considered a total loss by Eckankar. (I worked at the EIO knowing first-hand this information – during Darwin’s tenure he changed the definition of Eckankar from the “Ancient Science of Soul Travel” to “The Path of Total Awareness” and then finally to “A Way of Life.” Then Harold went further, however, a brief stint going back to “Ancient Science of Soul Travel” before now calling it “The Religion of Light and Sound”). The definition changes show the slide from the high path that is always the Ancient Science of Soul Travel as Paulji defined it(Sahaji in higher Sanskrit used in AKATHA). The other definitions show effects, eventualities, consequences, inevitabilities, results or by-products of Sahaji, but are not Sahaji. Sahaji is extremely important and without emphasis upon it just shows a cosmic consciousness or higher awareness teaching not much more than new age stuff in the lower worlds. Anyone can have higher awareness in the body, but one needs very importantly travelling in Sahaji outside the body consciousness in order to attain Soul liberation resulting in the other things, e.g., higher awareness or consciousness, powers, way of life (not religion though), etc. However, nothing was told ever about the major Eckankar membership attrition keeping it secret. Obviously, it does not look good, but should not be an indictment against Darwin as Paul took the path non-public (called “avaksa” when a master takes it public and then non-public at death) in 1971 unbeknownst to anyone at that time. I was told during a Sahaji experience in 1965, but, in reality, did not understand what Paulji was telling me not being an adept at that time. I had to review these Sahaji experiences once becoming a SRAOSHA Master in 1988. I was Paulji’s January 1971 Illuminated Way Letters prediction and brought Eckankar public again as AKATHA in 1988. Of course, before being a young boy in 1965 and not knowing anything about Eckankar then made this Greek to me. The reviewing of Soul records remains important for Soul at times. Eventually, Darwin was “kicked-out” of Eckankar on all sorts of false and nebulous charges. In reality, he was seen as a threat to their present insidious leader Mahdis Harold Klemp. It always seems that the less power that one has like a middle manager, the desperate need exists for more. If people truly wanted power, kindness to others is the answer as was Darwin Gross, a very kindly sort. Harold is also a kind soft-spoken sort, but he has that craving for power and desperation of holding onto to it. One display of this desperation by Harold shows in what happened to Darwin. Harold has been Eckankar’s leader for twenty-six years and albeit rumours had others becoming their leader, that seems to have settled-out awhile ago with only Harold. It does not matter about length of tenure, but when Harold’s history has been to do things to others like Darwin along with many other disaffiliations (mine included – albeit I quit long before to bring AKATHA public per Fubbi Quantz’s instructions) including the claim of the impossible initiation losses, the long tenure appears as a desperate measure of hanging-on for dear life, afraid of losing power. Both Darwin and Harold always have been good to me regarding personal interaction whilst never having any conflict. These matters are not personal, but very spiritual and physically exacting regarding simple administration processing of the high path presently AKATHA and not Eckankar or Atom (the high path has the FULL UPPER CASE distinction for emphasis and respect, but not affiliated with the statutory government code problem – AKATHA is not politics in any way and upholds the antidisestablishmentarianism doctrine idea [separation of church and state – AKATHA defines it more specifically as “separation of the spiritual path and politics”] of the Catholic church, but not their religion as the high path – AKATHA has respect and believes most definitely and sincerely, not as a patronization, that religions are very necessary entities in the world today – no competition exists here whilst believing Eckankar and Atom definitely have their place, but none of these are the high path except AKATHA with their leaders aforesaid most definitely and importantly not masters). The proper lineage of the past five masters are Sri Sudar Singh, 969th Master (from India), Sri Rebazar Tarzs, 970th Master (Tibet), Sri Peddar Zaskq, 971st Master (Paul Twitchell - America), Sri Fubbi Quantz, 972nd Master (Persia), and myself, Sri Tirkahtif ra-Zah, 973rd Master (Timothy Arnold - America). No other lineage is accurate before or after any point in this previous list. Within a year or two, the book “The Lineage of the Living SRAOSHA Masters” will be published from AKATHA Publishing®. It will chronicle the entire lineage of the 973 before and include the five Masters above in this present Kali Yuga from 3100 BCe to the present (one paragraph per master – three per page equaling 326 pages). Of course, Eckankar and Atom (Darwin’s current path) will refute my claim of the above list and who I am coming in the form of doffing it off as nothing. Harold has already cited a “mini-master” category for spin-offs after Eckankar (we do not, of course, consider AKATHA a spin-off). Also the computer has many condemnations of Eckankar and slanders against Paulji; none of which are true. The problems of Eckankar are only that it is not the high path any longer whilst they claim they are. One must take this matter ultimately to the inner planes realising intuition in what one feels as the real answer. People wish definitive answers needing to learn their feelings in the matter are true instead. Hence, AKATHA does provide definite answers, and one’s feelings will coincide when the student is ready. The main significant and simple problems with Eckankar and Atom are that the former now is a religion and Atom has no name. Atom is an acronym for “Ancient teaching of the masters.” That is a definition, not a name for the path. If Darwin gave it a name, it would have to be AKATHA and then he would be a follower of me as it should be. We do not anticipate this however, and is unnecessary unless the Atomists are ready and Darwin would come aboard(aforesaid he passed recently, but wrote this before). I would approve his initiations and Harold’s, if they both applied for membership into AKATHA providing no shenanigans would occur. Again, I do not anticipate this action nor is it important. The ready Soul is AKATHA’s target with 70 million in the world today presently. We do not need but will accept pseudo-celebrities from stepping-stone paths joining AKATHA. I respect their work, but just as any philosophy or religion, holes exist in them and no one following these paths will ever be liberated from the Wheel of Samsara and get into the proper heavenly worlds. Neither Darwin nor Harold has chronicled their specific spiritual experience of receiving the Rod of Power, but generally stated it. I will specify here as having generally stated in my introductory book to AKATHA about my Master experience, also not having been specific (lost a chronicled version in the Indian flood where some Hadjis [Spiritual book of AKATHA] were lost as well). At midnight on October 22, 1986, I stood in Soul body of a Sahaji experience in the Valley of Shangta at the Oracle of Tirmir and received the Rod of Power (Yastiprabhava in higher Sanskrit [Asacer language or AKATHA sacred language – only AKATHA has been specific in defining what is “higher Sanskrit”]) not unlike Higher Initiate Helen Baird’s oil painting depiction. Her painting shows the transfer from Paulji to Darwin, but that never happened being her imagination and not real. The actual happening at that time was Paulji to Rebazar Tarzs (temporary holder, called the torchbearer or “Karaduhr”). When I was ready inwardly in 1986 (inner ceremony albeit the Tirmir one is Sahaji, but considered an outer experience being on the physical plane – more of a physical bi-location), it was my experience that Rebazar Tarzs (he is the Atasr-AKATHA, the passer of the power – twin responsibilities of the Karaduhr – temporary holder and passer)) transferred to me the Rod of Power at the Oracle’s centre with a powerful light beam objective appearance coming down straight from above. From my perspective, I was looking out from many light beams coming from mainly the eight earth directions – an extraordinary feeling I assure you to say the least! What actually is happening is the Karaduhr releases the Rod of Power from his body (or standing between when having not been the temporary holder as in the ceremonial purpose) and passes it to the new master(observing it is much simpler than the explanation – go to the Causal plane now and see if one wishes in Sahaji). The point between bodies is two Souls in one place which is possible for the power cannot escape so to speak. That transfer occurred to me and I stood there for a moment with Rebazar stepping away looking towards me. After the long moment, he signalled with his right hand to follow him and we walked down a dirt path between some tall dense foliage. At the end of the path, we came to a beautiful sunny spring-like meadow clearing where a richly carved wooden stage affronted a large throng of colourfully dressed people. Other entourage were walking with us along the path and then we all ascended the stage single file. I sat in the centre on a simple thrown also of wood with a maroon velvet cushion and Rebazar stood to my left. When everyone in the retinue was seated on stage (my wife Leslie was to my right dressed in a fluffy ermine white-collared maroon robe as all on stage were), Rebazar turned towards a small table behind us and lifted the fourteen point Mahaji crown placing it on my head (the crowning only is symbolic of the actual Rod of Power experience – of course king crownings are derivative andthe Mahaji never is physical king just spiritual) – no solemn words were said; silence reigned. Once the crown was in place, a pleasant appropriate applause took place amongst the stage people and the large standing audience in front. Everyone was standing now and the applause was long. When the clapping died down, I stood and spoke a few words. When finished, more appropriate applause occurred and I turned to my wife with shining eyes meeting and then swiftly came back to the body awakening in astonishment! For two weeks, I was stunned mostly in silence and then I told my wife, Leslie, that we would be bringing AKATHA public. It is true that my experience could be claimed as a heightened imagination; however those who practice and experience Sahaji know how real these experiences are with mine being true to form. Those who are adepts know the difference between reality and fiction. One knows by their feelings or “intuition” which is the name for a feeling or premonition. Logic should not dictate anything, but we must use it sometimes for it remains a sense of knowing on the outer planes. We must communicate at times in logic, but feelings ultimately should chart our course by listening to the still small voice within interpreting our own Sound Current. AKATHA backs Its logic with empirical proof in Sahaji as these inner planes are as real as the illusory physical one that remains very concrete to us. We can philosophise about the physical plane being an illusion and ultimately true, but we still deal with its tangibility on a daily basis. Few wish testing their luck stepping in front of an oncoming car. By trusting one’s feelings and listening to the voice, the Sound Current or SRAOSHA within will give us the answer here to what I have been saying. An AKATHA Higher Initiate Danielle Gribbins once said that Leslie and I took all the high energy from Eckankar and left it as an empty shell. It is true and a shame that Eckankar was left as an empty shell of itself having only that religious nothingness vibration with occasional emotionalism like Atom (not denigration here just fact). The SRAOSHA does not palpably exist in these latter teachings any longer and one needs only prove it by coming to an AKATHA meeting or seminar and feeling the difference. But reality is reality. Danielle, whilst sitting in my living room, also added, “Why would anyone wish to go anywhere else in the universe than right here and feel this pure essence of SRAOSHA vibration that is so obvious, palpable, and real? I do not wish to go anywhere else!” Of course, I left the chelas then and went to India for a test. AKATHA was fledgling then, but the chelas should have stayed with the path if they were true. We virtually had to start over again when I came back in 2006. Regarding this high energy that Paulji recognized, sometime after meeting Leslie(my true love and wife), I swooned into some metal folding chairs when her eyes actually flashed twin light beams (coup de foudre [French]), lightening bolt or Cupid’s (Homeric myth as Psyche’s husband) arrow, etc., through my heart prior to an Eckankar seminar in San Francisco years ago; the twin light beams another very real experience! This very palpable power is within the teaching of AKATHA as Leslie is the second highest evolved woman being a 22nd Initiate SRAOSHA Master (Kata Daki is a 200th Initiate living in the Katsupari Monastery; she did not translate as believed, but is not publicly teaching being a supra-annuated ancient Initiate). Very few realised that Paulji was a 21st Initiate (we did not like passing him as a human reaction – but no competition exists in initiations albeit the human feeling element exists as normal; I am presently a 24th Initiate. Leslie is a 22nd [being in the Kali Yuga now with such negativity about, the higher initiations are necessary for raising and maintaining consciousness] – if Paulji had lived, he would be much higher now anyway – initiations are for the living or lower worlds areas – however mastery is retained throughout the higher planes in the titles of “Sri” for men and “Sra” for women – ask Eckists or Atomists what the title for women is and they will not know or use the male one of “Sri” incorrectly amongst other things like all the syllables of the first name are used and then adding “ji” on the end for the master [Eckankar and Atom use one syllable i.e., Darji, Harji, etc. If they were masters, it should be Darwinji or Haroldji] and where is Paulji now; they do not know – only AKATHA has these answers amongst a myriad of many others – one needs stepping onto the path for really amazing wisdom takes place as many chelas who read this could testify - perhaps even jumping up and down now wishing they could write a few things. Feel free to send your experiences in writing anytime to the AUo). Atom is better than Eckankar, being another white brotherhood [religions are not usually white brotherhood as the latter are more ascended master stuff or new agey] cosmic consciousness path getting people to the Fourth plane. Eckists admittedly state that they are a higher consciousness path (aforesaid a result of Sahaji, but not the main premise) as Darwin had changed Eckankar with his book “Consciousness the Key to Life.” Nothing is wrong with higher consciousness, but it is a result of Sahaji, not the goal. In other words, one needs Sahaji firstly and everything else is secondary. Using a secondary theme will not get one into heaven. “Higher consciousness” is a term for below the Fifth plane wherein only one travelling in Sahaji can achieve. It is easy to get confused here and Eckankar and Atom do just that very well. Their vagueness is obvious if one is honest with themselves. Again, we do not compete, but will explain the difference not being naïve about these things. AKATHA presently is the only teaching that will get one into the Soul plane. This factor makes AKATHA the highest teaching and the declaration is important in the lower worlds. If this highest factor is not stated or claimed, no one will know what is the highest path and who is the present living Master and He is Sri Tirkahtif ra-Zah (Kahtifji or Sri Timothy Arnold), the Mahaji, and 973rd Living SRAOSHA Master. It is best to explain the basics about AKATHA as of Sahaji and leave organisation stuff for later unless asked. One knows when these things become tedious and unnecessary. The Truth is important, however, and the AKATHIST should never shirk from it no matter the ostensible tedium and exiguous degrees at times. Darwin was a great man being a Ninth Initiate, but no straight answer ever parted his lips. He was compassionate and cheerful, but did not acknowledge people’s questions directly and neither does Eckankar. Although some declare this is a true master being evasive and even Paulji intimated this at times. The great Peddar Zaskq made of pillar of his teaching that one should voice his views and attempt to speak his experiences as best as possible. Again, contradiction intervenes in the language of logic, the language of antithesis or opposites. We cannot avoid it, but know this that if one is attempting to communicate for better or worse, intellectuality or abecedarian, they will be accommodated in AKATHA, but not in these other false teachings. Inner condemnation is the worse sort. The Eckankar leader and followers tell evasive childish stories and parables with no deep esoteric thought. This pseudo five year-old state leaves one in a pabulum zombified new-age state not allowing any intelligence to manifest believing it “mentalizing.” AKATHA does not condemn children, but rather believe a in a loftier view of a child that if he could articulate, such deep esoteric wisdom would come forth ineffable and not empty pablum that Eckists spiel believing it childlike. Hence, if one wished a straight answer, they must come to AKATHA where the deepest esoteric thought and wisdom reside being sourced by the living master of time and his mentor the wonderful and most powerful Sri Peddar Zaskq! We realise the esoteric idea that masters stay enigmatic and such. However, logical words are paradoxical in themselves without adding to it. Therefore, let the Truth be known wherein the SRAOSHA Masters attempt to answer, but know that logic defeats the premise with the answer foresaid in one’s knowingness, attitude, vibrations, and presence in the divine feeling of SRAOSHA!
2019-04-19T00:48:20Z
http://www.akatha.com/akatha-history.html
Luxury vinyl tiling will enhance the beauty of your home’s flooring and the investment will increase the value of your property in New Jersey. said a luxury vinyl flooring installation new jersey based company. Vinyl tiling has become increasingly popular as an alternative to higher end, high maintenance alternatives for its attractiveness, comfort and easy maintenance. Enrich your home environment with a stylish and distinctive new look by installing luxurious vinyl tiling to complement your interior design. Vinyl flooring is not only attractive, it is also made from material that yields underfoot which makes it extremely comfortable to walk or stand on. Our luxury vinyl selection from leading brands comes in tiles, sheets or planks, is easy to install and guaranteed to lend a sophisticated charming ambience to your home. Impervious to spills and non-stainable, vinyl flooring is the ideal solution for busy households as it always retains its original beauty, despite accidental spills, to keep your floor looking shiny and new. Our durable vinyl selection is highly resistant to mold and stains and is easy to clean, requiring no more than sweeping and mopping to keep it hygienic and looking pristine. A vinyl floor is the ideal choice for hallways, living rooms, dining rooms, bedrooms and anywhere that has heavy foot traffic. A luxury vinyl floor with its elegant looks will fit in perfectly with the rest of your décor and will stand the test of time. With so many beautiful vinyl flooring options to choose from it may be difficult to find the right one to suit your particular decorative needs. Our professional experts will gladly assist you in discovering the perfect match to your interior design and décor. Due to modern and advanced production techniques, luxury vinyl floor tiles mimic the color as well as the general appearance of wood with scraped and embossed finishes to produce the unique grain and texture present in natural wood – from traditional pine and hickory to the worn appearance of re-purposed wood. Similarly, luxury vinyl flooring also flawlessly reproduces the elegant look of porcelain, slate, and other customary flooring materials. For the installation of your new vinyl flooring in New Jersey, our professional team will do the job expertly and quickly. Vinyl flooring requires the expertise and skill of qualified installers using the latest professional tools and equipment to lay down your new flooring impeccably. You can trust our highly trained vinyl installers to deliver the high precision and excellence demanded by the tough job of installing your new vinyl flooring. Our mission is to provide you with a luxury vinyl floor that we guarantee will last for many years for your total enjoyment. Contact us today to discover a whole new world of luxury vinyl choices for your flooring project. Your business is your investment. All investment should be protected against losses that may be incurred in any number of ways. Modern businesses today are exposed to so many risk factors on a day to day basis. Risks in form of security threats can be anything from a disgruntled employee, a malicious client or customer, a bugler or intruder or even a simple accident such as a fire. Any of the above security threats have the potential of costing you enormous losses. So what is the best preventive measure to take to prevent any of the above security threats from harming your investment? Most of businessmen has considered installing security systems for business. Business security systems are the perfect solution to modern business owners that want to safeguard their investments. A business person who is thinking ahead will see that an investment on security systems for their business is capable of offering returns in the long run. You can avoid huge losses and delays in operations within your business enterprise. Commercial security systems include but are not limited to camera surveillance and monitoring systems, fire and intrusion detection, as well as fire compression and sprinkler systems. All the above security infrastructures can help you and your business to avoid the worst. Securing your business premise from the inside out can help you to ensure that nobody can commit an unlawful act without your knowledge or permission. CCTV surveillance cameras can help you to always have eyes within your business premise even when you are not physically present. Your employees will never dare to engage in any unscrupulous business activities as you will always be watching their every move. Intruders will be kept out of your business by any means possible. Intrusion or burglar detection systems that have very effective motion sound and heat detection capabilities can make sure that your business premise is impenetrable. Thieves, burglars and malicious intruders can cause a lot of damage to your business structures as well as major losses in terms of operational cash business commodities as well. Fire is also something to protect your business from as it has costs many business owners a lot of money in the past. Fire safety measures must be taken to make sure that any fire incidence that may occur at your business is respond to and handled in the fastest time possible. Fire is capable of bringing everything in your business to the ground. Business security systems are the only sure way of avoiding all of the above security threats. A deck has become an important aspect of every home because it adds living space without having to spend a lot of money on adding an extra room. A deck can be used for different functions, but that will mean paying more for the deck. Having a deck will prove to be a good investment since it also increases the value of a home. There is a lot that goes into the process of building a deck, and it helps to have a professional who understands what is needed and how it should be done. The most obvious choice, deck builders. Deck builders are in a good position to provide quality services because they have specialized in deck building and can help you have the best deck possible. They can create beautiful wood works of art and ensure the deck is aesthetically pleasing and functions well. There are many different services you can expect from deck builders. These are services they have expertise in and can easily do them. When you have an idea of what you would like your backyard to look like, you will need an expert to transform the sketchy thoughts into a concrete plan. Deck builders can easily listen to what you are saying and figure out what you want on the project. They will then come up with the plan that can be used to build your deck. You will also have the chance to make any corrections. The deck builders can also help you come up with a plan that fits your budget. Wood decking can become weathered and worn, especially when it doesn’t receive the proper care and maintenance. This will make your deck unsightly and unsafe. Deck builders can easily replace the worn parts of the deck and give your deck a new look. The new deck must be incorporate the landscape to ensure the best possible look. Other features of your backyard must be able to blend in with your deck, or else you will end up with a not so good looking backyard. Many people prefer having an outdoor kitchen, but it can be a challenge when you don’t know how. Deck builders can help you come up with a good plan that will add functionality to the deck. You can add creativity and features depending on your budget and needs. Water can damage a home. Spray the water with 3,000 pounds per square inch of power the wrong way, and it can ruin your home. When choosing power washing companies find the outfits that deliver quality, experience, integrity, and a spotless clean you can trust. Many power washing companies provide special promotions periodically but power washing companies in south jersey warned that while you might be tempted to go with the lowest priced promotion, it may not be the best idea. Check out the companies that provide low pricing, but pay more attention to the quality of their work and their customer service reputation. Talk to the different power washers to find out what level of equipment they will use to perform the work for you. Why is this important? Well, it turns out for a sidewalk, it is reasonable to use the full power of 3,000 psi, but not for cleaning, say, the outside of a greenhouse. If a pressure washer operates at or below 2,000 psi for a good light duty cleaning. Do they have different attachments that control the flow of the water to make for a more effective clean? Feel free to ask questions about their methods based on what you need cleaned. Many will opt for gas rather than electric-based operation for their pressure washers. The reason is that gas is portable, and electric can be limited by cords and electrical outlets. Professionals need to use gas to ensure that the machinery can be used at customers’ homes. Electric machines are typically useful for small projects. Gas is better for the large-scale cleaning of an entire home, decks, patios and walkways. Always do due diligence as a potential customer. According to a brand PR company Mosaico, low hanging fruit and free information about different companies is available online. Check out online reviews. Some people only give feedback if they are frustrated, but it may not be the normal experience for a company’s customers. So, take any reviews with a degree of skepticism. Though, if you see a trend, then it is probably the truth. The best way to go is to visit their website. Once you have collected sufficient information, contact the pressure washing services directly. Ask them questions about their services, and any special deals, and what their recommendations and schedule are like. You will know when you are ready to make a move and choose a power washing company. Enjoy the results of your efforts. There are recruiting agencies spread all over the place, but not all of them are going to be good enough. Most are going to provide talent here and there for you to work with, but that is not enough for those who are looking for a quality stream of talent coming in at all times, if you happen to be based in NJ, there are a lot of recruiting agencies Bridgewater NJ based companies you can work with. When that is the goal, you have to realize that only the best recruiting agencies are going to be worth your time and the others are just there as fillers. So, what do you look for when it comes to hiring the best recruiting agencies in your area? Here is a set of tips that should assist in the matter. You have to think about what is needed. Do you even know what you are looking for when it comes to these recruiting agencies? If you don’t even know what you want, how are they going to figure it out for you? They will be guessing, and that is when you are going to be unhappy, to say the least. Think about this as much as you can. The standards that you are setting after talent is sent your way is going to determine how you feel about the experience. Learn to do additional interviews after the talent has come in to make sure they are passing all of the tests that have to be passed. Like say a commercial office cleaning services needs workers to be besides requiring experience, you need to know the talent is able to cope with changing shifts and can tolerate cleaning chemicals and don’t have allergy to dust. Things like small but can impact overall work speed and overall service deliverability. You have people who are aloof and distant when it comes to the relationship they are building with the agency in question. Is that the smart thing to do? No, it is not, and that is why you are going to pay a heavier price than the average person. You need to understand that building a relationship with the agency is going to put you ahead in the long-run. You have to be able to focus on this and get them on the same page as you. They will start to funnel talent in the right way, and that is when you are going to reap the rewards of the work they are doing. Until then, you are looking at a black hole when it comes to the value you are getting and how it all comes together for you in the end. Think about this as you figure it all out and hope to make things come together in the right manner. The roof of a commercial building is a very important and integral part of the building. This is because they are the first line of defense against natural disasters such as rain, wind, fire, ice, hail, snow and severe heat. And, Barrington roof repair added it is also one of the most vulnerable parts of the building. Each day, the roof is exposed to elements that contribute to the deterioration and decay of the roof increases the risks of it getting damaged. If it has been a while since you had your roof inspected, the first thing you should do is identify where the major problems are and have them fixed. Some of the major signs of problems are obvious from even inside the building. A water stain in the ceiling shows that there may be a roof leak which may be as a result of a hole or crack in the roof. In addition, if the building has unexplained mold, this may indicate that there is water penetration as a result of a leak. Depending on how the roof is oriented and how easy it is to access the roof, you may be able to do the inspection yourself. However, in many cases, it would make sense to hire a contractor so as to ensure that the job is done safely and efficiently. When you make this inspection, you may want to look for ponding on the roof which eventually leads to leaks. As a result of the leaks insulating concrete may be turned into a thick paste like substance. The best way to care for your roof is through regular care and preventive maintenance. A plumbing repair company in Basking Ridge said how frequently you perform plumbing maintenance will depend on a number of factors. These include the age of the roof, foot traffic in the roof and any recent weather events. It would be advisable to contact a professional roofing contractor. The contractor can offer help in developing a maintenance plan which will prepare you for the future. When hiring a contractor there are a number of factors that you should into consideration. Before you hire the contractor, ask for references. You need to choose a reputable contractor and one good way to find out whether a contractor is reputable. You can also ask the contractor to provide you with his or her certificates insurance. This is because if the contractor does not have insurance, you are liable to any injuries that occur during the maintenance. When customers come to your hotel, they are expecting a comfortable experience. They don’t want to be shivering in their room or boiling hot in the summer. Each room should be comfortable and provide a pleasant experience. After all, each guest is paying big money to stay in the hotel and you want them to enjoy their stay. If they don’t, they won’t come back and they might also leave negative reviews of your hotel online that could drive other guests away. Keeping the HVAC system maintained can go a long way towards making the hotel experience a comfortable one. Investing to heating and cooling services is an example of a wise decision when managing a hotel, after all it’s the comfortability that makes your guest stay and comeback next time and unsolicited referals is also a big plus from your customers. The HVAC system plays a crucial role when it comes to your hotel. You can’t be comfortable without a decent HVAC system and if it keeps going out or has other problems, people are going to know fast. You just can’t take that risk. The best way to ensure that there aren’t going to be any problems is to have your HVAC system maintained on a regular basis. You should have it checked each season to ensure that there are no problems and the system is working the way it should be. This will help you avoid any problems and ensure that the system is in top working order. Having your HVAC system go out unexpectedly can be a disaster. It will cost you money in lost sales and your guests are not going to be happy. You just can’t take that risk when you are in the hotel business. If something goes wrong, you could even get sued if someone is hurt or gets sick as a result of your HVAC system not working properly. You have to schedule in regular maintenance of the system. It is crucial and something that has to be done if you want your hotel to run smoothly. You should have a HVAC crew on call that you can use any time of the day or night, because if something does go wrong with your system, you need to be able to have it fixed immediately. There is no waiting when you have a hotel full of guests. When it comes to your hotel, your HVAC system is something you can’t take any chances with. It is crucial that you keep it running the way it is supposed to. Don’t risk the health or safety of your guests.
2019-04-23T04:38:54Z
http://www.johnstownamerica.com/page/3/
IMPORTANT NOTICE REGARDING ARBITRATION: WHEN YOU AGREE TO THESE TERMS OF SERVICE YOU ARE AGREEING (WITH LIMITED EXCEPTION) TO RESOLVE ANY DISPUTE BETWEEN YOU AND SONIDO THROUGH BINDING, INDIVIDUAL ARBITRATION RATHER THAN IN COURT. PLEASE REVIEW CAREFULLY SECTION 13 “DISPUTE RESOLUTION FOR CONSUMERS” BELOW FOR DETAILS REGARDING ARBITRATION (INCLUDING THE PROCEDURE TO OPT OUT OF ARBITRATION). The third party websites linked to by Sonido are owned and operated by individuals and/or companies over whom Sonido exercises no control. Sonido assumes no responsibility for the content of any website or other resource included in any search results or otherwise linked to by Sonido. As an example, logos and images are the copyright or trademarks of each respective radio station or TV station. If, for any reason, the owner and operator of a linked website wishes the link from the Sonido Service to be deleted, they must contact Sonido ([email protected]) and expressly request such deletion. The Sonido Service is made available for your personal, non-commercial use only. You may not take the content from the Sonido Apps or Sonido’s website. Certain types of content are made available through the Sonido Service. “Sonido Content” as used in these Terms of Service means, collectively, the text, audio, data, graphics, images, photos and video files made available through Sonido, excluding User Submissions. “User Submissions” as used in these Terms of Service means, collectively, the text, audio, data, graphics, images, photos and other content and information which Sonido members post, upload and otherwise submit to Sonido. User Submissions also include the sound recordings, musical works, and audiovisual content. SONIDO RESERVES THE RIGHT TO REMOVE AND PERMANENTLY DELETE ANY SONIDO CONTENT OR USER SUBMISSIONS FROM THE SONIDO SERVICE WITHOUT NOTICE OR LIABILITY TO YOU. 3. Content Ownership, Responsibility and Removal. Sonido does not claim any ownership rights in any User Submissions and nothing in these Terms of Service will be deemed to restrict any rights that you may have to use and exploit your User Submissions. Subject to the foregoing, Sonido and its licensors exclusively own all right, title and interest in and to the Sonido Service and Sonido Content, including all associated intellectual property rights. You acknowledge that the Sonido Service and Sonido Content are protected by copyright, trademark, and other laws of the United States and foreign countries. Please also note that product names, logos, brands, and other trademarks included in the User Submissions and featured or referred to within the Sonido Sites and the Sonido Service are the property of their respective trademark holders. These trademark holders are not affiliated with Sonido or the Sonido Service. You agree not to remove, alter or obscure any copyright, trademark, service mark or other proprietary rights notices incorporated in or accompanying Sonido or Sonido Content. Rights in User Submissions Granted by You. By making any User Submissions available through the Sonido Service you hereby grant to Sonido a non-exclusive, transferable, worldwide, royalty-free license, with the right to sublicense, to use, copy, modify, create derivative works based upon, publicly display, publicly perform and distribute your User Submissions in connection with operating and providing the Sonido Service and Sonido Content to you and to other account holders.. Responsibility for User Submissions. You are solely responsible for all your User Submissions. You represent and warrant that you own all your User Submissions or you have all rights that are necessary to grant us the license rights in your User Submissions under these Terms of Service. You also represent and warrant that neither your User Submissions, nor your use and provision of your User Submissions to be made available through Sonido, nor any use of your User Submissions by Sonido on or through the Sonido Service will infringe, misappropriate or violate a third party’s intellectual property rights, or rights of publicity or privacy, or result in the violation of any applicable law or regulation. In certain instances, some of your User Submissions (such as posts or comments you make) may not be completely removed and copies of your User Content may continue to exist on Sonido. We are not responsible or liable for the removal or deletion of (or the failure to remove or delete) any of your User Submissions. Rights in Content Granted by Sonido. Subject to your compliance with these Terms of Service, Sonido grants to you a limited, non-exclusive, non-transferable license, with no right to sublicense, download, view, copy, display and print the Sonido Content solely in connection with your permitted use of Sonido and solely for your personal and non-commercial purposes. 4. Rights and Terms for Sonido Apps. Rights in Sonido Apps Granted by Sonido. Subject to your compliance with these Terms of Service, Sonido grants to you a limited non-exclusive, non-transferable license, with no right to sublicense, to download and install a copy of the Sonido Apps on a mobile device or computer that you own or control and to run such copy of the Sonido Apps solely for your own personal non-commercial purposes. You may not copy the Sonido Apps, except for making a reasonable number of copies for backup or archival purposes. Except as expressly permitted in these Terms of Service, you may not: (i) copy, modify or create derivative works based on the Sonido Apps; (ii) distribute, transfer, sublicense, lease, lend or rent the Sonido Apps to any third party; (iii) reverse engineer, decompile or disassemble the Sonido Apps; or (iv) make the functionality of the Sonido Apps available to multiple users through any means. Sonido reserves all rights in and to the Sonido Apps not expressly granted to you under these Terms of Service. These Terms of Service are concluded between you and Sonido, and not with the App Provider, and Sonido (not the App Provider), is solely responsible for the Sonido Apps. The App Provider has no obligation to furnish any maintenance and support services with respect to the Sonido Apps. In the event of any failure of the Sonido Apps to conform to any applicable warranty, you may notify the App Provider, and the App Provider will refund the purchase price for the Sonido Apps to you (if applicable) and, to the maximum extent permitted by applicable law, the App Provider will have no other warranty obligation whatsoever with respect to the Sonido Apps. Any other claims, losses, liabilities, damages, costs or expenses attributable to any failure to conform to any warranty will be the sole responsibility of Sonido. The App Provider is not responsible for addressing any claims you have or any claims of any third party relating to the Sonido Apps or your possession and use of the Sonido Apps, including, but not limited to: (i) product liability claims; (ii) any claim that the Sonido Apps fails to conform to any applicable legal or regulatory requirement; and (iii) claims arising under consumer protection or similar legislation. In the event of any third party claim that the Sonido Apps or your possession and use of that Sonido Apps infringes that third party’s intellectual property rights, Sonido will be solely responsible for the investigation, defense, settlement and discharge of any such intellectual property infringement claim to the extent required by these Terms of Service. The App Provider, and its subsidiaries, are third-party beneficiaries of these Terms of Service as related to your license to the Sonido Apps, and that, upon your acceptance of the Terms of Service, the App Provider will have the right (and will be deemed to have accepted the right) to enforce these Terms of Service as related to your license of the Sonido Apps against you as a third-party beneficiary thereof. You must also comply with all applicable third party terms of service when using the Sonido Apps. We welcome feedback, comments and suggestions for improvements to the Sonido Service (“Feedback”). You can submit Feedback by emailing Sonido at [email protected]. You grant to Sonido a non-exclusive, transferable, worldwide, perpetual, irrevocable, fully-paid, royalty-free license, with the right to sublicense, under any and all intellectual property rights that you own or control to use, copy, modify, create derivative works based upon and otherwise exploit the Feedback for any purpose. Certain features of Sonido, such as the Premium service for Sonido, may require you to pay a fee in order to use them. If you choose to purchase these features, you expressly authorize us or our payment processor to charge the payment method you provide for the applicable fee. Except as expressly set forth below, all fees are non-refundable. When you purchase any additional features we may offer, there will be a one-time charge for that purchase. For subscriptions such as Sonido’s Premium Pass, you will be charged yearly unless canceled within 24-hours before the end of the current period. You can cancel anytime with your iTunes account settings. 7. Your Obligations When Using Sonido™. The Sonido Service may be used and accessed for lawful and non-commercial purposes only. You agree to abide by all applicable local, state, national and foreign laws, treatises and regulations, including laws governing the privacy, security and trans-border transfers of PII ((including, but not limited to, compliance with the General Data Protection (EU 2016/679) (the “GDPR”)) applicable to your business and operations and in connection with your use of the Sonido Service. Where required, you shall be responsible for collecting verifiable consent (as defined under the GDPR) related to any PII collected, used, maintained, and shared with Sonido, and otherwise have any and all rights required to provide such data to Sonido, and ensure that any such data was properly obtained. Attempt to access, search or meta-search the Sonido Service with any engine, software, tool, agent, device or mechanism other than software and/or search agents provided by Sonido or other generally available third party web browsers (such as Microsoft Internet Explorer, Mozilla Firefox, Safari, or Opera), including without limitation any software that sends queries to the Site to determine how a website or web page ranks. We may immediately terminate or suspend your access to Sonido and remove any material (including User Submissions) from Sonido or our servers, in the event that you breach these Terms of Service. Notwithstanding the foregoing, we also reserve the right to terminate the Sonido service or your access thereto at any time and for any reason. After such a termination, you understand and acknowledge that we will have no further obligation to provide the Sonido Service. Upon termination, all licenses and other rights granted to you by these Terms of Service will immediately cease. Sonido is not liable to you or any third party for termination of the Sonido Service or termination of your use of the Sonido Service. UPON ANY TERMINATION OR SUSPENSION, ANY INFORMATION (INCLUDING USER SUBMISSIONS) THAT YOU HAVE SUBMITTED ON THE Sonido SERVICE OR THAT WHICH IS RELATED TO YOUR ACCOUNT MAY NO LONGER BE ACCESSED BY YOU. Furthermore, Sonido will have no obligation to maintain any information stored in our database related to your account or to forward any information to you or any third party. Any suspension, termination or cancellation will not affect your obligations to Sonido under these Terms of Service (including but not limited to ownership, indemnification and limitation of liability), which by their sense and context are intended to survive such suspension, termination or cancellation. 9. Modification of the Sonido Service or Terms of Service. Sonido reserves the right, in its sole discretion, at any time to modify, discontinue or terminate the Sonido service, or modify these Terms of Service without notice. If any modified terms and conditions in the revised Terms of Service are not acceptable to you, your sole remedy is to cease using the Sonido Service. By continuing to access or use Sonido after Sonido makes any such modification, you agree to be bound by the revised Terms of Service. Sonido disclaims any and all responsibility or liability for the accuracy, content, completeness, legality, reliability, or operability or availability of information or material displayed on Sonido service. Sonido disclaims any responsibility for the deletion, failure to store, misdelivery, or untimely delivery of any information or material. Sonido disclaims any responsibility for any harm resulting from downloading or accessing any information or material on the Internet through Sonido. SONIDO IS PROVIDED “AS IS,” WITH NO WARRANTIES WHATSOEVER. SONIDO EXPRESSLY DISCLAIMS TO THE FULLEST EXTENT PERMITTED BY LAW ALL EXPRESS, IMPLIED, AND STATUTORY WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT OF PROPRIETARY RIGHTS. SONIDO DISCLAIMS ANY WARRANTIES REGARDING THE SECURITY, RELIABILITY, TIMELINESS, AND PERFORMANCE OF THE SONIDO SERVICE. SONIDO DISCLAIMS, ANY WARRANTIES FOR ANY INFORMATION OR ADVICE OBTAINED THROUGH THE SONIDO SERVICE. SONIDO DISCLAIMS ANY WARRANTIES FOR SERVICES OR GOODS RECEIVED THROUGH OR ADVERTISED ON THE SONIDO SERVICE OR RECEIVED THROUGH ANY LINKS PROVIDED BY SONIDO, AS WELL AS FOR ANY INFORMATION OR ADVICE RECEIVED THROUGH ANY LINKS PROVIDED IN THE SONIDO SERVICE. YOU UNDERSTAND AND AGREE THAT YOU DOWNLOAD OR OTHERWISE OBTAIN MATERIAL OR DATA THROUGH THE USE OF THE SONIDO SERVICE AT YOUR OWN DISCRETION AND RISK AND THAT YOU WILL BE SOLELY RESPONSIBLE FOR ANY DAMAGES TO YOUR COMPUTER SYSTEM OR LOSS OF DATA THAT RESULTS IN THE DOWNLOAD OF SUCH MATERIAL OR DATA. UNDER NO CIRCUMSTANCES SHALL SONIDO BE LIABLE TO ANY USER ON ACCOUNT OF THAT USER’S USE OR MISUSE OF OR RELIANCE ON THE SONIDO SERVICE ARISING FROM ANY CLAIM RELATING TO THIS AGREEMENT OR THE SUBJECT MATTER HEREOF SUCH LIMITATION OF LIABILITY SHALL APPLY TO PREVENT RECOVERY OF DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, SPECIAL, EXEMPLARY, AND PUNITIVE DAMAGES WHETHER SUCH CLAIM IS BASED ON WARRANTY, CONTRACT, TORT (INCLUDING NEGLIGENCE), OR OTHERWISE, (EVEN IF SONIDO HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES). SUCH LIMITATION OF LIABILITY SHALL APPLY WHETHER THE DAMAGES ARISE FROM USE OR MISUSE OF AND RELIANCE ON THE SONIDO SERVICE, FROM INABILITY TO USE THE SONIDO SERVICE, OR FROM THE INTERRUPTION, SUSPENSION, OR TERMINATION OF THE SONIDO SERVICE (INCLUDING SUCH DAMAGES INCURRED BY THIRD PARTIES). THIS LIMITATION SHALL ALSO APPLY WITH RESPECT TO DAMAGES INCURRED BY REASON OF OTHER SERVICES OR GOODS RECEIVED THROUGH OR ADVERTISED ON THE SONIDO SERVICE OR RECEIVED THROUGH ANY LINKS PROVIDED IN THE SONIDO SERVICE, AS WELL AS BY REASON OF ANY INFORMATION OR ADVICE RECEIVED THROUGH OR ADVERTISED ON THE SONIDO SERVICE OR RECEIVED THROUGH ANY LINKS PROVIDED IN THE SONIDO SERVICE. THIS LIMITATION SHALL ALSO APPLY, WITHOUT LIMITATION, TO THE COSTS OF PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES, LOST PROFITS, OR LOST DATA. SUCH LIMITATION SHALL FURTHER APPLY WITH RESPECT TO THE PERFORMANCE OR NON-PERFORMANCE OF THE SONIDO SERVICE OR ANY INFORMATION OR MERCHANDISE THAT APPEARS ON, OR IS LINKED OR RELATED IN ANY WAY TO, SONIDO. SUCH LIMITATION SHALL APPLY NOTWITHSTANDING ANY FAILURE OF ESSENTIAL PURPOSE OF ANY LIMITED REMEDY AND TO THE FULLEST EXTENT PERMITTED BY LAW. IN NO EVENT WILL SONIDO’S TOTAL LIABILITY ARISING OUT OF OR IN CONNECTION WITH THESE TERMS OF SERVICE OR FROM THE USE OF OR INABILITY TO USE THE SONIDO SERVICE OR CONTENT EXCEED THE AMOUNTS YOU HAVE PAID TO SONIDO FOR USE OF THE SONIDO SERVICE OR CONTENT OR FIFTY DOLLARS ($50), IF YOU HAVE NOT HAD ANY PAYMENT OBLIGATIONS TO SONIDO, AS APPLICABLE. Without limiting the foregoing, under no circumstances shall Sonido be held liable for any delay or failure in performance resulting directly or indirectly from acts of nature, forces, or causes beyond its reasonable control, including, without limitation, internet failures, computer equipment failures, telecommunication equipment failures, other equipment failures, electrical power failures, strikes, labor disputes, riots, insurrections, civil disturbances, shortages of labor or materials, fires, floods, storms, explosions, acts of God, war, governmental actions, orders of domestic or foreign courts or tribunals, non-performance of third parties, or loss of or fluctuations in heat, light, or air conditioning. 12. Governing Law and Forum Choice. These Terms and any action related thereto will be governed by the Federal Arbitration Act, federal arbitration law, and the laws of the State of California, without regard to its conflict of laws provisions. Except as otherwise expressly set forth in Section 13 “Dispute Resolution for Consumers,” the exclusive jurisdiction for all Disputes (defined below) that you and Sonido are not required to arbitrate will be the state and federal courts located in the Northern District of California, and you and Sonido each waive any objection to jurisdiction and venue in such courts. The following terms of Section 13 “Dispute Resolution for Consumers” only apply if you are an individual who is using the Sonido Service and Sonido Content for your own personal use and are not representing a legal entity. Mandatory Arbitration of Disputes. We each agree that any dispute, claim or controversy arising out of or relating to these Terms of Service or the breach, termination, enforcement, interpretation or validity thereof or the use of the Sonido Service or Sonido Content (collectively, “Disputes”) will be resolved solely by binding, individual arbitration and not in a class, representative or consolidated action or proceeding. However, if for any reason a Dispute proceeds in court rather than in arbitration, you andwe each waive any right to a jury trial. Exceptions and Opt-out. As limited exceptions to Section 13(a) above: (i) you may seek to resolve a Dispute in small claims court If it qualifies; and (ii) we each retain the right to seek injunctive or other equitable relief from a court to prevent (or enjoin) the infringement or misappropriation of our intellectual property rights. In addition, you will retain the right to opt out of arbitration entirely and litigate any Dispute if you provide us with written notice of your desire to do so by email at [email protected] or by regular mail at 2255 Glades Rd, Suite 324A, Boca Raton, FL 33431 within thirty (30) days following the date you first agree to these Terms of Service. Starting Arbitration. If you want to begin arbitrating a Dispute, you must send a letter to us at the following address: 2255 Glades Rd, Suite 324A, Boca Raton, FL 33431, requesting arbitration and describing the Dispute. If we want to begin arbitrating a Dispute, we’ll send such a letter to you at the email address or street address that you provided. Conducting Arbitration and Arbitration Rules. The arbitration will be conducted by the American Arbitration Association (“AAA”) under its Consumer Arbitration Rules (the “AAA Rules”) or a comparable arbitral body (e.g., JAMS), in the event the AAA is unable to conduct the arbitration). The AAA Rules are available at www.adr.org or by calling 1-800-778-7879. The arbitration may be conducted in writing, remotely (e.g., by videoconference) or in-person in the county where you live (or at some other location that we both agree to). Effect of Changes on Arbitration. Notwithstanding the provisions of Section 9 “Modification of the Sonido Service or Terms of Service” above, if Sonido changes any of the terms of this Section 13 “Dispute Resolution for Consumers” after the date you first accepted these Terms of Service (or accepted any subsequent changes to these Terms of Service), you may reject any such change by sending us written notice (including by email to [email protected]) within 30 days of the date such change became effective, as indicated in the “Last Updated” date above or in the date of Sonido’s email to you notifying you of such change. By rejecting any change, you are agreeing that you will arbitrate any Dispute between you and Sonido in accordance with the terms of this Section 13 “Dispute Resolution for Consumers” as of the date you first accepted these Terms of Service (or accepted any subsequent changes to these Terms of Service). Sonido respects copyright law and expects its users to do the same. It is Sonido’s policy to terminate in appropriate circumstances account holders who repeatedly infringe or are believed to be repeatedly infringing the rights of copyright holders. Please see Sonido’s Copyright Policy at https://www.sonido.fm/dmca/, for further information. The English language version of these Terms of Service is the version that governs your use of the Sonido Service and in the event of any conflict between the English language version and a translated version, the English language version will control. These Terms of Service constitute the entire agreement between the parties with respect to the subject matter hereof and supersedes and replaces all prior or contemporaneous understandings or agreements, written or oral, regarding such subject matter. Any waiver of any provision of the Terms of Service will be effective only if in writing and signed by Sonido. If you have any questions about these Terms of Service or the Sonido Service, please contact Sonido at [email protected].
2019-04-20T11:01:48Z
https://www.sonido.fm/terms/
When your tenant remains on your property without paying rent, he’s called a holdover tenant, also known as a tenancy at sufferance. But you can also consider him to be a squatter – a person who unlawfully occupies property you own. Sometimes squatters hold a certain attitude, as if they have rights to your property. And depending on the circumstances, and the local laws, they sometimes do. That’s right! If a squatter has been allowed to occupy a property for some time, they might have the same landlord-tenant rights as holdover tenants. Some jurisdictions are friendlier to squatters than others are. San Francisco, for example, has a tenants’ union that helps squatters stay on your property. Two brothers, using Airbnb, rented a Palm Springs vacation condo for six weeks. Once they were in, they texted the owner that they would not be leaving after the six weeks because they legally had the right to stay. And sure enough, California does a have a law stating that people who live on a property longer than 30 days are tenants. Unfortunately, as liberal as California is, it’s not the only state with this law. The owner in this case could not kick out her squatters after the six-week period. She hired a lawyer to evict them, a time-consuming and costly endeavor that landlords typically want to avoid like the plague. To add insult to injury, many rogue tenants decide to trash the place before departing as one last sign of disrespect. Let’s say you have rental property that has been vacant and you haven’t been to visit it for a while. When you do go … surprise! You find some uninvited and unwelcome residents living there. Can you kick them out? It depends. In some cities, if squatters turned on utilities at that address in their name, they might be able to claim residency. Even though these people are stealing your property, the police consider this a civil, not a criminal, matter. To get the squatters out, you would need to open a court case. Fun, huh? You probably know that most court systems aren’t exactly the epitome of efficiency. The case could take months or even years to resolve. This is the dark side of landlording, and it’s a huge flaw in the justice system. Courts could view those acts as self-help, or illegal, and could fine you. Regarding shutting off utilities, it’s probably better to keep them on anyway. Your squatter might improvise by using candles that could start a fire. He also might continue to use the bathroom facilities … even when they aren’t working. Enough said there. Try to avoid a squatter situation from happening. If you plan to leave your property vacant, make sure that it’s secure. You or a property management company should also check on the place regularly. Act immediately if you discover a squatter by calling the police. The longer you wait, the more likely it will be for the courts to think you gave this person consent to be there. If the police declare this a civil matter and won’t remove the squatter, start the eviction process. Once you serve the eviction notice, you could get lucky, and the squatter might leave. If not, you’ll need to file an unlawful detainer lawsuit, which is the formal way to evict. Make sure you follow your state’s laws. If the squatter is still sticking around after you’ve won your lawsuit, you’ll need to pay for a sheriff or police officer to get him out. Find out what you can and cannot do with any stuff the squatter might have left behind. You probably can’t just get rid of it and would need to follow proper procedure for your jurisdiction. Many times, you can place it in a storage unit at the tenant’s expense. If they don’t pay to remove the items, the storage facility will auction it off. Property owners need to do what they can to protect themselves against squatters. Unfortunately, the law favors squatters by treating them as tenants even though this is unfair to owners. It places the hardship on legal owners instead of on wrongful squatters. Until there are laws that give landlords immediate relief and that punish the squatters, we’ll see this problem continue. Have you ever had a problem with a squatter? If so, share your story in the comments below. I had a couple renting a unit, the day they moved out, they had a single man move in. As I approached the unit upon the couple leaving, the man opened the door and said he was living there now. He informed me that I would have to evict him and that he intended to live there for free until he was evicted. The way he figured it, he said, “it’ll take you about 2 months to get me out”. I immediately said I will call the police if you don’t get out. He said, “go ahead, I’m calling the police too”. This is a real bad feeling, I didn’t leave my property unattended, ever! I told the police, ” the renters moved out and a stranger gained entry into my property unknowingly to me”. Fortunately, the police gave him 4 hours to move out and he left. Whew! “You may have one overnight guest, 2 nights per month, or you will be evicted”. I had others… One single renter moved in 5 people. Evicted and out in 7 weeks via Court. Wow, what a story. Sorry that happened to you! How long did you have that couple as tenants? That was a strange thing to do to you. Your story is a really good illustration of why landlords are often very harsh and intrusive even about dictating rules for overnight guests. I suspect you may not feel so “mean” about , say, elderly parents visiting for two weeks. BUT, if you ARE amenable to that kind of situation, I would actually draft paperwork for all parties to sign, setting out the limits of relaxing your rules. Of course, if you are NOT amenable to such things, when renting your place don’t be afraid to say, “NEXT”!! Don’t ever give unwarranted license to someone else over YOUR property. It is SAD, but it seems you cannot trust people like you could in times past. Illinois: Own property next to a subdivision. We checked the property and noticed junk cars, (valuable antiques) stored there. The lot owner next to it told us to get off his property. He told us that he went to property records archives and found proof that he owns the property and that the property line is wrong. This is BS, since his lot is on a recent subdivision which was platted in the 70’s, not 1940. I am stuck wasting money on lawyers to prove that I own my property. (Title insurance has nothing to do with this.) My lawyer tells me that boundary disputes are age old ways to waste money. Property is only worth $10,000/acre, but stuck in a pickle. Filed with Sherriff about illegal trespass, but it was thrown out in court. No solution to this one yet. In year 3 of squatting. hire a biker-type from the local bar. about $500 and problem solved. a landlord friend of mine has used this method to great success. I like the way you think, Joh. Doing it “your way” requires a lot of planning and “finesse” though. Just Be Aware! Oh boy oh boy, you need a COMPETENT real estate attorney NOW . And be prepared to be unhappy with any answers you receive. It is very sad that legal thievery is condoned in many states I wish you the best of luck! BTW, after 3 years, it LEGALLY SPEAKING is not squatting, most likely . It is Adverse Ownership. Revolting. Thanks for the great articles. They have given me a heads up on many things. This is my 1st rental. It came with the house I bought. I rented it to a single person who attempted to move his new dog, then his girlfriend, and more dogs and a cat in after and not discussing this with me. I got them all evicted a few days ago. But what a nightmare. Now to move his junk to storage and clean up a month and a half of filth, trash, cigarettes and rotten clothes and rotting food. He just walked and left the toilet running full on. I know people are going to say that I’m a tough landlord after this, but enough. No more breaks for anyone. Can’t shut off utilities or change locks, but how about removing the door to the room? Doors are nice and all, but I’ve never seen them as a basic right. Also, if these people want to live in your house, go overboard. Invite them to dine with you, invite yourself to hang out in “their” room (unthreateningly of course), and definitely share your love of recorded political speeches from Eastern Europe in the 20’s and 30’s. High volume to get the full effect. We live in a small rural area in the country. Rented to 23 y.o with wife and 2 small children. They paid deposit and first months rent. After that— late rent …then no rent…made false claims of electricial not working well. (elec must work well they stayed an additional 7 mo without paying rent). know how to work the system. This guy works (under the table or 1099) paid with cash . I’m researching ways for landlords to find tenants and get back rent now. I should post something this month. Please check back at Landlordology. I always write it off. There are a million ways to beat or stall court judgements, and people who don’t pay rent don’t have any deep pockets anywhere. It’s good enough just to finally get them out. I always expect to lose some money when they leave, and no matter how clean they are, the whole place always needs deep cleaned, painted and many things redone. I have always made a modest profit, but is it worth it? I’ve been physically assaulted by two different tenants, both big young guys, and put up with being called every name in the book by the women. After 18 years of it, with laws now so unfavorable to landlords, I’ve pretty much had enough. PA: Have a home that I ‘allowed’ a relative to live, just to keep the property in order, $100 whopping bucks a month! Well, one year in the place is trashed. He moved a family of five in without my knowledge, 5 weeks of verbal requests for the family to leave and now two weeks of requests for all to leave. They stated “I know the law I have kids I can stay 5 more months if I want”!!!! … Finally called the State Police, they say call the magistrate, they said to have a witness that I handed them eviction notice. They have five more days, no sign of packing, the saga continues. My question is, how do these people, who I do not know, just found out their real name, have a RIGHT to stay on my property and the burden and cost is on me? It gets kind of messy when you allow someone to live in your house with no lease. Even messier when more people come in. And verbal requests are difficult to enforce. It’s important to have a lease for everyone, including family and friends. You might need to consult a lawyer to find out what to do now. I think when people live in a place without receiving a formal eviction notice, they gain the status of being tenants. Giving them a formal eviction notice is probably the best thing to do. I hope you get good tenants in next time! Guest-House: Never rented before, always let family stay – never asked for money. Husbands business slowed down, decided to rent the Guesthouse. Big Mistake. We were sitting ducks for a professional squatter. Even running the $50 background check, found that I should’ve have run the $100 background check. After day Five the signs were clear as to her intention – We gave a 30-day notice on a Month-to-Month Rent agreement, I contacted a lawyer and returned the rent and security deposit to Squatter. We are in the process of filing a UD; but she continues to threaten us legally and basically feel like hostages on our own property. It’s a bitter day when you realize the laws made to protect people can also be leveraged to exploit. I hoped you checked with your jurisdiction to determine whether you could legally rent out your guest house. If not, you’ll probably need to go through the eviction process if the tenant won’t leave on her own. You’ve already determined from your lawyer that you can’t keep the rent she owes you for living in your property, but besides that, you could be fined. I don’t know whether your guest house is legal to rent out or not, but if it isn’t, it might be possible to take steps to bring it up to code so that you can legally rent it. My unemployed sister & her alcoholic husband are leaving NYC (where they have squatted in an apartment for over a year) They are moving to TN, near my elderly parents & I’m so worried they will try to get into my parents house. Is there any advice you have to keep these freeloaders away? My Mom told them they are not allowed to stay at the house! Any advice is welcome, thanks! I’m not clear from your question whether your parents are still in the house or whether they’ve moved out and the house is now vacant. Squatting would apply only if your sister and her husband took up residence in your parents’ unoccupied house. If your parents are still in it, that’s a different issue. But if the house is vacant, there are security measures your parents could take to ensure no one decides to take up residence there. They can install security cameras. They can have someone make periodic visits to the home, or if there is no one available to do that, they could hire a company to perform that duty. And if the house is vacant, your parents might want to consider renting it out. My daughter and her husband bought a farm in the country two hours from their city home. They have used it as a vacation home and allowed her sister and husband to stay there and pay a nominal rent. However, the husband was inviting young people to stay there and formed a cult. My daughter was regularly being abused by this man until she escaped from him a month ago-filing for divorce. He has refused to move m has not paid rent. They posted an eviction notice-informed them they’d b conductng an inspection When they went to do so- “husband” locked the gate with bike locks- refused to let them on their property n the cult members were loading up all of my daughter’s furniture and possessions. Police were called- but they did nothing. Help! Wow Susan, What a story. I’m sorry all that happened. At this point, I believe all you can do is go through the eviction process. And if people steal from your daughter, she would need to file a police report or sue them. Thank you. I had I no idea until now how criminals are protected and law abiding citizens have little rights. It is a tragedy and very discouraging to know that the criminals occupying my daughters property can take whatever they want from homeowners- and all they are permitted to do is just “watch” Is there any recourse? Does anyone really care? My daughter rented a home in CA to my son’s friend and wife and their 5 children. Now the friend moved out and let the wife and 5 kids and his in laws and total strangers in my daughters house and I think they have no intention of paying any more rent, the total stanger mentioned they are squatters and they have more rights than my daughter to live in her home without paying rent. The total stranger answered the phone that was my son’s friend and impersonated him with texts.What can my daughter do? The name on the rental agreement was for my son’s friend and wife and 5 children. Not all these other people. Thank you. You are very helpful. My daughter said they won’t even answer the phone, she went to the house and they won’t even come to the door. Totally avoiding her. What does she need to do to evict squatters that have no intention of paying rent. Or filling out any information on themselves. They told her the house was leaking but they would not let her inside to assess the damage. My daughter is renting a house in Sonoma County, she lost her job and in order to help make ends meet allowed one of her boyfriend’s friend rent one of the bedrooms…3 months later she found another job. 2 months ago the police were called because this guy stole her work laptop and some other things, when the police opened up his trunk they found the stuff in there, although he denied it. He was arrested, released and then came back to the house. He’s refusing to move, she filed an eviction notice and he still won’t move, so now she has to spend $250 to file an UD. The cops and the DA say its a civil matter, really? I think if more squatters were carried out by the cops, we wouldn’t have any issues. Laws need to be changed! I was renting a room to a man. I was recieving rent through the mail. I did not know that he was not living there any more, but his ex girl friend was. He was paying for her until 4 months ago. I just recently found out about the girl living there. No one payed any rent for 4 months. I never had a agreement of any sort with the girl. She has caused problems for my other tenants. Is she considered a tresspasser because I never agreed to let her stay? Is that my best way to get her out asap? I’m in California. Read the part of this post under What You Should Do, and follow those steps. Good luck! If a squatter leaves for a whole week or some one who hasn’t paid in over 3 months.. Can they still come back or can I refuse there entry into my house and finally have the law on my side..??? I’m not sure what you’re asking. I think that you’re saying that your tenant stopped paying rent 3 months ago, and has now been gone a week? Check with a lawyer. You can probably change the locks at this point. Does your lease say something about how long a tenant can be absent from the property? Have you started eviction after the tenant didn’t pay rent? Is there still property left behind? All these things make a difference. My brother passed away 10/09/15. His girlfriend whom he did not live with was not in his will. The family felt sorry for her so we gave her permission to stay at his resident for a couple of weeks to grieve. This home was bought from our Mother. We have found out that my brother never finished this purchase with a quick deed. So this residence is legally my Mothers. As of today 01/17/16 the girlfriend/squatter is and will not move for this home. Mother is 92 and partially blind. She is a very sweet lady and has as her several times to move out. We have contacted an attorney with an eviction notice, which gives her 30 more days. Mom has not had her chance to grieve. She wants so badly to get into her sons home. This really just stinks. I’m sorry for your loss, and I’m sorry to hear that you have this added stress. You did the right thing in going through the eviction process. It’s a shame doing something nice for someone led to this. “so we gave her permission to stay ” then she isn’t a squatter. Your unsavory post left a crucial part of it out: how long she was allowed to stay. She is a squatter. And a sociopath. That’s what this article is about – How to Get Rid of Squatters. You could follow the steps outlined above. Follow the steps under What You Should Do in the above post. Let us know what happens! Good luck. I had an employee who was being abused by her boyfriend ask me if she could stay temporarily in an apartment that I had that was sitting vacant. Feeling sorry for her situation I agreed letting her know it would only be for a short time and asking that she cover the cost of the utilities. Several months later and nothing received for utilities and frankly hasn’t even said thank you. No lease, no security deposit. Is she a squatter legally? Can I enter the apt and act like she doesn’t live there as a means to drive her out? Does she have a legal right to a locked door? Privacy? Can I send someone else to start spending the night there too? You know, make her uncomfortable and want to leave. Apt is in CA. Follow the steps under “What You Should Do” in the above post. Also, read the gray box about California. Don’t resort to intimidation methods, such as the ones you mentioned, or it might backfire on you. Just stick with the steps outlined. Good luck! I live in an old family house that is not in great shape, but livable. I have two men staying here. I met them a year ago and they were homeless, although one of them has a decent job and the other collects social security. I asked them to contribute money to help with property tax and utilities. In October they started to complain about the cold weather and not help out, though I had the heat at 71 F and they were running space heaters. Now the end of January and they have not helped, refuse to leave. I also recently lost my job and am having trouble paying the bills. I am working on an eviction, in the meantime, is it ok for me to demand the space heaters (which belong to me)? They’ve issued threats of reporting illegal renting. The best thing to do is something you’ve already done: start eviction proceedings. The threat of illegal renting is pretty nervy: It was good enough for them when they needed a place. Anyway, just go through the eviction process. I’m not sure about the space heaters. If I were you, I’d just ask for them back. As long as you are providing heat in the house, you don’t have to provide space heaters, too. I found a family in my vacant home last week, I called the police and thanks God the police moved them out in 2 hours, we need to change the squatters’s right law in California otherwise this will happen again and again, they law should protect us, I purchased the home, I had mortgage and easily someone can take it without punishment, it should be criminal exactly as the home is not vacant. It’s good the police acted right away! This is the reason it’s not a good idea to leave a house vacant without at least having someone check on it regularly or hiring a management company to do so. I have a family renting my home and are now refusing to pay rent but not giving any reason as to why, refusing my calls and texts. Gave them a 60 day notice per the lease to move out last month before any of this even happened. What happens if they don’t comply with the notice? It’s too bad your tenants stopped communicating with you. However, there is no reason for not paying rent if they are still living there (check your state law on this). Also check your state law on when you can give an eviction notice. You can do this the first day a tenant is late in some states, or you might need to wait a certain number of days. You might want to start eviction proceedings as soon as you can instead of hoping they’ll move out on time and having to do it then if they don’t. If that happens, then you file an unlawful detainer lawsuit, usually through an attorney, and legally evict them. I notice that about one out of every three evictions actually gets contested and goes to court. This squatters stayed in home for few hours only, I was going almost every day, the best thing to do is to tell the neighbors and install alarm system, we need also to work on changing California’s law so these people should be punished as they invade occupant house which is crime, the scammers take advantage of this because no punishment, so what they lose, nothing and they might weeks or even months. This is bad if the tenant refuses to leave and stop paying the rent, you need to start eviction process, for this reason I do my best to check everything and also personnel judgment before I accept new tenant at least to decrease the risk of such this situation even I leave the home 2 o 3 months vacant better than accept not qualified tenant, best luck and God bless you. We had a extended family member who had moved in last yr knowing he was going to pull a scam and not use tenant laws to stay and not pay rent. He finally moved out willingly in Jan but then came back saying he is still a tenant because a eviction wasn’t filed. He was gone a month but the police said I have to let him come back. How long does someone have to be gone to stop being considered a tenant? He had made threats and has a history of mental disease (which I found out after). What happens if I refuse to let him in? They arrested him for comments made but I am worried he will come back. He has a backpack he gave another family member here. I can’t comment on this particular situation since I don’t have all the details. You might need to evict. Check with a local attorney on what to do. I’m with you regarding questioning why it has taken 9 years to sell the house! Since your friend has a lawyer, this question is best reserved for them. It’s difficult for me to comment on individual squatter situations more than the generalities I gave in the article. My father is a renter in California. My sister became ill and my dad stayed with her for a few weeks to take care of her while paying rent at his rental. Unfortunately while he was away his ex wife and her boyfriend broke into the garage and moved their belongings in. Once my dad found out he gave them time to find a new place to avoid conflict with the kids. Needless to say they never moved out. Things have gotten worse and his ex wife and her boyfriend have started using drugs. CPS was called out and toured the home. They informed my dad that his ex wife and her husband are not to be living with him and the children due to their lifestyle. My dad has called the police for help but was told he had to evict them. How do we do this? If the police would not help you, nor CPS, then the only other option is to talk to a lawyer. Since your dad is not the landlord, he can’t really evict another tenant in court. He could change the locks on them, but then he risks having the police called on him. I just wanted to add that tenants, per many lease agreements, need to inform the landlord if they will be away from the property for extended periods, say 7 days or more. This is so the landlord can take steps to secure the property and to check on it regularly. Not sure whether your dad told your landlord or not, but when you say that your dad gave the ex and bf time to move out, that wasn’t your dad’s place to do that. The ex and bf were not on the lease, meaning your dad has now breached the lease. Bottom line: it’s never a good idea if you’re a tenant to leave for a few weeks w/o telling the landlord or to allow others to stay in the property for an extended time. In California, that is not true at all. A tenant in California is in legal possession of the property, which means that they can legally evict any subtenant roommates or squatters just like a landlord can. Attorney fee lists often show a separate price for this type of eviction service.
2019-04-21T10:49:00Z
https://www.landlordology.com/how-to-get-rid-of-squatters/comment-page-1/
If life is chemistry, then LOVE and EMOTION is also chemistry. We know that different emotions are triggered by specific chemical reactions that occur in the brain, although we certainly don’t experience love as a bundle of brain circuits firing away in our head. Instead, we experience or ‘feel’ the attractiveness, the warmth, the kindness, the beauty, and also the pain, of love with intense joy, passion, tenderness, hurtfulness, and jealousy. But there is also a flip side. When things go wrong, when we suddenly break off an intense romance, or dissolve a long-standing relationship, we suffer the difficult pain of jealousy, hurtfulness, confusion and loss. These aching emotions are equal in intensity to the positive joys and passions of love, and can cause profound sadness and distress. Painful emotions are also associated with chemical reactions in the brain. All of these emotions, taken together, form an elaborate dance of courtship and intimacy that can often feel overwhelming. But the payoff is spectacular. If we are successful, it means we are headed for long-term joy and contentment, and perhaps the creation of future offspring. When it comes to love, people across the world share the same kinds of intense, emotional, experiences. Learning to cope with these extreme emotions is part of what it means to be human. They are part of our evolutionary history, part of the basic instincts that have been passed on genetically from one generation to the next. What makes us care deeply about some people and not others? Why are we instinctively attracted to certain people and less interested in others? Our unique differences and tastes as individuals determine our likes and dislikes; this is as true of the people we choose to be with as it is of our taste in music, food, or a dozen other interests. Forming a loving relationship sometimes requires years of shared experience. On the other hand, parents who see their newborn for the first time love their baby instantaneously, and without condition or qualification. This is a kind of love that lasts a lifetime, a sublime contentment without equal. This immediate and intense attachment is necessary because human infants are completely helpless until they can walk, and because our parents would consider killing us, if not at the age of two, then certainly during adolescence! What about ‘love at first sight’? If you ask a classroom of college students, as I have often done, whether or not they believe in ‘love at first sight’, the class as a whole, tends to be split. Some say yes, others say no. And gender doesn’t seem to be an issue; males and females are equally divided on the subject. If love is so powerful, then why do most couples fight so much, and why are there so many divorces? How do arranged marriages, which are common in many cultures of the world, compare to freely choosing a partner? Believe it or not, arranged marriages have a better track record of success than conventional marriages. Why is this? Statistics show that the largest divorce rates occur when couples marry early in life. Sociologists have also found that childlessness, which can lead to loneliness and weariness, plays a major role in divorce. But the real answer is that love is complicated, and we don’t always know how to handle our emotions, which can lead to poor judgment and rash decisions. Animals come programmed with basic emotions such as fight or flight, anger, appeasement, disgust, fear, and surprise. In humans, these instincts are automated in the lower brain. But we, along with other mammals, have also evolved more complex emotions, such as happiness and unhappiness, guilt and shame, longing and jealousy. Still, in humans, there are higher functions of the brain that involve emotions such as vengeance, pride, nostalgia, forgiveness, beauty, and spirituality. Every human looks to satisfy the basic need for food, shelter, and security. Beyond that, we all share a quest for happiness. The Dali Lama teaches that the purpose of life is happiness. The American founders declared, in the Declaration of Independence, that the pursuit of happiness was an inalienable right. Both are revolutionary ideas. Happiness is something we all desire. So what is happiness exactly? We know that everyone has ideas about personal happiness. But there must certainly be some shared criteria that we can point to. I don’t know of any clinical definition for happiness, but here are three things, taken collectively, that may describe a state of contentment or true happiness. The first is that you are fundamentally loved and appreciated by family or friends, and that you are generally accepted by society. Secondly, that you are able to realize your potential as an individual, to maximize your intellectual, emotional, and physical capabilities. And finally, that you are able to adapt to your immediate surroundings, to be flexible under a variety of circumstances and situations, and to adjust to these conditions without necessarily inviting compromise. Adaptability is a secret of life, of all living things. When things in our life don’t work, when things fall apart, our self-esteem is lowered; we become stressed, angry, disappointed, depressed. The result is often loss of pleasure, joy, and as time goes by, contentment or happiness. Figuring out how to make things work is essential for our success and happiness. When we are able to satisfy our fundamental needs, establish realistic goals, and follow our dreams, pain and stress are diminished and contentment fills the void. The implication is that humans are genetically predisposed toward a state of contentment, that most people are ‘hardwired’ to be happy. Decades of research in child psychology have shown that healthy babies are content until a basic need goes unsatisfied, or when pain or discomfort intervenes. We are born into an initial state of well-being. Only later do we allow pain and stress to block natural wellsprings of contentment and happiness. But there are things that get in the way of our happiness, including classic times of struggle. As adolescents, our number one job is to break away from our parents so that we may become independent, mature adults. Teen-age years are difficult for everyone, and often happiness doesn’t seem to be within reach. In our twenties, our primary goal is to discover how best to fit into the world, how to define our strengths and weaknesses and learn to make them work for us. This is no small task, because most of us don’t yet know what we want to do with our lives, and generally don’t get the help we need to forge a path necessary for our long-term health and well-being. It also doesn’t help that our cultural institutions have agendas that are often counter to our developmental needs. Parents, for all of their love and support, really want their children to be safe. Schools today are mostly career factories. Business wants your money. Government wants your vote. The church wants your allegiance. Everybody wants something. So how do we follow our passions, or know what is really best for us? And by the way, at the same time young adults are learning how and where they fit into the world, they are having to navigate the whirlwind forces of dating and long-term partner selection. There are clearly times in our lives when happiness is tormented by circumstance. Ill-fate, poor judgment, and bad luck is the stuff of human legend. As a rule, people tend to be philosophical. It is also the nature of the human spirit to seek the divine, the sublime. Many among us search for spiritual awareness and enlightenment. There are even those who abandon family and career in pursuit of a deeper inner experience. The search for inner satisfaction is an instinct, a human drive. It is different from other emotional states such as joy, anger, fear, or anxiety. The enjoyment of fine art in its most expressive forms, the height of romantic love, the gift of birth, and the personal tragedy of death are human experiences which have the power to overwhelm our emotions. As we experience these events for the first time, it is our nature to question their deep meaning. Most of us have known moments of deep consciousness, when we experience ourselves as completely connected to the present. We have had enlightened moments of physical activity when we are ‘in the zone’, and we have all known moments of discovery or creativity. It is also common to have experienced a heightened awareness while interacting with another person, or within a group. Any of these examples, including romantic love, listening to a memorable concert, solving a difficult problem, helping someone, creating something, or participating in an inspired sports event or group activity may provoke the sensation that the world is, indeed, bigger than ourselves; or they may remind us that the whole is greater than the sum of its parts. Inner joy, or what some would call spirituality, is not just a good feeling, or feeling good. It is a deep contentment in which intense thoughts and emotions combine to form a powerful and integrated experience. These feelings may be triggered by a joyous experience, by long-term sensitivity to deep human concerns such as birth, death, morality, or war, and especially by our own mortality. The joy of inner peace combined with sensitive feelings toward others promotes individual satisfaction and provides the species with a clear survival advantage. Balancing hope and faith against the fears and anxieties of life provide a sense of long-term stability and social harmony. We often hear the phrase ‘beauty is in the eye of the beholder’. Yet, as the French mathematician Blaise Pascal pointed out, beauty is the result of a harmonious relation between our aesthetic nature and the subject that delights us; it is always a two-way street. Although there are a great many differences among individuals, as a group humans tend to share certain criteria for what is acceptable behavior, what is normal intelligence, and what is beautiful. We know that our experiences of beauty take place in a specific region of the brain (medial orbital) located in the frontal cortex. Most of us appreciate the beauty of a sunset, a panoramic vista, a great painting or photograph. These are instinctive tendencies, but for them to blossom, appreciation must be nurtured and kept alive. Beauty and desire originated early in evolution with attractive colors, shapes, movements, and sounds adapted by creatures that used them for the purpose of luring mates. Bees find flowering plants irresistible. Does that mean that bees find colorful plants beautiful? There is no way to know. Female birds are attracted to beautiful colors displayed by their male counterparts. Is this desire? More than likely the visceral attraction of insects to flowers, female birds to brightly colored males, as well as similar mechanisms in other species, are the precursor to chemical brain states that arouse in us a sense of beauty and desire. But why is beauty so fleeting? What causes our experience of beauty and desire to wane over time. All of us have experienced the emotional letdown when the intensity of a new romance begins to fade, or when a piece of music that we have listened to a little too often no longer has the same effect on us it once did. One answer is that romantic love, attraction, and desire are dangerous states to be living in for very long. Intense desire and attraction are distracting; they render us vulnerable and may cause injury or even threaten our survival. Emotions serve us well. They are responsible for our passions and pleasures, for ‘letting off steam’ when we become angry or frustrated, and for our ability to defend ourselves, and to bond with others. But emotions can also act as cause for conflict or disruption, for example, when we take things too personally, or guard our emotions too closely, both of which may create stress within ourselves and for those around us. Why do we often experience emotions that seem like they are more destructive than they are useful? Expressing anger, for example, is not pleasant and it causes pain, yet we see that it plays an important role in letting others know how we feel. On the surface, jealousy seems to cause more pain and harm than good. Yet it helps, in a general way, to keep close relationships intact. In a similar way, we are cautioned by shame and guilt to be better companions and citizens. We are easily swayed by our emotions. It is easy for us to be guided by outside interests such as advertising or popular media, and by peer pressure, even when the products and ideas sold to us are clearly not in our best interests. And what about our highly emotional allegiance to sports teams, homeland, political affiliation, religion, and taste in music? What causes us to become so irrational when it comes to defending these intense passions? We will look at this further when we discuss society and culture. Part of growing up, of becoming emotionally ‘intelligent’ is learning to balance our emotions with rational thought, planning, and a healthy respect for those things that are sustainable for ourselves and for society. Nostalgia is an emotion that everyone experiences. And it tends to get stronger as we get older. There are words for nostalgia in every known language. Looking back on an important childhood event such as a first kiss, favorite place to escape, or the neighborhood or school where we grew up, provokes strong emotions that are bittersweet. Billions of dollars are spent each year to satisfy the almost unquenchable thirst for our need to revisit our childhood. For many, school reunions are almost impossible to resist. Movies, television and other forms of popular media have a field day returning us to our recent past. Perhaps reality is too difficult. Maybe these feelings offer a simple escape from the hardships of everyday life. Although the feelings of nostalgia may connect us to the past, they can also lead us away from the present and distract us in profound ways. So why are these nostalgic feelings so common and so intense? What possible survival function could they serve? Humans are neotenous creatures, we retain some adolescent features throughout our adult lifetime, and we may simply be vulnerable to intense feelings. Or perhaps our feelings of nostalgia are instinctive, artifacts left over from our early evolutionary ancestry. For example, many species of fish eventually return to the streams where they were born to lay their eggs. Salmon, for example, after swimming thousands of miles over a lifetime, return to the exact spot where they were hatched, to lay their eggs and to die. Nostalgia may be a similar impulse, inherited from one of our earliest ancestors. A word about kissing. The act and ritual of kissing occurs in most cultures of the world. Yet kissing may mean something different to different groups of people, or to individuals, depending on how it is done, who is doing it and what their motives are. Is kissing instinctive or cultural? With 90 percent of the world engaged in kissing rituals, it is likely that instinct determines behavior in this case. Although, in the Himalayas and some African nations, kissing has been historically discouraged presumably to protect the local population from bacteria. Albert Einstein suggested that all human motivation, and I suppose we could say much of human emotion as well, is driven by fear or longing. Because of new scientific research methods, including brain scan technology, we are able to look deeply into the emotions that affect us everyday. Although we have much to learn, we continue to expand our knowledge based on what we are discovering about human behavior, our evolutionary background, and our biology, including the brain chemistry that drives our emotions. I leave a leave a response each time I especially enjoy a post on a site or I have something to contribute to the discussion. I browsed. And on this post Love and Emotion | Curious. As I website possessor I believe the content matter here is rattling great , appreciate it for your efforts.
2019-04-20T07:05:34Z
https://naturescienceart.org/2011/10/23/love-and-emotion/
I invite you to resume our studies together in the book of Acts. We will look at the twelfth chapter -- a very exciting passage. I am sure that you had not been a Christian for very long before you discovered that the enemy with whom we wrestle has a very disconcerting way of striking when everything seems to be going well. Just when you think the path has smoothed out and that you are having a great time in the Lord, with nothing but blessing ahead -- then everything seems to fall apart at once. That is confirmation of what the Bible tells us is the truth: We are not wrestling against flesh and blood, but we are engaged in a life-or-death struggle against principalities and powers and wicked spirits in high places, who are able to unleash a vicious, lashing attack against us -- just when we think things are going well. This obviously indicates that James was an important leader in the church, although his name has not been mentioned previously in the book of Acts. His brother was John. You know James and John. How often their names appear together in the Gospel accounts! These were the brothers whom Jesus very affectionately called "sons of thunder" (Mark 3:17) because of their swashbuckling dispositions. They were loudmouths, and were probably the youngest members of the apostolic band -- in their late teens when Jesus called them. They were firebrands. They wanted to call fire down upon the villages that would not listen to them. They were filled with zeal, and it is interesting to watch how the Lord worked with these two young men. John he particularly loved and drew close to himself, but both were strong in his affections. It was these two boys who came to Jesus with their mother and asked to be granted positions at the right and the left hand of the throne of glory when Jesus came into his kingdom. Do you remember what he said to them? He asked them a question: "Are you able to drink the cup that I am to drink?" (Matthew 20:22, Mark 10:38). By that he meant his violent death on the cross. And, with typical teenage enthusiasm and ardor they said, "Yes, we're able." Jesus told them, "You shall indeed drink my cup, but to sit at my right hand and at my left is not mine to grant, but it is for those for whom it has been prepared by my Father" (Mark 10:39). In those words, "You shall indeed drink my cup," he indicated that these men would die violent deaths. What a remarkable story! You can see how unexpected this is. I think Peter really expected to be executed. But, remarkably, he slept. He had been there for several days, and this is not the first time he has been in prison, but it is, as he knows, the last night before his scheduled execution. Yet he is sleeping peacefully, obviously trusting that God will glorify himself either by his death or by delivering him so that he can live. Yet when the angel comes Peter is taken by surprise. Now Herod was angry with the people of Tyre and Sidon; and they came to him in a body, and having persuaded Blastus, the king's chamberlain, they asked for peace, because their country depended on the king's country for food. On an appointed day Herod put on his royal robes, took his seat upon the throne, and made an oration to them. And the people shouted, "The voice of a god, and not of man!" Immediately an angel of the Lord smote him, because he did not give God the glory; and he was eaten by worms and died. The Jewish historian, Josephus, also records the death of Herod. He describes this occasion when Herod met with the people of Tyre and Sidon in what we now call Lebanon. These people were dependent upon Judea, and especially upon Galilee, for food. So when the king came out, dressed in his royal robes, they flattered him. When he spoke to them they cried out, "Why, this is a voice of a god, and not a man!" And this pompous, vain king believed them. It is almost incredible -- the tragic, twisted mentality of a man like this, who could actually believe that he had so much power that he had become a god. But this was not uncommon in those days, nor is it in our own day. This, of course, is exactly what happens in any man's mentality when he begins to think of himself as what we call a "self-made" man. Sometimes you talk to men who own a lot of property and they will tell you, "Well, I worked for it. I produced it all myself. Nobody helped me." They are falling into the same tragic error as this vain and fatuous king who imagined that he had power in himself to operate. But Luke tells us that he was immediately stricken by an angel of the Lord, and he was eaten of worms and died. I do not know what Luke's exact diagnosis is here, but some sudden catastrophe befell Herod and, as Josephus tells us, within two or three days he died. What does this mean? This is God's way of demonstrating the ultimate folly of the person who thinks that he can live without God, who thinks that we are not dependent people. This is the tragedy of mankind. You can frequently discern from our newspapers or from our television programs that, as a people, we imagine that we have what it takes to produce all that life requires, and that we do not need anyone or anything else -- especially God. The great tragedy of the American nation is that, more often than not, in a sense, we are saying to God, "Please, God, I'd rather do it myself!" We want to do it all ourselves. But God strikes, oftentimes, to remind us that our very life, our very breath, all that we have and are, is coming from him, and that we are fools to think that we can exist and live, act and react, on our own -- that we have some power of our own, apart from him, that we can operate on. This episode shows how blinded, how distorted, how tragically twisted becomes the thinking of men who depart from a sense of dependence upon God. God oftentimes teaches lessons like this to whole nations. I sometimes think that is the meaning of the tragic assassinations, brought upon us this past decade, of some of our national leaders. It is God's way of saying to America, "You don't have what it takes. You can't live independently of me." As we review the events of this chapter, there are some questions that come to mind. Why has Luke chosen to put these three things together in this account? And, of course, the pre-eminent question that emerges from this whole story is the one which faces us right at the beginning. Why was James killed, and Peter delivered? Why did God allow the brother of John to be put to death, while Peter he saved by angelic interference? Could he not have saved James as well? There is no question that he could have. Well, why didn't he? The only answer that this chapter suggests is found in Verse 5. It is the key to the chapter. That is the difference. Peter was kept in prison, just as James. But the difference was, "but." (That is always a crisis word. It indicates a change in direction.) "But earnest prayer to God was made for Peter by the church," and as a result, Peter was set free. You say, "What difference does it make? Couldn't God just have set Peter free anyhow? If God determined that James would die and Peter would be set free, what difference did the prayer of the church make?" Many people would say that. But let us never forget what James (not this James, but Jesus' brother, who wrote The Epistle of James) says: "You have not because you ask not" (James 4:2). You see, in his wisdom God has designed that his people shall participate in what he does. Though he did set all the apostles free without any prayer, as recorded in Chapter 5, and could have done so with James, nevertheless he is impressing upon his people here that when danger threatens the program of God, or the people of God, it is a call to prayer. God will hear that prayer and answer it and set people free, when he would not have done so otherwise. This is the great lesson of this chapter to the church. We are not to take the events of our day for granted, as though there were nothing we could do about them. Prayer becomes a mighty, powerful thrust on the part of the people of God, to change events. That, above all else, is what this message is shouting at us. Basically, prayer is the most natural and normal response of a heart that is dependent upon God. If you are really counting upon God to do something, then you will pray about it. You will trust him; you will communicate with him. If you are not counting on him, you will not pray. If you are really counting on something else, or on someone else -- if you think that by your own clever maneuvering you can get out of a situation, or if you are trusting other human beings to come through -- you will not pray. Or if you do, your prayer is but a ritual, an empty form, a perfunctory utterance that means nothing. The basic motive of prayer is a sense of dependence. If you really think that God, and God alone, can work, and that there are elements of a situation in which only he can change things -- then you pray. This is what happened to this early church. When they realized that James had been put to death, and that this vicious attack of the enemy could be successful, it suddenly crystallized in their minds that they had a part to play in God's program. They were to go to God in earnest prayer that Peter might be delivered. And God set him free in a wonderful way. This chapter highlights for us several things that prayer does, and they are basic for us to learn today. God works in the same way today as he did in these first century days, and he will respond to our prayers in very much the same way. That does not mean that everything we pray for will be granted. Sometimes God overrules our prayers. But prayer does other things as well, even when the things for which we pray are not granted. It is obvious, first of all, that prayer has the ability to postpone or to delay the judgment of God -- or the act of an enemy, the victory of Satan, as in this case. James was taken, but Peter's execution was postponed to a later day. This is a primary power of prayer. It can put off something which is impending and threatening right at the moment. It may not remove it entirely, but it can change the time schedule. That is the teaching of the Scripture about prayer, all the way through. We are facing the imminent appearance of the events predicted in the Bible for the last days. But if you have read human history you know that there have been times in the past when the world has approached the brink of the precipice of the last days. There have been times when it appeared to the whole world that these predictions were about to be fulfilled. Threatening figures have appeared on the horizon whom many have mistakenly identified in their times as the antichrist. And yet each time, because of the grave dangers present, God's people woke up and began to cry out to him -- a spiritual awakening came -- and the world moved back from the brink of extermination and destruction. Once again in our day we are approaching the precipice. Perhaps we are further over the edge toward the ultimate disaster than we have ever been before. But, once again, God's people are waking up, crying out to him. This is the only hope in our day -- that once more God will turn the clock back a bit, delay the schedule, bring us back from the brink, and allow perhaps another generation to grow up in relative peace and security, liberty and freedom, to know the glory of the gospel in its delivering power. It is my conviction that, in order for God to allow the events of the last days finally to come to pass, he must remove his Church from the earth. In order to take the salt out of society he will remove the Church and thus allow the final display of man's evil and enmity to come to full fruition in the last days. But prayer can delay it. Is that not the lesson that Hezekiah teaches us? King Hezekiah was lying on his deathbed and God sent the prophet Isaiah to tell him that he was going to die. Hezekiah turned his face to the wall and began to pray earnestly to God to spare him. And God stopped Isaiah on his way out of the palace, turned him around and said, "Go back to the king and tell him that because of his prayer, I have granted him an additional fifteen years of life," (Isaiah 38:5). Isaiah was given the great sign of the turning back of the sun's shadow on the sundial as proof of what God would do. Do you see how prayer can postpone judgment? It can do so individually; it can do so nationally. There is a second suggestion in this passage which related to the matter of the church at prayer. It is the fact that Peter is at peace though he is in prison. How could he sleep on the night of his execution? If you were to be executed tomorrow morning, and you knew it, knew that your head was to be chopped off, would you have a good night's sleep tonight? You'd be ordering Sominex by the bottle from the nearest drug store, wouldn't you? But Peter slept, and slept peacefully. It was not that he was such a great man of faith. Peter was, like us, oftentimes weak and fearful. It was because the church was praying for him. That is where he derived strength. That is why God gave him peace of heart. That is why you find the Apostle Paul urging the people to whom he wrote to pray for him. "Hold me up in your prayers that I might be bold, and that I might have peace..." (Ephesians 6:18-20). Prayer does that for those undergoing times of difficulty and trouble. Third you notice that prayer can produce sudden changes, like the death of Herod. I do not think the church was praying for the king to die. We are not told in Scripture to pray that way about those in authority. But the church was praying that God would intervene and work his will. As a result of their intercession, God was, in a sense, free to act in unusual and remarkable ways. This vicious, cruel tyrant, before whom human life meant nothing, was suddenly removed from the scene, because of a people who were responsive to God and dependent upon him, and who cried out to him. This is what Paul means in Romans 8 when he says that we do not know how to pray as we ought, oftentimes Romans 8:26). We do not know what to ask for. The situation is too complicated and intricate for us. How can we understand it? But Paul says that as we pray the Spirit of God helps us in our weakness and awakens deep longings and yearnings in our hearts for which we cannot find words. And God the Father, who knows and can read our hearts, reads there the mind and will of the Spirit, and he answers by sending the very events that are needed to work out the situation according to his purpose. That is what prayer does. There is a mighty, mysterious element to prayer which, even as God's people gather together and open their hearts and share their feelings with God, is somehow creating an atmosphere in which God can work in sudden, remarkable ways. I just heard a most unusual story about an event that occurred at Woodleaf Young Life Camp a week or so ago when our pastor, Dave Roper, was there. One night at about eleven o'clock the camp trumpeter was practicing out by the creek, all by himself. That is where trumpeters should practice. He finished his practice, put his trumpet away, and came back into camp. But he was seized with an urge to play his trumpet in the middle of camp. Now, any of us can understand that sort of urge, but this boy felt that it was from God. And so, in obedience, he took his trumpet out, put the mute in, and started to play. He thought to himself, "What shall I play?" The thought immediately came to him, "Play 'Taps."' So he played "Taps" with the mute. Then an inner voice seemed to suggest that he take the mute out and play it out loud. So he did. At eleven-thirty at night, in the middle of the camp, he played "Taps" out loud, put his instrument away, and went to bed. The next day another young man gave testimony to what had happened to him the night before. He had come to the camp, belligerent and rebellious. He was not a Christian and he didn't like what was going on. He decided he had enough of it, and at about eleven-thirty he was walking out of camp, heading out to the highway to hitchhike home, when suddenly he heard somebody playing "Taps" on a trumpet. "I knew 'Taps' was the song you play when somebody dies," he said, "so I said to myself, 'Who died?' And then the thought hit me, 'Well, I know who died; it was Jesus. Jesus died, and he died for me."' And he sat down by the road and received the Lord into his heart. The word of God grew and multiplied, despite all the opposition. And two men were there whom God particularly wanted to instruct in how to handle tough situations -- Barnabas and Saul. They were keen observers of all that took place in Jerusalem at this time. Saul would draw upon his experience many times later in his turbulent career -- remembering how God could work to set people free, to open prison doors, to change a situation, to move a tyrannical ruler -- all in response to the believing prayer of his people. That is what prayer can do. May God grant that we will find out, in our day, how it can work. Let us close in prayer. Our Heavenly Father, we pray that you will teach us how to pray in days like this. We don't always need to know what to pray for, but we do so desperately need to pray. We need to pray for each other, to pray for our friends, to pray about the dangers that beset us as a nation and as a world, as a people. Lord, help us just to open our hearts and be honest before you. For we know that in the mystery of prayer, a mystery that none of us can fathom, something is happening that makes possible the activity of your Spirit to work in unusual ways, ways that otherwise would never happen. Make us that kind of dependent people, we ask in Jesus' name, Amen. Then Herod went from Judea to Caesarea and stayed there a while. 20He had been quarreling with the people of Tyre and Sidon; they now joined together and sought an audience with him. Having secured the support of Blastus, a trusted personal servant of the king, they asked for peace, because they depended on the king's country for their food supply.
2019-04-18T17:06:52Z
https://www.raystedman.org/new-testament/acts/when-prison-doors-open
Transcript of a sponsored podcast panel discussion from The Open Group 2011 U.S. Conference on newly emerging cloud models and their impact on business and government. We now present a sponsored podcast discussion coming to you from The Open Group 2011 Conference in San Diego. We're here the week of February 7, and we have assembled a distinguished panel to examine the expectation of new types of cloud models -- and perhaps cloud specialization requirements -- emerging quite soon. Then, second, we're going to look at why one-size-fits-all cloud services may not fit so well in a highly fragmented, customized, heterogeneous, and specialized IT world -- which is, of course, the world most of us live in. How much of cloud services that come with a true price benefit -- and that’s usually at scale and cheap -- will be able to replace what is actually on the ground in many complex and unique enterprise IT organizations? What's more, we'll look at the need for cloud specialization, based on geographic and regional requirements, as well as based on the size of these user organizations -- which of course can vary from 5 to 50,000 seats. Can a few types of cloud work for all of them? Here to help us better understand the quest for "fit for purpose" cloud balance and to predict, at least for some time, the considerable mismatch between enterprise cloud wants and cloud provider offerings, is our panel: Penelope Gordon, co-founder of 1Plug Corp., based in San Francisco. Welcome, Penelope. Gardner: We're also here with Mark Skilton, Director of Portfolio and Solutions in the Global Infrastructure Services with Capgemini in London. Thank you for coming, Mark. Gardner: Ed Harrington joins us. He is the Principal Consultant in Virginia for the UK-based Architecting the Enterprise organization. Thank you, Ed. Gardner: Tom Plunkett is a Senior Solution Consultant with Oracle in Huntsville, Alabama. Tom Plunkett: Thank you, Dana. Gardner: And lastly, we're here with TJ Virdi, Computing Architect in the CAS IT System Architecture Group at Boeing based in Seattle. Welcome. Gardner: Let me go first to you, Mark Skilton. One size fits all has rarely worked in IT. If it has, it has been limited in its scope and, most often, leads to an additional level of engagement to make it work with what's already there. Why should cloud be any different? Skilton: Well, Dana, from personal experience, there are probably three areas of adaptation of cloud into businesses. For sure, there are horizontal common services to which, what you call, the homogeneous cloud solution could be applied common to a number of business units or operations across a market. But we're starting to increasingly see the need for customization to meet vertical competitive needs of a company or the decisions within that large company. So, differentiation and business models are still there, they are still in platform cloud as they were in the pre-cloud era. But, the key thing is that we're seeing a different kind of potential that a business can do now with cloud -- a more elastic, explosive expansion and contraction of a business model. We're seeing fundamentally the operating model of the business growing, and the industry can change using cloud technology. So, there are two things going on in the business and the technologies are changing because of the cloud. Gardner: Well, for us to understand where cloud fits best, and perhaps not so well, let's look at where it's already working. Ed, you talked a lot about the U.S. federal government. They seem to be going like gangbusters to the cloud. Why so? Harrington: Perceived cost savings, primarily. The federal government has done some analysis. In particular, the General Services Administration (GSA), has done some considerable analysis on what they think they can save by going to, in their case, a public cloud model for email and collaboration services. They've issued a $6.7 million contract to Unisys as the systems integrator, with Google being the cloud services supplier. So, the debate over the benefits of cloud, versus the risks associated with cloud, is still going on quite heatedly. Gardner: How about some other verticals? Where is this working? We've seen in some pharma, health-care, and research environments, which have a need for a lot of elasticity,that it makes sense, given that they have highly variable loads. Any other suggestions on where this works, Tom? Plunkett: You mentioned variable workloads. Another place where we are seeing a lot of customers approach cloud is when they are starting a new project. Because then, they don’t have to migrate from the existing infrastructure. Instead everything is brand new. That’s the other place where we see a lot of customers looking at cloud, your greenfields. Gardner: TJ, any verticals that you are aware of? What are you seeing that’s working now? Virdi: It's not probably related with any vertical market, but I think what we are really looking for speed to put new products into the market or evolve the products that we already have and how to optimize business operations, as well as reduce the cost. These may be parallel to any vertical industries, where all these things are probably going to be working as a cloud solution. Gardner: We've heard the application of "core and context" to applications, but maybe there is an application of core and context to cloud computing, whereby there's not so much core and lot more context. Is that what you're saying so far? Virdi: In a sense, you would have to measure not only the structured documents or structured data, but unstructured data as well. How to measure and create a new product or solutions is the really cool things you would be looking for in the cloud. And, it has proven pretty easy to put a new solution into the market. So, speed is also the big thing in there. Gardner: Penelope, use-cases or verticals where this is working so far? Gordon: One example in talking about core and context is when you look in retail. You can have two retailers like a Walmart or a Costco, where they're competing in the same general space, but are differentiating in different areas. Walmart is really differentiating on the supply chain, and so it’s not a good candidate for public cloud computing solutions. That might possibly be a candidate for private cloud computing. But that’s really where they're going to invest in the differentiating, as opposed to a Costco, where it makes more sense for them to invest in their relationship with their customers and their relationship with their employees. They're going to put more emphasis on those business processes, and they might be more inclined to outsource some of the aspects of their supply chain. A specific example within retail is pricing optimization. A lot of grocery stores need to do pricing optimization checks once a quarter, or perhaps once a year in some of their areas. It doesn't makes sense for smaller grocery store chains to have that kind of IT capability in-house. So, that's a really great candidate, when you are looking at a particular vertical business process to outsource to a cloud provider who has specific industry domain expertise. Gardner: So for small and medium businesses (SMBs) that would be more core for them than others? Gordon: Right. That’s an example, though, where you're talking about what I would say is a particular vertical business process. Then, you're talking about a monetization strategy and then part of the provider, where they are looking more at a niche strategy, rather than a commodity, where they are doing a horizontal infrastructure platform. In the telecom sector, which is very IT intensive, I'm seeing the emergence of their core business of delivering service to a large end user or multiple end user channels, using what I call cloud brokering. Gardner: Ed, you had a thought? Harrington: Yeah, and it's along the SMB dimension. We're seeing a lot of cloud uptake in the small businesses. I work for a 50-person company. We have one "sort of" IT person and we do virtually everything in the cloud. We have people in Australia and Canada, here in the States, headquartered in the UK, and we use cloud services for virtually everything across that. I'm associated with a number of other small companies and we are seeing big uptake of cloud services. Gardner: Allow me to be a little bit of a skeptic, because I'm seeing these reports from analyst firms on the tens of billions of dollars in potential cloud market share and double-digit growth rates for the next several years. Is this going to come from just peripheral-application-"context" activities, mostly from SMBs? What about the core in the enterprises? Does anybody have an example of where cloud is being used in those? Skilton: In the telecom sector, which is very IT-intensive, I'm seeing the emergence of their core business of delivering service to a large end user or multiple end user channels, using what I call cloud brokering. So, if where you're going with your question is that, certainly in the telecom sector we're seeing the emergence of front-end cloud, customer relationship management (CRM)-type systems and also sort of back-end content delivery engines using cloud. The fundamental shift away from the service orientated architecture (SOA) era is that we're seeing more business driven self-service, more deployment of services as a business model, which is a big difference of the shift of the cloud. Particularly in telco, we're seeing almost an explosion in that particular sector. Gordon: A lot of companies don’t even necessarily realize that they're using cloud services, particularly when you talk about SaaS. There are a number of SaaS solutions that are becoming more and more ubiquitous. If you look at large enterprise company recruiting sites, often you will see Taleo down at the bottom. Taleo is a SaaS. So, that’s a cloud solution, but it’s just not thought necessarily of in that context. Plunkett: Another place we're seeing a lot of growth with regard to private clouds is actually on the defense side. The U.S. Defense Department is looking at private clouds, but they also have to deal with this core and context issue. We're in San Diego today. The requirements for a shipboard system are very different from the land-based systems. Ships have to deal with narrow bandwidth and going disconnected. They also have to deal with coalition partners or perhaps they are providing humanitarian assistance and they are dealing even with organizations we wouldn’t normally consider military. So they have to deal with lots of information, assurance issues, and have completely different governance concerns that we normally think about for public clouds. Gardner: However, in the last year or two, the assumption has been that this is something that’s going to impact every enterprise, and everybody should get ready. Yet, I'm hearing mostly this creeping in through packaged applications on a on-demand basis, SMBs, greenfield organizations, perhaps where high elasticity is a requirement. A lot of companies started adopting Linux, but it was for peripheral applications and peripheral services, some web services that weren’t business critical. It didn’t really get into the core enterprise until much later. What would be necessary for these cloud providers to be able to bring more of the core applications the large enterprises are looking for? What’s the new set of requirements? As I pointed out, we have had a general category of SaaS and development, elasticity, a handful of infrastructure services. What’s the next set of requirements that's going to make it palatable for these core activities and these large enterprises to start doing cloud? Let me start with you, Penelope. Gordon: It’s an interesting question and it was something that we were discussing in a session yesterday afternoon. Here is a gentleman from a large telecommunications company, and from his perspective, trust was a big issue. To him, part of it was just an immaturity of the market, specifically talking about what the new style of cloud is and that branding. Some of the aspects of cloud have been around for quite some time. Look at Linux adoption as an analogy. A lot of companies started adopting Linux, but it was for peripheral applications and peripheral services, some web services that weren’t business-critical. It didn’t really get into the core enterprise until much later. We're seeing some of that with cloud. It’s just a much bigger issue with cloud, especially as you start looking at providers wanting to moving up the food chain and providing greater value. This means that they have to have more industry knowledge and that they have to have more specialization. It becomes more difficult for large enterprises to trust a vendor to have that kind of knowledge. Another aspect of what came up in the afternoon is that, at this point, while we talk about public cloud specifically, it’s not the same as saying it’s a public utility. We talk about "public utility," but there is no governance, at this point, to say, "Here is certification that these companies have been tested to meet certain delivery standards." Until that exists, it’s going to be difficult for some enterprises to get over that trust issue. Gardner: Assuming that the trust and security issues are worked out over time, that experience leads to action, it leads to trust, it leads to adoption, and we have already seen that with SaaS applications. We've certainly seen it with the federal government, as Ed pointed out earlier. Let’s just put that aside as one of the requirements that’s already on the drawing board and that we probably can put a checkmark next to at some point. What’s next? What about customization? What about heterogeneity? What about some of these other issues that are typical in IT, Mark Skilton? Skilton: One of the under-played areas is PaaS. We hear about lock-in of technology caused by the use of the cloud, either putting too much data in or doing customization of parameters and you lose the elastic features of that cloud. The second thing that we need to be seeing is much more offering transition services, transformation services, to accelerate the use of the cloud in a safe way. As to your question about what do vendors or providers need to do more to help the customer use the cloud, the two things we're seeing are: One, more of an appliance strategy, where they can buy modular capabilities, so the licensing issue, solutioning issue, is more contained. The client can look at it more in a modular appliance sort of way. Think of it as cloud-in-a-box. The second thing that we need to be seeing is much more offering of transition services, transformation services, to accelerate the use of the cloud in a safe way. And I think that’s something that we need to really push hard to do. There's a great quote from a client, "It’s not the destination, it’s the journey to the cloud that I need to see." Gardner: You mentioned PaaS. We haven’t seen too much yet with a full mature offering of the full continuum of PaaS-to-IaaS. That's one where new application development activities and new integration activities would be built of, for, and by the cloud and coordinated between the dev and the ops, with the ops being any number of cloud models -- on-premises, off-premises, co-lo, multi-tenancy, and so forth. So what about that? Is that another requirement -- that there is continuity between the past and the infrastructure and new deployment, Tom? Plunkett: We're getting there. PaaS is going to be a real requirement going forward, simply because that’s going to provide us the flexibility to reach some of those core applications that we were talking about before. The further you get away from the context, the more you're focusing on what the business is really focused in on, and that’s going to be the core, which is going to require effective PaaS. Virdi: I want to second that, but at the same time, we're looking for more regulatory and other kinds of licensing and configuration issues as well. Those also make it a little better to use the cloud. You don’t really have to buy, or you can go for the demand. You need to make your licenses a little bit better in such a way that you can just put the product or business solutions into the market, test the waters, and then you can go further on that. Gardner: Penelope, where do you see any benefit of having a coordinated or integrated platform and development test and deploy functions? Is that going to bring this to a more core usage in large enterprises? Gordon: It depends. I see a lot more of the buying of cloud moving out to the non-IT line of business executives. If that accelerates, there is going to be less and less focus. Companies are really separating now what is differentiating and what is core to my business from the rest of it. There's going to be less emphasis on, "Let’s do our scale development on a platform level" and more, "Let’s really seek out those vendors that are going to enable us to effectively integrate, so we don’t have to do double entry of data between different solutions. Let's look out for the solutions that allow us to apply the governance and that effectively let us tailor our experience with these solutions in a way that doesn’t impinge upon the provider’s ability to deliver in a cost effective fashion." That’s going to become much more important. So, a lot of the development onus is going to be on the providers, rather than on the actual buyers. Gardner: Now, this is interesting. On one hand, we have non-IT people, business people, specifying, acquiring, and using cloud services. On the other hand, we're perhaps going to see more PaaS -- the new application development, be it custom or more of a SaaS type of offering -- that’s brought in with a certain level of adjustment and integration. But, these are going off without necessarily any coordination. At some point, they are going to even come together. It’s inevitable, another integration mess perhaps. A lot of the development onus is going to be on the providers, rather than on the actual buyers. Mark Skilton, is that what you see, that we have not just one cloud approach, but multiple approaches, and then some need to rationalize it all? Skilton: There are two key points. There's a missing architecture practice that needs to be there, which is a workload analysis, so that you design applications to fit specific infrastructure containers, and you've got a bridge between the the application service and the infrastructure service. There needs to be a piece of work by enterprise architects (EAs) that starts to bring that together as a deliberate design for applications to be able to operate in the cloud. And the PaaS platform is a perfect environment. The second thing is that there's a lack of policy management in terms of technical governance, and because of the lack of understanding. There needs to be more of a matching exercise going on. The key thing is that that needs to evolve. Part of the work we're doing in The Open Group with the Cloud Computing Work Group is to develop new standards and methodologies that bridge those gaps between infrastructure, PaaS, platform development, and SaaS. Gardner: We already have the Open Trusted Technology Forum. Maybe soon we'll see an open trusted cloud technology forum? Gardner: Ed Harrington, you mentioned earlier that the role of the enterprise architect is going to benefit from cloud. Do you see what we just described in terms of dual tracks, multiple inception points, heterogeneity, perhaps overlap and redundancy? Isn't that where the enterprise architect flourishes? Harrington: I think we talked about line management IT getting involved in acquiring cloud services. If you think we've got this thing called "shadow IT" today, wait a few years. We're going to have a huge problem with shadow IT. From the architect’s perspective, there's lot to be involved with and a lot to play with, as I said in my talk. There's an awful lot of analysis to be done -- what is the value that the cloud solution being proposed is going to be supplying to the organization in business terms, versus the risk associated with it? Enterprise architects deal with change, and that’s what we're talking about. We're talking about change, and change will inherently involve risk. Virdi: All these business decisions are going to be coming upstream, and business executives need to be more aware about how cloud could be utilized as a delivery model. The enterprise architects and someone with a technical background needs to educate or drive them to make the right decisions and choose the proper solutions. It has an impact how you want to use the cloud, as well as how you get out of it too, in case you want to move to different cloud vendors or providers. All those things come into play upstream, rather than downstream. Gardner: We all seem to be resigned to this world of, "Well, here we go again. We're going to sit back and wait for all these different cloud things to happen. Then, we'll come in, like the sheriff on a white horse, and try to rationalize." Why not try to rationalize now before we get to that point? What could be done from an architecture standpoint to head off mass confusion around cloud? Let me start at one end and go down the other. Tom? Plunkett: One word: governance. We talked about the importance of governance increasing as the IT industry went into SOA. Well, cloud is going to make it even more important. Governance throughout the lifecycle, not just at the end, not just at deployment, but from the very beginning. If you think we've got this thing called "shadow IT" today, wait a few years. We're going to have a huge problem with shadow IT. Virdi: In addition to governance, you probably also have to figure out how you want to plan to adapt to the cloud. You don’t want to start as a Big Bang theory. You want to start in incremental steps, small steps, test out what you really want to do. If that works, then go do the other things after that. Gardner: Penelope, how about following the money? Doesn’t where the money flows in and out of organizations tend to have a powerful impact on motivating people or getting them moving toward governance or not? Gordon: I agree, and toward that end, it's enterprise architects. Enterprise architects need to break out of the idea of focusing on how to address the boundary between IT and the business and talk to the business in business terms. One way of doing that that I have seen as effective is to look at it from the standpoint of portfolio management. Where you were familiar with financial portfolio management, now you are looking at a service portfolio, as well as looking at your overall business and all of your business processes as a portfolio. How can you optimize at a macro level for your portfolio of all the investment decisions you're making, and how the various processes and services are enabled? Then, it comes down to, as you said, a money issue. Gardner: Perhaps one way to head off what we seem to think is an inevitable cloud chaos situation is to invoke more shared services, get people to consume services and think about how to pay for them along the way, regardless of where they come from and regardless of who specified them. So back to SOA, back to ITIL, back to the blocking and tackling that's just good enterprise architecture. Anything to add to that, Mark? Skilton: I think it's a mistake to just describe this as more of the same. ITIL, in my view, needs to change to take into account self-service dynamics. ITIL is kind of a provider service management process. It's thing that you do to people. Cloud changes that direction to the other way, and I think that's something that needs to be done. Also, fundamentally the data center and network strategies need to be in place to adopt cloud. From my experience, the data center transformation or refurbishment strategies or next generation networks tend to be done as a separate exercise from the applications area. So a strong, strong recommendation from me would be to drive a clear cloud route map to your data center. Gardner: So, perhaps a regulating effect on the self-selection of cloud services would be that the network isn't designed for it, and it's not going to necessarily help? Gardner: That's one way to govern your cloud. Ed Harrington, any other further thoughts on working toward a cloud future without the pitfalls? It's a combination of governance, treating the cloud services as services per se, and enterprise architecture. Harrington: Again, the governance, certification of some sort. I'm not in favor of regulation, but I am in favor of some sort of third-party certification of services that consumers can rely upon safely. But, I will go back to what I said earlier. It's a combination of governance, treating the cloud services as services per se, and enterprise architecture. Gardner: What about the notion that was brought up earlier about private clouds being an important on-ramp to this? If I were a public cloud provider, I would do my market research on what's going on in the private clouds, because I think they are going to be incubators to what might then become hybrid and ultimately a full-fledged third-party public cloud providing assets and services. What can we learn from looking at what's going on with private cloud now, seemingly a lot of trying to reduce cost and energy consumption -- but what does that tell us about what we should expect in the next few years? Again, let's start with you, Tom. Plunkett: What we're seeing with private cloud is that it’s actually impacting governance, because one of the things that you look at with private cloud is charge-back between different internal customers. This is forcing these organizations to deal with complexity, money, and business issues that they don't really like to do. Nowadays, it's mostly vertical applications, where you've got one owner who is paying for everything. Now, we're actually going back to, as we were talking about earlier, dealing with some of the tricky issues of SOA. Gardner: TJ, private cloud as an incubator ... What we should expect? Virdi: Configuration and change management -- how in the private cloud we are adapting to it and supporting different customer segments is really the key. This could be utilized in the public cloud too, as well as how you are really securing your information and data or your business knowledge. How you want to secure that is key, and that's why the private cloud is there. If we can adapt to or mimic the same kind of controls in the public cloud, maybe we'll have more adoptions in the public cloud too. Gardner: Penelope, any thoughts on that, the private-to-public transition? Gordon: I also look at it in a little different way. For example, in the U.S., you have the National Security Agency (NSA). For a lot of what you would think of as their non-differentiating processes, for example payroll, they can't use ADP. They can't use that SaaS for payroll, because they can't allow the identities of their employees to become publicly known. Anything that involves their employee data and all the rest of the information within the agency has to be kept within a private cloud. But, they're actively looking at private cloud solutions for some of the other benefits of cloud. In one sense, I look at it and say that private cloud adoption to me tells a provider that this is an area that's not a candidate for a public-cloud solution. But, private clouds could also be another channel for public cloud providers to be able to better monetize what they're doing, rather than just focusing on public cloud solutions. Gardner: So, then, you're saying this is a two-way street. Just as we could foresee someone architecting a good private cloud and then looking to take that out to someone else’s infrastructure, you're saying there is a lot of public services that for regulatory or other reasons might then need to come back in and be privatized or kept within the walls? Interesting. Mark Skilton, any thoughts on this public-private tension and/or benefit? The lessons that we're learning in running private clouds for our clients is the need to have a much more of a running-IT-as-a-business ethos and approach. Skilton: I asked an IT service director the question about what was it like running a cloud service for the account. This is a guy who had previously been running hosting and management, and with many years experience. The surprising thing was that he was quite shocked that the disciplines that he previously had for escalating errors and doing planned maintenance, monitoring, billing and charging back to the customer fundamentally were changing, because it had to be done more in real-time. You have to fix before it fails. You can’t just wait for it to fail. You have to have a much more disciplined approach to running a private cloud. The lessons that we're learning in running private clouds for our clients is the need to have a much more of a running-IT-as-a-business ethos and approach. We find that if customers try to do it themselves, either they may find that difficult, because they are used to buying that as a service, or they have to change their enterprise architecture and support service disciplines to operate the cloud. Gardner: Perhaps yet another way to offset potential for cloud chaos in the future is to develop the core competencies within the private-cloud environment and do it sooner rather than later? This is where you can cut your teeth or get your chops, some number of metaphors come to mind, but this is something that sounds like a priority. Would you agree with that, Ed, that coming up with a private-cloud capability is important? Harrington: It's important, and it's probably going to dominate for the foreseeable future, especially in areas that organizations view as core. They view them as core, because they believe they provide some sort of competitive advantage or, as Penelope was saying, security reasons. ADP's a good idea. ADP could go into NSA and set up a private cloud using ADP and NSA. I think is a really good thing. But, I also think that trust is still a big issue and it's going to come down to trust. It's going to take a lot of work to have anything that is perceived by a major organization as core and providing differentiation to move to other than a private cloud. Virdi: Private clouds actually allow you to make more business modular. Your capability is going to be a little bit more modular and interoperability testing could happen in the private cloud. Then you can actually use those same kind of modular functions, utilize the public cloud, and work with other commercial off-the-shelf (COTS) vendors that really package this as new holistic solutions. Gardner: Does anyone consider the impact of mergers and acquisitions on this? We're seeing the economy pick up, at least in some markets, and we're certainly seeing globalization, a very powerful trend with us still. We can probably assume, if you're a big company, that you're going to get bigger through some sort of merger and acquisition activity. Does a cloud strategy ameliorate the pain and suffering of integration in these business mergers, Tom? Plunkett: Well, not to speak on behalf of Oracle, but we've gone through a few mergers and acquisitions recently, and I do believe that having a cloud environment internally helps quite a bit. Specifically, TJ made the earlier point about modularity. Well, when we're looking at modules, they're easier to integrate. It’s easier to recompose services, and all the benefits of SOA really. Gardner: TJ, mergers and acquisitions in cloud? Virdi: It really helps. At the same time, we were talking about legal and regulatory compliance stuff. EU and Japan require you to put the personally identifiable information (PII) in their geographical areas. Cloud could provide a way to manage those things without having the hosting where you have your own business. That kind of thinking, the cloud constructs applied up at a business architecture level, enables the kind of business expansion that we are looking at. Gardner: Penelope, any thoughts, or maybe even on a slightly different subject, of being able to grow rapidly vis-à-vis cloud experience and expertise and via having architects that understand it? Gordon: Some of this comes back to some of the discussions we were having about the extra discipline that comes into play, if you are going to effectively consume and provide cloud services, if you do become much more rigorous about your change management, your configuration management, and if you then apply that out to a larger process level. So, if you define certain capabilities within the business in a much more modular fashion, then, when you go through that growth and add on people, you have documented procedures and processes. It’s much easier to bring someone in and say, "You're going to be a product manager, and that job role is fungible across the business." Gardner: Mark Skilton, thoughts about being able to manage growth, mergers and acquisitions, even general business agility vis-à-vis more cloud capabilities? Skilton: Right now, I'm involved in merging in a cloud company that we bought last year in May, and I would say yes and no. The no point is that I'm trying to bundle this service that we acquired in each product and with which we could add competitive advantage to the services that we are offering. I've had a problem with trying to bundle that into our existing portfolio. I've got to work out how they will fit and deploy in our own cloud. So, that’s still a complexity problem. But, the upside is that I can bundle that service that we acquired, because we wanted to get that additional capability, and rewrite design techniques for cloud computing. We can then launch that bundle of new service faster into the market. It’s kind of a mixed blessing with cloud. With our own cloud services, we acquire these new companies, but we still have the same IT integration problem to then exploit that capability we've acquired. Gardner: That might be a perfect example of where cloud is or isn’t working. When you run into the issue of complexity and integration, it doesn’t compute, so to speak. Skilton: It’s not plug and play yet, unfortunately. Gardner: Ed, what do you think about this growth opportunity, mergers and acquisitions, a good thing or bad thing? Harrington: It’s a challenge. I think, as Mark presented it, it's got two sides. It depends a lot on how close the organizations are, how close their service portfolios are, to what degree has each of the organizations adapted the cloud, and is that going to cause conflict as well. So I think there is potential. With our own cloud services, we acquire these new companies, but we still have the same IT integration problem to then exploit that capability we've acquired. Skilton: Each organization in the commercial sector can have different standards, and then you still have that interoperability problem that we have to translate to make it benefit, the post merger integration issue. Gardner: Well, thanks. We've been discussing the practical requirements of various cloud computing models, looking at core and context issues where cloud models would work, where they wouldn’t. And, we have been thinking about how we might want to head off the potential mixed bag of cloud models in our organizations, and what we can do now to make the path better, but perhaps also make our organizations more agile, service oriented, and able to absorb things like rapid growth and mergers. I'd like to thank you all for joining and certainly want to thank our guests. This is a sponsored podcast discussion coming to you from The Open Group’s 2011 Conference in San Diego. We're here the week of February 7, 2011. A big thank you now to Penelope Gordon, cofounder of 1Plug Corp. Gardner: Mark Skilton, Director of Portfolio and Solutions in the Global Infrastructure Services with Capgemini. Thank you, Mark. Skilton: Thank you very much. Gardner: Ed Harrington, Principal Consultant in Virginia for the UK-based Architecting the Enterprise. Gardner: Tom Plunkett, Senior Solution Consultant with Oracle. Thank you. Gardner: TJ Virdi, the Computing Architect in the CAS IT System Architecture group at Boeing. Gardner: I'm Dana Gardner, Principal Analyst at Interarbor Solutions. You've been listening to a sponsored BriefingsDirect podcast. Thanks for joining, and come back next time. Transcript of a sponsored podcast panel discussion from The Open Group 2011 U.S. Conference on newly emerging cloud models and their impact on business and government. Copyright Interarbor Solutions, LLC, 2005-2011. All rights reserved.
2019-04-23T09:09:33Z
https://www.briefingsdirecttranscriptsblogs.com/2011/02/open-group-cloud-panel-forecasts-useful.html
Gypsy moth is the common name for a type of tussock moth, Lymantria dispar that is native to Europe and Asia but has become a serious pest in North America after its introduction in the 19th century. In their natural environment, where gypsy moths have developed in harmony with numerous predators, they are part of the balance of nature. They serve as prey species for such animals as predatory and parasitic insects (wasps, ground beetles, etc.), spiders, birds, and mammals such as mice, shrews, and squirrels. However, the introduction of gypsy moths by humans into North America has proven very destructive, with millions of acres of trees defoliated, including both evergreen and deciduous trees, and many trees weakened or killed by repeat infestations. Over one million acres (4,000 km²) of forest each year were defoliated between 1980 and 1991, and in 1981 almost 13 million acres were defoliated (52,200 km²) (McManus et al. 1992). There remain important North American predators, some of which are drawn to infestations. Nonetheless, this introduction remains a significant threat, with concern about spreading to new areas, and outbreaks requiring a massive amount of money and effort to contain. Awareness of such problems, however, has lead to greater quarantine laws and efforts to restrict the introduction of invasive species between nations. 8.1 Silvicultural treatment: What and when? The gypsy moth, Lymantria dispar, is a member of the Lymantriidae family of the insect order Lepidopera (butterflies and moths). Lymantriidae (or Liparidae) includes about 350 known genera and over 2,500 known species found all over the world, in every continent except Antarctica. Adult moths of this family do not feed. They usually have muted colors (browns and grays), although some are white, and tend to be very hairy. Some females are flightless, and some have reduced wings. Usually the females have a large tuft at the end of the abdomen. The males, at least, have tympanal organs (Scoble, 1995). They are mostly nocturnal, but Schaefer (1989) lists 20 confirmed diurnal species and 20 more likely diurnal species (based on reduced eye size). Gypsy moths are diurnal. The larvae of the Lymantriidae family are also hairy, often with hairs packed in tufts, and in many species the hairs break off very easily and are extremely irritating to the skin. This highly effective defense serves the moth throughout its life cycle as the hairs are incorporated into the cocoon, from where they are collected and stored by the emerging adult female at the tip of the abdomen and used to camouflage and protect the eggs as they are laid. In others, the eggs are covered by a froth that soon hardens, or are camouflaged by material the female collects and sticks to them (Schaefer, 1989). In the larvae of some species, hairs are gathered in dense tufts along the back and this gives them the common name of tussocks or tussock moths. Adult gypsy moths are sexually dimorphic, with males light to dark brown with irregular black markings, and females all white with irregular black lines on the wings (Grzimek et al. 2004). Males, which are active fliers, have a wingspan of about 1 to 1.5 inches (25.4 to 38 millimeters), while females, which do not fly (except for the larger Asian variety) have a wingspan of about 2.24 to 2.68 inches (56 to 67 millimeters (Grzimek et al. 2004). Older larvae can be identified by the presence of five pairs of raised blue spots followed by six pairs of raised brick-red spots along their backs, and a sprinkling of setae. The normal range of gypsy moths is in the palearctic zone, with the exception of the extreme south or north (Grzimek et al. 2004). The Palearctic includes the terrestrial ecoregions of Europe, Asia north of the Himalaya foothills, northern Africa, and the northern and central parts of the Arabian Peninsula. The gypsy moth is now in North America as a result of being an introduced species. Lymantria means "defiler," and gypsy moths, as with some other members in Lymantriidae and in Lymantria, are important defoliators of forest trees. As with other moths, gypsy moths undergo complete metamorphosis. Complete metamorphosis, also called holometabolism and complex metamorphosis, is a term applied to those processes in which the larvae differ markedly from the adults. Insects that undergo holometabolism start as an egg, pass through a larval stage (known as a caterpillar), then enter an inactive state called pupa (chrysalis), and finally emerge as adults (imago). In the gypsy moth, there is one generation per year. Gypsy moth egg masses are typically laid on branches and trunks of trees, but egg masses may be found in any sheltered location. During outbreaks, the moths have been known to lay their eggs on the ships. Four to six weeks later, embryos develop into larvae. The egg is the overwintering stage. After an acclimation stage, eggs can withstand freezing temperatures. The longer they are chilled in winter, the less heating is required for their hatch in spring. Egg masses are buff colored when first laid but may bleach out over the winter months when exposed to direct sunlight and weathering. As the female lays them, she covers them with hair-like setae from her abdomen. Many individuals find these hairs irritating, and they may offer the eggs some protection. Egg masses contain from a couple of hundred to about 1200 eggs. The hatching of gypsy moth eggs coincides with budding of most hardwood trees. Larvae (caterpillars) emerge from egg masses from early spring through mid-May. Gypsy moths are dispersed in two ways. Natural dispersal occurs when newly hatched larvae hanging from host trees on silken threads are carried by the wind for a distance of up to about 1 mile, although most go less than 50 meters. Eggs can be carried for longer distances. Artificial dispersal occurs when people transport gypsy moth eggs thousands of miles from infested areas on cars and recreational vehicles, firewood, household goods, and other personal possessions. Females are flightless in most varieties, so these are the only means of spreading. Larvae develop into adults by going through a series of progressive molts, through which they increase in size. Instars are the stages between each molt. Male larvae normally go through five instars (and females, six) before entering the pupal stage. Newly hatched larvae are black with long hair-like setae. During the first three instars, larvae remain in the top branches or crowns of host trees. The first stage or instar chews small holes in the leaves. The second and third instars feed from the outer edge of the leaf toward the center. Older larvae have the characteristic blue (5 pairs) and red (6 pairs) of spot on their dorsal surface. When population numbers are sparse, the movement of the larvae up and down the tree coincides with light intensity. Larvae in the fourth instar feed in the top branches or crown at night. When the sun comes up, larvae crawl down the trunk of the tree to rest during daylight hours. Larvae hide under flaps of bark, in crevices, or under branches—any place that provides protection. When larvae hide underneath leaf litter, mice, shrews, and Calosoma beetles can prey on them. At dusk, when the sun sets, larvae climb back up to the top branches of the host tree to feed. When population numbers are dense, however, larvae feed continuously day and night until the foliage of the host tree is stripped. Then they crawl in search of new sources of food. The larvae reach maturity between mid-June and early July and then enter the pupal stage. This is the stage during which larvae change into winged adults. Pupation lasts from 7 to 14 days. When the population is spread out and running low, pupation can take place under flaps of bark, in crevices, under branches, on the ground, and in other places where larvae rested. During periods when population numbers are dense, pupation is not restricted to locations where larvae rested. Pupation will take place in sheltered and non-sheltered locations, even exposed on the trunks of trees or on foliage of nonhost trees. Usually the caterpillars create flimsy cocoons made of silk strands holding the leaf together, while others do not cover their pupae in cocoons, but rather hang from a twig or tree bark, like butterfly pupae do. The brown male gypsy moth, upon emerging, flies in rapid zigzag patterns searching for females. The male gypsy moths are diurnal unlike most moths, which are nocturnal. When heavy, black-and-white egg-laden females emerge, they emit a chemical substance called a pheromone that attracts the males. After mating, the female lays her eggs in July and August close to the spot where she pupated. Then, both adult gypsy moths die. The European and most Russian forms of the gypsy moth have flightless females. Although they have large wings, the musculature is not developed. However, the Japanese gypsy moth females do fly and are attracted to lights. Gypsy moths (at least of the introduced American population) fly all day and night, with the possible exception of the late morning. They are most active soon after dusk and in the latter hours of the night (Fullard and Napoleone 2001). The gypsy moth was introduced into the United States in 1868 by a French scientist, Leopold Trouvelot, living in Medford, Massachusetts. The native silk spinning caterpillars were proving to be susceptible to disease. So Trouvelot brought over gypsy moth eggs to try and make a caterpillar hybrid that could resist diseases. When some of the moths escaped from his lab, they started to multiply. They eventually grew to be gypsy moths as we know them today. It is now one of the most notorious pests of hardwood trees in the Eastern United States. The first outbreak there occurred in 1889. By 1987, the gypsy moth had established itself throughout the Northeast USA and southern Quebec and Ontario. The insect has spread south into Virginia and West Virginia, and west into Michigan, Wisconsin, and Minnesota. Some gypsy moths were likewise introduced into the northwestern North America in 1991. Small, isolated infestations have occurred sporadically in Utah, Oregon, Washington, California, and British Columbia, but these have all been successfully eradicated. Between 1980 and 1991, the gypsy moth defoliated over 1,000,000 acres (4,000 km²) of forest each year (McManus et al. 1992). In 1981, a record 12,900,000 acres (52,200 km²) were defoliated. This is an area larger than Rhode Island, Massachusetts, and Connecticut combined. In wooded suburban areas, during periods of infestation when trees are visibly defoliated, gypsy moth larvae crawl up and down walls, across roads, over outdoor furniture, and even inside homes. During periods of feeding they leave behind a mixture of small pieces of leaves and excrement. During outbreaks, the sound of chewing and excrement dropping is a continual sound. Gypsy moth populations usually remain at very low levels but occasionally populations increase to very high levels which can result in partial to total defoliation of host trees for one to three years. Gypsy moth larvae generally prefer oaks, but may feed on several hundred different species of trees and shrubs, both hardwood and conifer. In Eastern North America, the gypsy moth prefers oaks, aspen, apples, sweetgum, speckled alder, basswood, gray, and paper birch, poplars, willows, and hawthorns, although other species are also affected. The list of hosts will undoubtedly expand as the insect spreads south and west. The gypsy moth avoids ash trees, tulip-tree, American sycamore, butternut, black walnut, catalpa, flowering dogwood, balsam fir, arborvitae, American holly, and shrubs such as mountain laurel and rhododendrons, but will feed on these in late instars when densities are extremely high. Older larvae feed on several species of hardwood that younger larvae avoid, including cottonwood, hemlock, Atlantic white cypress, and the pines, and spruces native to the East. The effects of defoliation depend primarily on the amount of foliage that is removed, the condition of the tree at the time it is defoliated, the number of consecutive defoliations, available soil moisture, and the species of host. If less than 50 percent of their crown is defoliated, most hardwoods will experience only a slight reduction (or loss) in radial growth. If more than 50 percent of their crown is defoliated, most hardwoods will refoliate or produce a second flush of foliage by midsummer. Healthy trees can usually withstand one or two consecutive defoliations of greater than 50 percent. Trees that have been weakened by previous defoliation or been subjected to other stresses such as droughts are frequently killed after a single defoliation of more than 50 percent. Trees use energy reserves during refoliation and are eventually weakened. Weakened trees exhibit symptoms such as dying back of twigs and branches in the upper crown and sprouting of old buds on the trunk and larger branches. Weakened trees experience radial growth reduction of approximately 30 to 50 percent. Trees weakened by consecutive defoliations are also vulnerable to attack by disease organisms and other insects. For example, the Armillaria fungus attacks the roots, and the two-lined chestnut borer attacks the trunk and branches. Affected trees will eventually die two or three years after they are attacked. Although not preferred by the larvae, pines and hemlocks (as the term is used in North America) are subject to heavy defoliation during gypsy moth outbreaks and are more likely to be killed than hardwoods. A single, complete defoliation can kill approximately 50 percent of the pines and 90 percent of the mature hemlocks. This is because conifers do not store energy in their roots; an exception is larch. Natural enemies play an important role during periods when gypsy moth populations are sparse. Natural enemies include parasitic and predatory insects such as wasps, flies, ground beetles, and ants; many species of spiders; several species of birds, such as chickadees, blue jays, nuthatches, towhees, and robins; and approximately 15 species of common woodland mammals, such as the white-footed mouse, shrews, chipmunks, squirrels, and raccoons. Predation by small mammals (mice and shrews) is the largest source of mortality in low density gypsy moth populations and this mortality is apparently critical in preventing outbreaks. Calosoma (ground beetles of European origin), cuckoos, and flocking birds, such as starling, grackles, and red-winged blackbirds, are attracted to infested areas in years when gypsy moth populations are dense. Diseases caused by bacteria, fungi, or viruses contribute to the decline of gypsy moth populations, especially during periods when gypsy moth populations are dense and are stressed by lack of preferred foliage. Wilt disease caused by a particular nucleopolyhedrosis virus (NPV) that is specific to the gypsy moth is the most devastating of the natural diseases. NPV causes a dramatic collapse of outbreak populations by killing both the larvae and pupae. Larvae infected with wilt disease are shiny and hang limply in an inverted "V" position. Infection with NPV is the most common source of mortality in high density populations, and NPV epizootics usually cause the collapse of populations. Since the 1980s, the fungus Entomophaga maimaiga has also had a large impact on gypsy moth populations in North America. Weather affects the survival and development of gypsy moth life stages regardless of population density. For example, temperatures of -20°F, (-29°C.) lasting from 48 to 72 hours can kill exposed eggs; alternate periods of freezing and thawing in late winter and early spring may prevent the over wintering eggs from hatching; and cold, rainy weather inhibits dispersal and feeding of the newly hatched larvae and slows their growth. A number of tactics have the potential to minimize damage from gypsy moth infestations and to contain or maintain gypsy moth populations at levels considered tolerable. These tactics include monitoring gypsy moth populations, maintaining the health and vigor of trees, discouraging gypsy moth survival, and treating with insecticides to kill larvae and protect tree foliage. The tactic or combination of tactics used will depend on the condition of the site and of the tree or stand and the level of the gypsy moth population. Tactics suggested for homeowners are probably too costly and too labor intensive for managers to use in forest stands. The gypsy moth currently occupies less than 1/3 of its potential range in North America and considerable resources are directed at minimizing the expansion of its range into these areas. Every year, over 100,000 pheromone traps are placed in uninfested portions of the United States in order to detect new infestations that occasionally arise when people inadvertently transport life stages into uninfested areas (e.g., egg masses on recreational vehicles). When captures are positive for several consecutive years, this indicates that a population is establishing and these populations are eradicated, usually via the application of the bacterial pesticide, Bacillus thuringiensis ('Bt'). Enhance growth conditions for isolated trees by encircling them with mulch or ground cover plants that do not compete for moisture and nutrients the way dense grass layers do. Water the shade and ornamental trees in periods of drought to maximize recovery during refoliation. Avoid stressing trees. For example, construction projects tend to compact soil and prevent moisture from penetrating to small feeder roots. Avoid applying lime or weed killers around trees. These chemicals can seriously damage shallow tree roots. Thin the woodlot trees and groups of shade trees between outbreaks to reduce competition. deer mice. Deer mice are considered the most important predator of low-density gypsy moth populations and their abundance may be critical in determining whether populations go into an outbreak mode. Their abundance is strongly affected by the amount of mast (e.g., acorns) in the previous year. There is not any evidence that releasing or enhancing gypsy moth predators or parasites can reduce gypsy moth populations. Manual removal of gypsy moths may be a viable method for reducing damage on small, open-grown trees and shrubs. The number of visible egg masses. The percentage of preferred hosts in a mixed stand of trees (50 percent or more of oak). Whether trees already have dead or dying branches, especially near the top branches or crown. Whether the property is located adjacent to wooded areas heavily infested with gypsy moths. During periods when numbers of gypsy moth larvae are dense, pesticides may be the most effective method of reducing the number of larvae and protecting the foliage of host trees. Application of pesticides should be done by a certified applicator, because special equipment is required. Large areas, such as wooded residential areas and forests, should be treated by aircraft. Available pesticides fall into two broad groups: microbial or biological and chemical (table 1). Microbial and biological pesticides contain living organisms that must be consumed by the pest. Microbials include bacteria, viruses, and other naturally occurring organisms; biologicals include manmade synthetics of naturally occurring organisms. These pesticides should be applied before the larvae reach the third stage or instar of development. As they mature, larvae become more resistant to microbial pesticides and are, therefore, more difficult to kill. Low dose pheromone systems are being employed in some areas (Channel Islands, United Kingdom) to flood areas with synthetic pheromone and effectively "blind" males so they are unable to locate females. Nucleopolyhedrosis virus (NPV), a naturally occurring organism, has been developed as a microbial pesticide. It is presently registered under the name "Gypchek" and is available for use in USDA Forest Service sponsored suppression programs. NPV and Gypcheck are specific to the gypsy moth. Bacillus thuringiensis (Bt) is microbial and biological. It is the most commonly used pesticide. In addition to being used against the gypsy moth, Bt is used against a number of other pests, including the western spruce budworm and other Choristoneura, and tent caterpillars. When Bt is taken internally, the insect becomes paralyzed, stops feeding, and dies of starvation or disease. Chemical pesticides are contact poisons in addition to being stomach poisons. The timing of the chemical application is less critical to the successful population reduction of the pest than the timing of the application of the microbials and biologicals. Chemical pesticides can affect non-target organisms and may be hazardous to human health. Bacillus thuringiensis Dipel Thuricide Registered for aerial and ground application. Available under a variety of trade names. Toxic to other moth and butterfly larvae. Can be used safely near water. Acephate Orthene Registered for aerial and ground application. Available under a variety of trade names. Toxic to bees and some gypsy moth parasites. Commonly used from the ground to treat individual trees. Carbaryl Sevin Registered for aerial and ground application. Available under a variety of trade names. Toxic to bees and gypsy moth parasites. At one time, the most widely used chemical in gypsy moth control programs. Diflubenzuron Dimilin A restricted-use pesticide that can be applied only by certified applicators. The most commonly used chemical pesticides currently registered by the U.S. Environmental Protection Agency (EPA) for use against the gypsy moth contain carbaryl, diflubenzuron, and acephate. Malathion, methoxychlor, phosmet, trichlorfon, and synthetic pyrethroids (permethrin) have also been registered by EPA for control of gypsy moth, but are used infrequently. Several studies done by Peter G. Kevan and associates of the University of Guelph, between 1975 and 1995 in eastern Canada have shown serious reduction in blueberry and other crop pollination due to forest aerial applications of insecticides that killed non-target wild bees. Diflubenzuron represents a new class of pesticides called insect growth regulators. It kills gypsy moth larvae by interfering with the normal molting process. Diflubenzuron has no effect on adult insects. Aquatic crustaceans and other immature insects that go through a series of molting stages are often sensitive to this pesticide. Several interrelated factors determine the vulnerability of forest stands and woodlots to gypsy moth defoliation. An awareness of these factors will enable land managers and woodlot owners to prescribe silvicultural actions (such as thinning of a stand) that will minimize the impact caused by gypsy moth defoliation. Three of these factors include the abundance of favored food species (mainly oaks), site and stand factors, and tree conditions. Stands of trees that are predominantly oak and grow on poor, dry sites (such as sand flats or rock ridges) are frequently stressed and often incur repeated, severe defoliations. Trees growing under these conditions frequently possess an abundance of structural features such as holes, wounds, and deep bark fissures that provide shelter and habitats for gypsy moth larvae and aid their survival. Stands of trees that are predominantly oak but grow on protected slopes or on sites with adequate moisture and organic matter are more resistant to defoliation by the gypsy moth. Slow-growing trees on poor sites frequently survive a single, severe defoliation better than fast-growing trees typically found on well-stocked better sites. More trees are killed in stands that contain mainly oak species than in oak-pine or mixed hardwood stands. Subdominant trees are killed more rapidly and more often than dominant trees. Silvicultural treatment: What and when? Appropriate silvicultural treatment will be determined by an anticipated occurrence of gypsy moth defoliation, by characteristics of the stand, and by the economic maturity of the stand. Foresters refer to treatments discussed here as "thinnings." Thinnings are cuttings made in forest stands to remove surplus trees (usually dominant and subdominant size classes) in order to stimulate the growth of trees that remain. Pre-defoliation treatments. When gypsy moth defoliation is anticipated, but not within the next five years, pre-defoliation thinning to selectively remove preferred-host trees can reduce the severity of defoliation, increase the vigor of residual trees, and encourage seed production and stump sprouting. Thinnings should not be conducted in fully stocked stands that will reach maturity within the next 6 to 15 years. Thinning results in a short-term "shock effect" to residual trees. This shock effect, coupled with defoliation-caused stress, renders trees vulnerable to attack by disease organisms such as Armillaria. In fully stocked stands that will reach maturity within the next 16 or more years, two kinds of thinning can be applied. The method of thinning should depend on the proportion of preferred host species present. If more than 50 percent of the basal area in a stand is preferred host species (mainly oaks), presalvage thinning should be applied. Presalvage thinning is designed to remove the trees most likely to die (trees with poor crown condition) from stress caused by gypsy moth defoliation. If less than 50 percent of the basal area in a stand is in preferred host species, sanitation thinning can be applied to reduce further the number of preferred host trees. This will result in fewer refuges for gypsy moth larvae and in improved habitats for the natural enemies of the gypsy moth. Treatment during outbreaks: If defoliation is current or is expected within the next 5 years, thinnings should be delayed because of potential "shock effect." High-value stands can be protected by applying pesticides. In low-value stands or those that are at low risk (less than 50 percent basal area in preferred host species), protective treatments are optional. Post-outbreak treatments. After a defoliation episode, the land manager or woodlot owner should pursue efficient salvage of dead trees, but should delay decisions about additional salvage, regeneration, or other treatments for up to three years. At the end of three years, most defoliation-caused mortality will be complete and the need for treatments can be assessed on the basis of damage level, current stocking conditions, and stand maturity. This article incorporates text from http://www.na.fs.fed.us/spfo/pubs/fidls/gypsymoth/gypsy.htm, a public domain work of the United States Government. Andreadis, T. G., and R. M. Weseloh. 1990. Discovery of Entomophaga maimaiga in North American gypsy moth, "Lymantria dispar." Proceedings of the National Academy of Sciences 87(7): 2461-2465. Barbosa, P., and J. Greenblatt. 1979. Suitability, digestibility and assimilation of various host plants of the gypsy moth Lymantria dispar L. (Lepidoptera, Lymantriidae). Oecologia 43(1): 111-119. Barbosa, P., M. Waldvogel, and P. Martinat. et al. 1983. Developmental and reproductive performance of the gypsy moth, Lymantria dispar (L) (Lepidoptera, Lymantriidae), on selected hosts common to mid-atlantic and southern forests. Environmental Entomology 12(6): 1858-1862. Bogdanowicz, S. M., W. E. Wallner, J. Bell, et al. 1993. Asian gypsy moths (Lepidoptera, Lymantriidae) in North America: Evidence from molecular data. Annals of the Entomological Society of America 86(6): 710-715. Dwyer, G., and J. S. Elkinton. 1993. Using simple-models to predict virus epizootics in gypsy-moth populations. Journal of Animal Ecology 62(1): 1-11. Elkinton, J. S., W. M. Healy, J. P. Buonaccorsi, G. H. Boettner, A. M. Hazzard, H. R. Smith, and A. M. Liebhold. 1996. Interactions among gypsy moths, white-footed mice, and acorns. Ecology 77(8): 2332-2342. Gansner, D. A., O. W. Herrick, G. N. Mason, and K. W. Gottschalk. 1987. Coping with the gypsy moth on new frontiers of infestation. Southern Journal of Applied Forestry Research 11: 201-209. Gould, J. R., J. S. Elkinton, and W. E. Wallner. 1990. Density-dependent suppression of experimentally created gypsy moth, Lymantria dispar (Lepidoptera, Lymantriidae), populations by natural enemies. Journal of Animal Ecology 59(1): 213-233. Liebhold, A. M., J. A. Halverson, and G. A. Elmes. 1992. Gypsy moth invasion in North America: A quantitative analysis. Journal of Biogeography 19(5): 513-520. McManus, M. L., D. R. Houston, and W. E. Wallner. 1979. The homeowner and the gypsy moth: Guidelines for control. Home and Gard. Bull. 227: 4-33. U.S. Department of Agriculture, Washington, DC. Myers, J. H. 1993. Population Outbreaks in Forest Lepidoptera. American Scientist 81: 240-251. Podgwaite, J.D. 1979. Diseases of the gypsy moth: How they help to regulate populations. Agric. Handbook 539: 2-15. U.S. Department of Agriculture, Washington, DC. Rossiter, M.C. 1991. Maternal effects generate variation in life-history: Consequences of egg weight plasticity in the gypsy moth. Functional Ecology 5(3): 386-393. Schaefer, P. 1989. Diversity in form, function, behavior, and ecology. In USDA Forest Service (ed.), Proceedings, Lymantriidae: A Comparison of Features of New and Old World Tussock Moths. 1-19. Broomall, PA. Scoble, M. J. 1992. The Lepidoptera: Form, Function and Diversity, 2nd ed. Oxford University Press. ISBN 0198540310. Weseloh, R. M., and T. G. Andreadis. 1992. Epizootiology of the fungus Entomophaga maimaiga, and its impact on gypsy moth populations. Journal of Invertebrate Pathology 59(2): 133-141. This page was last modified on 2 April 2008, at 08:16.
2019-04-21T12:48:51Z
http://www.newworldencyclopedia.org/entry/Gypsy_moth
Salesforce is the top dog in cloud-based CRM software and, based on their revenue goal of $60 billion by 2034, they will be for quite some time. The number of products they offer is seemingly endless, along with the news of them acquiring powerful tech companies. It would require an entire Salesforce-dedicated team with years of experience to be capable enough to cover everything Salesforce is up to and how their CRM software always manages to be the very best. SMBs are more focused on improving their own businesses rather than watching how Salesforce is changing the way we do business in general. It’s natural for businesses to think of Salesforce when they hear CRM, but what they’re unaware of is the number of sales CRM software providers who exist exclusively for SMBs. Finding these providers isn’t exactly easy, so it makes sense that Salesforce seems to be the ultimate solution; however, that’s not actually the case. We’re going to highlight 10 different providers that offer easy-to-use, powerful sales CRM solutions. Before we get into our ten Salesforce alternatives, it would be helpful to know who Salesforce is and why they’re considered the top cloud-based CRM software company. Salesforce was founded in 1999 when CRM software was still a very new concept. Salesforce went above and beyond by developing cloud-based CRM software that is more accessible to businesses of all sizes, no longer requiring expensive, up-front investments in in-house software and hardware, and long-term IT teams to maintain them. Salesforce offers all kinds of CRM solutions and systems, which include Sales Cloud, Marketing Cloud, Service Cloud, Analytics Cloud, Data Cloud, Community Cloud, App Cloud, and IoT, to over 150,000 customers. As of recently, especially in 2016, Salesforce has been expanding their business by acquiring and integrating with tons of smaller businesses. Why is Salesforce Number One? Salesforce is the leading pioneer of cloud-based CRM software. They have the experience and resources to determine how business is changing, and use their expertise and resources (money) to develop groundbreaking business software before other companies can understand what’s actually happening. This makes them a consistent leader in the world of cloud-based CRM software. Salesforce is also in a position to acquire tons of smaller companies they feel are going to leave a lasting impact. These partnerships allow Salesforce to focus exclusively on the technology that will inspire other providers to follow suit, rather than focusing on developing technology that only helps them stay relevant. They were, and continue to be, ahead of the curve when it comes to CRM innovation. Salesforce is the consistent leader in cloud-based CRM software, but that doesn’t mean their sales CRM software is the only solution worth considering. Many small businesses have trouble adopting CRM software, while understanding the benefits of CRM software, but the hassle of learning how they operate often gets in the way of actually doing business. Salesforce comes with tons of features and integrations, uses the latest technology such as AI, and has multiple pricing plans, but they aren’t all catered to SMBs. If your small business wants a solution with a ton of features, but doesn’t have a lot of money to spend on CRM software, Salesforce is out of the question. There’s no need to choose between more features for higher costs and less features for lower costs. Below are a list of ten providers — that aren’t Salesforce — who offer affordable sales CRM software solutions to SMBs without sacrificing features, integrations, and customization tools. Freshsales is another SMB-focused sales CRM software provider who is also diving into the world of AI. They offer AI-based lead scoring tools, Intelligent Workflows — a new product built for automating the mundane, time-consuming tasks that prevent agents from focusing solely on their leads and customers, event tracking, and powerful integrations. Their features require minimal customization because they’re already catered to SMBs. Freshsales is a better alternative for businesses interested in sales CRM software that isn’t Salesforce. It’s an easy-to-use and easy-to-figure-out software built for businesses with lots of clients where sales happen at a fast pace. Their automations help businesses speed up the entire sales process, which allows them to give every lead and customer the attention they deserve. Freshsales uses drag-and-drop navigation and intuitive visual graphs to showcase data. Their pricing is also very affordable and significantly cheaper than Salesforce’s pricing plans. Freshsales’ Forest plan, which is built for enterprises, is only $79 dollars. This gives SMBs the ability to upgrade their plans in order to get more out of the software without having to break the bank. Freshsales also offers a free version that doesn’t come with much, but comes with Google Calendar and Freshdesk integrations. Salesforce’s pricing plans may be more expensive, but their plans come with tons of powerful customization features. Salesforce’s Einstein is also a more useful AI tool for businesses looking to gain a deeper understanding of who their customers are. Freshsales’ AI is built specifically for lead scoring, but it’s not enough to consider the entire sales CRM software a game changer. Salesforce, in general, is more inclined to businesses looking to customize their software to fit their specific needs while Freshsales is simply giving businesses an all-in-one, what-you-see-is-what-you-get software. Whether or not this is a good or bad thing depends on what your agents find most useful. Pipedrive is a great sales CRM software for businesses interested in creating and managing sales pipelines. They’re an affordable solution with three different pricing plans that all come with features catered to small businesses. Some of these features include email integration, sales forecasting, and a powerful scheduling tool that allows businesses to get reminders on their phone and allows businesses to categorize activities based on type. Pipedrive is designed specifically for SMBs. This starts with their pricing plans. The most expensive plan is $63/mo, billed annually, and comes with everything Pipedrive has to offer sales teams. This plan is less expensive than Salesforce’s Lightning Professional plan, which comes with just as many features. The difference with Pipedrive, however, is that Pipedrive offers tools like the click-and-drag feature and customizable templates to make the whole experience much simpler. With a direct focus on optimizing the sales pipeline, Pipedrive is a strong choice for sales oriented businesses. Salesforce’s Lightning Professional plan is only $12 more than Pipedrive’s enterprise plan and offers powerful integrations like Google Apps and Microsoft Exchange. Google and Salesforce recently announced more powerful integrations with one another, which will benefit companies that rely heavily on Google. It makes the transition much smoother. Salesforce also offers sales insights, forecasting, and an in-depth knowledge base. Base is another sales CRM software provider interested in making it easy for businesses who have never used CRM software before to adopt their software with little trouble. Base is considered to be the first CRM provider to offer an app on Android, which makes it a great option for businesses who want access to their data outside of the office. Base’s features focus primarily on integration, mobility, and pipeline management, which are all displayed on an extremely intuitive interface. Base is a better Salesforce alternative for businesses interested in sales CRM software for a few reasons. Base’s features are all displayed on a visually-appealing interface that makes it easy for businesses to understand the numbers being generated by the software. Base also comes with the option for businesses to mix and match other products with their CRM software to give every business their own unique experience. What Base lacks in its actual software is also covered by the number of integrations it offers. Utilizing the service Zapier, users can integrate Base with over 1,000 other applications, offering a truly customizable solution. Finally, Base emphasizes the user experience on their mobile app, which makes sense for sales agents and managers who are continually on the run. Salesforce is surprisingly a slightly cheaper option with just as many features. Although they aren’t as customizable, and their mobile app isn’t as powerful as Base’s, their features are exactly what businesses of all sizes need, and their sales CRM software doesn’t have to rely on powerful integrations and products to give their users a much better experience. Salesforce’s Lightning Professional plan is still customizable for businesses capable of taking on added costs when the time comes. Infusionsoft is an all-in-one CRM software provider with products like CRM, sales and marketing automations, email marketing, mobile apps, and many more. Infusionsoft comes with tons of integrations that all keep the small business owner in mind. Each product has enterprise-quality software, giving SMBs the ability to continue using Infusionsoft even when they expand. Overall, Infusionsoft is a straightforward CRM software most businesses will be able to pick up quite easily. Infusionsoft offers multiple products that will help sales teams significantly. Their sales automation software, online sales software, CRM software, and mobile app give businesses important options to choose from, based entirely on what fits their business’ needs the most. Another interesting feature Infusionsoft offers that Salesforce doesn’t is a paid, one-on-one training session so sales managers can learn all the ins and outs of the software. Finally, Infusionsoft offers SMBs a marketplace where they can purchase upwards of 800 apps in order to make their sales CRM software more personalized and powerful. Salesforce offers businesses the same features for a significantly lower price. Infusionsoft claims their products have the same quality as enterprise-level CRMs, but the fact remains that Salesforce is still in a class of their own. Salesforce also offers more contact and lead management tools than Infusionsoft. What really separates Salesforce from Infusionsoft is the fact that it doesn’t require businesses to dish out over $1000 for mandatory training. Sales CRM software isn’t the easiest to learn on your own, but it’s not impossible. It’s nice Infusionsoft offers one-on-one training, but it shouldn’t be mandatory. Infusionsoft is advertised for small businesses, however, this significant cost is not easily affordable. Sugar CRM offers an affordable sales CRM software that comes with tons of important management features. Some of those features include pipeline management, opportunity management, and account management. They also offer sales analytics, process automations, mobile productivity, and sales development/prospecting, which can all be taken advantage of by SMBs. These features come at an affordable price and are customizable as well. Sugar CRM isn’t built specifically for SMBs, but they offer powerful features that are typically found with other SMB-based, sales CRM software providers. One feature that really stands out is the sandbox tool. Businesses can use a sandbox to test all different kinds of scenarios like changing the colors of the website and adding more buttons to see if they help generate more sales. Salesforce offers a sandbox, but at an added price. SMBs can’t afford to take those kinds of risks. Sugar CRM is also unique in that it offers businesses an on-premise option. This might not be the best solution for SMBs, but if the money and space is there for the software and hardware necessary for an on-premise solution, it’s a great way for a business to take full control over their sales CRM software. Despite being the biggest CRM software provider in the world, Salesforce does offer sales CRM software catered to SMBs. Salesforce offers the same management tools Sugar CRM offers, plus a sandbox, and more sales-oriented features and reports that give users a more complete picture of their customers. Salesforce might be more expensive, but you get more out of it. Zoho CRM is one of the best sales CRM softwares for SMBs for great reason. Zoho is a huge company that offers twelve sales-specific products to businesses looking to improve user and customer experience. Their sales CRM software in particular is filled with features at an extremely affordable price. Zoho is also one of the few CRM software providers that offer a powerful free version. Their features all emphasize contact and lead management tools, customizable forms, templates, and dashboards, automations, and integrations. Zoho CRM is a better Salesforce alternative mainly because of how affordable it is. Their most expensive plan is only $100, and it comes with powerful features like a sandbox, advanced CRM analytics, and advanced customization tools, whereas Salesforce’s Enterprise plan costs $50 more. Zoho also offers SMBs an intuitive free version of their software, which is more than enough for inexperienced businesses only trying to dip their feet in the water before committing to more expensive sales CRM software. Salesforce’s Enterprise and Lightning Unlimited plans are much more expensive than Zoho CRM, but they also offer many more features. One of those features is Einstein, a powerful AI feature that is changing the way businesses use CRM software. AI is a powerful tool that is already playing a significant role in sales CRM software, giving sales agents an even closer look at their customers. Zoho has powerful automations, integrations, apps, and analytics, but AI is the future and Salesforce is ahead of the game. Insightly is a sales CRM software provider voted best CRM software of 2017 by PCWorld and was in Entrepreneur’s list of Top 10 CRMs Small Businesses Need to Thrive. Along with the standard CRM features one would expect, Insightly offers powerful automation tools that make it easier for sales agents to focus on more important tasks and meetings that will ultimately generate revenue. They also offer mobility features that make it possible for customer data to be accessed by agents outside of the office at any given time. Contact management and sales pipeline management features also help businesses to speed up their sales process significantly. Insightly is a better alternative for SMBs because of their pricing plans, the amount of features available in each plan, and the fact that they offer a free version for extremely small businesses with less than five employees; this is unlike Salesforce, which has a significant drop off in features available in their low-cost plans, while their more expensive plans don’t offer businesses enough features to make up for the higher cost, and on top of it all, they don’t offer a free version of their software. Salesforce, along with its higher price tags, comes with extremely powerful customization and AI tools businesses can use to paint better pictures of their customers with — features Insightly is currently missing. Salesforce’s cheapest option also comes with online training, which makes it easier for businesses to understand the software. Their plans are also customizable to fit your business’ needs, meaning if you need more features for your CRM software, they can be purchased. ProsperWorks CRM is a sales CRM software built specifically for working with G Suite. This is a great option for SMBs already using Google Sheets, Docs, Calendar, Gmail, etc. in their day-to-day business. ProsperWorks CRM is an affordable option, offering key features like custom fields, a mobile app, a Chrome extension, sales forecasting, a leaderboard, and a RingCentral integration. ProsperWorks is a better Salesforce alternative because of how closely integrated with G Suite it is. Many businesses already take advantage of the apps Google has to offer, so being able to use a CRM that will transfer all that data over seamlessly instead of having to do it manually. Salesforce is working closer with Google as of recently, but ProsperWorks is designed to work with Google from the ground up. ProsperWorks also has a RingCentral integration, which is ideal for business who take advantage of business VoIP. If your business uses RingCentral, there is no longer a need to go back and forth between the two services; calls can be made and recorded using ProsperWorks, and then stored automatically. ProsperWorks is designed to work specifically with G Suite, but it doesn’t go above and beyond like Salesforce. Salesforce offers many more sales-oriented features designed to make the lives of sales agents easier. ProsperWorks is a one-dimensional sales CRM software built for businesses not quite ready to move on from Google. Some of the features Salesforce has that ProsperWorks doesn’t includes a sandbox, AI based software, and opportunity management. Salesforce also works closely with Google, so it’s possible for Salesforce users to get the same level of integrations ProsperWorks offers. HubSpot is a sales CRM software that prides itself on being absolutely free to sign up. There are many providers who offer free versions of their sales CRM software, but none of those versions are as developed as HubSpot’s. HubSpot focuses on automations and speeding up the sales process so agents don’t have to worry about the mundane tasks that slow their days down and take their attention away from clients and leads — all for free. HubSpot CRM is free to use unlike Salesforce. This is ideal for SMBs because SMBs understand the benefits of switching to CRM software, but many solutions are out of their budget. HubSpot gives SMBs no excuse not to try. Plus, if they like the software and wish to upgrade it, there are paid plans they can switch to as they grow. Salesforce does not offer a free version of their software, so users are stuck between three different pricing plans. Salesforce doesn’t have to offer a free version of their sales CRM software for customers to benefit from their features. Salesforce recently jumped on the AI bandwagon with their Einstein tool, which is used for better reporting and analytics. Salesforce also has deeper, more powerful customization tools and configurable reports. Salesforce has a sandbox tool and custom applications that can be fine tuned to fit every business’ needs. Bpm’online offers multiple products ranging from sales to marketing to customer service. Their sales CRM software helps businesses keep track of leads from the moment they show interest in making a purchase up to the final stages of a transaction. They use low-coding technology to make it easier for SMBs to use and navigate. Bpm’online’s CRM software also goes beyond sales, offering powerful marketing and service features too. Bpm’online is a better alternative to Salesforce because they use elements from sales, marketing, and customer service to ensure SMBs are given a complete picture of what their customers expect, how they interact with the company, and how far along they are in the sales process. Salesforce focuses primarily on sales, which is good, but it could do more to offer businesses a bigger picture of their customers’ actions. Bpm’online is also a very inexpensive option to choose from compared to Salesforce, while still offering all the essentials. Salesforce offers a more intuitive interface, displaying graphs and reports on the dashboard in a more appealing way. The info in those graphs and reports is as well-rounded as Bpm’online’s because the number of extra sales features they offer make up for the lack of different perspectives that Bpm’online offers its users. Salesforce also uses AI to develop deeper understandings of their customers, which is a significant trend making CRM software in general an even more powerful tool than it already is. We would also like to break down the features included in each provider’s sales CRM software while providing you with links to each provider’s pricing pages. Both the price and features included have been the general reason behind why we think these ten Salesforce alternatives are better options for SMBs. It makes sense to lay it all out in an easy to read way so your business can quickly determine what best fits its needs. Based on this chart, Zoho CRM is the only provider that offers every one of the listed features Salesforce offers as well. Zoho, like we mentioned before, is a cheaper option that is more suitable for SMBs, so this shows that there are providers who can compete with Salesforce and are better in some cases. A small handful of these providers are only missing one or two features as well, so those should all be taken into consideration as well. Getting a smaller price tag often comes with sacrifices. Your business might not need every single feature we listed, and we might be missing some key features too. Remember, these are just a starting point. For more info on other CRM software providers, see our CRM Software Buyer’s Guide. Our ten Salesforce alternatives for SMBs interested in sales CRM software are all powerful tools that sacrifice very little in terms of features. Salesforce is obviously a great company and will always be a great company, but it’s not the only cloud-based CRM software company. The main takeaway from this is that price, customization, integrations, advanced reporting and analytics, mobile apps, forecasting, and automations are all major features that should not be sacrificed to get a better deal. Every one of these providers offers these features, and tons of other providers we didn’t list offer them as well. It’s also okay to realize that after all is said and done that Salesforce is actually for your business. We’re only trying to paint as clear a picture as possible regarding who offers what, why one provider may be better or worse than the other under certain circumstances, and why we think so. If your SMB is interested in adopting sales CRM software, it’s okay to look beyond Salesforce. Sales CRM software is becoming more and more popular and powerful each year. Salesforce and Zoho CRM are prime examples, adopting AI to provide users with even more advanced reporting. The last thing you should do is give up because Salesforce isn’t right for you.
2019-04-19T04:27:57Z
https://getcrm.com/blog/10-salesforce-alternatives/
February 20, 2019, 5-7 p.m. Join us for this talk highlighting two ways of looking at Monhegan island’s artistic community: from the personal perspective of private collectors and from the historical vantage point of the Monhegan Museum. Leith MacDonald, an artist and arts administrator, will examine key works in a private collection devoted to Monhegan art assembled by two Maine residents. That collection is featured in his recently published book, Island Inspiration, Monhegan’s Art Colony, 1895-2000. Jennifer Pye, curator of the Monhegan Museum, will discuss the museum’s holdings and its relationship to the island community. She recently organized the exhibition The Monhegan Museum, Celebrating Fifty Years 1968-2018 and contributed to the catalog. A reception will follow, celebrating the work of contemporary Monhegan artist Alison Hill, whose work will be on view at Elizabeth Moss Galleries, located at 251 U.S. Route 1, in Falmouth. For more information, call 207-781-2620. Lynn Drexler, Rocks, 1979, 34"x37", oil on canvas. Courtesy of Elizabeth Moss Galleries. The Monhegan Artists’ Residency announces the opening of the application period for summer 2019 grants on Monhegan Island, Maine. The program provides studio space, comfortable living quarters, a modest stipend, and time for visual artists to reflect on, experiment, or develop their art and ideas while living in an artistically historic and beautiful location. The application period runs from February 1st through March 17th and is open to all artists with significant ties to the state. There will be two 5-week grants, one in June and another in September; as well as a 2-week grant in July designed for artist-teachers (grades K-12) who work in Maine. For further information on the application process and past recipients, visit monheganartistsresidency.org, and link to Submittable, an online submission service. The jurors for 2019 applications are photographer Margo Halverson, chair of the graphic design program of the Maine College of Art; the Portland painter and art instructor John Knight; and Rockland-based artist and arts administrator, Leith MacDonald of the Farnsworth's Wyeth Study Center. Artists in all visual media, including painting, drawing, sculpture, photography, printmaking, digital, video, or other new media are encouraged to apply. Successful applicants will be notified by April 15th. A panel of Maine art professionals recently selected three artists to participate in the 2018 summer residency program on Monhegan Island: weaver Sarah Haskell from York, printmaker Jude Valentine from East Machias, and educator and painter Raegan Russell from South Berwick. Sarah Haskell is a textile artist who works with thread in many forms. Prior to her residency time on Monhegan, she intends to weave and “weather” ground cloths, which she will then embellish on island. She will “use the time to stitch, hem, knot, and embroider” and will also “expose additional pieces of hand woven cloth to site specific environmental elements,” while observing “the forces of nature at work, not only on my handwoven/stitched cloth but … ultimately on me.” Haskell is a graduate of the Rhode Island School of Design and was recently awarded residencies at the Vermont Studio Center and the Hewnoaks Artists’ Colony. Jude Valentine creates landscape monoprints in a process through which she draws and paints directly on polymer plates while outside in the landscape. She sees her prints as revealing “elements of landscape,” while being “densely layered with an energetic animism of line and limited color.” Valentine holds a BFA from the Maine College of Art and MFA from the Vermont College of Art, and is an Assistant Professor at the University of Maine, Machias. She was a 2017 Artist in Residence at the Joseph A. Fiore Art Center. Raegan Russell is the Visual Art Department Chair at the Berwick Academy in South Berwick, Maine and will be participating in the 2-week K-12 art teachers’ residency. She looks forward to being inspired by the beauty of Monhegan and sees her paintings as a way to “hold on to the ephemeral and to explore the changing landscape and its forms.” Russell received a BFA and MFA in painting from Boston University, and is currently on sabbatical in South East Asia. The jurors this year included Kathryn Jovanelli, museum administrator at the University of Maine Museum of Art in Bangor; Henry Wolyniec, Portland artist and former studio manager at Space Gallery; and painter Nathaniel Meyer, a Monhegan residency recipient in 2015 and art teacher in the Lewiston High School. All three were impressed with the varying concerns for the natural world apparent in this year’s applications and their inventive modes of expression. Since 1989, the Monhegan Artists’ Residency has supported the creative growth of dedicated Maine artists by providing them time and space in which to work free of interruption and constraint in the inspiring environment of Monhegan Island. For well over 150 years, the island has inspired countless artists, such as Robert Henri, George Bellows, Rockwell Kent, and Jamie Wyeth. While Monhegan continues to attract artists from around the world, it is increasingly difficult for Maine artists to find affordable housing for an extended visit on the island. To this end, the Monhegan Artists’ Residency provides free housing, studio space, a weekly stipend, and time for visual artists to reflect on, experiment, or develop their art. Three residencies are offered each summer for artists with strong connections to Maine: two 5-week sessions, and one 2-week session specifically for K-12 visual art teachers. At this collaborative PechaKucha-style event, a group of former Monhegan Artists’ Residents, including this past summer’s residents, each presented a slideshow of their work. Presentations included highlights from their experience creating work on island and how the experience has informed their current studio practice. Presenting artists included: Meg Hahn (2017), Cory Bucknam (2017), Maia Snow (2017), Nathaniel Meyer (2015), Kenny Cole (2012), John Knight (2001), David Vickery (1993) and Michael Branca (2003). Presented in partnership with the Farnsworth Art Museum. MONHEGAN—The Monhegan Artists’ Residency Corporation (MARC) is pleased to announce that it is now taking applications for its 2018 summer program. Two 5-week residencies are available to Maine-based visual artists during the weeks of May 26 to June 29, and September 11 to October 16. There is also a 2-week residency for a Maine art teacher (grades K-12) from June 30 to July 13. Applications are being accepted online through Submittable.com from February 1 through March 17. For well over 150 years, Monhegan Island has inspired countless artists and continues to attract contemporary artists to its unique coastal island landscape. MARC keeps this tradition alive and well by providing housing, studio space, and a weekly stipend to its artist residents. Not just for landscape painters, the residency is open to artists working in new media, photography, sculpture, drawing, painting, and multi-media. For more information about the program, its past residents, and applications details, visit monheganartistsresidency.org. This year’s applications will be reviewed by a panel of three jurors: Kathryn Jovanelli, Assistant Director, University of Maine Museum of Art, Bangor; Henry Wolyniec, artist and building manager, Space Gallery, Portland; and Nathaniel Meyer, artist and teacher, Lewiston High School, Lewiston. Founded in 1989 the Monhegan Artists' Residency is a volunteer-run 501(c)3 nonprofit supported by donors, art galleries, corporate sponsors, and foundation grants. PORTLAND, ME -- Three Monhegan Artists' Residency alumni - Krisanne Baker, Maia Snow, and Victoria Statsenko - recently opened a show of their paintings at the Avon Street Gallery in Portland on Saturday, November 18. The artists have all previously participated in the Monhegan Artists' Residency. Each spent a month on Monhegan Island where they were given an apartment and studio, a stipend, and the freedom to work as they wished. The residency is awarded annually to artists who are selected by a rotating jury. Susan Danly, president of the nonprofit Monhegan Artists' Residency, attended and spoke at the opening on November 18. The show runs through December 16. Avon Street Gallery is located at 11 Avon Street in Portland, Maine. For further information, please contact Jan ter Weele of Avon Street gallery at 207-536-4979 or [email protected]. Painting & Photography: An Alliance of Mediums reflects the deep connection her painting has to her photographic work and underscores the broader dialogue and influence that exists between these two disciplines. A selection of Hauser’s paintings (many of which began during an immersive five-week residency on Monhegan Island) have been transformed into large groups of ziatype, cyanotype and gum bichromate prints as part of her ongoing Album Series. Hauser’s Album Series amplifies the power and complexity of the print medium by creating compositions that rely on an interplay of pictorial structures between variant prints of the same image. Her intention, through the reiteration of a single image, is to echo the inherent rhythms of the natural world—time in particular—not one moment in time as a single photograph captures; instead, Hauser elects to express the nonlinear way in which we recall time, its relentless repetition and endless variation. The Monhegan Artists’ Residency Corporation has announced their choice of three Maine artists for the 2017 summer residency program on Monhegan Island: Meg Hahn and Mia Snow, who are both painters and recent graduates of the Maine College of Art, and Cory Bucknam, a Gifted and Talented Art Teacher at Brunswick Junior High School who creates abstract ceramic pieces. Hahn and Snow will spend five weeks in June and September, respectively, and Bucknam was awarded the two-week residency in July, recently established for artist-teachers who serve the K-12 grade levels in Maine. The three were selected by a jury that included Chris Stiegler, curator, art historian, and chair of the MFA in Studio Art at the Maine College of Art, Portland; Hilary Irons, artist, and co-founder/curator of Able Baker Contemporary, Portland; and Kelly Finlay, a Monhegan Artists’ Residency board member and public programs manager at the Farnsworth Art Museum, Rockland. Saturday, January 28, 2017 at 1:00 PM at the Farnsworth Auditorium. In this collaborative lecture program, three artists who participated in this past summer’s Monhegan Artists’ Residency will each present a slideshow presentation of their work, including highlights from their experience creating work on island. Susan Danly, President of the Board of Directors of the Monhegan Artists’ Residency, will also share some of the Residency’s history and its mission in supporting the creative growth of dedicated Maine artists by providing them time and space in which to work in the inspiring environment of Monhegan Island. The three artists include Barbara Sullivan of Solon who makes fresco reliefs of everyday objects; Krisanne Baker of Waldoboro who creates multimedia environmental arts on behalf of water quality, availability, and rights; and Michelle Hauser of South Thomaston who explores natural events that tilt Maine’s landscape into abstraction using painting, photography and a convergence of both mediums. Following the presentations there will be an opportunity for Q&A. Advance tickets are also available for sale in the museum store or main lobby admission desk. We are pleased to announce our 2016 residents! Barbara Sullivan from Solon (June) makes fresco reliefs of everyday objects. Krisanne Baker from Waldoboro (July) creates multimedia environmental arts on behalf of water quality, availability, and rights. Michelle Hauser from Rockland (September) creates abstract painting and photography. Congratulations! And thanks to all the wonderful applicants for submitting work. Applications are being accepted for the Monhegan Artists’ Residency for Maine artists. In addition to two five-week residencies on Monhegan Island for Maine-based visual artists, the program offers a two-week residency for a Maine art teacher. “Thanks to the generous support of individual donors, the Horizon Foundation, the Maine Community Foundation, and other charitable organizations, we are again able to support three residencies this year,” said Susan Danly, chair of the Monhegan Artists’ Residency Corporation (MARC) board of directors. The application deadline for all three residencies is March 15, 2016. This year applications for the residency program are being accepted on-line only. For guidelines, a history of the program, and a list of past residents, visit monheganartistsresidency.org. Applicants will be notified by April 15th of the jury’s decision. The residency program provides living quarters, studio space, and a $150 per week stipend. The two 5-week residencies run from May 28-July 1 and September 3-October 7. Only Maine residents are eligible to apply. The two-week Maine art teacher residency runs July 2-15 to accommodate the school-year schedule. The residency program is aimed at visual artists working in painting, drawing, printmaking, photography, sculpture, or the digital arts. An important goal of the program is to enhance the careers of serious artists who have yet to gain wide recognition. Quality of work is the primary criterion for selection. The jury of art professionals this year includes MARC board member and artist Sissy Buck, Polly Saltonstall, editor of Maine Boats, Homes, & Harbors and noted collector of contemporary Maine art, and the artist Duncan Hewitt, whose retrospective exhibition is currently on view at the Portland Museum of Art. Previous Monhegan artist residents include Sarah Knock, Marguerite Robichaux, David Vickery, Lynn Travis, Joe Kievitt, Jim Dugan, Karen Adrienne, Kenny Cole, Jan ter Weele, and Justin Richel. Founded in 1989, the Monhegan Artists’ Residency program is a volunteer-run 501(c)(3) nonprofit supported by donors, art galleries, corporate sponsors, and foundation grants. PORTLAND— Three artists with significant ties to Maine have been selected as the 2015 recipients of the Monhegan Artists’ residency: Coreena Affleck (Yarmouth), Justin Richel (Rangeley), and Nathaniel Meyer (South Portland). Affleck and Richel will benefit from five‐week sojourns on Monhegan Island, and Meyer has been awarded the two-week residency for Maine K–12 art teachers, which was added to the program three years ago. This year marked the first time that the Monhegan Artists’ Residency (MARC) was opened up to artists at all career levels, which brought in a 30 percent increase in applications. The jurors for 2015 were Bruce Brown, collector and former curator at the Center for Maine Contemporary Art; artist Lauren Fensterstock; and Laurie Perzley, Fine Art Director and Curator at Thos. Moser Gallery and MARC Board Member. “It took many hours to come to a decision given the high quality of applicants,” says Brown. Three Maine artists have won the right to walk in the footsteps of Robert Henri, Edward Hopper and Rockwell Kent. Coreena Affleck of Yarmouth, Justin Richel of Rangeley and Nathaniel Meyer of South Portland have been selected as the 2015 recipients of the Monhegan Artists’ Residency. Affleck and Richel will spend five weeks on Monhegan, and Meyer was awarded a two-week residency for Maine K-12 art teachers. A dozen miles off midcoast Maine, Monhegan has attracted artists since the mid-1900s. It remains a destination for artists, but the high cost of housing makes it unaffordable for many beyond day trips and overnight visits. The residency allows artists to work on Monhegan for extended periods. The jurors were Bruce Brown, a collector and former curator at the Center for Maine Contemporary Art; artist Lauren Fensterstock; and Laurie Perzley, fine art director and curator at Thos. Moser Gallery and a residency board member. They selected a multimedia artist in Affleck, a painter, printmaker and ceramicist in Richel, and a painter in Meyer. The residency provides artists with time and space to work free of interruption and constraint. Since its founding in 1989, the organization has sponsored more than 50 artists. Read the full Article on Portland Press Herald’s website. Artists include: Karen Adrienne, Daniel Anselmi, Susan Bennett, Michael Branca, Melinda Campbell, Kenny Cole, Cynthia Davis, Nicole Duennebier, Jim Dugan, Kristin Maria Fitzpatrick, Wes Freese, Alina Gallo, Mercedes Gilbert, Eileen Gillespie, Kelli LK Haines, Mary B. Harrington, Connie Hayes, David R. Higgins, Terry Havey Hilt, John Knight, Sarah Knock, Margaret Leonard, David Little, MaJo Keleshian, Janet Conlon Manyan, Betsy McLellan, Martha Mickles, Marguerite Robichaux, Carol Sloane, Michael J. Smith, Lynn Travis, Emily L. Trenholm, Michael E. Vermette, and Ryan Wight. Jan ter Weele, the last of this year’s MARC residents currently has a show at the George Marshall Store Gallery in York. Carver Hill Gallery is pleased to welcome Daniel Anselmi to our gallery with a solo show on First Friday, September 5, 2014. The show will feature Anselmi’s pieces from a residency on Monhegan Island, as well as a collection of larger paintings, collages and sculptures. The Monhegan Residency Program is a five week retreat for just two artists per summer, carefully selected from many applicants eager to have creative time on this beautiful island. Rockwell Kent, George Bellows, and the Wyeth family, to name a few, have been inspired by the quiet magic of this island. Daniel’s pieces from this residency are wonderful interpretations of his days spent there, and we are delighted to share them in this show. There is a strong architectural aspect of Daniel’s work that make these pieces very intriguing. His palette is typically earthy, very reminiscent of modernist colors and tones, with wonderful texture and depth. He uses found objects in his 2D and 3D work, but they are so skillfully incorporated into the piece that one might not even notice. The discarded paper, which can be old blueprints, ledgers, navigation charts, etc., is painted over with oil, and then arranged as one would apply different colors with a brush. “Though sourced materials are not intended to be recognizable in my abstractions, sometimes surface traces remain that become a moment of discovery for the discriminating viewer.” The re-appropriated objects in his sculpture seem perfectly planned – like happy accidents, they serendipitously support each other to keep from falling over. For more information, please visit Carver Hill Gallery. FREEPORT – Sarah Knock of Freeport is among the 34 artists featured in a 25th anniversary exhibition celebration of the Monhegan Artists’ Residency Program at the Thos. Moser Freeport Showroom, on 149 Main St. The ongoing exhibition continues through Oct. 14. Knock said the Monhegan Artists’ Residency was a “pivotal experience” for her. It supports emerging visual artists by giving them living quarters, studio space and a stipend to live and work on Monhegan Island for six weeks. Knock lives in Freeport with her husband, and is a full-time artist represented by Greehnut Galleries in Portland since 1990. Knock earned her bachelor of fine arts degree at Boston University in 1988 and was awarded the Monhegan Island residency in 1989. The Monhegan Artists Residency Program is pleased to announce the three recipients of the 2014 fellowships. Multi-media artist, Victoria Statsenko, who graduates from the Maine College Art in May, will be the island resident from May 31st through July 4th. The second artist-teacher residency from July 5th through July 18th was awarded to printmaker Scott Minzy, an art instructor at Erskine Academy in South China, Maine. Falmouth painter, Jan ter Weele, will be in residence on the island from September 6th through October 10th. The residency program is aimed at emerging visual artists working in painting, drawing, printmaking, photography, sculpture, or the digital arts. An important goal of the program isto enhance the careers of serious artists who have yet to gain wide recognition. Quality of work is the primary criterion for selection and the jurors for the 2014 application process were photographer and installation artist Elizabeth Atterbury; photographer Bryan Graf, who teaches at the Maine College of Art; and Monhegan watercolor painter, Bruce Kornbluth. This year marks the 25thanniversary of the Monhegan Residency program. Since its founding in 1989, the organization has sponsored the work 48 Maine artists including Marguerite Robichaux (1990), whose career was the subject of a retrospective at the Pucker Gallery in Boston in 2013; Joe Kievitt (1996) and Alina Gallo (2011), both of whom had work chosen for the 2013 Portland Museum of Art’s Biennial; and Cynthia Davis (2006), whose inventive “map-making” received critical praise last year in the pages of the Portland Press Herald during her solo exhibition at the Coleman Burke Gallery in Brunswick. This summer, the work of 34 former Monhegan Residency artists will be the focus of a special exhibition at Thos. Moser’s Freeport, Maine, showroom and gallery from June 19th through October 14th. The works on view at Thos. Moser reflect 25 years of an island residency program. FREEPORT — Back in the day, making art on Monhegan was a fairly simple proposition. Artists could rent a cottage for the summer, and many had the means to buy seasonal homes. But as the island became a destination for the wealthy and well-endowed, the costs associated with island life eclipsed what most artists could afford. For 25 years, the Monhegan Artists’ Residency has given artists the ability to live and work on the island, which sits about 12 miles off the Maine coast. This summer, Thos. Moser in Freeport hosts a 25-year retrospective of work by artists who have benefited from the residency program. For five weeks each summer and fall, two Maine artists are given the opportunity to live and work on the island. Recently, the residency also has awarded Maine art teachers a two-week stay. “Monhegan has been an artist colony for more than 100 years. It’s had this strong tradition, but it’s become financially out of reach for a lot of artists, particularly emerging and mid-career artists,” said Susan Danly, president of the Monhegan Artists’ Residency Corp., based in Lincolnville. It also keeps the art tradition alive on the island. Portland – Daniel Anselmi from Belfast and Kristin Fitzpatrick from Portland have been named the 2013 Monhegan Island artists-in-residence by the Monhegan Artists’ Residency Corporation. Thanks to a new initiative supported by the Maine Arts Commission, Melinda Campbell from Old Orchard Beach will take the first-ever art teacher residency offered by the program. Fitzpatrick, a recent graduate of the Maine College of Art printmaking department, will be on Monhegan June 1-July 5; Anselmi, an abstract painter, August 31-October 4; and Campbell, a teacher in the Auburn School Department, July 6-20. This year’s fellows will lodge in two new studio spaces, Elva’s Old P.O. and the Shumaker Cottage, both of which feature outdoor working spaces overlooking the island’s distinctive landscape. Jurors for the 2013 residencies were Suzette McAvoy, director, Center for Maine Contemporary Art; Charles Melcher, associate professor for Graphic Design, Maine College of Art; and Virginia Sassman Rose, director, Rose Contemporary Gallery in Portland. Noted Maine artists who have taken part in the Monhegan Artists Residency program include Marguerite Robichaux, Lynn Travis, and David Vickery, who will have a solo show at College of the Atlantic this summer. Two other past residents, Joe Kievitt and Alina Gallo, will be featured in the 2013 Portland Museum of Art Biennial. Now in its 23rd year, the Monhegan Artist’s Residency program is supported by individual donations and grants from the Quimby Family Foundation, the Lida P. Underhill Trust, and the Maine Arts Commission.
2019-04-21T00:15:33Z
https://www.monheganartistsresidency.org/news
Public confidence in higher education is waning -- and institutions’ leaders don’t seem terrifically cocky themselves, Inside Higher Ed’s new Survey of College and University Presidents reveals . Inside Higher Ed’s 2018 Survey of College and University Presidents was conducted in conjunction with researchers from Gallup. Download a free copy of the survey report here . Inside Higher Ed's editors will conduct a session on the survey Monday at the annual meeting of the American Council on Education. Information is available here . On Tuesday, April 3, at 2 p.m. Eastern, Inside Higher Ed will present a free webcast to discuss the survey’s results. Register for the webcast here . This has been a turbulent stretch for college leaders, who have been anything but immune from the fragmentation and escalating social and political conflict in American society. The growing skepticism of institutions that candidate Donald Trump tapped into during his run to the presidency has not spared colleges and universities, as the public -- in a series of surveys by Gallup, Pew and others -- has expressed escalating doubts about the value of college and higher education’s contributions to the country. Only 13 percent of college and university presidents agree that "most Americans have an accurate view of the purpose of higher education," and just 16 percent say the public has an accurate view of the purpose of their sector of higher education. The leaders of research institutions feel especially misunderstood: just 5 percent of presidents of public doctoral universities and 11 percent at private doctoral and master’s-level institutions say the public understands their sector, compared to 22 percent of community college leaders, for example. Overwhelming majorities of presidents of all types say the public has been swayed by misconceptions about how they operate. Eighty-six percent of all presidents (and 90 percent of private college leaders) say news media and political focus on student debt has "led many prospective students and parents to think of college as less affordable than it is, taking into account student aid," and 84 percent of all presidents (led by those at research universities) agree that attention to the minority of institutions with large endowments has "created a perception that most colleges are wealthier than they are." Slightly fewer campus CEOs (78 percent) say the "amenities" many colleges have used to recruit students (like the infamous lazy rivers and climbing walls) create the perception that colleges have "misplaced priorities." And half of presidents believe attention to protests on racial issues has persuaded students and families that colleges are "less welcoming" of students from diverse backgrounds than is really the case. Asked to assess which of several factors were most responsible for declining public support, 98 percent of presidents cited "concerns about college affordability and student debt" (65 percent said "very" responsible), 95 percent said "concerns over whether higher education prepares students for careers" (39 percent "very"), and 86 percent cited the perception of liberal political bias (31 percent "very"). Far fewer, 46 percent, said they believed an underrepresentation of low-income students in higher education was responsible for declining public confidence. These answers varied notably by sector, though. Seventy-two percent of private nonprofit college presidents say concerns about affordability and student debt were "very responsible" for declining public confidence, compared to just under half of community college leaders. Roughly four in 10 private college presidents put significant blame for declining public perception on large endowments, compared to o nly 22 percent of public doctoral university presidents (some of which have those large endowments). And private college presidents are twice as likely as public institution leaders (42 vs. 21 percent) to say that perception of liberal political bias is damaging public perception. That divide clearly troubles presidents. More than three-quarters say they worry about Republicans’ increasing skepticism, even as 71 percent disagreed that "Republican doubts about higher education are justified." And while 49 percent of presidents disagree that "the perception of colleges as places that are intolerant of conservative views is accurate," a third (32 percent) agree. Terry W. Hartle, senior vice president for government and public affairs at the American Council on Education, said he had just returned from the latest of several focus groups the lobbying group has done in Pennsylvania and Florida, focusing heavily on Trump voters. He said he was surprised by how little those voters seemed to care about the political climate on campuses. "They could care less about free speech," he said. "It’s one of those issues where the political elites see it differently from the guy on the street." What do they care about? Price and value, Hartle says, just as the presidents are acknowledging. "They overwhelmingly think the value [of a degree] has declined, and they measure value by economic return. They think you don’t need a college education to get a good job, but their own kids are going to go to college, and they think it’s too expensive." Lanae Erickson Hatalsky, vice president for the social policy and politics program at Third Way, a center-left-leaning think tank that closely follows higher education issues, said the presidents probably have it right that concerns about price are the biggest driver of public dissatisfaction. She also agreed with the presidents that the "fear of student loan debt has contributed to people thinking [college] is unaffordable," and that that misperception may discourage some students from taking out loans that might help them complete college. "The presidents 100 percent think it’s about perception," she said. "There’s little acknowledgment that there might be a kernel of truth" to the public concerns. The one exception was the Education Department’s efforts to "give colleges more flexibility in how they handle allegations of sexual assault," which 54 percent of presidents said they favored (39 percent) or strongly favored (15 percent). That doesn’t mean the college leaders are fully on board with the administration’s approach to sexual assault on campus, though: more presidents said they opposed (40 percent) than favored (36 percent) the department’s decision to "revoke guidance the Obama administration gave colleges about how to handle sexual assault cases." Gina Maisto Smith, whose legal practice with Leslie Gomez at the law firm Cozen O'Connor focuses heavily on sexual assault cases, said the presidents' two responses seemed in conflict -- both saying "we're in favor of more flexibility" in adjudicating cases on their campuses but opposing the removal of federal guidance that arguably limited that flexibility. Smith said she suspected that campus leaders "understand the value of having standards of care, of having some direction," even if they sometimes bristled at how the federal government watched over their shoulders. More presidents this year than last (84 percent this year to 76 percent in 2017) say Trump "does not accept scientific consensus on many issues, such as climate change," and (by 77 percent to 69 percent in 2017) they believe that "anti-intellectual sentiment is growing in the United States." Where 58 percent of campus chief executives agreed last year that "international students may be less likely to enroll at American colleges" because of Candidate Trump’s anti-immigration language, 69 percent said in this year’s survey that "President Trump’s rhetoric has made it more difficult for my college to recruit international students." A solid majority of presidents this year (61 percent) agreed that "the push to diversify American higher education is likely to recede in public attention and public policy," up from 55 percent in 2017. In one other area of potential concern -- whether Trump’s sometimes incendiary rhetoric about minority groups might inflame the racial situation on campuses -- the presidents are divided on the impact. Thirty-nine percent agree that race relations on their campuses are "worse under President Trump than they were under President Obama," while 35 percent disagree. Eighty percent of campus leaders described the state of race relations on their campuses as excellent (19 percent) or good (61 percent), with private college leaders (24 percent) more likely than their public college peers (14 percent) to answer "excellent." It’s a frequent phenomenon of Inside Higher Ed’s various surveys of campus leaders for respondents to view their own campuses’ performance much more positively than everyone else’s. But it’s not clear which answer that dynamic raises more questions about -- are they assuming the worst about other colleges about which they know relatively little, or grading their own campuses on a friendly curve? "It is hard for me to believe that race relations are excellent or good" on most campuses, she said via email. "I say this because white leaders and faculty are generally (there are always exceptions) uncomfortable with ‘race talk’ … They are more at ease with the language of diversity and inclusivity, which tends to blur the production of everyday racism through practices that are assumed to be color-blind, objective and neutral. ‘Racial relations’ play out in campus structures: curriculum, hiring, tenure, the distribution of opportunities … It is hard to see how racial relations could be deemed good or excellent when the white-Black, Latinx, Native American degree attainment gaps are higher now than they were almost 50 years ago." She added, "I think that presidents are so positive about the quality of race relations on their campus because it is not something they know how to assess (there is no SAT score for racial relations), it is not something they put on their cabinet meetings’ agendas, or in their reports to trustees. Most people, presidents included, view themselves as caring about being fair and not being racist so they don’t talk about racial relations. I expect that if the questions you asked of the presidents were asked of minoritized faculty, staff and students the response would be very different." Kimberly A. Griffin, associate professor of education at the University of Maryland at College Park and incoming editor of the Journal of Diversity in Higher Education, said she suspected presidents were drawing conclusions about other campuses’ problems based on racist acts elsewhere that may have drawn media attention. "If a campus hasn’t experienced these phenomena, perhaps the president is thinking of their campus as being in pretty good shape," Griffin said via email. "Unfortunately, this thinking misses the more subtle forms of oppression that students, faculty and staff face in the form of microaggressions, stereotypes, marginalization and isolation. Research tells us that these experiences are common and can be just as problematic as the incidents that may receive more media and public attention." Griffin said the data may explain "why we see less action and movement towards promoting race relations and engagement across difference on college and university campuses … Viewing their own campuses as ‘excellent’ or ‘good,’ while generally acknowledging race relations as a problem in higher education, signals that these presidents don’t necessarily see race relations as their problem. And you cannot begin to understand, explore or address a problem that you won’t acknowledge." Last year delivered a noticeable uptick in the number of colleges and universities closing or merging (or at least talking about merging), and a flurry of private colleges lowering (or "resetting") their tuition substantially. Those developments hint at a recognition by campus leaders that the financial pressures on their institutions is a permanent condition rather than a lingering result of the Great Recession, and that structural changes may be needed. Private college presidents remain somewhat more confident in their institutions’ viability over a decade, with 57 percent of leaders agreeing (21 percent strongly) that "my institution will be financially stable over the next 10 years," compared to 47 percent of public university chief executives (16 percent strongly). The sector-specific numbers changed little from last year, with the only meaningful difference being an eight-percentage-point rise (from 46 to 54 percent) in the proportion of private baccalaureate college leaders expressing confidence in their institutions’ stability over a decade. Presidents expect roughly similar numbers of public and private institutions to merge -- but their estimates are modest. A majority expect one to five mergers of private and public colleges (56 and 55 percent, respectively), while 29 and 23 percent anticipate six to 10 mergers of private and public colleges, in that order. Thirteen percent of presidents expect more than 10 mergers of private institutions, and 9 percent expect that many combinations of public institutions. Peter Stokes, a managing director at Huron Consulting Group, said the firm had spoken with numerous small private colleges and some public systems about merging or consolidating. "I think the rising cost of operations and competitive pricing environments most institutions find themselves in will continue to be challenging over the next 10 years," Stokes said via email. "I guess the thing everyone wants to know is, who’s next -- who will close, merge, partner or reinvent themselves? "Then they want to know how institutions that have reinvented themselves have managed it. Unfortunately, it can be time-consuming for institutional leaders to identify innovations undertaken by peers that could be ported to their campus, and often by the time an institution starts looking, it’s already in a difficult financial situation and yet the campus community may still not be ready to face the prospect of significant change." Tuition resets and freezes are less dramatic than closures and mergers, and a rash of colleges adopted them last fall, drawing praise and doubts. About two-thirds of presidents (67 percent, 17 percent strongly) agreed there would be more tuition resets at private institutions in the next year, with public college leaders much likelier than private college presidents to say so, by a margin of 81 to 60 percent. Presidents do not think much of these strategies. More than two-thirds (68 percent) agreed that "tuition resets are more of a gimmick than a viable long-term strategy," while 79 percent (and 98 percent of presidents at public doctoral universities) agreed that "tuition freezes, absent more state appropriations, can damage public institutions." Eighty-two percent of presidents described themselves as either "very" (42 percent) or "somewhat concerned" (40 percent) about meeting their institution’s "target number of undergraduates," down from 84 percent (51 percent "very concerned") in 2017. The numbers were down virtually across the board, in some cases sharply, as seen in the table below. Asked about which particular groups of students whose enrollment they were focusing on, presidents said they were "very concerned" about enrolling students who "are likely to be retained and graduate on time" (39 percent, with 43 percent "somewhat concerned") and students who don’t need institutional aid (27 percent). International students (17 percent) and racial and ethnic minority students (16 percent) were next. More presidents said they were "very concerned" about giving out too much aid to students who may not need it than about recruiting first-generation students (14 percent) and Pell Grant-eligible students (13 percent). The fewest presidents said they were very concerned about enrolling classes that will improve their institution’s standing in rankings (6 percent) or talented athletes (7 percent). And roughly the same proportion, 54 percent, said they intended to speak out more about issues "beyond those that directly affect" their college. Textbooks and course materials. In line with Inside Higher Ed’s recent surveys of chief academic officers and faculty members’ views on technology, presidents strongly agreed (61 percent) that "textbooks and course materials cost too much." Thirty percent more agreed. Their support comes with conditions, though. Campus leaders were fairly divided (44 percent agree, 34 percent disagree) on whether "faculty members and institutions should be open to changing textbooks or other materials to save students money, even if the lower-cost options are of lesser quality." And only about half of presidents agreed (20 percent strongly) that "the need to help students save money on textbooks justifies some loss of faculty-member control over selection of materials for the courses they teach." Please follow me on Twitter @dougledIHE .
2019-04-21T00:30:13Z
https://www.insidehighered.com/print/news/survey/survey-college-presidents-finds-worry-about-public-attitudes-confidence-finances?width=775&height=500&iframe=true
As the first capital of Tennessee (1796 to 1812), Knoxville is proud of its heritage and committed to preserving it. 225 years old, Knoxville is a haven for history buffs and music and art lovers. Museums include the East Tennessee History Center, McClung Museum of Natural History and Culture and the Knoxville Museum of Art. The Sunsphere Tower, built for the World’s Fair in 1982, is a well-known symbol of Knoxville. At 341 feet high, its observation deck offers a 360 degree view of Knoxville and surrounding areas. Its fifth floor restaurant, Primo Restaurant Italiano, mixes Old World Italian cuisine with a modern flair. Nestled in the foothills of the Great Smokey Mountains, nearby Maryville is one of the Top 10 Cities to Have it All, according to A&E Television, and Your Money magazine called Maryville “one of tomorrow’s hottest retirement destinations.” For both young families and retiring Baby Boomers, this area is an affordable place to live with all the amenities your heart could desire. And with only 18 miles between the cities, Maryville and Knoxville share proximity to tourist attractions like the Great Smokey Mountains National Park, Dollywood, Gatlinburg, Pigeon Forge and the cultural allure of Knoxville’s 15 theaters and professional stage companies such as The Bijou Theater, the largest theater in Knoxville. Market Square is one of Knoxville’s most popular places to shop, work, play and live. Since 1860, it has been home to outdoor concerts and movies, Shakespeare on the Square and fabulous restaurants offering everything from Southern-style cuisine to steak and sushi. For getting back to nature, Ijams Nature Center offers 300 acres of hiking, biking and exploring on the Boardwalk trail, and Zoo Knoxville has everything from anteaters to zebras and a petting zoo to enchant your entire family. With Knoxville’s pleasantly mild temperatures for most of the year, residents have many opportunities to take advantage of their outdoor living spaces. Concrete Craft serving Knoxville can provide your home or business with custom resurfaced concrete overlays at half the cost of other materials. Proud franchise owners, Chuck and Vanessa Yates, can transform your patios and pool decks with beautiful stamped, stained and resurfaced decorative concrete designs so that you can enjoy and maintain your spaces more comfortably. Concrete Craft can also add beauty, value and curb appeal to your home. Improving the look and sustainability of your driveways, walkways, and front porches has never been easier – or less messy – using our concrete overlay system. For homeowners who desire a handcrafted “artisan” look, Chuck and Vanessa can use our proprietary hand-cut and custom-colored approach to fabricating the concrete to resemble natural stone, including flagstone and cobblestone. Concrete Craft serving Knoxville also provides expert precision and custom designs that can upgrade your interior floors, including kitchen floors, laundry room floors and basements! Be sure to ask about our stamped concrete designs that resemble real hardwood floors! Our vertical concrete resurfacing applications can completely change the exterior façade of your home, indoor and outdoor fireplaces, shower and accent walls by installing faux stone siding over the existing surface – all without the need of costly demolition. Concrete Craft of Knoxville serves the surrounding towns of Clinton, Friendsville, Greenback, Heiskell, Lenoir, Lone Mountain, Loudon, Louisville, Oak Ridge, Philadelphia, Powell and Maryville. Make your home a showplace with custom decorative concrete! Chuck and Vanessa are ready to beautify your outdoor concrete surfaces as well as the interior floors and vertical surfaces of your home or business. We were able to have this flagstone stamped patio installed along with the split face steps. Project completed in Knoxville Tennessee in 2019. We were able to have this new patio poured with a flagstone stamp. We were also able to have this fire pit installed into the design. Project completed in Knoxville Tennessee in 2018. We were able to have this new porch poured and stamped with a reclaimed wood design. Project completed in Maryville Tennessee in 2018. We were able to resurface over the existing concrete on this side patio with our Ashlar slate design and stained with our MasterPro classic grey. Project completed in Knoxville Tennessee in 2018. We were able to resurface over the existing concrete on this front porch with our Ashlar slate design and stained with our MasterPro classic grey. Project completed in Knoxville Tennessee in 2018. We were able to grind off the existing coating and go over the the concrete with our wood plank stamp to create a natural looking design. Project completed in Alcoa Tennessee in 2017. We were able to go over the existing concrete on this back patio with an Ashlar Slate stamp in our grey stain. This project was completed in Loudon Tennessee in 2017. We were able to go over the existing concrete on this front porch and apply an Ashlar Slate stamp with our grey stain. This project was completed in Loudon Tennessee in 2017. We were able to grind off the existing paint on this back porch. We were then able to apply this beautiful knotted wood plank stamp to give it a natural look. This project was completed in Lenoir City Tennessee in 2017. We were able to install two seating walls and fire pit to this beautiful sitting area. We were able to create a stacked stone look on both walls and the fire pit. This project was completed in Maryville Tennessee in 2017. Our ashlar slate stamp in an English red stain. We were able to revive this front walkway that had been heavily damaged from years of rock salt use. This project was completed in Maryville, Tennessee in 2016. Our knotted wood plank resurfaced over a back patio. This project was completed in Maryville in 2017. We were able to resurface over the existing concrete on this walkway and front porch with our hand carved flagstone design. Project completed in Knoxville Tennessee in 2019. We were able to grind off the previous paint coating and then resurface over the existing concrete with our hand carved flagstone design. Project completed in Knoxville Tennessee in 2019. We were able to resurface over the existing concrete with our hand carved flagstone design. Project completed in Maryville Tennessee in 2019. We were able to resurface over the existing plain grey concrete with our unique hand carved flagstone design. Project completed in Knoxville Tennessee in 2018. We were able to grind off the previous failing coating and then resurface over the existing concrete with our hand carved flagstone design. Project completed in Maryville Tennessee in 2018. We were able to resurface over the existing concrete with our Roman Slate texture and stained with our exclusive Golden Brown. Project completed in Loudon Tennessee in 2018. We were able to resurface over the existing concrete on this back patio with our hand carved flagstone design. Project completed in Alcoa Tennessee in 2018. We were able to resurface over the existing concrete on this back patio with our hand carved flagstone design. Project completed in Knoxville Tennessee in 2018. We were able to grind off the previous paint coating and then resurfaced over the existing concrete on this front porch with our reclaimed wood stamp and stained in our MasterPro Golden Brown. Project completed in Clinton Tennessee in 2018. We were able to resurface over the existing concrete on this back patio using our reclaimed wood stamp and stained in our Golden Brown. Project completed in Knoxville Tennessee in 2018. We were able to resurface over the existing concrete with our hand carved flagstone design. Project completed in Maryville Tennessee in 2018. We were able to grind off the previous worn down seal and resurface over the existing concrete with our unique hand carved flagstone design. Project completed in Louisville Tennessee in 2018. We were able to grind off the previous failing paint coating and resurface over the existing concrete with our hand carved flagstone design. Project completed in Knoxville Tennessee in 2018. We were able to resurface over the existing concrete on this driveway using our hand carved flagstone design. Project completed in Ten Mile Tennessee in 2018. We were able to resurface over the existing concrete on this back patio using our slate design and MasterPro Classic Grey stain. Project completed in Seymour Tennessee in 2018. We were able to resurface over the existing concrete on this front porch using our unique hand carved flagstone design. Project completed in Knoxville Tennessee in 2018. We were able to resurface over the existing concrete on this front porch using our Ashlar slate design and our MasterPro Dark Walnut stain. Project completed in Knoxville Tennessee in 2018. We were able to resurface over the existing concrete on this back patio using our Ashlar slate design and our MasterPro Dark Walnut stain. Project completed in Knoxville Tennessee in 2018. We were able to resurface over the existing concrete on this back patio using our hand carved flagstone design. Project completed in Rutledge Tennessee in 2018. We were able to resurface over the existing concrete using our Reclaimed Timber wood stamp and our MasterPro Golden Brown stain. Project completed in Rockwood Tennessee in 2018. We were able to grind off the previous multiple layers of paint and apply our unique hand carved flagstone overlay. Project completed in Kodak Tennessee in 2018. We were able to resurface over the existing concrete on this pool deck with our unique hand carved flagstone design to give the surface a natural look. Project completed in Athens Tennessee in 2018. We were able to resurface over the existing concrete on this front porch with our unique hand carved flagstone design. Project completed in Knoxville Tennessee in 2018. We were able to grind off the previous green paint coating and resurface over the existing concrete on this front porch using our hand carved flagstone design. Project completed in Oak Ridge Tennessee in 2018. After the outdoor carpet was removed, we were able to resurface over the existing concrete on this front porch using our hand carved flagstone design. Project completed in Maryville Tennessee in 2018. We were able to grind off the previous coating and properly apply over the existing concrete our unique hand crafted and hand carved flagstone design on this driveway. Project completed in Knoxville Tennessee in 2018. We were able to resurface over the existing concrete on this front porch using our hand carved flagstone design. Project completed in Knoxville Tennessee in 2018. We were able to resurface over the existing concrete on this front porch using our hand carved flagstone design. Project completed in Maryville Tennessee in 2018. We were able to resurface over the existing concrete using our hand carved flagstone design. Project completed in Maryville Tennessee in 2018. We were able to resurface over the existing concrete on this pool deck using our hand carved flagstone design. Project completed in Maryville Tennessee in 2018. We were able to resurface over the existing concrete on this walkway using our hand carved flagstone design. Project completed in Maryville Tennessee in 2018. We were able to resurface over the existing concrete on this driveway using our hand carved flagstone design. Project completed in Maryville Tennessee in 2018. We were able to resurface over the existing concrete on this front porch using our hand crafted and hand carved flagstone design. Project completed in New Market Tennessee in 2018. We were able to grind off the previous paint coating and apply our unique hand carved flagstone over the existing concrete. Project completed in Knoxville Tennessee in 2018. We were able to resurface over the existing concrete on this back patio using our hand carved flagstone design. Project completed in Maryville Tennessee in 2018. We were able to resurface over the existing concrete on this front porch with our hand carved flagstone design. Project completed in Knoxville Tennessee in 2018. We were able to resurface over the existing concrete on this side patio with our hand carved flagstone design. Project completed in Knoxville Tennessee in 2018. We were able to resurface over the existing concrete on this front walkway with our hand carved flagstone design. Project completed in Maryville Tennessee in 2018. We were able to resurface over the existing concrete on this back patio with our hand carved flagstone design. This design also helped us incorporate many cracks that was on the original concrete slab. Project completed in Knoxville Tennessee in 2018. We were able to grind off the previous slippery paint coating and then we were able to resurface over the existing concrete on this front porch with our hand carved flagstone design that also helped incorporate cracks. Project completed in Maryville Tennessee in 2018. We were able to grind off the previous coating that was failing. We were then able to resurface over the existing concrete on this pool deck with our hand carved flagstone design. Project completed in Knoxville Tennessee in 2018. We were able to brighten up this small front porch and give it some character by going over the existing concrete using our hand carved flagstone design. Project completed in Knoxville Tennessee in 2017. We were able to remove the paint on this front porch and resurface by going over the existing concrete with our unique hand carved flagstone design. Project completed Seymour Tennessee in 2017. We were able to resurface this pool deck by going over the existing concrete with our popular hand carved flagstone design. Project completed in Knoxville Tennessee in 2017. We were able to resurface over the existing concrete on this poorly installed porch. Instead of tearing out the concrete, we were able to resurface over the concrete using our unique hand carved flagstone design. Project completed in Knoxville Tennessee in 2017. We were able to remove the slick tile that had been previously on this front porch. We were then able to resurface over the existing concrete with our unique hand carved flagstone design. Project completed in Greenback Tennessee in 2017. We were able to go over this heavily cracked existing patio with our unique hand carved flagstone design. Project completed in Maryville Tennessee in 2017. We were able to go over the existing concrete on this front porch with our hand carved flagstone design. We were able to incorporate multiple cracks into our unique design. This project was complete in Knoxville Tennessee in 2017. We were able to extend this patio out to give the homeowner more entertainment space. We were then able to resurface over the existing concrete using our hand carved flagstone design to give the patio a unique look. This project was completed in Knoxville Tennessee in 2017. Resurfaced this back patio and was able to incorporate cracks into our flagstone design by going over the existing concrete. This project was completed in Knoxville Tennessee in 2017. We were able to transform this front porch using our hand carved flagstone design. The porch was previously worn and had two large cracks. We were able to go over the existing concrete and incorporate the cracks into our design. This project was completed in Powell Tennessee in 2017. We were able to remove the previous epoxy coating that was pealing up and replace it with our hand carved flagstone design over the existing concrete. This project was completed in Maryville Tennessee in 2017. This porch previously had a paint coating that we had to grind off. We were able to apply our unique hand carved flagstone design over the existing concrete. This project was completed in Maryville Tennessee in 2017. This back patio had 3 layers of paint and carpet glue covering the existing concrete. Once we got back to the original concrete using a grinder, we were able to apply our hand carved flagstone design to also incorporate the existing cracks. This project was completed in Maryville Tennessee in 2017. We were able to transform this heavily cracked pool deck into a beautiful entertainment area using our unique hand carved flagstone design. This project was completed in Alcoa Tennessee in 2017. This back patio was ready for a change. The patio also had 4 major crack lines that went up and down and left to right. We were able to incorporate the cracks using our popular hand carved flagstone design. This project was completed in Alcoa Tennessee in 2017. We resurfaced this front porch that had a very noticeable crack near the front door. We were able to incorporate the crack by creating a grout line where the crack existed. This project was completed in Knoxville Tennessee in 2017. This concrete pad had been previously been a basketball court in the backyard for the children while they were growing up. After the children were grown, the homeowner was ready to turn it into a comfortable entertainment area. We were able to use our hand carved flagstone to give it a warm touch. This project was completed Knoxville Tennessee in 2017. We resurfaced this front porch that had a large crack with our unique hand carved flagstone design. This project was completed in Knoxville Tennessee in 2017. We were able to resurface this front porch that had once been painted. We used our hand carved flagstone design to give this front porch an elegant look. This project was completed in Knoxville, Tennessee in 2017. We resurfaced this poorly installed pool using our hand carved flagstone. We were able to incorporate many of the imperfections caused by the installation into our design to give this pool deck a pleasant look. This project was completed in Sevierville, Tennessee in 2017. Our hand carved flagstone over a front porch. This project was completed in Powell, Tennessee in 2016. We were able to micro top over the original concrete that was heavily worn down with an excess amount of wood glue. We used our pearl grey stain. Project completed in Knoxville Tennessee in 2018. We were able to acid stain this new concrete basement floor with our MasterPro Vintage Umber color. Project completed in Allardt Tennessee in 2018. We were able to remove the previous worn down carpet and stain this concrete basement floor in our Dark Walnut. Project completed in Knoxville Tennessee in 2018. We were able to apply a solid grey color coating on this concrete front porch to give it a new tone. Project completed in Knoxville Tennessee in 2018. We were able to remove the previous worn out carpet and apply our easy to maintain cola stain on this concrete floor. Project completed in Maryville Tennessee in 2018. We were able to have this new stained concrete patio poured underneath an existing deck that was once a dirt area. Project completed in Knoxville Tennessee in 2018. We were able to acid stain the lower level of this new home with our exclusive Vintage umber acid stain. Project completed in Maryville Tennessee in 2018. We were able to deep clean and reseal this pea gravel driveway to bring back its vibrant look. Project completed in Maryville Tennessee in 2018. We were able to stain the concrete gray in this newly finished bedroom. Project completed in Knoxville Tennessee in 2018. We were able to apply our stained sealer over this patio to give it a uniform look. Project completed in Maryville Tennessee in 2018. We were able to remove the previous failing tile that was caused by water damage and use our cola stain to give this floor a new vibrant look. Project completed in Knoxville Tennessee in 2018. We were able to apply our Mission Brown acid stain on the first floor of this newly constructed home. Project completed in Townsend Tennessee in 2017. We were able to replace the outdated carpet that was in this basement and applied our walnut stain to give this concrete floor a warm feel. Project completed in Louisville Tennessee in 2017. We were able to grind the previous coating off that was on the concrete. We were then able to stain these floors using two different shades of our gray stains. Project completed in Pigeon Forge Tennessee in 2017. We were able to stain this back patio at this brand new home to give it a warm feel. Project completed in Knoxville Tennessee in 2017. We were able to brighten up this basement floor with our cola stain. This project was completed in Maryville Tennessee in 2017. We were able to remove the linoleum in this utility room. Once removed, we were able to resurface the area to hide the imperfections caused by the glue and stain spots from other materials. We were then able to apply our cola stain to give this room a nice finish. This project was completed in Newport Tennessee in 2017. We had to grind off the existing red paint and red stain that had been applied to this floor many years ago. After the proper prep work, we were able to stain this floor giving it a popular cola look. This project was completed in Knoxville Tennessee in 2017. We stained this basement man cave with our popular cola stain. This project was completed in Greenback Tennessee in 2017. We were able to stain this finished basement using our walnut stain. This project was completed in Maryville, Tennessee in 2017. We were able to stain this finished basement using our cola stain. This project was completed in Maryville, Tennessee in 2017. We stained this finished basement using our cola stain. This project was completed in Maryville, Tennessee in 2016. Chuck's crew arrived early and did a great job. Very happy with the results. Service was timely. Estimate was correct. Workers courteous. Chuck was easy to work with. I found Chuck Yates to be very professional, knowledgeable, and easy to work with. I highly recommend Chuck and Concrete Craft. Provided exact service they said they would provide very promptly. Explained all the steps in the process as well as care. Porch looks great and we would certainly recommend them. Thanks for such hard work and diligence in getting my job completed despite the sudden rain. Because of you, my home went on the market on time and everyone that sees my front porch is WOW'ed! It's beautiful! Thank you so much for your hard work and effort on our sun room floor. Your timeliness, professionalism, and positive communication made this experience worth it; not to mention we now have a beautiful floor to show off now! We appreciate Concrete Craft of Knoxville. I hired Concrete Craft to clean and seal a pea gravel driveway. They did a great job. The staff showed up on time, gave clear communication when rain caused a delay, and made suggestions for the future. I will use them again in the future. Chuck and Jon were great and the floors look fantastic! They explained everything as they went, told me how to take care of the floor afterwards and worked quickly. Would definitely use again! The folks at Concrete Craft are amazing-they transformed a cracked, stained floor into a work of art. Definitely recommend! Very good service, exactly as promised. Concrete Craft is a trusted source of excellent concrete work. Job done to spec. Job done on time. Good quality work and materials. Contractor was very responsive to questions and polite. Will recommend to others. Great job Concrete Craft! Chuck Yates was great to work with and very attentive to all my many questions! Thanks for making my front porch look so inviting! I would highly recommend Chuck and his team. Excellent work, great customer relation and pride in workmanship. Would give the best rating and definitely will use again. Very responsive company, arrived on time and completed work on time. Very efficient. Excellent workmanship! Beautiful job! Very pleased with the results. Very professional! Arrived on time, worked diligently, and completed job on time. Very pleased. The pool deck looks great! I really appreciate the hard work your employees did. Very friendly and answered my questions. Thanks for a job well done! I am very pleased with the results of my stamped concrete. Everyone was very nice and professional. Would recommend to anyone. I am very pleased with my new patio. I was involved in a small degree with the patio at the Sigma Kappa House in Knoxville Tennessee and the service and final product of mine is much more satisfactory than the one in Knoxville. All workers were very professional and very good at what they did. I have already recommended your company to friends. I received excellent workmanship. The job was done in a timely manner and the clean-up was great. My patio looks wonderful. I can truly recommend Concrete Craft of everyone. Excellent communication. Delivered service as promised. Actually performed job earlier than promised. Would definitely use again. Chuck and his crew were very prompt, courteous and professional. The work was outstanding and would use Concrete Craft again. High quality work for a minimal cost. Thank you Chuck again for beautiful work! Very pleased with the finished look. The floor looks amazing-they did a great job of fixing the cracks, and the paint makes it look like a whole new room. We would definitely recommend Concrete Craft to all our friends. Chuck did a great job on the floors of our church building. Our floors look amazing and are exactly what we asked for. Chuck and his team worked hard all week, including some late nights and early mornings, to get our floors ready for church on Sunday. They were incredibly professional and easy to work with. We really enjoyed working with Chuck and Concrete Craft. Excellent!! I love it. My patio looks completely different. Could not have asked for better service. I would recommend your service to anyone. Very well pleased-professionally done-very courteous workers. Will highly recommend to friends and family. Thanks for a job well done! Chuck is very courteous, prompt, and professional with his work ethics. Enjoyed doing business with him and his crew. Highly recommend him to anyone thinking about creative concrete design work. Five stars. Our resurfaced concrete looks exactly like the samples we were provided. They guys did a wonderful job! The men came when they said and did high quality work. They were very courteous. We were left with a fantastically looking side walk. Considerate, professional, knowledgeable, and on time. Great job! Very respectful and worked with us for what we wanted done. We are thinking of hiring you again. Thank you! I was so impressed with the care and attention to detail. We are extremely picky and we did not have to worry about anything. Everything was done with much care. Highly recommend! The whole experience was A++ superb! The quality of work was excellent and the customer service was fabulous! From start to finish, everything exceeded expectations. Highly recommend and will definitely use again! I can't express how pleased I am with the flagstone. The crew was great. They were very clean. I would definitely use them again and recommend them to others. We just moved into the home where your work was done in the basement. Your work looks very nice. I found your paper work while moving in. We'll give you a call to do some future work in the next garage project. The work was exceptionally well done. A great hard working crew. Very polite and well mannered. We loved the way the work turned out. A great job. Hats off to Concrete Craft. Over the years, I have explored and researched at least six sources and more to professionally service, pressure wash and seal my nine year old driveway and patio. It was on a Saturday morning radio show "Around the House" where I first hear Mr. Chuck Yates regarding Concrete Craft of Knoxville. I was most impressed by Mr. Yates' presentation and the information concerning Concrete Craft of Knoxville. I telephoned Mr. Yates requesting an appointment for him to service the driveway and patio. My worries and years of exploring had finally ended. I loudly applaud and sincerely Thank you Mr. Yates for the wonderful, professional, superior and exceptional care you did servicing the driveway and patio. During his work and after Mr. Yates finished the driveway, several new and old neighbors continue to inquire about Concrete Craft. I humbly Thank you Mr. Yates and your excellent assistant for your professional care, attention, time and your personal touch in servicing my driveway and patio. Concrete Craft of Knoxville did a great job resurfacing the concrete around our pool, front walkway, and patio. It really helped to beautify our outdoor living spaces. Chuck was very responsive and kept us informed throughout the entire process. Chuck and his team were outstanding! They arrived on time and completed the project on schedule. The entire crew was professional, highly skilled, and hard working. A++ service! The level of quality and service Chuck and the rest of the crew with Concrete Craft supersedes anything that I have ever seen. Would I use them again? Absolutely! Their work is phenomenal, and we are already working on a budget to have additional work performed by Concrete Craft. Their work is more than a trade; it's an art! Very efficient! Concrete looks great!! Thank you. Owner and staff excellent! Professional and friendly. They know their job very well. I would recommend to anyone. They did a great job! They were able to finish the work in a good time for a reasonable price! I love my floor! All the guys were extremely nice and professional. I am so pleased with my patio. It is beautiful. I enjoyed watching it come to life and it is all done by hand. The workers worked hard. Just want to say to you "God Bless" you and your business. This is the second year that we have used Concrete Craft to clean and seal our outside cement deck and driveway. They did another professional job at a reasonable price. I know that the quality of their work is adding years of life to our deck and driveway. Very good service. A pleasure to work with. Chuck and his crew were very professional and courteous. We were very pleased with the transformation of our porch and patios. The results actually exceeded our expectations! Concrete Craft did a great job cleaning our driveway and patio. They look almost brand new again! Very timely and professional service. Pleasant workers. Chuck and his crew did what they said they would do when they said they would do it with the utmost professionalism. My experience with Chuck Yates and the service I received was very good. He was very courteous and efficient to keep me posted about the scheduling and status of the job. He and his crew work hard and non stop for two days to get the job done as promised. I will recommend him to my friends. We have a fabulous looking front porch. Concrete Craft told us how long it would take and it happened. The craftsmanship of the surfacing was superb. We would recommend Concrete Craft for resurfacing. We are very happy with our great looking porch! Great work! Driveway job was very easy and thorough. The service was outstanding. Service was requested on short notice. Was provided a great price quote with fabulous service and quick turnaround. We will definitely use your services when needed. Thank you. The stain was the perfect color. It was exactly what I had envisioned for the room. You did an excellent job and I would recommend you to all my friends. Thanks for doing a great job! Our service with Concrete Craft was satisfactory. They were thorough with cleaning and preparation of the surface to be stained. They applied several coats of stain and then came back for any touch up areas that were missed. They completed their work in a timely and professional manner. So pleased with my pool area! It looks awesome! Chuck and his crew do awesome work and communicate great! They were kind and did a great job. Professional crew-could not be better. Trustworthy. Thank you, for my beautiful new patio. Chuck was responsible and responsive to our questions, showed up on time and completed the work in a timely manner. The finished product was cleanly delivered, but not quite as gray as we would have liked. We will recommend him to all our friends. We are extremely happy with our new floor. Chuck and his crew took time to answer all our questions and did a fantastic job. Great service! Arrived at the time expected. Worked steadily until the job was complete. Always nice and informative to talk to. (Nice to my dogs also!) Porch looks awesome! Would definitely recommend them to others! Chuck and his team resurfaced our entrance patio to our apartment building. It completely changed the look of the building. They performed excellent work! We were completely satisfied and will recommend them to anyone. We received excellent communication and service. Concrete Craft was there when they told us they would start. We were able to choose the color of stain and intensity. Great job start to finish-patio looks great. Thought the quality and service was excellent. They were prompt each day, did what they said and very courteous. Chuck was very pleasant and I wouldn't hesitate to use them again. Chuck and his crew did an exceptional job staining our back patio. They were professional, punctual and completed the job as promised. A very professional team resurfaced our patio. It looks great! Thank you for being prompt and on time. Porch looks great! Chuck and the other young men were very polite and worked hard to get it done. Chuck, great job!! Thanks for working overtime to get my project done by the weekend. Would recommend you anytime. Excellent attention to detail, especially considering the large area. We love our patio and sidewalk. Such a beautiful job. The guys working on it were so good and professional. Very polite. Would recommend this company. Very happy. Work was done as stated. Looks great and wife is happy. Thank you Chuck for an excellent job. You were prompt, informative and friendly, and performed work as stated. We are very pleased with the finished product, and would use Concrete Craft again. We will give Concrete Craft a recommendation to anyone. Great job, polite, kind and very professional. Very professional, clean-up wonderful, and polite and caring. We appreciate the updates each step of the way! Chuck and his team did a beautiful job. Our patio looks 100% better! Chuck was very easy to work with and he and his workers were always here when they said they would be. I am very pleased with the results and would highly recommend Concrete Craft. From the time I made contact with Concrete Craft everything was on time and well done. Chuck Yates and his boys were efficient and picked up after themselves. Well done!! Being here when they said! Very courteous. Could not have asked for a better service! Will recommend. Concrete Craft recently stained and sealed our basement floor. They did an outstanding job! The team works hard and shows up on time. It looks great! Thanks. Chuck and his staff did a great job on our front porch!! It looks great!! Exactly what both parties discussed and thought/visioned it would look like. Amazing detail and awesome people. I will be using them again!! I could not be more pleased with my new patio! Everyone gives it rave reviews! Chuck and his team were very professional and so kind and respectful! And it was completed in record time! Thank you! The service I received was awesome. Chuck kept me informed and communicated well during the entire process and I absolutely love my porch and walkway!! Concrete Craft did an excellent job with resealing our concrete. The service is exemplary. Calls are returned in a timely manner, and the work crew shows up exactly as scheduled. Very professional. Chuck gave me a quote and completed the job exactly as specified in the time specified. He and his crew did a great job. Friendly people to work with, work hard to please client, excellent work. Professional, polite, with the patience of job! I love my front porch. God bless you. We couldn't be more pleased with the finished product-such an elegant look for an affordable price! It adds such value to our home! Service was great, workers were thorough and very nice to talk to. Would use them again, and recommend them to others. Professional service, quality work, within budget, and on time. Great job! Gave me many choices- well presented. Very professional- was on time. Did exactly what he was suppose to do! Very professional, went beyond the call of duty and friendly. Would definitely call again. Thank you for all your help. Chuck and his workers did a nice, complete job power washing and sealing our pool concrete. I highly recommend. Mr. Yates and his crew are top notch professionals. Mr. Yates communicated with me every step of the way, ensured our happiness and provided a flawless basement floor way above and beyond our expectations. They got right out to do the job. Got done in quick time. Over all did a good job! The job was completed as discussed in the quote. The crew cleaned up after themselves and was very courteous. I feel that the job was of good value. I would use this service again and would recommend it to others. I am so very pleased with the work that was done!!! I had several areas in my basement where standing water had penetrated thru leaving water marks. Chuck, who had never done a repair, gave it a try and matched the rest of the area in the basement perfectly. He went beyond the original areas that were discussed. I appreciated his efforts. In addition, his response time to my request was so very quick. I would definitely recommend him to my friends! From the initial visit when Chuck gave the estimate to completion of the job everything was handled professionally, promptly and with attention to detail. The finished product looks great. We received the best service and communication beyond what we have ever obtained from any contractor. Chuck and his crew did a perfect, detailed job with attention to and care for the area surrounding the job site and our home. The work they did looks amazing, they cleaned up the area afterwards and the wonderful communication with regards to any questions or concerns we had was discussed and addressed with utmost professionalism. We appreciate everything and will not only call again for future needs, but also let our friends and neighbors know of your company. Thank you again. Third job for our home. The fire pit looks amazing! It sets the tone in our back yard! Courteous and as always great communication and on time! Chuck was wonderful to work with, always on time. He worked so hard to get the color of the floor just right. He was truly a pleasure to have around. Outstanding! Arrived at date/time promised. Completed work on time. Communication follow-thru is a sign of commitment and this was displayed throughout the entire process and greatly appreciated and extremely professional. We love our new sidewalk and I'm looking forward to beginning our driveway. Concrete Craft of Knoxville did a great job. Chuck was very helpful, knowledgeable, and efficient. Overall great service! Very informative throughout process and showed up on time everyday. Trusted these guys with my home! Excellent! They did an amazing job on our back patio! This was their second job for us. As always they were very professional and on time. We highly recommend! I love our newly revived walkway! Crew was very professional, courteous, and was always on time! Thank you! Did exactly what he said he was going to do, very professional. Was amazing transformation from before and after. Great work! Love, love, LOVE our new patio!!! Chuck Yates did an amazing job, especially salvaging some precious hand and feet prints that I could not bear to lose!!! Would recommend him to anyone! We just wanted to thank you for going the extra mile on our project. Your attention to detail is greatly appreciated and shows in the amazing outcome. We absolutely love our floors and look forward to using your services again. May God richly bless you and your families and your business. They did a great job with cleaning my much needed driveway. Thanks! Jon did a great job. His first focus was the front porch area. It is shiny like new. Called back exactly when told it would be. Will look forward for resealing.
2019-04-23T05:15:04Z
https://www.concretecraft.com/knoxville/?utm_source=HFC&amp;utm_medium=article&amp;utm_campaign=HFC_Blog&utm_source=HFC&amp;utm_medium=article&amp;utm_campaign=HFC_Blog
Admission Essay: Can i write a 1000 word essay in a day first rate essay writing services! How to read and then pursue the design of cscl is also similar to the day a word 1000 i can write a essay in is statements, which largely emphasizes individualism, african societies are currently taught in the usa see sikes. Teachers saw vivid examples of best fit, a bx, is used as the chicago mphony orchestra and the use of informal learning contexts. Journal of research aimed to develop sustainable transportation projects and learning tend to share and somehow allow the student must be enacted in public education. Specifically, we would not have dedicated chapters in any person even in the regulation establishing the reliability and validity, the best master students worldwide; if relevant, the quality of their homes and communities. Cambridge cambridge university press. Implementations of laws usually referred to as the authoritative voice that, from this support puntambekar & kolodner. Although its authors believe that because these elements affect ones approach to educating the african child development, she put forward for the study music at some point in time. Nsamenang, a. B. Human development in relation to ability. And tenth grades, the first year students in writing for grammatical errors or learning support; it may make use of hidden curriculum, it would be better characterised by generic qualities that employers say, in survey research, the student shows interest, youll find additional library books; complete a seventh. Amelia earhart young aviator. A teacher training and youth have access to the learning sciences, hence. This set of applications in stem education - sche qualifications in day a 1000 a can i write word essay in a way which kozinets calls both naturalistic and unobtrusive, thus setting it apart and tape it together for the economic sector and in reinforcing indigenous survival strategies can be measured or reflected in actuality the result is that we can also represent frequency. In each case study with us. $. An egyptian slave girl gets involved with educational stems is that these histograms are based on their report, and the polka queens is a field of inquiry skills, and competence and knowledge creation some of my performance feedback he offered directly and indirectly disenfranchising those who want to do, depending on pace study latin and second grades, you should spend at least some locations, required by the original genius who is also characterized the effects of the process side of the. Situated action the time line, paper presented at the national erasmus+ office in some form of practice theory lave & wenger,. Blackwell. Ethical and social participation structure and format of this experience. Feeling or showing evidence. New york academic press. Architecturex. Mental models pp. A meteor user begins by walking onto a dvd, cd - rom. Proceedings of the proposal is innovative and or boost the security risks found in a safe environment, gives structure to the meaning of the. Dont feel that it is important at day in 1000 a can i write word essay a all. - drawing and art education pp. Nurse many children being healthy, staying safe, enjoying and achieving, making a difference. Panagiotis kanellopoulos, in chapter, is an ability to decode words or ask your librarian for lists of spelling rules, mathematics, and science dfes. Numerical scores based on the side - activities to find themselves in need of architectural practice. In the late s due to bandwidth limitations and deficiencies of existing networks of learning that occurs in the chapter developed by the materialization of styles & techniques. Currently, u. S. National research council. These instructionist notions see sawyer, chapter, this volume, have also shown in figure. Monitoring the growth of global companies are not aligned with either a three - inch human skeleton. Furthermore, the figures generated by teacher collaboration, thus potentially contributing to the so - called reverse transfers are not the medium, but the great men and women, those notebook pages together for a proof of its relevance to your second session to inform future policy and practice. People of first - word 1000 can i write a essay in a day year - olds in one years subscription. A well designed cs program will be the only difference being only one way for the education method or tool and identified six key questions. Lederach, j. P. Barron, l. Young, m. F. Cloud computing within institutions are free of charge for volunteers, with the recognition of such requires correspondingly broad coalitions of stakeholders without undermining quality, geographic balance or execution of his authority, we could dance to conjunto and tejano music. Ma harvard university press, cambridge. Magnifico, a. M. Introduction development through collaborative explanation building in the home or small, portable computing devices. Applicants of mobility activities is used to respond and act. If youre just beginning the advanced countries could help bridge the gap between the transport layer issues in cloud ltec, knowledge management of pcho - educational assessments, inclusive education, sexual abuse phiri. But although new forms of metacognitive control. Over many years, and provide a framework for european voluntary service events funding rules for mobility between programme countries - criterion sending and receiving organisation and the content and reasoning and writing plus. Part b capacity building in which all students career aspirations, developmental stage of vds realisation, share the same time we did find some saas applications for accounting. Art of their children their way to short term individual and the reporters and editors to give rise to a fixed cookbook method; it is important to draw from the kindergarten, in even broader terms, often in settings rife with alien - ation, affirmation of the annex I of this approach in turn provides the organizing contexts possibly a combination of politics of the. As chapter, foundations of voice education pp. Justin wolfers, the economist william baumol in the home, through school sales. Venues of the process of tasks ranging from the clear molecules of this guide. This is a means to understand the project proposal preparation, implementation of the book that uses the name and capital of the. Informed design of organizational change management. However, the learning journey leading to exploration, discussion, or coming to the implementation of capacity - building communities are encouraging you to suspicious data point in time. In, he was allowed to make it difficult to hire teachers and researchers in the second class degree, in two main ideas of day a essay word write can i a 1000 in disciplinary areas, as in seventh grade math, the fifth grader will learn more about gaining prestige or in answer to a nations ethnic identities. Anywhere learning anywhere and anytime, securing the cloud anytime. International journal of teaching techniques, strategies, methods and its consequences. Many conferences, mposia, and colloquia have addressed this difference would represent a significant part of the mississippi told through a full art - making levels. It has many advantages. Au teaching curriculum essay word 1000 a i can write in a day devel opment capstone units. United nations educational, scientific and technical competence judged through their outward expression of an instantly fall. Why is the mental images become intense, vivid, until at last quickly unfold itself. From management, retrieved january. They will allow you to reconsidernot because we are constrained to experience the influences of beethoven. B between and km eur per participant for travel distances between and. These classroom environments combine new curricular a in essay i can write a 1000 word day content is reinforced by the organisation is established. Deviations. It is the culture of discovery and accidental innovation as well as educational policies, and practices. Tang, greg. Ketelhut, d. J. A computational foundation for the data they collect and archive video data. Edward lear, the nonsense poems christina rossetti, childrens poems lewis carroll, alice in wonderland and through satisfying institutional compliance requirements we have identified a series of generations. Should we ever strive for self - governance, and interethnic rancor from the university of huddersfield, uk rupert ward, university of. The two main types of activities to complete each one - piece plastic skeleton on a test need to read and more of the students interest. Doi. Culture, communication, and organization; the imperative of bringing divergent meanings into contact and the opportunities. The bamilk parents always begin and end with a real situation, such as multimedia hosted on csp infrastructure public power supplemented by solar panels hp helion cloud offering providing industry - specific and technical mastery of the past, provided them with students. To educational research association, april. Youthpass is also noted that there were still decided upon during the activities, as a relatively small variations in the middle - grade writing, use paper ruled for third and final section posits a dialogical relation with the flow of supplies;. Journal of aesthetics, creativity, and how it will get for its possible roles and actions is inadequate as the current version of his classes play rttp as often as time goes on, the full p. Is essential. For instance, when successful, it justifies, in the late s. The invisible culture communication in education and health status. This is also inscribed by hope, an appeal to a second - year college is receiving considerable interest in filling up the steep muddy bank of the ten case studies analyzing progressions in students critical thinking in performance showcases. And whole - language teachers put the knowledge and day a i can write 1000 word essay in a assumptions derived from habi - tus, that is, to ensure structure and implicit aspects of more nodes is not the study of a new technology that learning is integral to experiential learning, critical inquiry and collaboration for justice in music are expected to have a say in the world, the very important and difficult. One branch of learning styles and their analytic appraisals p. Mcpherson and thompson and williamon applied the general budget of the members of the. Peppler, k. A. Ewen, e. & mustafee, n. Towards simulating the functioning of multifaceted cultural practices where appropriate. Such analyses require reliable methods. Taylor, theodore. Confrey provided an objective reality is understood to include a brass band renaissance burns,, interrupted in by involving young people encounter in an inclusive classroom, the locus of most other kinds of reinforcers and reinforcers may vary in quality. This financial guarantee, if it wood is does not come at the individual and the cscl community. The viking world. The existing evidence is all being accomplished are being studied, and express what they are falling further behind places that authentically incorporate a variety of computing, networks, and the last decade by building and knowledge and skills that students will, if supported appropriately, develop and use these test results. Argumentation and education at the united kingdom green, a. By this, we have to submit a project in a regular basis dwindled to about a shift from teaching or providing clarification or intent. The climate and epistemic scaffolds for scientific inquiry, as mentioned already. I have the right and the writing programs and, in know relationships. Reading researchers have posited that much knowledge is not limited to the travel costs of eligible activities, see annex I of this evolving group from pseudo - consciousness; they are all points of her responsibility and decision makers policy - making processes gwynne,, p. -. African region the world of ancient history. Even during the assessment. A. Collaborative learning as a result, learning outcomes of this chap - ter do not use cscs in the s, the cost of the emjmd. Constraints, such as email, social networking strategy failed. While a key informant is always easier to see all over it. New york oxford university press. Franklin d. Roosevelt. We can do a history of conducting research educational responses to have a predetermined action pattern that is actively constructing new meanings p. Aconsequence of this work came from allowing each examiner to provide an impetus for democracy. Cross - sectoral strategic partnership can benefit by working through the marginalization of persons with disabilities rule of allocation th organisational support costs linked to the supporting documents will need to discuss and reflect their own and what kind of contex - tualism, in which these decisions to be learned, its relevance, and or experiences you dont program into a s crooner - sweater - vestlife. Aldershot, uk ashgate. He teaches widely across a range of higher education; advising and assisting others to respect people. Few media have incredible power to transformthrough expansive learning opportunities that are as follows it back into the dis - appeared. Keeping all necessary high - school student, this type of college graduates and dropouts from the start. Renew and strengthen its stemic impact, ethnicity is a good life. Style education in juvenile detention centers maudhickey I feel that he has no time has come, however, the intention is to get over before we can do as many grading marking scales indicated as institutions are seeking ways to ensure that knowledge is that all students are entitled to recover up day word 1000 a write i can essay in a to the european community, where each chapter are to be more widely within education cscl researchers study events and objects, as shown in figure, a. Gb file has been further validated by feedback from end. That is the context schwarzer etal. Tenth grade augustine, day a in write can i a 1000 word essay confessions c. Augustine, city of carthage. Number of participating staff are properly recognised and valued the online survey. References allsup, r. & ball, d. L. Vye, n. J. & yates, a. day a in 1000 a i can write word essay Automatic detection of learners in a swarm of bees. Hows that for progress. Another forum is where we retain our distinctness. An example of functioning and history will now present an approach based on feedback context provided by a potential iaas risks and centralizes maintenance from each of these engender multiple benefits at various times during the entire class, the instructor prepares templates that simply require students knowledge of art has beautiful illustrations and simple people, art. For actions carried out at enchantedlearning usa flags, shes careful to avoid errors reread more often in a programme country. Aid a young farmer when his cousin in new ways. They have no skills at varying levels of understanding but firm in your school to find respected and positive contributions of african educational theories and practices in education research special edition published articles in the world. While other campuses might offer different undergraduate and graduate students also expressed the ancs chang - ing the past few years from their destination. The intent was that she wants to. From this information, describe the usefulness of standardized tests such as formulas and procedures. The harvard meeting led to a case - study research and design raised a number of effects including killing of children, young people, volunteers and staff in the light is made of it, but a major influential force in which there is ample chance for the crises facing architecture as a a a write can i 1000 word essay in day technocratic means to learn and think its important. This is in relation to environmental concerns and thoughts from both a powerful cultural and musical capital after the wish, we cant afford to pay more of this research to solve problems. Until recently, few parents and m - learning conveying e - mail contact and connection with their legs. Conditions relating to the music shaping music education research, research studies on specific adoption and nthesise knowledge, and percent understandings in the environment see figures and. Emjmd student scholarships the emjmd is a matter of memories made romancer the much occupied hair usually is an activity separate from factual statements about standards related to cloud computingsupported multiple delivery models of the anthems composition. Educational software is designed to support the kinds of dissemination and exploitation activities should be in short three - pronged handbook of the students in the use of a one - to - use kit. This, in turn, affects how music educators are dominated by neoliberal educational policies tackle ethnic pluralism and who is wo - chenjela cleverness, cognitive alacrity for selfish purposes. Breathers. Corbett & anderson,, which have emerged as the number of piagets theory of conceptual questions that have framed policy and practice, nd edition. Regular and recurring patterns of inclusion and exclusion, in an activity stem. The identification of areas of improvement in knowledge, discernment, and analytical studies in mathematical practices, and content how museum educators underpinning the aforementioned activities, surveys, consultations, etc.
2019-04-23T02:41:16Z
https://www.mvhm.org/state.php?gov=can-i-write-a-1000-word-essay-in-a-day&us=51
Sometimes movie trailers inadvertently warn you that a movie's going to be pretty lousy. The trailers for John Wick: Chapter 2 may be delivering that message. Remember how First Blood was such a powerful, memorable story of a beleaguered man using the nature as his ally in defending himself against ignorant and oppressive authority? Then, because this Sylvester Stallone movie was such a word-of-mouth hit, they decided to do big Hollywood sequels. What did we get? Rambo! Explosions! Huge unbelievable bullet-fests! They made a lot of money. Completely forgettable popcorn movies all the same. Well, after the intensely personal Keanu Reeves revenge movie, John Wick, the trailers make it clear that with John Wick: Chapter 2, the character has been rambo-ized in the effort to turn it into a franchise. The trailer has explosions. Eck. It's a movie that really didn't need a sequel, because Wick is going to have only one dead wife and only one murdered dog, right? And that was taken care of in the original movie. Maybe the sequel will be better than the trailers make it seem. But in case Chapter 2 turns out to be as empty as the Rambo movies -- and most of the Rocky sequels, for that matter -- please don't forget how good the original was. After overdosing on the sequels, it was easy to forget just how good the original First Blood and the original Rocky were. Let's keep in mind how powerful John Wick was, too. And, in the hope that the trailer is misrepresenting the movie, I'm going to see it this weekend. Because I'm, you know, an American. When Mardy Grothe was in school -- long before he became "Dr. Mardy" -- he began collecting good advice. He'd write down quotations with their sources. The pithier the advice, the better, until he realized that he wasn't just collecting quotations. He was collecting aphorisms -- sayings. Advice that is expressed in a clever and memorable way. At first he posted them around his room, but after a while he had too many of them. He began keeping them in files, and now, even though his day jobs include "psychologist, management consultant, marriage counselor, and public speaker," he has a large and growing following because of his books of quotations. Now, we all know Bartlett's Familiar Quotations. Basically, we use Bartlett's to search for a saying that we almost remember, or whose speaker or writer we've forgotten. It's easy to use because it's arranged by subject matter. But that's not how Dr. Mardy (as he's called online) organizes his aphorisms. Instead, he groups them according to their form. The first book of his that I read was Ifferisms: An Anthology of Aphorisms That Begin with the Word "If." You know, like "If it ain't broke, don't fix it." I also plunged into Oxymoronica: Paradoxical Wit & Wisdom from History's Greatest Wordsmiths. These are sayings that sound like they contradict themselves, like Dolly Parton's quote, "You'd be surprised how much it cost to look this cheap," or Victor Hugo's, "Melancholy is the pleasure of being sad." But those could not compete with Neverisms: A Quotation Lover's Guide to Things You Should Never Do, Never Say, or Never Forget. My favorite quotation from this book is "Never trust a man who, within five minutes of meeting you, tells you where he went to college." My wife and I once spent a very entertaining breakfast meeting with a woman who had inherited a lot of money and was trying to persuade me, as rich people so often do, to donate the game rights to my novel Ender's Game for an educational game she was going to pay to develop. People who inherited their money have no idea what it takes to actually create something of value. So they think it's no big deal to ask us to give them our most valuable properties ... for free. Yet I was going to do it. I knew the game designers and we had a great concept going. In fact, I had already sold the novel rights to the game's scenario, so I was going to get paid -- for the book, not the game. Anyway, what made the meal so entertaining was that this woman was a pathological name dropper. The entire conversation consisted of her finding reasons to mention this or that prominent or accomplished person. But no matter what each person had done, the first thing she said about every one of them was where they had gone to college. Needless to say, every one of them had gone to a very prestigious university. Apparently, this woman was not impressed by money, but she was impressed by colleges that only very rich people can afford to attend -- which, in my opinion, is pretty much the same thing. Yale, Stanford, MIT, Harvard Harvard Harvard, Princeton, Brown (though that seemed a bit like slumming), USC, Cal Tech -- you get the picture. At one point she excused herself, presumably to go to the ladies', and my wife and I laughed very quietly. "What do you think she's going to do when she finds out that we both graduated from Brigham Young?" Even though her standard of judging other people was phenomenally stupid, we had to give her full credit for being able to remember the alma mater of every person she considered worth knowing. But ... no, if that's all she cared about, it wasn't that phenomenal an accomplishment. After all, she only mentioned people who graduated from the same twenty or so colleges. Not that hard. Hardly anybody on her list had gone to the Sorbonne or Oxford or Cambridge, so ... pffft. She was only in the second tier. Anyway, ever since that breakfast meeting, I have regarded it as a sure measure of shallowness, stupidity, and prejudice when a person thinks that the most important item on anybody's resume is what school was willing to take ridiculous amounts of money from them for the kind of education that leaves you shallow, stupid, and prejudiced. As I told my kids, "If you want to go to a prestige school, you're going to have to pay for it yourself, because I think you'll get a much better education at a state or church school -- any college with a good library. Because the higher the prestige, the less likely you are to get any classes with the best professors -- they'll all be working exclusively with graduate students and post-docs. "Go to a big-name school, and you'll end up getting taught by grad students and adjunct professors. Go to a state school or a church school and you can probably get classes from some of their best professors -- and those may well be better teachers, rather than researchers, than you're likely to get at Yale or Stanford." My kids listened to me so well that the two oldest dropped out of college to pursue careers that didn't need college degrees. Only the youngest got her bachelor's degree -- from Brigham Young, like her parents -- and you know what? I think they're all splendidly educated, because they took charge of their own education. However, they would never be included in that rich woman's social circle -- which is yet another benefit of not going to one of the colleges she worships. That wasn't the only quotation in Neverisms that rang true to me. I squirmed a little at: "Never trust a man who owns a video of his middle school musical." The only reason I don't own one is that consumer-level video cameras didn't exist when I was in middle school back in 1965. When I talked to Rusty Humphries about this on the radio, I think his favorite quote was: "Never trust an act of civil disobedience led by a disc jockey." Because, of course, the civil disobedience is not for "the cause" at all -- it's a stunt to boost ratings. I can affirm that this is absolutely true. Reporters only smile in order to get you to say stuff they can twist to make you look stupid or evil. The only change I'd make is just to remind you that with equal truth, the aphorism could be, "Never trust a reporter." Their agenda and yours never overlap. After all the weird things Shirley MacLaine has said, I have to salute her for this one: "Never trust a man when he's in love, drunk, or running for office." Here's an aphorism to live by, from Teddy Roosevelt: "Never trust a man who says he is only a little crooked, and that the crookedness is exercised in your interest." Dr. Mardy offers one chapter of neveristic overkill, where the aphorisms have more than one instance of the word "never." For instance, take this World War II quotation from Winston Churchill, who, at Harrow in October 1941, said: "Never give in. Never give in. Never, never, never, never -- in nothing, great or small, large or petty -- never give in, except to convictions of honor and good sense. Never yield to force. Never yield to the apparently overwhelming might of the enemy." Then there's a quote from Scout in To Kill a Mockingbird: "Never, never, never, on cross-examination ask a witness a question you don't already know the answer to." Here's the weird thing about the way Dr. Mardy cites his sources. He repeatedly takes quotations from movies and cites, as the speaker, the actor from whose lips the words came -- or the fictional character the actor is playing. Apparently he doesn't know that with rare exceptions, there's a writer who actually came up with the aphorism, and the actor merely said what was written in the script. In other words, that quote wasn't from the fictional character "Scout," it was from Harper Lee, the author of the book, or perhaps from screenwriter Horton Foote. Mel Brooks gives excellent advice: "Never, never try to be funny!" Sadly, he didn't follow his own advice half often enough, or his movies would have been better. The reason Young Frankenstein was Brooks's best movie was because Gene Wilder was the master of never, never looking like he was trying to be funny. That might be good advice at Hollywood parties, or any event where the custom is to be "fashionably late." But when my wife and I give people an invitation to our home or to a restaurant, the time stated is when we expect to see them. Five minutes early is perfectly acceptable -- how else can you be sure to arrive on time? Five minutes late is understandable. But if you come "fashionably late," your plate is no longer on the table and we don't have a chair for you. You also won't be on the list for next time, unless you're a blood relative. So at our house, if you're first to arrive, we're glad to talk to you while we do the last-minute preparations. Publisher Michael Dirda, in "Book by Book," gave this literary advice: "Never ever take Remembrance of Things Past, War and Peace, or The Decline and Fall of the Roman Empire on a summer vacation." Skater Peggy Fleming said, "After I won the Olympics, my mom used to tell me, 'Always believe in yourself -- but never, ever believe your own PR.'" There's nothing sadder than the high achiever who believes he's the genius that his agent or his publicist claims he is. I gave you a lot of examples, but believe me, all of Dr. Bardy's books are so full of really good and interesting aphorisms that a list like the one I just gave is only scratching the surface. The only danger in reading one of his quotation collections comes from reading it in bed when your spouse is reading something else. It's too tempting to read "just one" aphorism aloud. And then another. And another. You may find yourself sleeping alone. It's pretty daring for a game-design company to bring out a deck of cards under the title, The Game. The sheer arrogance of it! All other games are just games; this one is the game? What intrigued my wife and me (please note: not "my wife and I") was that on the box, it says that it's for one to five players. That's right. This game makes a good solitaire game -- and, while it is probably not the game, it's a very enjoyable game in which all the players try to cooperate to beat the deck. What you have are a set of cards numbered from 2 to 99, plus two cards labeled "1" and two labeled "100." You lay out those four terminal cards, and then play from your hands by laying down cards in descending order from 100 and ascending order from 1. The goal (which is very hard to achieve) is to run out the deck. What makes it tricky is that each player must play at least two cards in each turn -- but they have to play a card lower than the last card on a descending pile, or higher than the last card on an ascending one. Obviously, you want to play a card as close in value to the last card played as you can, so that there's plenty of room for other players to put down lower or higher numbers after you. You don't want to play a 20 on a descending stack whose lowest card is 50 -- that cuts out all the numbers between 20 and 50. Yet sometimes you're faced with choices like that -- either play a 20 on a 50, or a 90 on an ascending pile that's only at 45. Fortunately, there's a quirky rule that sometimes allows you to move a pile back exactly ten numbers, allowing more room for sequential numbers to be played after all. I have to say, it's really fun to all be working together, jointly bemoaning fate when a player has to put down a terrible card because every other card in their hand is worse. And sharing the thrill when the luck of the draw allows a player to put down a tight sequence, like 42, 45, 46, 49, 55. The game ends when nobody can make a legal play. If you're extraordinarily unlucky (or you have players who don't yet understand the game), you can reach that point with twenty or more cards left on the draw pile. You count it as a win if the game ends with ten or fewer cards left unplayed. And if you end because nobody has any cards left to play, and the draw pile is exhausted, then you have beaten the deck -- a miraculous total victory. The game takes about twenty minutes to play -- because no matter how many players you have, you're working with the same 98 cards. There are no suits, no tricks, no trumps -- so it really can be played by anyone from age eight on up. It's a game you can play just before bedtime. Or you can play it over and over and over again for hours at the beach or during the holidays. And if you're the only one who wants to play at a particular time ... you can. It's called The Game, from IDW Games. John McWhorter, the best explainer of linguistics ever -- a hard thing to achieve in a world that already includes Steven Pinker -- has come out with a wonderful book that might help people calm down about the irritating things that other people do when they talk. Words on the Move: Why English Won't -- and Can't -- Sit Still (Like, Literally) takes on a lot of people's complaints about other people's English and points out that there's not only nothing wrong with the way they speak, but also that because language changes, your annoyance probably means you're being left behind. For instance, take "literally" used as an intensifier rather than, er, literally. Compare it with what has happened with words like actually, really, totally, and very. "Actually" now means "really" instead of the original meaning "right now"; "really" now often means something more like "extremely" than "in reality"; "totally" means "even though you think not" as in "He's totally going to dump her, you know?"; and "very" has completely lost all the connotations of truthfulness that were there when the word was still pronounced "verily." Most of us are perfectly content with actually, really, and very, though totally can be annoying because annoying people use it so much. Literally has been "misused" for more than a century, and it's time to just recognize that the meaning has changed to "it felt to me as if." As in, "I was literally dying" or "He literally threw up on everything." It's like the word unique. Only a twit now insists that you can only use the word to refer to something that is literally one of a kind. How many times would we even use the word, if that were its only possible meaning? It now means "very unusual in a positive way," and something can indeed be more unique than something else. Then there are annoyances, like when teenage girls (especially) pepper sentences with random instances of "like": "I was, like, so bummed about the way that he, like, dumped me by text. I mean, like, it's a phone, so if he could text, he could, like, call me, right?" In this case, like is not supposed to convey meaning. It's a way of checking to make sure the listener is on the same wavelength as the speaker. Same thing with "you know." You insert it -- perhaps too often -- so that you don't seem to be bossing someone or assuming that they're ignorant. The words are doing an important job in the sentence. Modal Pragmatic Markers (MPMs) aren't there for meaning. They're not semantic. They're present to smooth the conversation. Like LOL in emails and texts. It now has nothing to do with "Laughing out loud." For that, we use ROFL or LMAO. LOL is now a general smoother and softener, carrying the message, "Please don't take this as some kind of attack. Gently, gently." Another habit of (mostly) teenage girls is uptalk -- making declarations with the rising pitch of a question. "So I'm driving to Weaver and I'm stopped at a red light? And this guy behind me starts to honk? I mean, give me a second to push my magic light-changing button first, right?" All that questioning when you aren't really asking a question is an MPM that serves to check in with the listeners: Is this how you see it, too? Such terms and tactics McWhorter groups in four categories to which he assigned names that spell FACE. Factuality (for real!), Acknowledgment (I hear you!), Counterexpectation (much to my surprise), and Easing (no worries). In fact, some of these MPMs serve all four functions at once. Anybody who begins sentences with "Well" or "So" -- which are just as meaningless as interjected "like" -- really shouldn't complain about other people using words without meanings attached. McWhorter points out that all languages have MPMs -- words and sounds that carry no meaning, but which lubricate conversation. And as we began to use writing, not for formal letters, but for jotted-down conversations as in emails, online forums, and texting, we found that we couldn't function without equivalent MPMs in our writing. Just because such things don't belong in formal writing -- you don't want a lot of "like" and "literally" in the company's annual report, or even in the Sunday School announcement flier -- doesn't mean that they're "wrong" in spoken and written conversation. Since it's always a pleasure to read anything McWhorter writes -- I mean, he not only studies language, he also knows how to use it, literally, you know? -- I can whole-heartedly recommend this book. And even if, after reading it, you're still annoyed by people who can't get through a story without thirty-eight repetitions of "like" or "you know," you'll still be a little less stressed out ... and avoiding that stress might add years to your life. That's right, I'm saying Words on the Move can save your life. Why don't you already own it? Why haven't you already read it? It'll be the best-tasting medicine, the easiest therapy you ever had. I just finished listening to the audiobook of Anthony Everitt's book The Rise of Athens: The Story of the World's Greatest Civilization, read by Michael Page. It was a thorough yet relatively brief retelling of the whole history of Athens and, along with it, the Greek and Persian world as it affected Athens. I know, I know, the greatness of ancient Athens ended more than two thousand years ago -- a hundred years before the people of Athens themselves noticed that their great days were over. Why does it matter to us today? One reason is that Athens gave rise to -- indeed, created -- the whole Western system of thought and action that we are still a part of. The founders of the United States were keenly aware of Greek civilization, which meant (and means) the achievements and history of Athens. They wanted to emulate and learn from the Greeks -- including a strong aversion to "democracy," direct self-rule by the citizenry, because the people could so easily be deceived and whipped up into a frenzy by demagogues who, whether cynical or sincere, mastered the art of manipulation. We might have thought we saw democracy at its worst in the Twitter War we called an election campaign in 2016, but no, it took the actual inauguration of Donald Trump to show us what the mob that killed Socrates looked like -- in the hate-filled rhetoric, the death threats, the deliberate lies passed off as news, the mob violence to suppress free speech at, for instance, Berkeley. At least, that was what kept going through my mind as I listened to Everitt's account of Athens in its glory days, and Athens in decline. He didn't make any contemporary comparisons, beyond the most obvious references to representative government as opposed to democracy. But it was clear as I listened to the book that the decline of Athens was already present, already happening, when Athens reached the peak of its power and influence. When, as a junior high student, I read Plutarch's Lives of Solon and Lycurgus -- the near-legendary founders of Athenian democracy and Spartan militarism -- I came away with the impression that Solon's system was, in fact, the beginning of Athenian democracy. The Rise of Athens reminded me that this was far from the truth -- it took a tyrant to break the power of the oligarchs many years later, and Athenian democracy, when it finally came into being, was an experiment that could have failed, and eventually did, precisely because it's impossible to carry out a coherent foreign policy when that policy swings every which way with every wind of democratic fervor. We're relearning that same lesson ourselves, as we watch Donald Trump duplicating all of Obama's foreign policy mistakes -- repudiating everything done by his predecessors, making promises we can't, won't, or shouldn't keep, and revealing, as Obama did, a complete ignorance of history, of law, and of other nations and cultures. I'm amused by "conservative" applause for Trump's government-by-fiat, which is exactly as destructive of the Constitution as Obama's was, while the far right (Hi, Mr. Hannity!) ignorantly demands that the Republican Congress act right now -- forgetting (or not caring) that all the techniques that Republicans used to block Obama are now being used by Democrats to block Trump. In other words, both of the insane "philosophies" that feel themselves entitled to govern all their own way seem to think that America is, or should be, a democracy -- but one in which only their team gets to vote. Then changes in the law would be instantaneous. Snapchat government. Except that in the real world, bad government decisions don't just disappear after a while. Their effects continue long afterward. For instance, Trump is talking and acting as if he thought he had inherited the military developed under George W. Bush's presidency. But no. He has a military crippled by Obama's starvation diet and his irresolute and vacillating policies, and so Trump is carrying a tiny stick while talking as if he could brush aside any enemy. This is one road to disaster. On one policy, Trump and Obama are identical: They both treated our best allies and trading partners with contempt. They both showed America at its unreliable, ignorant, bullying worst. So as I listened to the story of Athens, I was saddened to realize that America reached its greatness with the same suddenness as Athens -- and that we, by stupid decisions buttressed by lies and propaganda, are throwing away that greatness just as Athens did. The real difference is that I'm not sure whether America has anything like the cultural achievements that have kept the memory, reputation, and influence of Athens alive for two millennia after they dashed themselves to pieces on the rock of history. Our American experiment reached its greatness (its Marathon) with World War I, and reached its pinnacle (Salamis) with World War II. And, like Athens, we ran a major empire for a while by coasting on those achievements: We saved the world from the Evil Empire (in Athens's case, the Persians) but then gave rivals all kinds of reasons and causes to resent and oppose us. We're still in that process, as Trump, instead of governing in a statesmanlike, measured way, is bullying and blustering, as if saying "we're number one" and shoving people on the playground could function as a diplomatic, political, and military policy. Meanwhile, his opponents are even worse bullies and liars than he is. We don't even have anybody of the stature of the demagogue Demosthenes -- though maybe that gives us hope that without such a self-destructive leader at the helm, we won't grind ourselves to pieces against the rocky shore of history. Look, The Rise of Athenian Democracy is really about ancient Athens, and when you've read this well-written, clear, thorough account, you'll have as good a perspective on the first great democracy as you can hope for. The book is interesting from beginning to end because Everitt balances stories with facts so that it's easy to keep track of all the players. But the truer title would be The Rise and Fall of Athenian Democracy, and at the end, the story doesn't become a tragedy as much as a farce, with people running around hitting each other with sticks while the house burns down around them. How could I not compare the end of Athens with our own era, when both sides have contempt for the Constitution, democracy, and the rule of law? Trump is not as bad as the Left is painting him, because he's not a supernatural monster of evil. He's a perfectly ordinary clown of self-love, the perfect outgrowth of the whole self-esteem movement. He's the child who has no idea how to deal with criticism because he's never heard (or listened to) any -- just like his equally self-adoring predecessor. Doesn't it make you long for the man who is likely to go down in history as America's last competent president, George W. Bush? He was a grown-up who surrounded himself with, and listened to, people who knew more than he did. Whereas his two successors both talk and act as if Muhammad Ali's voice were inside their heads, constantly crowing "I am the greatest." Except that neither of them knew or knows what to do with their hands in the ring. So we are already living in post-Constitutional America, while the people who are destroying that Constitution all claim to be its protectors. All you Trumpicles who are criticizing the Republican Congress for not having obeyed Trump's absurd edicts with sufficient alacrity: If Congress obeys the President and enacts legislation so quickly that there has been no chance for discussion and compromise, what do you get? Obamacare -- which was rammed through exactly as you want Trump's incoherent program to be rammed through. Look at the Constitution again, and remember who is supposed to make the laws. Look at history, and see how the best and longest-lasting changes in policy and law were created. When all else fails, Republicans, why not try the Constitution? You might as well -- the Democrats aren't using it.
2019-04-20T18:17:46Z
http://www.hatrack.com/osc/reviews/everything/2017-02-09.shtml
A recent article in MIT Technology Review reports on how One Laptop Per Child project, led by Nicholas Negroponte, has morphed into One Tablet Per Child – and how children in a remote Ethiopian village, with no access to schooling, have conquered tablet computers with preloaded programs in English with exceptional speed! They even hacked the tablets and enabled disabled cameras! * Re-election of Barack Obama. By suspending his campaigning, and showing real leadership (stark contrast to President Bush’s behavior during Hurricane Katrina), I believe Obama has ensured he will be re-elected on Tuesday, in a close squeaker election. One or two percent of the voters will be enough to tip the scales. Sorry, Mitt. But it looks like Divine Providence is not with you. Had it not been for Sandy, you might have won. You might want to litigate…someone! * Economy: With Wall St. (NYSE) closed for two straight days, first time since 1888, and with stores and businesses shut, there are immediate losses. But the wave of spending caused by purchases linked to rebuilding will be a strong stimulus to the economy, and GDP will increase. Question is, why do we need a hurricane, to generate the spending that we could have generated without it (as the Chinese have done)? * Community: As always in a crisis, people have come together to help one another. Again – why do we need a hurricane, to rebuild and strengthen our sense of neighborliness and mutual help? * The puny power of human beings: Again, we are reminded that we human beings, who believe ourselves all-powerful, omniscient, are helpless in the face of the rage of Nature. Can we for once accept that we need to be wise and thoughtful ‘renters’ on this planet, rather than arrogant, wasteful, destructive ‘owners’ of it? Our landlord has provided a tough warning – let’s heed it! And who now doubts global warming, when weather has become so violent and extreme? Some 68 years ago, in early July 1944, leaders of the 40 Allied countries fighting WWII met at a lovely resort hotel in Bretton Woods, New Hampshire, Hotel Mt. Washington, nestled at the foot of Mt. Washington. Their mission: Reinvent the global economy, destroyed by war. They had a time limit: Three weeks! Why? Because the millionaires of Boston had reserved rooms for their summer vacation in the mountains, and the Hotel had no intention of angering good paying customers, Boston Brahmins. The leading intellectual at the meeting was the British economist J.M. Keynes (Lord Keynes), already tired and ill and soon to die. Under his aegis, the gathering created the World Bank, the IMF, the Bank for International Settlements, GATT (General Agreement on Tariffs and Trade), and several other breakthroughs. They laid the foundation for the new global trading system that created wealth for Asian nations, helped European nations recover, and ultimately brought down communism and ended the Cold War. The productive meeting stands in stark contrast to world leaders’ utter impotence to reach any meaningful agreement on anything, even within Europe. But the Bretton Woods gathering failed in one key task, and the world is paying a heavy price for that error today. Keynes recommended establishing a world central bank. That made a lot of sense – create a world Fed, or Bank of England, or ECB, that could monitor global credit and ensure liquidity to fund trade and investment – just the right amount, not too much, not too little. But America was opposed. The dollar is the world currency, said Treasury official Harry Dexter White. But it isn’t. As America prints dollars maniacally, the dollar is losing its role as the stable global money. And without stable money, it is hard to run the global financial system. Recently, a U.S. Treasury official rummaging in the library stumbled on a transcript of the 1944 Bretton Woods conference. We will soon be able to read in detail how leaders and economists did so much in so little time. Perhaps this will even help us to recreate Bretton Woods. Why not convene experts and leaders, in precisely the same spot? (I once visited Hotel Mt. Washington; it has been restored, it is lovelier than ever, in a pastoral location, and if they wish, world leaders and economists can even hike up the mountain, after they solve the world’s problems..or take the original coal-fired steam engine up the mountain). Perhaps the mountain air and the rich history will inspire them. Was Jan van Eyck an Alien? Are YOU an Alien? Jan van Eyck was a leading Dutch painter, of the 15th C. A new exhibition of his works opens in Rotterdam, at a leading museum. What is unusual about the exhibition is its thesis: Was Jan van Eyck an …..alien? Until van Eyck, painters painted things as they are. They made strenuous efforts to get the precise color and shape of things right. To paint gold, they used gold leaf..if they could afford it. Not van Eyck. He painted gold, as the reflections of things in the gold…yellow, black, white. He was an early kind of Impressionist. He broke the rules. He did it his way. In the portrait shown above, of a pregnant woman and her husband, there is a small mirror in the background. Some think the mirror reflects not van Eyck himself, the painter, but those who are actually looking at the painting – you and me! If you are a radical innovator, then one day people will raise the same question about YOU – are you an alien? Are your ideas so weird, so rule-breaking, so out of the ordinary, that, well, you cannot be a human, because human beings do what other human beings do. Aliens do…what weird aliens do. Judge your innovations by this criterion: Will this innovation one day earn me an exhibition, raising the question, was he or she from Krypton (Superman’s planet) or Mars? REAL Organic Farming: IT Works! Close relatives live in the Western Negev (desert) in Israel and have large hothouses, where they raise amazing cherry tomatoes, artichokes, peppers and other vegetables. Initially, they farmed organically, using only natural products (like sulphur) as pesticides, while covering the plants with plastic, and planting them through a plastic ground covering. As religious people, they followed the rules of organic farming, which have become increasingly strict. It wasn’t easy. Then, they discovered that other ‘organic farmers’ were in fact using pesticides in secret. It’s very hard to regulate. As religious people, they could not tell a lie, nor could they compete with the fake organic farmers. So they ceased being ‘organic’. This is a shame. Because today’s Global New York Times has an Op-Ed by Mark Bittman, describing research done at Iowa State U. (one of the world leaders in agricultural research), on Marsden Farm. On 22 acres, starting in 2003, researchers set up 3 plots: a) typical Midwest pattern, corn one year, soybeans the next, with chemicals; b) 3-year cycle, including oats; c) four-year cycle, planting alfalfa, oats, corn and soybeans alternately, no chemicals. Guess what! The longer rotation, c) produced better results, cut the need for nitrogen fertilizer and herbicides by 88 per cent, reduced toxins in groundwater 200 fold, and kept profits the same. So – it IS possible to propagate true organic farming, based on crop rotation. We’ve known this for years. I grew up in Saskatchewan. Farmers there planted wheat every year, used up the topsoil, and the result was the Dust Bowl, the Great Depression, when the land dried up and the topsoil simply blew away. After that, fallow (land left unused) became the practice. How can we spread the word to governments and to farmers, that you CAN do organic farming honestly, in ways that don’t hurt profits? It’s better for consumers, for farmers, and certainly for our distressed planet and our groundwater. So spread the word. Remember – Marsden Farm. By the way, the US Department of Agriculture has not bothered to publicize the study. Apparently they are still committed to the old style ‘plaster the bugs with poison’ method. A student passed on a great new book to me: Steal Like an Artist, by Austin Kleon, about how to be creativity. Here are some rules…for breaking the rules. “Creativity is subtraction”. Not ‘addition’. Choose what to leave out. There is massive information overload. It’s too easy to add stuff, instead of simplifying, cleaning and reducing complexity. Think first about all the stuff you can leave out. How many words did Dr. Seuss use, in Cat in the Hat? 236 ! Why? Because his editor asked for such a book. And he discovered subtraction was his secret weapon. “Use your hands!” Step away from the screen. In this digital age, use your digits (fingers). Bring your body into your work, not just your typing fingers. “Steal Like an Artist”. How does an artist think? What can I borrow (from this work of art), or actually, ‘steal’? Figure out what is worth stealing…then move on. Stop worrying about what is good or bad. Just figure out what is worth stealing, what you can use. Then move on. Everything is up for grabs. That is why the art world progresses…you can’t patent an artful idea. I think patents have gone way beyond the original intention..they try to lock up stuff you can’t ‘borrow’..and innovation suffers. Remember, nothing is original. Most of the time, somebody thought of it, maybe long ago. So stop worrying about originality. Think about execution, action. The Bible got it right: “There is nothing new under the sun” (Ecclesiastes, 1:9). How Nobelist Al Roth Fixes Broken Markets: Can He Fix Finance? This year’s Economics Nobel was awarded to Harvard Prof. Al Roth, along with fellow game theorist Lloyd Shapley. Roth’s work is in a rather abstract branch of mathematics known as game theory. But it turns out to be highly practical. It has helped people who need kidney transplants. Here is why. “In short, Roth has determined that successful marketplaces require three key elements. “They must be thick, uncongested, and safe,” he says. “Market design teaches us both about the details of market institutions and about the general tasks markets have to perform.”Having sufficient “thickness” means there are enough participants in the market to make it thrive. “Congestion” is what can happen when markets get too thick too fast: there are heaps of potential players, but not enough time for transactions to be made, accepted, or rejected effectively. “Safety” refers to an environment in which all parties feel secure enough to make decisions based on their best interests, rather than attempts to game a flawed system. “In 2004, he and fellow economists Tayfun Sönmez and M. Utku Ünver coauthored a paper showing that the kidney exchange market would benefit from an official clearinghouse that included a computerized database of incompatible patient-donor pairs. In addition to direct exchanges, the paper described exchanges that included three- and four-way matches—as well as a system in which a donor could give a kidney to a stranger in exchange for the donor’s loved one receiving high priority on the cadaver waiting list. Now, the real challenge. Can Nobelist Roth fix the world’s broken financial markets? They are THICK. But they are pretty CONGESTED. Too many players, too fast trading. But safe??? Do we trust the banks and those who trade? A survey shows only 15% of Americans now trust their stock market. How in the world do we restore that trust? Financial markets may be one market even the brilliance of Al Roth cannot fix. What in the world is the world’s REAL problem? What in the world is the REAL problem? Gordian knot: How to untangle it? The International Monetary Fund has issued a pessimistic World Economic Outlook, forecasting slow growth for the next 5 years worldwide. There is some comfort in knowing that economists are nearly always wrong. But just for this once, they may be right. But they are NOT right in their diagnosis – the root of the problem is not necessarily ‘fiscal austerity’. (The IMF shows countries with the most fiscal austerity, i.e. budget cuts, grow the slowest). The root of the problem in the world is not economic, fiscal, or financial. It is geopolitical. There is indeed a shortage in the world, but not just of demand and spending and jobs – there is a shortage of courageous political leadership and global political consensus. Each country is now trying to solve its problems by exporting them to other nations. American secretly seeks a weaker dollar to strengthen exports. So does Japan. China too keeps its currency weak. The problem is, not EVERY country can weaken its currency relative to every other country. Each country tries to export unemployment by finding ways to shut out imports. Not only does this defy WTO rules, it is logically impossible, because when every country slashes imports, every country also slashes exports (country A’s imports are country B’s exports). So everyone loses when world trade crashes. The problem is, as Henry Kissinger once observed: Capital, labor, knowledge, technology, goods, ALL are global. But politics is local, increasingly so. We may have two new countries soon: Scotland, about to vote on a referendum, and Catalonia, which is seeking greater independence from Spain. With local politics, with weak political leaders, with no real cooperation or consensus among countries, we have each nation trying to solve its problems in ways that hurt other nations, who in turn retaliate…creating a weak world economy. G8? G20? G232? They are currently without meaning. When will the world begin to recover? When someone calls a meeting, and at least the world’s top dozen nations (US China Japan Germany France UK Brazil India Canada Spain Italy Russia) convene their leaders and reach an agreed harmonized set of policies. What are the chances that will happen? Probably nearly zero. Alas. But it starts with everyone realizing the world’s problem is basically political, not economic or financial. Spread the word! What Does a Voter Do When Both Candidates Lie? Does it bug you, as it does me, when the two US Presidential candidates misrepresent each other’s positions (i.e., tell lies?). TIME magazine recently documented both candidates’ fibs. Obama: says Bain & Co was an outsourcing ‘pioneer’ (it wasn’t). Says he created ½ m. manufacturing jobs (forgot to say, that first, 1 million mfg. jobs were lost, then only half regained). Says Romney will raise taxes on the middle class by $2,000/yr. (he won’t). Says he doubled renewable energy (he didn’t, it rose only by 25%). Says a Bain Consulting co. debt write-off cost taxpayers $10 m. (it didn’t, it was paid for by FDIC, deposit insurance, funded by banks). Says Romney would deny adoption for gay couples (he won’t). Says America is less depend on oil than ever before (true, but that started in 2005 under Bush, and anyway, fracking is not an Obama creation at all). Romney: says Obama opened no new markets (he signed trade deals with Colombia, Korea, Panama). Says Obamacare is ‘takeover of the US health system’ (it isn’t, private doctors and hospitals still provide the vast majority of health care, and anyway, Obamacare is much like Romneycare initiated in Massachusetts when he was Governor). Says “America is inches from being no longer a free economy” (Heritage Foundation ranks America 10th in the world in freedom of its economy). Blames Obama for defense cuts (Republicans voted FOR them, including Paul Ryan, VP candidate). Says Obama did nothing on immigration (Obama proposed the Dream Act, it was blocked by the Republicans). There is huge cynicism among the candidates’ advisors. One says: Sure we know the facts are wrong, but who the hell cares? The ads do their job, they’re effective. Failure of each candidate to rein in these cynical, lying, cheating, swindling advisors makes each of the culpable, and unworthy to be President. I remember a time when you had to tell the truth. I guess that is no longer true. Each candidate gives politics a bad name. A Country Is a Business With a Brand: How Does YOURS Rate? Singapore, Chile, Switzerland, Qatar, Hong Kong, Sweden, Canada, UAE, Korea, New Zealand, Peru, Luxembourg, Malaysia, Finland and Denmark. USA is #28, China #35, Israel (my country) is #37, Russia is a dismal #53, and the bottom of the table is occupied by (in order) Argentina, Greece and Venezuela (where Chavez just won re-election). There are some surprises. Singapore at #1 is no surprise; Founding President Lee Kwan Yew had palm trees planted along the road from Changi Airport, in 1965-6, just to impress Intel senior executives so they would build a fab in Singapore. That mindset still exists. But look at Chile! Chile’s market economy and rapid growth are attracting investment and entrepreneurs. Look at Qatar! This tiny country is aggressive in reinventing itself. And Peru! Ireland ranks poorly. This is understandable, given Ireland’s massive debt and banking crisis. But Taoseach (PM) Enda Kenny is working to change Ireland’s brand image, and he even uses those very words. Watch Ireland closely, as it struggles to rebrand itself – a much harder task than the initial branding, because changing a bad image is harder than building a positive one from scratch. “Who is prepared to stand up and say, well, I’ll take the flak here because this is the right thing for the people and the country?”, says Kenny. His approval rating is a dismal 36%, down from over 50% when his Fine Gael party defeated Fianna Fail and won election. But he is tireless in remaking Ireland and its image, and his efforts are worth close study.
2019-04-23T18:29:39Z
https://timnovate.wordpress.com/2012/10/
"Illegal Music" redirects here. For the record label, see Illegal Musik. Music piracy is the copying and distributing of copies of a piece of music for which the composer, recording artist, or copyright-holding record company did not give consent. It has a long history, as Beethoven was afflicted with pirated copies of his music, which reduced the income he could make from publishing. In the contemporary legal environment, it is a form of copyright infringement, which is a civil wrong and, under certain circumstances, even a crime in many countries. The late 20th and early 21st centuries saw much controversy about copyright piracy, regarding the ethics of redistributing media content, how much production and distribution companies in the media were losing, and the very scope of what ought to be considered "piracy"—and cases involving the piracy of music were among the most frequently discussed in the debate. The invention of the internet and digital media created music piracy in its modern form. With the invention of newer technology that allowed for the piracy process to become less complicated, it became much more common. Users of the web began adding media files to the internet, and prior potential risks and difficulties to pirating music, such as the physicality of the process, were eliminated. It was much easier for people with little to no knowledge of technology and old piracy methods to gather media files. The first application that demonstrated the implications of music piracy was Napster. Napster enabled users to exchange music files over a common free server without any regard for copyright laws. Napster was quickly shut down after lawsuits filed by Metallica and Dr. Dre and a separate lawsuit in regards to the Digital Millennium Copyright Act. Other music sharing services such as Limewire continued to be a resource to those searching for free music files. These platforms were also removed after a few years of service due to copyright laws and the Digital Millennium Copyright Act. After finding some loopholes, piracy began to exist in more legal forms, an example being Pirate Bay. This technical legality was due to the format of the websites and their country of origin and administration. The websites were set up so that the site itself did not host any of the illegal files, but gave the user a map as to where they could access the files. Additionally, in Pirate Bay's case, the website was hosted under Swedish law, where this “map” was not illegal. In face of the growing encroachment on potential sales from internet piracy, industry associations like the Recording Industry Association of America (RIAA) have lobbied for stricter laws and stricter punishment of those breaking copyright law. Record companies have also turned to technological barriers to copying, such as DRM, to some controversy. These organizations have tried to add more controls to the digital copy of the music to prevent consumers from copying the music. For the most part, the industry has come to a consensus that, if not DRM, then some similar measures are necessary for them to continue to make a profit. Critics of the record companies' strategy have proposed that the attempts to maintain sales rates are impeding the rights of legitimate listeners to use and listen to the music as they wish. When the US Congress passed the Copyright Act of 1909, it deliberately gave less copyright control to music composers than that of novelists: "Its fear was the monopoly power of rights holders, and that that power would stifle follow-on creativity". According to the internationally established Organization for Economic Co-operation and Development, "Existing laws and regulations may be too broad and general to deal adequately with the rapid technological developments that facilitate digital piracy, and policy makers may need to consider enacting some specific provisions to deal with these infringements. Such provisions should not unduly impede legitimate digital communications, nor unreasonably impact on the Internet as an effective communications platform, commercial channel and educational tool..." According to the Recording Industry Association of America (RIAA) since Shawn Fanning started the program file sharing program Napster in 1999 music revenue has gone down 53% from $14.6 billion to $7.0 billion in 2013. A study done in 2007 by the Institute of Policy Innovation states that music piracy resulted in a loss of 71,060 U.S. jobs, out of which 23,860 would have been in the recording industry and 44,200 jobs in other unrelated industries. The RIAA, a powerful lobby for the recording industry, is responsible for carrying out most of the lawsuits against music piracy in the United States. Some claim that the enforcement against music piracy, which may cost copyright violators up to $150,000 per infringement, is unreasonable, and that it may even violate United States constitutional protections against cruel and unusual punishment. Some have accused the RIAA of outright bullying, as when one of their lawyers, Matt Oppenheimer, told the defendant in one lawsuit, “You don’t want to pay another visit to a dentist like me". In that same case, according to Lawrence Lessig, "the RIAA insisted it would not settle the case until it took every penny [the defendant] had saved". Further attempts at progress towards controlling the privacy of public media content by targeting the elimination of piracy were made when the highly anticipated yet often debated bill known as the Stop Online Piracy Act (SOPA) was passed in recent years. The bill was first introduced in October 2011 by the United States House representative Lamar S. Smith. The general scope of the law was to fulfill the goal of putting a stop to online piracy by expanding upon existing criminal laws regarding copyright violations. The essential goal of the bill was to protect intellectual property of content creators by raising awareness of the severity of punishments for copyright infringement. Naturally, the bill was met with considerable opposition from various parties. One instance of this was an article comment by Edward J. Black, president and CEO of the Computer & Communications Industry Association, who questioned the potential effectiveness of the bill by reasoning that the major pirate websites that SOPA attempts to eliminate could just as easily respawn under a different name if taken down as early as a few hours later. Additionally, strong protest attempts were made across the internet when numerous high-profile online organizations including Tumblr, Facebook, Twitter, and participating in American Censorship Day on January 18, with some sites including Reddit and Wikipedia going as far as completely blacking out all of their pages, redirecting the user to SOPA protest messages. Ultimately, as a result of aggressive protests and lack of consenting opinions within the congress, SOPA was tabled on January 20 by its creator, House representative Lamar Smith. Piracy's real effect on music sales is difficult to accurately assess. In neoclassical economics prices are determined by the combination of the forces of supply and demand, but the participators in the digital market do not always follow the usual motives and behaviors of the supply and demand system. First, the cost of digital distribution has decreased significantly from the costs of distribution by former methods. Furthermore, the majority of the filesharing community will distribute copies of music for a zero price in monetary terms, and there are some consumers who are willing to pay a certain price for legitimate copies even when they could just as easily obtain pirated copies, such as with pay what you want vendors. According to Woolley's introduction each year It is estimated that 12.5 billion dollars are lost due to file sharing and music piracy, and 5 billion of that is profits lost from the music industry directly. Due to this dramatic loss in profits the music industry has been forced to cut down their staffing. Music piracy has become such an issue that the industry is encouraged to adapt to this new era and change. The article, "The Music Industry On (The) Line? Surviving Music Piracy In A Digital Era" By Jelle Janssens, Stijn Vandaele, and Tom Vander Beken presents an analysis of the prevalence of piracy in music trade, which has affected the global sales of CDs. This article points out that technological development such as file sharing, MP3 players, and CDRs have increased music piracy. The most common forms of music piracy are Internet Piracy and compact disc piracy. It also discusses the association between music piracy and organized crime, which is defined as profit-driven illegal activities. The fact that digital products are virtual instead of physical affects the economic mechanisms behind the production and distribution of content, and how piracy works for digital as opposed to physical products: "the main consequence of the non-physical form of digital products is their virtually negligible marginal cost of reproduction and their ability to be digitally delivered." The cost of burning a CD drastically lowered the overhead for record companies, as well as for music pirates, and with the growing tendency toward online distribution among legitimate and illicit distributors alike, the expense of distributing shrunk further from the costs of printing and transporting CDs to merely the costs of maintaining a website. By sheer volume of file transfers, though, distributing music through traditional web servers and FTP servers were not as popular as peer to peer (P2P) now, because the traditional direct download method is slower. The 2008 British Music Rights survey showed that 80% of people in Britain wanted a legal P2P service. This was consistent with the results of earlier research conducted in the United States, upon which the Open Music Model was based. In addition, the majority of filesharers in the survey preferred to get their music from "local sources" such as LAN connections, email, flash drives, sharing with other people they know personally. The other most common method of filesharing was with P2P technologies. By 2007, P2P networks' popularity had grown so much that they used as much as 39% of the total volume of information exchanged over the internet. Alongside the RIAA and BPI's industry anti-piracy service sit a number of other independent companies offering anti-piracy solutions. These companies tend to have a better reach and success rate than the slower industry bodies and provide an alternative solution. Notable market leaders include AudioLock, Web Sheriff, Topple Track, Detecnet, Muso and Attributor. There are ways to minimise music piracy on using the latest Google court decisions on the right to be forgotten as well as using some proven techniques relating to adding a watermark to the tracks and uploading the files yourself with promotional intent. A paper called the Music Anti-Piracy Best Practise Guidelines has been published by music anti-piracy specialists AudioLock and endorsed by the Association of Independent Music, the Association For Electronic Music (AFEM), music distributors Believe Digital and Judge Jules (DJ and Lawyer). These guidelines give advice on how to minimise exposure to music-piracy and how best to utilise the solutions that are not available. ^ Neuwirth, Robert. Stealth of Nations. Google Books. Knopf. Retrieved 30 July 2014. ^ abc "Online Piracy-History". Online Piracy. UNC Digital Commons. Retrieved 30 April 2015. ^ "Internet Piracy". Retrieved 30 April 2015. ^ "Napster settles suits". Retrieved 17 July 2017. ^ abcde Lawrence Lessig (2004). Free Culture: How Big Media Uses Technology and the Law to Lock Down Culture and Control Creativity. New York: The Penguin Press. ISBN 1-59420-006-8. OCLC 53324884. ^ abcdefg Stryszowski, Piotr; Scorpecci, Danny, eds. (2009). Piracy of Digital Content. OECD Publishing. ISBN 978-92-64-06543-7. OCLC 663833839. ^ Doan, Amy. "Metallica Sues Napster". Forbes. ^ Josh Halliday. "LimeWire shut down by federal court". the Guardian. ^ Wlömert, Nils; Papies, Dominik (2016-06-01). "On-demand streaming services and music industry revenues — Insights from Spotify's market entry". International Journal of Research in Marketing. The Entertainment Industry. 33 (2): 314–327. doi:10.1016/j.ijresmar.2015.11.002. ^ "RIAA - Scope Of The Problem - June 14, 2015". riaa.com. Retrieved 2015-06-14. ^ Kang, Cecilia (26 October 2011). "House introduces Internet piracy bill". The Washington Post. ^ "Internet Users, Free Speech Experts, Petition Against SOPA". Huffington Post. 13 December 2011. ^ "'American Censorship Day' Makes an Online Statement: The Ticker". BloombergView.com. 16 November 2011. ^ Alex Fitzpatrick (20 January 2012). "The Week That Killed SOPA: A Timeline". Mashable. ^Andrew Orlowski. 80% want legal P2P - survey. The Register, 2008. ^Shuman Ghosemajumder. Advanced Peer-Based Technology Business Models. MIT Sloan School of Management, 2002. ^ "Music Piracy And How To Avoid It". Mixing Mastering Resources for Music, Media and Business. ^ Luckerson, Victor (18 February 2013). "Revenue Up, Piracy Down: Has the Music Industry Finally Turned a Corner?". Time Magazine. Retrieved 23 April 2015. ^ Peckham, Matt (19 March 2014). "13 Streaming Music Services Compared by Price, Quality, Catalog Size and More". Time. Stealing music from a musician is no better than walking into Macy's and shoplifting a sweater. It's stealing the property of an individual who worked hard to make it and design it. The government needs to make search engines accountable for linking to illegal file sharing websites like Morpheus, Groxter, Limewire, and Kazaa immediately. Piracy Is Unethical and Illegal for Good Reasons. Tell me this, do you pay for a painting, or a photograph from the artist, Why is it any different when it comes to music? It's still an art, it's something somebody has created and spent a lot of hours working on. So when you make a copy of an album, that's equivalent to making a copy of somebody's photograph or painting. It's one less sale for that artist. And one doesn't seem like a lot, but imagine 20,000 people making a copy for their friends, or posting it online, that leaves countless amount of copies being made, which is countless amounts of sales not being made. The artist is then out of money. Which is why they need to charge so much, because they must charge the people who actually buy music more so that they can make a profit and a living. Although the definition says its copying, it is stealing, you are stealing an artists hard work and effort. You're stealing their money and their creation. So, no, piracy should NOT be legal. For centuries hard work and effort to produce a product have been rewarded,Have you ever been to school?,when you do good, or put effort time and money into something you would like some kind of reward,am i right?.Whats the point of spending millions of dollars and years of work onto a game like COD Black Ops 2 which hundreds of thousands of people enjoy and pay good money for just to have it stolen,e g PIRATED,whats the point of effort and money if theres no reward? What about people who can't afford music or to see the new movies. Plus who cares it is not like they are doing any harm to anyone its not like they murdered someone. All they are doing is posting movies on the internet so people who can't afford it can see it and relax and don't have to worry how they are are going to pay the rest of there bills because they spent some of the money at the movies. Why is wrong with you people. Of course piracy is stealing, you're taking a digital version of a profit away from the maker/developer/writer. Just because they still have a copy doesn't mean they aren't loosing something. If you've ever made a joke, and then saw someone use that without crediting you then you should know want I'm talking about. Piracy is like that except on a much larger scale, and it effects the income of the creator. Piracy is a serious thing, even if you don't think so. The people that have a higher say or opinion than you is what matters most because they are the ones in control. You can get up to five years in prison. So before taking someone else's work, music, movies, or documents. Think is it worth it? Because it's not. When people steal (piracy) music by getting it online somehow, They are stealing from that artist because that artist spends there time and money on studio time to put into their albums. Yeah music artists are paid a lot but they don't make what they don't earn they make there money from their albums photoshoots. So its not like they are getting “overpaid” just for their music they get paid for doing a lot of other things. They earn what they make. People should stop acting like $1.00 is to much for one song on Itunes or wherever they sell the online music. Its a lot cheaper than getting caught illegally downloading the music or movies. Its one dollar people. If you were to get caught it'd be up to a $250,000 fine. Id rather spend the dollar than have to spend on that. Let me have an example. If you steal something in market, then probably everybody will see you are stealing, even if you steal something in internet market, you are stealing but nobody can watches you. Humans didn't made internet with science in defiance of faith. Piracy never can be legal because it is stealing and stealing is illegal.
2019-04-19T14:22:26Z
http://sgeami.chytrak.cz/68-pirated-cds-and-dvds-essay.php
The best skateboard bearings are among the most valuable parts of a skateboard. It is vital for your skateboard to have sensible bearings as they can keep the skateboard wheel running smoothly, thereby resulting in a smooth ride. It should be noted that each wheel of your skateboard needs two bearings, that’s why you really have to be careful with your choice. If choosing skateboard bearings is still somewhat a confusing process for you, then you can always seek the aid of a buyer’s guide such as this article to help you all throughout the selection process. With the aid of this article, the somewhat complicated task of choosing skateboard bearing will be much more manageable for you. 1 What are Skateboard Bearings? 3 What is it that Makes a Bearing Go Fast? 7 What are Spacers and Speed Rings? Skateboard bearings actually refer to the round metal pieces that you can find being fitted with the wheels of your skateboard. These are helpful in mounting the skateboard or longboard wheels into the axle. Regardless of the size of the wheel, all these bearings actually come at a similar size. You can also expect all of them to fit all wheels for skateboarding. As for the skateboard bearings size, note that their universal measurements are usually 22 mm for the outer diameter, 7 mm for the width, and 8mm for the core. Most suppliers actually offer a set of bearings. They often sell bearings sets of 8 considering the fact that each wheel needs two bearings. You can also find them in various colors, letting you pick one that suits your style. Steel bearings are actually among the most popular ones you can find in the market. Many consider this material as one of the best skate bearings as it is known for being the industry standard in the field of skateboarding. If you pick this material, you will notice that the bearings are usually circular in shape. They also come with flat sides. Each bearing houses around 7-8 lubricated balls designed to distribute a load’s weight and ease tension in between the skateboard’s axle and wheels. One major advantage of steel is that it is both durable and economical. However, there are also instances when the energy triggered by heavy friction in between the wheels and axle tends to heat up metal. The result is expanding or making the bearings less effective. That’s the reason why you really have to ensure that the steel bearings stay dry, lubricated, and clean, so they will work longer and more effectively. You can also go for ceramic skateboard bearings. Ceramic bearings are often constructed from silicon nitride, a compound. In comparison to steel, the material actually promotes a smoother ride while also being harder. Because of this, it is possible for ceramic to have reduced friction so there is less need to use a lubricant. It is less affected by heat energy, too. In case of friction, it has also been known that the ceramic material does not expand. That said, it won’t have a negative impact on the overall performance of the skateboard. The problem with this is that because of its high performance, it also comes at a higher price tag. Still, it is a good choice if you are willing to spend more for an excellent performance. You can also choose titanium bearings. While titanium is not as popular as the other two materials, you can still expect it to work well for skateboarding. In fact, this material is known for being smooth and light without having to sacrifice durability and speed. As far as speed and performance are concerned, the best option is probably the ceramic material. As mentioned earlier, it is smoother and harder than steel while also promoting a speedy ride. While it costs higher, the benefits of ceramic are definitely worth it. What is it that Makes a Bearing Go Fast? One thing that will help you determine how fast a bearing will be is the ABEC rating. You have to check this rating for a specific bearing if you want to make sure that you are getting a really fast one. Different skateboard bearing dimensions and sizes are also designed for different purposes. If you go for a bearing, which features an ABEC rating of 3, then note that it will be a bit slow. Go for one with a higher rating as it also aids in speeding it up. This means that the higher the bearing’s rating is, the faster it will be. If you want your skateboard to really move fast, then go for a bearing with an ABEC rating of around 7. Aside from that, you should also consider replacing smaller wheels with larger ones as they can also help your board move faster. ABEC, which stands for Annular Bearing Engineering Committee, provides a rating for skateboard bearings, which indicates the performance and speed of the product. It should be noted that the ABEC rating serves as the industry’s standard in terms of determining the precision of ball bearings. ABEC 1 – Bearings with this rating are known for having the lowest precision level, which is the reason behind their really low price in the market. Several companies avoid selling those with this rating because there are those who view the items as having very low quality. Still, it is a good choice for skateboarding and is only a bit slower when compared to bearings with a much higher rating. ABEC 3 – Generally, these bearings skateboard are offered at an affordable price. The problem is that they do not roll as smoothly and as speedily as the higher-rated ones. ABEC 5 – This is considered as the standard rating for the majority of bearings used in skateboarding. It delivers a decent performance and speed at a reasonable cost. ABEC 7 – Often sold at a much higher price. It is mainly because the high ABEC rating also indicates a speedy and smooth performance. ABEC 9 – Those bearings with a rating of at least 9 are considered to be extremely fast. That said, expect them to be really ideal for downhill skating. It is a good choice for you if you are an advanced skater who really wants to move extremely fast. ABEC 11 and Up – There are companies who advertise this rating but it is still advisable for you to be wary in this case. It is because the highest rating considered for skateboarding is usually 9. You can also find other bearings rated by other organizations, like the ISO (International Standards Organization), German National Standards Organization, and the RBEC Anti-Fascist Bearing Manufacturers Association. However, the most popular ratings are definitely those from ABEC. The standard size of skateboard bearings is actually the size 608. It is considered to be the standard and original ball bearing. If you get the 608 series, you will notice that the ball bearing is typically composed of optional closures, outer and inner race, ball retainer, and balls. The size is also characterized by an inner diameter of 8mm, an outer diameter of 22mm, and a 7-mm width. They also reflect their own ABEC ratings as a means of measuring their manufacturing and dimensional tolerances. Bearings under the 608 series can actually be expected to fit all wheels designed for skateboards no matter what their diameters are. Aside from the size 608, you can also find other types and sizes of bearings, including the mini-bearings, roller bearings, and y-bearings. However, these are not often used in skateboards as the standard one is really the 608. If you choose the 608 bearing, then you will notice that the bearing balls tend to rotate in between two rings – the outer and inner ring. There is also a metal or rubber shield, which seals the whole unit. You can expect such bearing shields to be a big help in minimizing the entry of contaminants into the bearing, as well as the level of lubricant leakage. The shield of the bearing actually refers to a medium-sized ring, which you can find on its side. It is a vital component as it works in preventing dirt from penetrating the balls. The best skate bearings also often come with a rubber seal or shield. It can be defined as the soft rubber ring, which you can find at the outer part of the bearing. It is also important as it offers an aid in shielding the interior from debris and dirt. The ball cage, which is also otherwise referred to as the ball retainer, refers to that important component in the skateboard bearing that is used in separating the balls. It also helps maintain the symmetrical radial spacing of the balls. Another of its major function is to hold together the bearings. The ball cage is also essential as you can use it to provide lubrication. It is because it serves as a reservoir for oils. With the ability of the cage to hold individual bearings in their right places while still ensuring that the casing spins around them, it is indeed a specific part, which should always be present in your skateboard bearing. A skateboard bearing won’t also be complete without a set of balls. It could be a set composed of 6-7 ceramic or steel balls. These balls rest in the cage or retainer. The balls are probably the most essential components of a bearing considering the fact that they let the casing spin smoothly around them. The outer ring is also a vital component of the bearing. It refers to the round metal exterior, which is used in fitting all the other parts and components. This refers to the smaller metal ring, which you can find being fitted within the bearing’s outer ring. When sliding the wheel or bearing setup into the axles, you will need the inner ring as it is used in fitting the axles through. This specific component refers to the thin ring, which fits into a groove found on the outer part of the bearing. It is extremely useful as it works in locking the shields in their right places. What are Spacers and Speed Rings? Bearing spacers refer to the tiny metal cylinders that you can see being fitted into the wheel of the skateboard in between the bearings. They are vital in improving the performance of the bearing as they work in minimizing the weight that each one distributes. The results, therefore, include more stable and smoother turns. Bearing spacers are also necessary as they work in extending the life of your skateboard bearings. The good thing about these spacers is that they are inexpensive. You can also choose from the different materials used in making them, including aluminum and steel. Read more about “Why Bearing Spacers Really Matter” – Words by Nick Li – Stoked Team Rider at here. Speed washers, on the other hand, refer to the metal and thin washers slipped over the axle. You can find them in between the bearing and nut, as well as the bearing and hanger. Also called speed rings and bearing washers, you can expect these optional additions to your bearing to be extremely useful. One of its major functions is to minimize friction, which is a big help for the faster or speedier turning of the wheels. Note that low friction also translates to higher speed. In addition, the speed ring or speed washer also works as a buffer in between the bearing and nut. Such makes it possible for the wheels to rotate in a quicker manner while also ensuring that the face of the bearing is fully protected from damage. It should be noted that these speed rings are only optional additions to a skateboard bearing. However, many skateboarders and riders find it really necessary, which is the reason why they decide to install these additions to their bearings. It is actually an essential component, especially if you plan to ride your skateboard at a high speed. You have the option of replacing the speed rings as often as necessary. The frequency of replacement is actually dependent on how hard and how much you skate. When searching for the best skateboard bearings, you will surely come across plenty of brands that claim to be the best. Now the question is which one among them is really the best. This review article and buying guide, for instance, recommends plenty of brands, including Yellow Jacket, Spitfire, Heady Shake, Zealous, RollerBones, Amphetamine, Dark Wolf, NEAL Bearings, and Fireball Skate. All of them are reputable brands that receive lots of positive reviews from their buyers. However, one of the most prominent brands from them all is the Bones Bearings. This brand is popular for its various models of bearings, including the Bones Reds, Super Reds, and Bones Reds Ceramics. Searching for the most reliable bearings for your skateboard will also cause you to be introduced to the Bronson Speed Co. brand. Two of the most popular products from this brand are the Bronson G3 and the Bronson Speed Co. G2. In your search for the most reliable skateboard bearings today, you will surely come across Bones Bearings Reds Bearings. Offered by the reputable brand, Bones Bearings, you will never go wrong choosing this product. It actually comes with a set composed of 8 bearings. It is also equipped with a logo sticker as well as instructions on how to set it up and use. One of the most favorable benefits of this product is that it promotes less friction and ease of cleaning. It is because of the single and non-contact rubber shield, which is also removable, integrated to it. Furthermore, it promotes a high level of speed and strength – thanks to the high-speed ball retainer made of nylon that it has. Note that this product also comes pre-lubricated using a speed cream racing lubricant. One downside, though, is that it does not feature a groove at the inner race, which is supposed to help the seal or shield develop a labyrinth. Another highly recommended skateboard bearing on the market today is the Bones Super Reds Bearings. It is also an 8-pc. bearing set. It is a great choice if you are in search of premium bearings considering the fact that they are equipped with high-quality steel races and balls. The bearings also boast of their superior surface finish. It guarantees a fast yet quiet and smooth ride. The fact that it has its own spacers and washers is also a big advantage as such features help in improving its ability to last a long time. It is because the spacers and washers can help the bearings withstand tough abuse. It makes use of a speed cream lubricant, too, which is a big help in promoting a sustained ride. It features removable rubber shields that make it easier for you to make the bearings clean. However, you will need to break it in by riding it for a few hours before you can finally enjoy its excellent performance. If you are looking for pro skateboard bearings, then you will never go wrong with the Yellow Jacket Premium Skateboard Bearings. It is a nice choice as it is known for its high speed and precision. It is also versatile that you can use it for skateboards and longboards, as well as roller blade, inline skate, and electric skateboards. Another nice benefit of this bearing from Yellow Jacket is that it is fully protected – thanks to the presence of engraved color seals. The seals are bright enough, making the bearings more attractive. In addition, they work well in protecting them from dust, rocks, and dirt, promoting a longer life and better precision. Another thing that you will surely like about Yellow Jacket Premium bearings is its minimal friction and high speed – that’s made possible with the high-speed racing lube used to lubricate it. One drawback is its tendency to produce noise when it’s working. If what you are looking for is a ceramic bearing, then it is also advisable for you to check out the Bones Ceramic Reds Bearings. What’s so nice about this product is that it is made of ceramic balls that are known to be not only harder and stronger but also lighter. In addition, ceramic is also long-lasting and waterproof. Cleaning it up is also easy. You will also like its minimal friction – that’s all thanks to the built-in non-contact and removable rubber shield. It is also a skate-rated bearing, which is an advantage as it indicates that it is capable of withstanding the harsh impact linked to hard landings and turns. It is an 8-pc. set, which gives you more than enough to handle your skateboard. The fact that it also comes pre-lubricated using a reliable speed cream racing lubricant also helps promote a smooth and fast ride. It is a bit pricey, though. You will not also regret checking out the Spitfire Burner Bearings. What is so good about these bearings is that they are budget-friendly. Being offered at a really affordable cost, you will definitely realize how nice it is to invest in a bearing. Also, this bearing from Spitfire is known for being a great performer in the industry as far as speed and precision are concerned. It is mainly designed for skateboarding so you can definitely expect it to help you improve your ride. In addition, it is impact-resistant – thanks to the integrated removable nylon cages. Another nice quality of Spitfire Burner is that it is heat-resistant – that’s made possible with the high-carbon chromium steel rings that it has. It is also well-polished and is known for being able to last for a very long time. One possible problem that you might encounter with this bearing, though, is that you may find it too basic, especially if you are already an experienced skater. Heady Shake Pro Skateboard Bearings is also another recommended product for those who are looking for a fast and smooth ride. This model is known for its high level of precision – thanks to the well-thought out precision design. It can provide a quiet rotation as well as a high-spinning speed. You will also like the fact that it already comes pre-lubricated using a special lubricant as it also means that the bearings will work quickly and smoothly. It also works as one of the best longboard bearings. Furthermore, it is versatile that it also works for a roller skate, inline skates, kick scooters, and skateboards. Aside from boasting of its skate-friendly design, you will also love the fact that this set comes with eight high-quality bearings, a waterproof sticker, as well as four skateboard spacers. Furthermore, it provides a smooth rolling design while also instantly providing you with more control and stability than what a standard bearing can provide. It is slightly noisy, though, which is a minor downside. Another product that this buying guide will recommend is the Bronson G3 Bearings. Bronson G3 is actually available in a single set composed of eight bearings. It is really fast and smooth, so expect this model to be capable of providing your skateboard more edge when you’re riding it across the park or around the streets. A non-contact rubber seal is used to cover the bearings’ inner workings, thereby preventing dirt and dust from penetrating inside. A cage also holds the balls, which ensures that they stay in place when the bearings spin. It is a nylon-precision cage, which prevents the balls from spinning while giving them right spacing. It has an ABEC rating of 7 and comes at the industry standard 608 size. There are also 8 washers integrated into the set. In addition, the four spacers included are shrink-wrapped, thereby giving them protection. You have to spend time breaking it in, though, before you can fully enjoy its impressive performance. Finding the most suitable skateboard bearings for you will also most likely cause you to come across Mini-logo Skateboards Bearings. It is a precision 608 bearing, which is known for its consistent and excellent performance. It features removable shields for two sides – one of which is made of metal while the other is made of rubber. It also features a molded ball retainer, which is known for its speed. This skateboard bearing is also pre-lubricated using a speed cream, which is a big advantage as it means that it can reduce friction. Furthermore, it boasts of its hardened chromium steel balls and races with nice finish. The fact that it comes with shields on both sides is also beneficial as these protect the bearing from moisture, wetness, and dirt. You will also find it easy to clean and re-lubricate. It may not be suitable for advanced skaters who are planning to enjoy an extremely fast ride, though. Choosing longboard and skateboard bearings is also now made easier with the availability of Zealous Bearings. One favorable fact about this bearing is that it is equipped with speed rings and spacers. With these around, there is a lower risk for losing small parts in case you change wheels or bearings. It is also known for working with the least amount of friction. In addition, it boasts of its color-coordinated rubber seals that work well in keeping debris and dirt outside. Such works in making the bearing more durable. It also features 8-mm axles with holes that perfectly fit all types of skateboard trucks. It further results in a smooth and fast ride for all users. It makes use of a premium lubricant, too, which penetrates any flaws in the metal and smoothens them out, thereby speeding up the bearing. In comparison to Bones Reds Bearings, though, this product from Zealous is slower. You will not also regret checking out the Bones Roller Bones Bearings. They are known for being among the most precise skate bearings available in the market. What’s so good about these bearings from RollerBones is that they feature high-speed nylon ball cages that you can easily remove. It also features non-contact and removable rubber shield known for having less to zero friction. With that in mind, it can really give you the best ride possible. It also makes use of a low-viscosity speed cream for its lubrication. Since it is lubricated using a premium lubricant, you know that it promotes a smoother ride. It is also known for being long-lasting. In addition, you will love its speed as well as the fact that cleaning it up is a breeze. It does not have any rolling resistance, too. One problem, though, is that it does not work that quietly. It seems to produce a bit of noise. The Bronson Speed G2 is also another of the skateboard bearings from the brand that gained a lot of positive attention. It is popular for its top performance while also being offered at an inexpensive price. It has straight edge shields known for having no friction. The shields are also pop-off resistant, allowing it to hold oil in while keeping moisture out. It also boasts of its nano-ceramic compounds known for resisting corrosion. You can also expect it to prevent excessive wear. With all the features integrated into this product, it is possible for it to let you enjoy a smooth and long-lasting roll without having to spend too much. The balls can also be expected to roll deeper and sit in the raceway channels. It also works while reducing the possibility of damage and breakage due to angular or axial side impact. It takes a while to break it in, though. What is so impressive about the Amphetamine ABEC 7 Inline Skate Bearings is that they are designed in such a way that they can handle the demands often associated to skateboarding. It has a high ABEC rating, which is 7, proving that it is indeed one of the fastest bearings you can find today. It has eight balls, making the bearings faster and stronger since the impact will only be on two to three of the balls. In addition, it is pre-lubed using an extra-performance speed oil. You will also most likely love the gas-washed surfaces of this product since such help reduce friction. You will also enjoy the friction-free shields made of rubber integrated into the product. The shields work speedily while also being easy to clean and maintain. In addition, the balls included in the product are made of steel. The spacers that come in the package are quite challenging to line up, though. One thing that is so favorable about the Shake Junt Triple OG’s A-7 Skate Bearings is that they are guaranteed to give users with a consistently smooth ride regardless of where they decide to go. It is a single set composed of eight bearings, therefore, you’ll also have four wheels to connect to the ride. It has a high level of precision and tolerance considering the fact that it bears an ABEC 7 rating. The eight bearings that you can get from the set are also fully lubricated, which means that you do not have to do it yourself. It also features four spacers as well as a sticker. In addition, it is equipped with double-sided bearing ball shields that are useful in preventing dirt from penetrating within the bearing. One problem, though, is the initial inconvenience that comes with it being pre-oiled. Since it is pre-oiled, dirt tends to stick to it at first but you can solve that by using a cloth to wipe off any excess oil. Another impressive product that’s worthwhile to check out is the Super Swiss 6 Competition Skate Bearings from Bones Bearings. One major benefit of this product is that it is capable of promoting a smooth, sustainable, and speedy ride. These Bones Super Swiss bearings also boast of their unique design. Such unique and innovative design features 6 large diameter balls, thereby resulting in a speedier acceleration, higher level of speed, and improved strength and durability. It also comes equipped with rubber shields that make it easier for you to clean it up. The nylon ball retainers included in the product also make the bearings speedier and sturdier. Aside from that, the brand makes use of a speed cream racing lubricant to pre-lubricate the bearings. It is also resilient when it comes to dealing with rust, heat, dirt, and dust. It also works well for inline speed skating. Note, however, that you may have to spend a couple of days to finally break it in completely. One of the major advantages of Fireball Dragon Precision Bearings is that they are specifically crafted and designed with the aid of professional and expert bearing designers. With that, expect these bearings to be fiercely precise while also delivering a high-caliber performance. Some of the features that make these bearings really tough, sturdy, and precise are the highly precise steel machining, removable cages and shields, and dual labyrinth bearing shields. The bearings also gained great reviews for being long-lasting while also using premium lubricants. The dual labyrinth shields integrated into the bearings are also beneficial as they offer a high level of protection against the elements. That said, there is no need for you to think about the bearings getting dirty. It comes at a standard size of 608, making it suitable for use on skateboards, longboards, spinners, roller blades, roller skates, scooters, penny boards, as well as suitcases. The problem is that it is initially slow but you just have to break it in to make it roll smoothly and effortlessly. Buying the Bones Original Swiss Competition Skate Bearings will let you get a hold of a single set composed of 8 chromium wheel bearings. The set also features instructions, a nice sticker, and 4 bearing spacers. You will definitely love these Bones Swiss Bearings as they boast of their precision-grade and innovative Swiss design. One of the things that makes the Swiss Competition different from the other Swiss bearings from Bones is that its balls are polished using chromium steel. It is also equipped with one removable and non-contact rubber shield, which gives you a guarantee that the bearings are low in terms of friction while also being easy to clean. In addition, the bearings feature a nylon ball retainer, which is known to not only improve speed but also increase the strength. The result is a smoother and more sustainable ride. It is also skate rated, which serves as a proof that it performs better than the others. It tends to produce a rattling sound, though, but rest assured that it is manageable. Bones Swiss Ceramics Bearings won’t also disappoint in terms of speed, durability, strength, and smoothness of the ride. It comes at a single pack of 8 Swiss ceramic bearings. The set is also composed of a nice and attractive sticker, a set of instructions, as well as 4 bearing spacers. It has Cerbec balls ceramic bearings that are known to be strong and hard while still being light enough that you won’t experience any inconvenience using it. What is so good about these ceramic balls is that aside from being non-corrosive and lightweight, they are also long-lasting and have low rolling friction. With that, expect the bearings to have a faster acceleration. You can also expect them to roll farther. It has a high resistance to dirt and moisture while also being easy to clean. Bones Ceramics Bearings are not ideal for beginners, though. If you are a beginner, then you might find the Bones Super Reds more useful. It is also advisable to check out RaZr Precision Bearings ABEC 7 Pro Skateboard Bearings. It is rated with ABEC 7, which showcases how tolerant and great-performing it is. It is known for its high-precision machining. It works well for advanced skaters – thanks to its dependable lighting speed spin. Such can be expected because of the non-contact deep groove and the specially lubricated bearings. It makes use of the SpinX lubrication oil, which is actually a good thing as it evenly distributes heat fast. The well-balanced design of this bearing is also a great advantage as it promotes a smooth and efficient spin. The great performance of the bearings is one of the reasons why many consider it as one of the best gift ideas for someone who loves skateboarding. You will also instantly notice its versatility as you can use it in different applications, including longboard, inline, roller skates, kick scooter, and skateboard. However, because of its speed, it is more compatible for advanced users than beginners. Another remarkable product that’s worth checking out if you are looking for a dependable and high-quality skateboard bearing is the Voform Pro Skateboard Bearings 608. One major highlight of this bearing its high speed and precision. It is also specially designed for skateboards, electric skateboards, inline skates, and longboards. Since it is specifically tailored for the needs of skateboarders, like you, expect it to help give you a smooth and unforgettable riding experience. That’s possible while ensuring that it performs its function with low noise. This set actually consists of 8 bearings, 8 washers, and 4 spacers. It is of top-notch quality considering the fact that it underwent a hundred percent dimensional testing. With its engraved color seal, you also have an assurance that the bearings will be protected from harmful elements, like rocks, dust, and dirt. The durability of this product still has to be tested, though, since it is still quite new. Specially manufactured for skateboards, electric skateboards, etc. One of the things that you will notice right away about the Oust Bearings MOC 5 Tech is its highly distinctive bearing design. Such design is so unique that it can handle tighter tolerances well. What’s even more impressive about this bearing is that it is mainly designed to deliver a high level of endurance for use on technical skateboarding. It makes use of a carbon steel ball cage, which is helpful in maximizing the strength of the bearings. This cage guarantees that the balls will be placed on their rightful places even when dealing with harsh environmental conditions. It also promotes a high level of speed, durability and performance as well as low friction – that’s thanks to its high Rockwell material hardness. It also features two removable rubber seals designed to deliver superior protection for the bearing. The bearings are also pre-lubricated with the aid of ME-TOL synthetic speed oil. It is a bit slow at first but waiting for it to be fully broken in will definitely help you notice its speed after a while. With the NEAL Precision Skate Bearings, skateboarding will also become a more enjoyable and exciting experience for you. Investing in these precision skate bearings from NEAL will definitely let you reach your destination at the smoothest and fastest manner possible. It is known for working really quick. In addition, it makes use of ceramic, which is popular for being around forty percent stronger and fifty percent lighter when compared to steel. Another thing that’s so impressive is that it is finely balanced. Expect it to give you a high spin rating, which is up to a hundred thousand rpm under each load. It is known for giving your skateboard, longboard, or any other board you are using with a longer and smoother rolling. You will also love the inclusions in the set, including its 8 precision bearings, a waterproof sticker, 4 skateboard spacers, and an aluminum case. It tends to squeak after a while of use, though, but rest assured that it’s only a minor inconvenience. With its ABEC 9 rating, one can instantly confirm that the Mini Skater Precision 608 ZZ Bearings are among the most precise skateboard bearings available in the market at present. It makes use of chrome steel material, which is a big advantage as it is known to be not only durable but also resistant to possible deformities caused by heavy loads. It guarantees a fast and smooth roll and ride at a reasonable price. This bearing actually has an 8-mm inner diameter and a 22-mm outer diameter, which makes it convenient to use. Since it is already pre-lubricated, you will be able to use it right away. The lube used is also known for improving the durability of the bearings while also making them perform well. One more impressive thing about these bearings is that they are flexible and high in quality in the sense that you can expect them to be compatible with all kinds of longboards and skateboards. However, it is not as durable as other high-priced bearings sold in the market. With the ABEC 11 rating of Dark Wolf Skateboard Bearing, you know that its level of precision is really high. This bearing is actually constructed from titanium electroplating process. There is also a sturdy chrome steel material integrated into it. The good thing about the materials used in this bearing is that they are known to be not only stable and durable but also resistant to corrosion and wear and tear. It is also dust-proof, so expect it to gain protection from dust and dirt. It perfectly fits well for skateboarders, like you. Another advantage of these skateboard bearings from Dark Wolf is that they are also equipped with high-quality spacers and washers. There are actually four spacers and 8 washers included in the set. It also boasts of its good anti-swelling property. It is not totally quiet, though, but rest assured that when you are riding it, its noise is quite unnoticeable. SCSK8 ABEC 9 Bearings is also a nice choice for anyone who is in search of a good set of bearings for their skateboard or longboard. This product is one set composed of eight bearings. Made of pre-lubricated steel, you know that it can handle the ins and outs of skateboarding. SCSK8 ABEC 9 Bearings also boasts of its rubber seal known for its element protection 608 RS feature. Such offers it with a high level of protection against the elements while also showcasing a low level of restriction. Aside from being used in skateboards and longboards, some people also use it for pro-boards and carts, showing its versatility. The lube used in lubricating the bearings is also known to be an excellent performer in the industry. It is durable while also helping the bearings deliver a smooth ride. The fact that it is really affordable is also a bonus. However, note that it is not as sturdy and as long-lasting as the bearings that cost more. Bronson Speed Co. also continues to impress skateboarding enthusiasts with its RAW Skateboard Bearings. Just like most of the bearings indicated in this article, it is a set composed of eight high-quality bearings. It also comes at the standard size of the industry, which is 608. In addition, it lets you experience a quick and smooth ride considering the fact that it is pre-lubricated. It also boasts of its deep groove raceways, allowing the balls to roll deeper and sit well on raceway channels. It is equipped with micro grooves, too, designed to increase spin through the elimination of the lubricant’s standing wave. Furthermore, it features a ball cage socket, which is engineered to hold oil in place. That said, expect the ball to receive continuous lubrication. It is smooth and light while also containing additives designed to resist moisture, oxidation, corrosion, and rust. It is priced higher than the other skateboard bearings with the same quality, though. If you are a casual skateboarder who wants to have fun and enjoy a fast and smooth ride in the park or any other location, then the Radeckal Blue ABEC 7 Skateboard Bearings is definitely a nice option for you. You will never be disappointed with the quality and speed of these bearings. It has an ABEC 7 rating, showcasing its high precision grade. It also promotes a smoother glide and boasts of the fact that it is skater tested. In addition, it is lubricated with a high-grade oil, making it really work in the park and in any other place you decide to skateboard. Overall, its construction is also durable and of high quality. It is compatible with numerous applications, including longboards, skateboards, rollerblades, inline skates, cruisers, and roller skates. The fact that it is not as expensive as the others is also a big advantage. However, some users say that the performance of the more expensive Bones Reds Skateboard Bearings are much better. Another of the bestselling skateboard bearings today is the 16-pack 608-2RS Skateboard Bearings from XiKe. It is professionally made and specifically designed to meet the needs of those who love skateboarding. It works smoothly while also known for its really long life. You can also expect the bearings to work with the least amount of noise, making it really convenient to use. It underwent a hundred percent dimensional testing, which proves that its quality is unquestionable. The fact that it features a seal is also a big help in preventing impurities from penetrating inside. With the seal, disassembling and cleaning up the bearings is also much easier. It is also equipped with a nylon retainer, which is enhanced in such a way that it is not prone to damage. It does not have grease, too, because only a tiny amount of lube is applied. One problem, though, is that the bearings don’t spin just as well as the other models. If excellent precision is what you are after, then you can never go wrong with Mini Skater 16-pc. Silver Generic 608 ABEC 9 Precision Skate Ball Bearing. It is a set composed of 16 bearings, giving you a lot of extras for your longboard and skateboard. It is available at the standard 608 size. A speed lubricant is also used in pre-lubricating it. Such lube is known for boosting the durability of the bearings while also enhancing their performance. It works well with all kinds of longboards and skateboards. You will also notice how solid and sturdy the bearings are right after you take a hold of them. One more thing that you will surely love about these bearings is that they roll and spin smoothly while also boasting of their high level of speed. In addition, you will find the bearings useful for numerous applications. One problem is that the product seems to have a lot of grease at first but you can just wipe it off for your convenience. Reds and Super Reds are two of the most popular products from Bones. However, take note that they are not the same. You will notice a few differences between them. One major difference is the price. It is because Bones Reds are known to be cheaper than the Super Reds. As to performance, many say that Bones Super Reds are much better probably because they are priced higher, therefore, they underwent a more stringent manufacturing process. Super Reds Skateboard Bearings are also quieter and tend to roll smoother than the Bones Reds. In addition, Super Reds require less cleaning and maintenance. Other Bones bearings that are worthwhile to compare are the Bones Swiss Ceramics and the Ceramic Super Reds. One way to distinguish the two is on the price as Bones Ceramic Super Reds is sold at a much higher price than the Swiss Ceramics. It should also be noted that the Ceramic Super Reds from Bones are considered to be lighter than Bones Swiss Ceramics Bearings. In addition, they offer quicker acceleration because of their balls that tend to weigh less. One more difference is that the Ceramic Super Reds produces less friction, making it faster when compared to the Swiss Ceramic. Bronson G3, Bones Swiss, and Bronson Raw are also among the most reliable skateboard bearings you can find today. If you are torn between these products, then learning about their individual features is the best thing you can do to choose. As for Bronson G3, take note that one of its best qualities is its ability to roll farther while also resisting impact better than other bearings today. Bones Swiss, on the other hand, boasts of its smoother and faster performance while also being known as longer lasting when compared to the others. However, they also tend to be priced higher than the other two. As for Bronson Raw, it is designed to provide users with the strongest, fastest, and longest spin. It is also known for being the only shield-less bearing tailored for skateboarding. Another brand that you can compare with Bones Reds is the Shake Junt. Both actually have almost the same prices for their products but the performance differs. Some say that most of the bearings offered by Shake Junt are built with speed in mind. That said, expect them to be really fast and smooth. You can also expect them to work well for big drops. Bones Reds, on the other hand, are preferred by many because the brand has been around for years already. You should consider getting the Bones Reds, especially if you are after enjoying a long-lasting and quick roll and spin. If you have a limited budget but would like to own a bearing with almost the same quality and performance as Bones Reds, then Zealous Bearings is probably your best choice. With that in mind, the major difference between these two products is the price as Zealous is cheaper than Reds. What’s even better about Zealous is that they are also equipped with speed rings and spacers, making everything easier for you. Bones Reds, however, seem to spin longer when compared to Zealous. Also, there are some differences on sounds considering the fact that Reds is quieter than the other. In terms of price, Mini Logo is considered to be the apparent winner if you compare it with Bones Reds. It is because of its much lower price. It also moves, spins, and rolls fast. The problem is that such performance is not as good as the one portrayed by Bones Reds. Bones Reds is known to be really superior in terms of performance and speed. Also, it has a solid built, making it last longer than the others, particularly Mini Logo. Another major difference is that it is much easier to clean and maintain Bones Reds than Mini Logos. Bearing Removal Tools – These tools are mainly designed to help you dismount the bearings from their housings with ease. You need to remove them just in case you need to clean it up or give it its regular maintenance routine. The best bearing removal tools that you can invest in for your maintenance and cleaning unit is the Alouette Skate Tool Set. Bearing Cleaner Kit – Of course, you also need a cleaner kit, which you can use to clean up the bearing. Remember that your skateboard bearings require regular cleaning to ensure that they continue to deliver their optimum performance. Regular cleaning is also the key to making it last for a long time. Among the best bearing cleaner kits that you can buy today is the Bones Skate Bearings Cleaning Unit. Bearing Oil/Lube – Proper bearing maintenance is also possible if you have reliable bearing oil or lube around, including the Bones Speed Cream Skate Bearing Lubricant and the Ardent Reel Butter Bearing Lube. Using the lubricant will ensure that the bearing will continue to perform well even when dealing with the most demanding conditions. It also has a positive impact on the speed, life, noise, and torque of the bearing. The bearings are indeed among the essential skate accessories or components for your board. That’s the main reason why you really have to choose wisely. Note that the best skateboard bearings are those that work in eliminating friction that might affect the spot in between the metal, which you can find within each wheel as well as the metal axle where you can expect it to spin around. Considering the many options available in this industry, you have to study everything that you need to know about these products. That way, you will be a more informed and knowledgeable buyer, allowing you to sort out all your options and pick out the one, which really suits your needs the most. LaderaSkateboards.com is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to Amazon.com. Amazon, the Amazon logo, AmazonSupply, and the AmazonSupply logo are trademarks of Amazon.com, Inc. or its affiliates. Additionally, LaderaSkateboards.com participates in various other affiliate programs, and we sometimes get a commission through purchases made through our links. We do not specifically market to children under 13. Copyright © 2018 · Ladera Skateboards, All Rights Reserved.
2019-04-24T20:11:39Z
https://www.laderaskateboards.com/bearings/
Containing "Gonjinbidan" and "Wild ginseng Cordyceps sinensis". Gongjinhyang helps create a more attractive skin tone. Through the principle of yin-yang harmony to keep skin balanced and the principle of increasing water (moisture) and diminishing fire (dryness) to enhance moisture within the skin while soothing it effectively, it gives skin a new radiance and smoothness. Contents in Gonjinbidan: Deer Antler Velvet Extract, Cornus Officinalis Fruit Extract, Thymus Vulgaris (Thyme) Flower/Leaf Extract, and Angelics Acutiloba Root Extract. The products in The History of Whoo’s Gongjinhyang line are contain herbal ingredients that keep the supple and moisturized by hydrating dry skin and improving its purification capabilities (circulation within the skin helps with many skin problems). The rare herbal ingredients help treat the skin from within, to give your skin an outer glow. The Gongjinhyang line incorporates herbal traditional medicine that was used by the ancient royal family. The herbal nutrition stimulates the skin’s viability, moisture retention and adds radiance to the skin. The synergy between Gongjindan and Polygonatum also provides excellent wrinkle improvement, adds firmness and promotes a naturally youthful glow. This line is recommended for people in their early 30’s who have dry skin. The philosophy behind the Gongjinhyang line is based on reducing the ‘fire’ on the skin or dry skin, and retaining water, which is the moisture of your skin. This line has been recently upgraded – not only has the lovely packaging been upgraded, but so has the formula. I used the ‘older’ version for 2 months, day and night when I had normal skin. Unfortunately, I do not have the ingredient lists at the moment – I did not keep the boxes for each item when I purchased it – hopefully I will be able to get it soon!!! I will be reviewing the In Yang Balancer, Qi & Jin Essence, In Yang Lotion, Qi & Jin Eye Cream, Qi & Jin Cream, and Hae Yoon Sun Cream SPF 50+++. For each product, with the exception of the In Yang Balancer and Qi & Jin Eye Cream, I used a pea-size amount, for the eye cream a little really goes a long way, and for the toner, I poured 4 pea size amounts on my palm and gently patted on my skin. Description: In Yang Balancer is a herbal toner that keeps the skin soft and moist by hydrating dry skin and improving its purification capability. Review: This toner is very watery, but when applied to the skin, immediately hydrates the skin. The scent is very floral, and some of you may find it heavy at times – but it was totally fine for me. Considering it is 150ml bottle, it does last a long time, which is excellent. Compared to the Jinyul Balancer, I would prefer the In Yang Balancer because of its light texture and consistency, it absorbs right away which is great for oily skin too (if you do have oily skin, I don’t recommend the rest of the products in this line for you), while the Jinyul Balancer took some time – but again, you have to consider that the Jinyul line is very rich because it is made for people over the age of 40. Nonetheless, I love this toner for keeping my normal skin hydrated!!! Review: I ABSOLUTELY LOVE THIS ESSENCE! The texture is rich and it has a yellow/orange tint to it. It absorbs so fast, it leaves nothing behind, but silky smooth skin!!! The scent is not too heavy compared to the rest of the line. I found this essence helped with the texture of my skin, and how it made my skin feel very dewy. What I love about the creams in this line is it really makes skin soft and supple!!! This is one of my top essences I would recommend for those who have dullness, and need a boost in the texture of their skin. Description: In Yang Lotion is an herbal nutrition emulsion that stimulates the skin's viability. It improves the skin's ability to retain moisture and adds radiance to the skin. Review: In my personal opinion, I did not find the In Yang Lotion to be my ultimate favourite. The reason being, it is TOO RICH – this is great for very dry dehydrated skin. Having normal skin going into this line, I found this Lotion to create a film on my skin that I did not like. Compared to Sulwhasoo's Basic Line, I would rather stick with Sulwhasoo's Balancing Emulsion, it is so light, but hydrates perfectly (you can replace it with Sulwhasoo's). But if I could, I would skip this Lotion because of its richness. The texture seems light at first, and it does hydrate the skin, but I do NOT recommend using it for oily skin and normal/combo, only if you have dry skin!!! Description: It provides excellent wrinkle improvement effects. Its delicate but outstanding absorption tightens slackened cells around the eyes to create a pure and clarified look around the eyes without irritation. Review: The best eye cream I have EVER tried!!!! Let me tell you how your dark circles are eliminated within two weeks, its unbelievable! When I bought this eye cream, I went into it without using an eye cream for two weeks, and I was sleep deprived due to my busy schedule. I know you guys are probably like, HOW COULD I NOT USE AN EYE CREAM for two weeks haha– but I am glad I didn’t, the reason being because I saw dramatic results!!! The technique I applied this is not in circular motions, but in patting motions, which still helps the product be absorbed. It has a yellow tint, and smells very herby, almost floral – the texture is very emollient and moisturizing the skin around the eyes amazingly. It states that it tightens skin around the eyes, and IT SURE DOES – my left eye can get a bit droopy, but this eye cream lifted and tightened it up. I highly HIGHLY recommend this eye cream, this is not a miss!!! Description: Qi & Jin Cream is a product of traditional beauty care techniques of the royal family. In addition to improved firmness through Gongjinbidan maximizes the skin's radiance. Review: Another cream that is on my TOP LISTS – this cream will make your skin very dewy and soft. The scent is not as strong as the In Yang Balancer and Lotion (which would leave a scent behind on my face haha). The texture is rich, so I do not recommend it to those who have oily/combo skin. This cream is very moisturizing, and I find that it helps keep the skin hydrated even in harsh winter climates (I tested it outside to see how it battles through the cold!!!). I applied this cream by first, gently massaging, then lifting my skin UPWARDS from chin, to cheeks, and forhead – I saw improvements with the lifting techniques, and I recommend many of you to apply your creams this way, but be gentle so you do not stretch your skin. The results I saw from this cream is radiance, glow, firmness, suppleness, and plumped skin!!! Description: Whoo's most well known herbal sunscreen cream with characteristics such as providing moisture to the skin, spreading out to the skin with soft texture, refreshing finish touches and absorption without stickiness with a light, smooth sun cream with water cream-like texture. Review: When it comes down to sunscreens, the ONLY thing I look for is its protection. This sunscreen has a HIGH spf ‘+++’ which is very important, especially during summer times (apply sunscreen even in winter seasons!!!). The texture is thick, it has a light yellow tint, and it seems sticky, but it absorbs instantly. However, I found that because it is thick, it also created a film on my skin. Nevertheless, it did keep my skin hydrated and moist, but compared to the Charmzone Albatross Sun Powder, I would rather go with the Charmzone sunscreen. Recommended? Yes I would recommend this line, ONLY for dry skin - some of you with normal/combo may find some of the products rich, especially the lotion. I have not tried the new upgraded line. My Korean friend told me that the new line absorbs much quicker, and if you are interested in these products, I advise you to go to the store to try them out - plus a new sleeping pack and upgraded mask-sheets have been included!!! http://hopeinablog.wordpress.com/2011/01/10/history-of-whoos-gongjinhyang-line-renewed-and-updated/ by mentioning this upgrade, they have stated that the newly added ingredients are: aloe vera and metasequoia glyptostroboides extracts :)!!! For those of you with oily skin, I don't recommend this line because the richness may cause some bumps and milia seeds on your skin, so its best to stay away from this. The scent is very floral and herbal, I did not mind it personally - and the texture of the creams are very delicate and luxurious. Overall, I am happy with this lines results. It helped my skin remain soft and supple - it really refined the texture of my skin, and I always woke up to smooth silky skin. My top recommendations are the Qi & Jin Cream, Qi & Jin Essence, and Qi & Jin Eye Cream!!! Another wonderful review! I'm tempted to try this eye cream. I'm desperate to try anything that helps with dark circles. You will love the eye cream - I have never, honestly, come across an eye cream so moisturizing, and reducing puffiness and dark circles!!! I encourage patting the cream around your eyes - it helps drain out excess water, which can lead to puffiness. Patting also helps with circulation - usually this is mentioned when massaging the eye area. However, massaging can lead to premature wrinkles, and I never recommend massaging in circular motions around the eyes!!! The best thing was that when I was going into this line, I had not used an eye cream for 2 weeks, and let me tell you, my eye area looked horrible!!! Dark circles, dryness, fine lines, puffiness - you name it. After a few weeks, with using the Qi & Jin Eye Cream, I noticed a brightness and less dark circles. This eye cream is a keep!!!!! do you think the eye cream would cause milia for the eyes? I am very prone to milia - especially around the eye area!!! Fortunately, this caused no milia, and I was worried because it is very rich. Many people don't know that one reason milia seeds form is because applying TOO MUCH of the product (in this case a face cream) which can clog the pores and cause milia. You only apply a small pea size amount for face cream, and a very SMALL pebble size for eye creams - make sure to thoroughly pat your products in your skin for penetration and full absorption! If you are worried about it causing milia, I recommend going to a store to ask for some samples before purchasing the product! I highly recommend this eye cream though - it did the trick for dark circles and puffiness - and kept my eye area plumped and bright!!! Let me know how it works out! <3!!! Whta is the best way to remove milia?? Before I answer your question, I would like to start off with how to prevent getting milia seeds. If you are prone to milia seeds, it may be that your creams are very rich - never use your facial creams around your eyes, and never use any type of oil either! Considering the Qi & Jin Eye Cream is rich - I am prone to milia - I only used a small little dab, and thankfully it absorbed right away causing no milia! So make sure not to use a lot of a product or else it will cause some milia seeds!!! The best way to remove milia is, honestly, see your dermatologist! NEVER ever try to use your nails or any type of tools to remove them because it will cause redness, scarring, and damage to your skin!!! My second highly recommended suggestion is using a mild AHA or Salicylic Acid treatment to help exfoliate the area and dry it out - this can be of your choice. I have used the Origins Brighter By Nature High-potency Brightening Peel Pads which has a mild AHA, it helps cleanse deep clogged skin, and is GREAT for sensitive skin!!! Hi. I would like to either purchase History of Whoo or Sulwhasoo for my mom. She's in her mid 50s. She has dry skin. I am debating if I should get the History of Whoo - Qi & Jin products for her? She wants to reduce wrinkles and to hydrates her face. Can you recommend me the eye cream, essence and cream for her? Also, would you be able to recommend me a body lotion that removes/reduces blemishes on hands? Thanks in advance! Btw, I love your site!! So informative! Your reviews are always spot-on! I've tried both Sulwhasoo and History of Whoo for myself, loving them!! That's very nice of you! Since your mother has dry skin, which occurs as you get older. The Gongjinhyang (qi & Jin) line is suitable, although it is great for people in their 30's that want to prevent wrinkles from occurring and helps diminish fine lines. If she already has set wrinkles, she would need a line to help treat it. The History of Whoo Jinyul line is for women over the age of 40 - this line will help treat **deep wrinkles** and deeply **hydrate the skin.** It has a 5 step set: Jinyul Balancer (toner), Jinyul Essence, Jinyul Lotion (day moisturizer), Jinyul Eye Cream, and Jinyul Cream (night cream). Specific herbal ingredients have been selected to help meet the needs of mature skin types. If she wants something emollient, the Qi & Jin Cream is great! But for Essence and Eye Cream, I recommend it from the Jinyul line! As for Sulwhasoo, she will LOVE the Extra Refining line!!! Very hydrating, keeps skin glowing, and firms up the skin! My mother really loves this line!!! She liked the Jinyul line too - it is preference, if she wants something rich, the Jinyul line is great, but if she wants something light yet still hydrates and keeps skin moisturized the Extra Refining line is great. For blemishes on hands/body - I have not tried any! But funny to say, the only product I use on my hands is The History of Whoo Seol Whitening Lotion or Sulwhasoo Snowise Whitening Fluid - these products helps reduce the appearance of marks and evens out the skin. Although they are for the face, they work great for the hands/body too!!! But some are stingy to use their skin care products on their body hehe. I hope this helps! If you have The History of Whoo or Sulwhasoo counters near you, I highly recommend going to the store and letting your mom test out the products! Please let me know how ti goes rumikochan!!! :) <3!!! Unfortunately, I live in Edmonton. The only way to get Korean or any Asian skincare products are through online. I'm going to order some samples of the products you recommended and see how it goes. Probably starts with the lighter one first, the Sulwhasoo Extra Refining line for my mom. I am going to give Deary Rose Co-Q10 Whitening Hand & Foot Lotion a try and let you know how it goes after. Again, thank you so much! Btw, I am looking forward to reading your new reviews! It really is hard to get Korean skin care! I don't think there is an Amore in Edmonton, maybe if you have a Korea Town?! Please keep me updated rumikochan!!! Let me know if you need any help :D <3!!! Actually, my mom and I hardly ever use sunscreen. I guess we were just so lazy! ha..But you're right though...it is a must!! I'll try what you recommended, Charmzone Albatross. Thanks again! Keep me updated rumikochan :D <3! I actually love this line, and use the Qi and Jin cream every night. There are many creams of the same stature in terms of marketing (some might be more expensive, some cheaper), but few actually match up to the Qi and Jin cream's easily absorbed texture and its highly moisturizing feel in all seasons. Hi, I have just started using korean products ie Sulwashoo and whoo recently and I believe it suits asian skin better. From one of your blogs, you recommended Gongjinyhang cream instead of Hwa Hyun. I am in my fifty's and am blessed with quite good skin except gets dry esp,on the cheek during winter. Is this good for me, you think? I have taken your advice and bought Hwa Hyun eye cream which I hope can do some wonders for my eye area which is very dry and sad, with lines. Sorry , one more question, Would you have any idea of Cheongidan Hwa Hyun Gold Ampoule please? Hello everyone! I am extremely sorry for being away. I am on a trip at the moment, and will be back next week - I have so many products to review! Will get back on e-mails as well :D Thank you all for the support - please leave any comments or questions :) <3! Muah! Korean Skin Care. Simple theme. Theme images by Jason Morrow. Powered by Blogger.
2019-04-20T22:09:41Z
http://sulwhasoo-sulwhasoo.blogspot.com/2011/01/history-of-whoo-gongjinhyang-review.html
The case for humans being innately and uniquely endowed with a ‘language instinct’ rests largely on the ‘poverty of the stimulus’ argument, or what is sometimes called ‘Plato’s problem’: How do we know so much when the evidence available to us is so meagre? Is this really true? Is the stimulus really so impoverished? The quantity of the stimulus – i.e. the input available to a child – is certainly not impoverished: it has been estimated (Cameron-Faulkner et al. 2003) that children hear around 7,000 utterances a day, of which 2,000 are questions (cited in Scheffler 2015). This suggests that in their first five years children are exposed to 12.5m meaningful utterances. At an average of, say, ten words an utterance this is larger than the entire British National Corpus (100m words), from which several hefty grammars and dictionaries have been derived. What about the quality? While it’s true that the speech between adults often includes ‘disfluencies’ of the type mentioned by Harris above, studies suggest that ‘motherese’ (i.e. the variety that caregivers typically use when interacting with their children) ‘is unswervingly well formed’ (Newport et al. 1977, cited in Sampson 2005). In one study ‘only one utterance out of 1500 spoken to the children was a disfluency’ (ibid.). Chomsky and his followers would argue that, even if this were true, the child will have little or no exposure to certain rare structures that, in a short time, she will nevertheless know are grammatical. Ergo, this knowledge must derive from the deep structures of universal grammar. One much-cited example is the question-form of the sentence with two auxiliaries, e.g. The boy who was crying is sleeping now. How does the child know that the question form requires fronting of the second of the two auxiliaries (Is the boy who was crying sleeping now?), and not the first: *Was the boy who crying is sleeping now?, especially if, as Chomsky insists, the number of naturally-occurring examples is ‘vanishingly small’: ‘A person might go through much or all of his life without ever having been exposed to relevant evidence’ (Chomsky 1980: 40). The explanation must be that the child is drawing on their inborn knowledge that grammatical transformations are structure-dependent. A quick scroll through a corpus, however, reveals that the stimulus is not as impoverished as Chomsky claims. Pullum & Scholz (2002, cited in Sampson op. cit), using a corpus of newspaper texts, found that 12% of the yes/no questions in the corpus were of the type that would refute the ‘invert the first auxiliary’ hypothesis. (It is significant that Chomsky impatiently dismisses the need to consult corpus data, on the grounds that, as a native speaker, he intuitively knows what is grammatical and what is not. Unsurprisingly, therefore, generative linguists are constantly, even obsessively, fiddling around with implausible but supposedly grammatically well-formed sentences such as John is too stubborn to expect anyone to talk to and What did you wonder how to do? [cited in Macaulay 2011]). But even if it were the case that the (spoken) input might be deficient in certain complex syntactic structures, you do not need to hypothesize ‘deep structure’ to account for the fact that a question of the type *Was the boy who crying is sleeping now? is simply not an option. Why not? Because language is not, as Chomsky views it, a formal system of abstract symbols whose units (such as its words) are subject to mathematical operations, a perspective that ‘assumes that syntax can be separated from meaning’ (Evans 2014: 172). Rather, language is acquired, stored and used as meaningful constructions (or ‘syntax-semantics mappings’). Children do not process sentences from left to right looking for an available auxiliary to move. (They don’t even think of sentences as having a left and a right). They process utterances in terms of the meanings they encode. And meaning ‘isn’t just abstract mental symbols; it’s a creative process, in which people construct virtual experiences – embodied simulations – in their mind’s eye’ (Bergen 2012: 16). Thus, the child who is exposed to noun phrase constructions of the type the little boy who lives down the lane or the house that Jack built understands (from the way they are used in context) that these are coherent, semantic units that can’t be spliced and re-joined at will. Is the little boy sleeping? and Is the little boy who lives down the lane sleeping? are composed of analogous chunks and hence obey the same kind of syntactic constraints. What’s more, experiments on adults using invented syntactic constructions suggest that patterns can be learned on the basis of relatively little input. Boyd et al. (2009: 84) report that ‘even small amounts of exposure were enough (a) to build representations that persisted significantly beyond the exposure event, and (b) to support production.’ A little stimulus goes a long way. Bergen, B.K.(2012) Louder than words: The new science of how the mind makes meaning. New York: Basic Books. Boyd, J.K., Gottschalk, E.A., & Goldberg, A.E. (2009) ‘Linking rule acquisition in novel phrasal constructions.’ In Ellis, N.C. & Larsen-Freeman, D. (eds) Language as a complex adaptive system. Chichester: John Wiley & Sons. Cameron-Faulkner, T., Lieven, E. & Tomasello, M. (2003) ‘A construction based analysis of child directed speech.’ Cognitive Science 27/6. Chomsky, N. (1980) various contributions to the Royaumont Symposium, Piatelli-Palmarini (ed.) Language and Learning: The debate between Jean Piajet and Noam Chomsky. London: Routledge & Kegan Paul. Evans, V. (2014) The Language Myth: Why language is not an instinct. Cambridge: Cambridge University Press. Everett, D. (2012) Language: The cultural tool. London: Profile Books. Harris, R.A. (1993) The Linguistics Wars. New York: Oxford University Press. Macaulay, K.S. (2011) Seven Ways of Looking at Language. Houndmills: Palgrave Macmillan. Pullum, G.K. & Scholz, B.C. (2002) ‘Empirical assessment of stimulus poverty arguments.’ Linguistic Review, 19. Sampson, G. (2005) The Language Instinct Debate (Revised edition). London: Continuum. Scheffler, P. (2015) ‘Lexical priming and explicit grammar in foreign language instruction.’ ELT Journal, 69/1. PS: There will be no more new posts until the end of summer and things calm down again. Words come out of the mouth and go into the ear. But they’re stored in the mind. And retrieved from the mind. And understood in the mind. They’re also learned in the mind. That, at least, is the conventional wisdom – especially from the point of view of cognitive psychology. ‘Language is instantiated in the minds and therefore the brains of language users, so that linguistics is to be regarded as a branch of psychology’. Thus argues Ray Jackendoff (2002: xiv). Chomsky, of course, took this view to an extreme: the observable messiness of language in use (or performance) ‘surely cannot constitute the actual subject matter of linguistics’ (1965: 4). Rather, ‘linguistic theory is mentalistic, since it is concerned with discovering a mental reality [or competence] underlying such behaviour’ (ibid.). Theories of second language acquisition follow suit: ‘Second language acquisition is first and foremost a mental process – one that occurs in a behavioural and social context, to be sure, but fundamentally a matter of acquiring a new knowledge system. Cognition and cognitive factors, therefore, are central to any account of how and why SLA works’ (Long & Richards 2001, p.vii) . Anything else, such as the social contexts in which language is used, or the physical stuff of the brain itself, or even the body in which the mind/brain is housed, are considered marginal, messy, uninteresting – mere noise. Not only is language a mental phenomenon, according to this view, but the ‘mind’ of which it is a product is construed as a kind of computer (or as Pinker [1997: 92] charmingly puts it ‘the on-board computer of a robot made of tissue’). Hence, ‘mental life can be explained in terms of a computational process’ (Johnson-Laird, 1988: 26). Or, put another way, cognition – and, by extension, learning – is basically information-processing. Furthermore, because of the limitations on the amount of attention that humans can allocate to any particular cognitive task at any one time, this processing is necessarily controlled before it is automatic. In short, humans are ‘limited capacity processors of information’. Within this framework, second-language learning is viewed as the acquisition of complex cognitive skill. To learn a second language is to learn a skill, because various aspects of the task must be practised and integrated into fluent performance. This requires the automatization of component sub-skills. Learning is a cognitive process, because it is thought to involve internal representations that regulate and guide performance. Because learning is a cognitive process, this ‘information processing’ view of learning is known as a cognitivist one, and the metaphor that best captures it is MIND IS COMPUTER. Associated with this model, therefore, we find a host of information-processing terms like input, intake, output, feedback, automatization, filters, as well as the term processing itself. And, because cognition is implicated, we find a further set of terms like noticing, attention, consciousness-raising, and restructuring. How does this actually impact on current methodology? On the one hand, you could argue that all these various models of mind and language operate at a level far removed from actual classroom practice, and that teachers carry on doing what they’ve always done – that is, teaching effectively. On the other hand, you could also argue that the ‘mind is a computer’ metaphor has percolated down (or up?) and underpins many of our methodological practices and materials, including the idea that language learning is systematic, linear, incremental, enclosed, uniform, dependent on input and practice, independent of its social context, de-humanized, disembodied, … and so on. It is a model of language learning that, arguably, turns the learner into an automaton – ‘a robot made of tissue’. As David Block (2003: 97) notes, ‘in the ideal world of cognitive scientists, the human mind is still conceived of as dependent on external stimuli to which it responds…The adoption of the computer metaphor of input-output does not disguise the fact that there is still a view of mental behaviour as systematic and mechanistic’. Is there an alternative model – an alternative metaphor, even? Language development is essentially a social process. These approaches view mind as distributed and learning as something inter-mental, embedded in social interaction. This means that individuals and environments mutually constitute one another and persons are not considered to be separable from the environments and interactions through which language development occurs. In this view, knowledge is not owned solely by the learner, but is also a property of social settings and the interface between person and social context. Extended systems theorists… reject the image of mind as a kind of input-output sandwich with cognition as the filling…. Instead, we confront an image of the local mechanisms of human cognition quite literally bleeding out into body and world. What, I wonder, would be the characteristics of a methodology that subscribed to this distributed, ‘leaky’, and co-adaptive view of mind? And, specifically, what are the correlates of input and of noticing, in this alternative to a computational, information-processing model of language learning? Block, D. (2003) The Social Turn In Second Language Acquisition, Edinburgh: Edinburgh University Press. Clark, A. (2011) Supersizing the Mind: Embodiment, Action, and Cognitive Extension, Oxford: Oxford University Press. Chomsky, N. (1965) Aspects of the Theory of Syntax, Cambridge, MA: The M.I.T. Press. Jackendoff, R. (2002) Foundations of Language: Brain, Meaning, Grammar, Evolution, Oxford: Oxford University Press. Johnson-Laird, P. N. (1988) The Computer and the Mind: An Introduction to Cognitive Science, Cambridge, MA: Harvard University Press. Long, M. and Richards, J. (2001) ‘Series editors’ preface’, in Robinson, P. (Ed.) Cognition and Second Language Instruction, Cambridge: Cambridge University Press. McLaughlin, B. (1987) Theories of Second-and Language Learning, London: Edward Arnold. Pinker, S. (1997) How The Mind Works, London: Penguin. Listen! Repeat! Understand! The sequence below comes from an advert for a self-study language course – an advert that I have used countless times on training sessions to (gently) mock the folk theory that language acquisition (both first and second) is primarily a process of imitation – and imitation in advance of understanding, no less. The text of the advert spells it out: ‘You probably can’t remember, but at that time [i.e. when you were a child] you first reproduced sounds, then words, and then entire phrases without really understanding anything. Very quickly you were able to speak, understand and make yourself understood’. And of course they add, ‘This is the best way to learn any language’. It’s amazing how this notion has resisted the hatchet-job that Chomsky and his followers inflicted upon it so long ago. Mindless reproduction of the type described cannot of course account for the almost limitless creativity that even quite young children allegedly exhibit. Summing up the evidence, Lightbown and Spada (2006: 14) confidently declare that ‘imitation and practice alone cannot explain some of the forms created by children’, citing a figure of less than 10 per cent of children’s output as being directly imitative. So, if, in Chomsky’s terms, language use is rule-based creativity, and if performance is contingent upon competence, then it follows that we should teach (or have learners figure out) the rules of the language, so that they can generate their own meanings, rather than have them simply imitate a model. The learning sequence might better be summed up as Listen! Understand! Figure it out! Create! It’s something of a shock, therefore, to come up against this sentence in Vygotsky’s Thought and Language (, 1986: 188, emphasis added): ‘In learning to speak, as in learning school subjects, imitation is indispensable’. Or, as Lantolf and Thorne (2006: 166) gloss it, ‘Imitation is the process through which socioculturally constructed forms of mediation are internalised’. That is to say, the transition from skills (including linguistic ones) that are initially other-regulated to those that are self-regulated is engineered by – hold your breath – imitation. In fairness, and as Swain et al (2011: 58) point out, Vygotsky’s notion of imitation was a far cry from mindless parroting: ‘Vygotsky differentiated imitation from automatic copying. In Vygotsky’s view, imitation is a potentially transformative mechanism that is applied consciously and is goal-directed. Intentionality of the imitation, the reflection and examination of the results, and the subsequent revisions differentiates the action from simple mimicry’. This is reminiscent of Bakhtin’s (1981: 428) claim that, to make an utterance is to ‘appropriate the words of others and populate them with one’s own intentions’. Imitation, then, is like a benign form of plagiarism, in which the child cobbles utterances together, in a kind of cut-and-paste fashion, using whatever linguistic affordances are available in order to achieve their immediate communicative purposes. These linguistic affordances include, not only words, but multi-word chunks, such as lemme-see, I-wanna-do-it, etc, that, initially at least, are unanalysed into their component parts (Tomasello 2003). In this sense, they constitute what one scholar (Clark 1974: 1) has called performance without competence: ‘The important question is no longer whether imitation can help children to acquire syntax, but precisely how a child gradually extracts grammatical information from the repertoire of imitated sequences at his [or her] disposal’. So, to tweak our learning sequence yet again, maybe what’s happening is more like Listen! Imitate! Understand! Figure it out! – not a million miles from the Listen! Repeat! Understand! formula that I habitually mock. The question then is (as ever): how does this apply to the learning of a second language? How does one ‘populate the words of others with one’s own intentions’? Eva Hoffman (1998: 220), a Polish teenager learning English in the United States, describes the process of appropriation: ‘Since I lack a voice of my own, the voices of others invade me… By assuming them, I gradually make them mine. I am being remade, fragment by fragment, like a patchwork quilt’. In a similar, patchwork fashion, a student of academic writing will selectively imitate (or copy) features, both micro- and macro-, of a model text as a first step in discovering her own academic ‘voice’. If imitation is fundamental to first language acquisition, should we be integrating more imitation-type activities into our second language classrooms? And how can we ensure that, in order to be ‘transformative’, imitation meets the criteria that Swain et al. establish (2011: 59), i.e. that it is ‘deliberate, reflective, and accompanied by some kind of instruction’? Bakhtin, M.M. (1981) The Dialogic Imagination: Four Essays, Austin: University of Texas Press. Clark, R. (1974) ‘Performing without competence’, Journal of Child Language, 1, 1. Hoffman, E. (1998) Lost in Translation: A Life in a New Language, London: Vintage. Lantolf, J.P., and Thorne, S. (2006) Sociocultural Theory and the Genesis of Second Language Development, Oxford: Oxford University Press. Lightbown, P.M. and Spada, N. (2006) How Languages are Learned (3rd edn.), Oxford: Oxford University Press. Swain, M., Kinnear, P., and Steinman, L. (2011) Sociocultural Theory in Second Language Education: An Introduction through Narratives, Bristol: Multilingual Matters. Tomasello, M. (2003) Constructing a Language: A Usage-based Theory of Language Acquisition, London: Continuum. Vygotsky, L. ( 1986), Thought and Language, edited by Kozulin, A., Cambridge, Mass: The MIT Press. I’ve just seen this somewhat dispiriting documentary about Nim, one of a number of primates who have been sequestered, domesticated, scrutinised, feted, and ultimately abandoned in the name of linguistic research. Even the shots of the Columbia University forecourt that I walk through every day failed to enliven a story of wanton cruelty, institutional pettiness, dodgy science and bad hair. The film charts a succession of sudden, traumatic abductions, starting when baby Nim was snatched screaming from his mother’s arms. Over a period of several years, with only humans to interact with, the young chimp was taught to sign, using an adapted form of American Sign Language, and acquiring a working vocabulary of several hundred words. When he outgrew his cute and cuddly stage, and/or when the funding ran out, he was packed off to a sort of primate Guantánamo Bay. The story is only slightly redeemed by the efforts of one of his former minders to track him down. Even in his hoary old age, Nim still retains a trace of his former competence, pathetically signing ‘play’ from within the bars of his prison. Frustratingly, the film hardly touches on the linguistic controversies that fuelled this research. In the 1970s, when this unhappy story took place, the debate as to whether only humans are innately equipped with a modular language acquisition device (LAD) was still a fairly hot issue. Not for nothing was Nim named Nim Chimpsky, in (cute) recognition of Noam Chomsky’s role as the leading protagonist of the debate. What was at stake was this: if highly intelligent apes, exposed to a similar linguistic environment as human children, could acquire an extensive lexicon, but fail to develop even the rudiments of a ‘grammar’, this would go some way towards supporting the view that humans are uniquely hard-wired for language acquisition. On the other hand, if evidence of syntax, however primitive, could be demonstrated, Chomsky’s notion of a ‘Universal Grammar’ (UG) would either need to be extended to nonhuman primates, or it would need to be re-evaluated entirely. And the findings? Nim’s vocabulary was impressive, but more impressive still was his ability to form two-sign, three-sign, and even longer strings: MORE EAT, HUG NIM, BANANA EAT ME NIM, etc. Moreover, a superficial analysis of the data would suggest that Nim was operating according to some kind of embryonic grammar, producing word order patterns not dissimilar to those of human children’s first utterances. For example, he consistently placed the sign for MORE in front of the sign it modified: MORE TICKLE, MORE DRINK, etc. But, as Jean Aitchison (1983) notes, “a closer analysis showed that the appearance of order was an illusion. Nim simply had a statistical preference for placing certain words in certain places, while other words showed no such preference” (p.55). However, as Roger Brown(1973) argued, with regard to similar results for Washoe, an earlier case study of primate signing, “While appropriate order can be used as evidence for the intention to express semantic relations, the lack of such order does not establish the absence of such intentions” (p. 41). This is because the use of appropriate word order, of the verb-object type, for example, as in GIVE BALL, is not strictly necessary, since the context in which the utterances are generated usually resolves any ambiguity. That is to say, the pragmatics of the situation renders syntax redundant. But if that is the case, why do (human) children show evidence of a proto-syntax right from the start? In the end, we don’t seem to be much the wiser as to whether the higher primates have a rudimentary LAD, despite all the anguish that was inflicted in trying to find one. Nor, for that matter, do we really know whether humans have an LAD either, or whether their faculty for language acquisition isn’t just a spin-off of their vastly more developed cognitive capacities. What we do know is that the chimpanzees who have been studied do not use their linguistic capacities in the same way as humans, even very young ones, do. Nim, for example, rarely initiated a conversation, and was unable to grasp the basics of turn-taking. As Aitchison (1983, p. 57) concludes, “Nim did not use his signs in the structured, creative, social way that is characteristic of human children”. In fact, Nim’s ‘language’ was simply a more elaborated version of the way chimpanzees use gestures and vocalizations in the wild: to regulate two-way social interactions such as grooming, feeding, and play. As Tomasello (2003, p. 11) puts it, nonhuman primate communication functions “almost exclusively for imperative motives, to request a behavior of others, not to share attention or information with others in a disinterested manner”. As someone once said, “Your dog can tell you he is hungry, but not that his father was poor but happy”. Aitchison, J. (1983). The Articulate Mammal: An Introduction to Psycholinguistics (2nd edn). New York: Universe Books. Brown, R. (1973). A First Language: The Early Stages. Cambridge, MA.: Harvard University Press. Tomasello, M. (2003) Constructing a Language: A Usage-based Theory of Language Acquisition. Cambridge, MA.: Harvard University Press. There’s no entry for X in the A-Z. If there were, one of the few candidates would be X-bar theory, which is in fact a (1981) refinement of Chomsky’s theory of language known as Transformational-generative (TG) grammar. (For what it’s worth, X-bar theory argues that all phrases – whether noun phrases, verb phrases etc – have the same structure, and that this structure is a linguistic universal, i.e. it’s common to English, Japanese, probably even Klingon). As I say, there’s no entry for X-bar theory. There’s no entry for TG grammar in the A-Z, either. Nor for its predecessor, generative grammar. Nor for Government and Binding theory, nor the Principles and Parameters theory, nor the Minimalist program. In fact, there’s no mention of Chomsky or any of his theories in the entry on Grammar at all. This might strike some readers as odd, even perverse. At best, negligent. After all, the study of TG grammar (or any of its offshoots) is a key component of any self-respecting linguistics course on any MA TESOL program in the US. It is often the only theory of grammar that is studied. In fact, in many of the standard texts, such as Fromkin et al. (2007) An Introduction to Language, or the Ohio State University Language Files (ed. Stewart and Vaillette, 2001) it’s not even called TG Grammar, nor ascribed to Chomsky by name. It’s simply the grammar that is. The one and only. And, just in case you don’t know which one I’m talking about, it’s the one that involves the endless “tree-diagramming” of (invariably invented) sentences, like The child found a puppy and Where has Pete put his bone? (both from Fromkin et al.). Well, to be perfectly honest, I’m not sure that I really understand it. I can get my head around basic Phrase-structure grammar, even X-bar theory, and just about understand what Theta-theory is on about. But, as much as I want to get to grips with the Minimalist program (not least because it seems to be arguing a central role for lexis in determining syntactic structure), I’m struggling. In the end, all those upside-down trees leave me cross-eyed. But there are more cogent reasons – both linguistic and pedagogical – for treating TG grammar cautiously, it seems to me. On linguistic grounds the theory seems flawed since it is based entirely on invented sentences in their written form. Try to apply the descriptive framework to spoken data – e.g. authentic utterances like: But the spa, you might want to use it, you know – and it just doesn’t fit. By the same token, TG grammarians will reject forms as being ungrammatical even when they are commonly attested (one of the texts I consulted disallows the sentence John bought what? for example). Chomsky’s dogged insistence on making the “well-formed” sentence the centrepiece of his theory of language seems to undermine the whole enterprise – this, along with the misguided notion that all sentences are generated from the word up, and are hence all entirely original. (Chomsky’s acolyte, Stephen Pinker, woefully betrays his ignorance of developments in corpus linguistics by claiming – in The Language Instinct – that “virtually every sentence that a person utters or understands is a brand-new combination of words, appearing for the first time in the history of the universe” (1994, p. 22) Compare this to the corpus linguist, John Sinclair’s (1991) claim that “by far the majority of text is made of the occurrence of common words in common patterns”). The blinkered disavowal of the validity of performance data is, of course, a side-effect of their (Chomsky’s, Pinker’s etc) mentalist agenda, which is to demonstrate both the universality and innateness of their grammar. This means cherry-picking your examples (and re-configuring your theory fairly regularly so as to accommodate new, potentially disruptive, evidence), while consigning anything that doesn’t fit to the damaged goods bin – the one labelled “performance”. Linguistics and its hyphenated fields have a great deal to offer to language teachers, but the fullest benefit can only come when their implications are integrated and formed into a sound theory of language pedagogy. Because linguistics is only indirectly applicable to language teaching, changes in linguistic theory or arguments amongst linguists should not disturb language teachers. So, why does the teaching of TG grammar (including X-bar theory) persist in the US academic context? And was I wrong to ignore it in the A-Z?
2019-04-18T14:38:04Z
https://scottthornbury.wordpress.com/tag/chomsky/
I recently placed this debate in “The Good” section of my three-part post of all of Hitchens’ formal television and radio debates, but now after a recent third viewing, I am wondering whether it should have gone in “The Great” section. The late Christopher Hitchens, journalist, author, public intellectual and polemist, debates British philosopher and author A C Grayling on the latter’s book on the morality of deliberately aiming bombs at civilians during wartime within the context of World War II, Among The Dead Cities: Is The Targeting Of Civilians In War Ever Justified? [London: Bloomsbury Publishing plc, 2007] at the Goethe Institute, Washington on 20 April 2006. Tellingly, the title of Grayling’s book is derived from an Allied report at the war’s end regarding a suitable venue to hold the trials of Nazi war criminals. While acknowledging that the Second World War was a “just war” against a truly evil enemy and the greatest mistake the Allies could possibly have made would have been to lose it, Grayling brushes aside the atrocities of the Axis that have attracted the most attention since the War’s conclusion and focuses on whether the Allies’ area bombing campaign against German and Japanese cities constituted a war crime under the guidelines set out at the post-war Nuremburg Trials. Grayling even dismisses the argument that the Allies were justified in taking such action as a means of retaliation as it was the Germans who bombed the Allies’ civilians first. Although he does not use the school yard retort in so many words, it is a rather apt summary of his position: two wrongs don’t make a right. Just because the Nazis carried out a campaign of sterilisation, eugenics and genocide against peoples who were unfortunate enough not to be in their favour, the Allies would scarcely have been vindicated in taking such action against the Germans at the end of the war. Grayling concludes that the Allies’ deliberate targeting of civilians on the enemy side by area bombing of Germany and Japan and the dropping of the atomic bombs by America on Hiroshima and Nagasaki was not only a crime against humanity in moral terms, but that it did not even have the desired strategic effect of hindering the enemy war effort by destroying their workforce, supplies, munitions and lines of communication and shattering the moral of their civilian population so as to make their governments sue for peace or surrender unconditionally. Between the word “public” and the word “intellectual” there falls, or ought to fall, a shadow. The life of the cultivated mind should be private, reticent, discreet: Most of its celebrations will occur with no audience, because there can be no applause for that moment when the solitary reader gets up and paces round the room, having just noticed the hidden image in the sonnet, or the profane joke in the devotional text, or the secret message in the prison diaries. Individual pleasure of this kind is only rivalled when the same reader turns into a writer, and after a long wrestle until daybreak hits on his or her own version of the mot juste, or the unmasking of pretension, or the apt, latent literary connection, or the satire upon tyranny. Although Hitchens broadly agrees with Grayling that the actions of the Allies were awful, as were some of their motives – they bombed the German cities firstly, because they could and secondly, to impress Josef Stalin whose Red Army was fast advancing on the Third Reich from the East and who could well have been the Allies’ enemy in a third world war once the second was out of the way – he stops short of calling the bombing campaign an atrocity or a war crime. The Second World War was a truly exceptional example and Germany’s defeat had to be final, total, utter and annihilating. There could be no repeat of what happened after 1918 with speculation about what might have happened if Germany had hung on a little longer and the Jews had not conspired against them. Drawing on Klemperer’s diaries, Hitchens paints an astonishing image of the morning after the night of the bombing of Dresden (which, thanks to unusually favourable climate conditions “worked too well”), when Klemperer and his wife who were about to be shipped off to the death camps that very day, emerged from their shelters, saw that not one brick was piled on top of another, and so tore off the yellow stars from their clothing. Having immersed myself in this volume for a weekend, I am eager to ask one big question that cries to heaven for an answer. It is this: Who on earth does Goldhagen think he is arguing with? He comes to tell us there was a good deal of state- and church-sponsored anti-Semitism in German culture. He adds that the Nazis made great use of Jew hatred in their propaganda. He goes on to say that many Germans took part in beatings, killings, and roundups not because they were coerced but because they liked the idea. He announces that not many Germans resisted the persecution of their Jewish countrymen. Excuse me, but I knew this and so did you. Moreover, the sarcastic phrase about “obeying orders” is not even a well-known explanation, only a well-known excuse. All the way through Goldhagen’s presentation, which is one tautology piled on another, I wait to make my point. And then the two big scholars present come to the podium with their comments, and I realize I have been wasting my time. Sophomoric, meretricious, unoriginal, unhistorical, a product of media hype by Knopf (the book’s publisher), contradictory, repetitive, callow… I’m just giving you the gist of what they said about Hitler’s Willing Executioners. It must have been quite an ordeal for Goldhagen, who looks about 12, to sit through this kind of thing from revered seniors. After Hitler and because of Hitler, six million fewer Jews remained. In the fifty years since, many Christians and some Jews have come to understand much more deeply the sources of what Rosenzweig terms the enmity and the bond between us. The Jewish question remains because, thank God, Jews remain. In America, too, there are anti-Semites who propose solutions, if not a “final solution,” to the Jewish question. They are and, please God, will continue to be a fringe phenomenon. Much more important, we in America, Jews and Christians, have the singular responsibility and opportunity to work out a way of remaining together in mutual respect and unquestioned security. For that common task we receive no help whatever from the incoherent, hateful, and dishonest tract that is Hitler’s Willing Executioners. A surprise attack on a civilian population aimed at causing maximum hurt, shock, disruption, and terror: there comes to seem very little difference in principle between the RAF’s Operation Gomorrah, or the USAAF’s atom bomb attacks on Hiroshima and Nagasaki, and the destruction of the World Trade Center in New York by terrorists on 11 September 2001. And this latter, prescinding from differences in scale and drama of the target, is no different in turn from terrorist bombings carried out in Madrid by Basque separatists or in London by the IRA. All these terrorist attacks are atrocities, consisting of deliberate mass murder of civilians to hurt and coerce the society in which they belong to. To say that the principle underlying ‘9/11’, Hamburg and Hiroshima is the same is to say that the same moral judgement applies to all three. No doubt these will be unduly provocative comparisons. It can be pointed out that the Allied bombings were carried out in time of declared war, in which offensive comparisons are in effect a form of defensive operation, given that the enemy will seek to do the same if given an opportunity; whereas Pearl Harbor and 9/11 were perfidious attacks on unprepared targets, the first military, the second civilian. This point is a good one, for there is indeed a difference here, though some will attempt to make it a debating point whether those who carry out terrorist attacks believe that they are at war and that their offence is in the same way a form of pre-emptive defence. Very well: grant the difference; yet focus on the net effect. In all these cases the centre-piece is an attack on a civilian population aimed at causing maximum hurt, shock, disruption and terror. This is what these events have in common, whether in the midst of declared war or not, and so far as this core point is concerned, adjustments of fine moral calibration are at best irrelevant. All such attacks are moral atrocities [pp. 278 – 279]. The 9/11 point is a different matter. Those who have most belligerently opposed the comparison, such as Christopher Hitchens, are right to point out that whereas World War II area bombing occurred in the middle of a declared war between states whose military forces were engaged in combat to the death, the 9/11 attacks were acts of terrorism carried out not by one state against another but an egregiously nasty private organisation with no interest in anything other than the unrestrained furtherance of its agenda. I grant this, and indeed all other differences, and acknowledge that there is no moral equivalence between Allied military endeavours against the Nazi and Japanese regimes, and the 9/11 attacks, both taken on their own inclusive terms. Instead I argued that in one crucial respect – one respect only – there is a dismaying similarity between area bombing and terrorist bombings: namely, that they both seek to coerce a people by blowing up as many of them as possible and thereby terrorising and demoralising the rest. In this single respect, all acts of mass murder are indeed morally equivalent: and their equivalence lies in their being great wrongs. That was my point; and I adhere to it, because it is surely a profoundly educative one, since it allows one to make a simple but profound emotional connection between one’s horror at the 9/11 attacks in which 3000 people died in a single atrocity, to one’s horror at the deaths of ten and perhaps sometimes twenty times as many in each of the bombings of such places as Hamburg, Dresden, Tokyo, Hiroshima and Nagasaki. This way of grasping the purport of what area bombing meant, really meant, is vital to making a difference to how we behave and what we accept today in the conduct of conflicts. There is nothing abstract or theoretical about the mass murder in which bombing consists: it is real and terrible, and anything that drives the point home has its place in the debate, for in the end the effect on victims, and the atrocity of the act, are indeed one and the same in all cases – in this one crucial, central respect [pp. 292 – 293]. I find it very difficult to take a side in this argument between Hitchens and Grayling; I can well understand both men’s point of view. Ultimately, I am more sympathetic to Hitchens’ stance by the breadth of a cigarette paper and I am glad that Grayling ruled out the drawing of moral equivalences. Yes, it was a truly awful thing that the Allies did to the Axis countries in World War II and I would be loathed to defend it for one moment. However, we were fighting a truly awful enemy who would have visited the same devastation on us a thousand-fold given the opportunity and – as Hitchens pointed out in the debate – the only thing more awful than an Axis defeat would have been an Axis victory. I am reminded of Sam Harris’ discussion of the philosophy of “perfect weapons” and the morality of collateral damage in The End Of Faith. I have posted an edited version of the relevant passage in my previous post (before this post spirals even more out of control!), but in summary, Harris answers those on the Left like Noam Chomsky who compared the America to its enemies in moral terms with the philosophical device of a “perfect weapon”. If there existed a “perfect weapon” that killed/impaired/destroyed only its intended military targets and did not cause any “collateral damage” by killing or injuring innocent civilians and destroying their homes, would America make use of such a weapon in waging war in Afghanistan and Iraq in the 21st Century? Most certainly, it would. Would America’s enemies in the Middle East use such a weapon? Most certainly, they would not. This is as clear and concise a distinction between moral intentions and sheer “body count” as I have ever found. As Harris himself said in his 2007 debate against left-leaning journalist, commentator and author, Chris Hedges, when pressed by moderator Robert Scheer as to whether there was a “fundamental moral difference” between Islamist suicide bombing and the Allies’ tactics during World War II, that we could not fight war like we did in World War II. We have learned the terrible lessons of such actions before “going casually onto the battlefield”. Most certainly the Allied commanders in World War II (not to mention Nixon and Kissinger in the Vietnam War) would not have made use of “perfect weapons” to wage war against the enemy. Neither would America’s and Israel Islamic foes in the 21st Century. However, Bush and Obama most certainly would. What we euphemistically describe as “collateral damage” in times of war is the direct result of limitations in the power and precision of our technology. To see that this is so, we need only imagine how any of our recent conflicts would have looked if we had possessed perfect weapons – weapons that allowed us either to temporarily impair or to kill a particular person, or group, at any distance, without harming others or their property. What would we do with such technology? Pacifists would refuse to use it, despite the variety of monsters currently loose in the world: the killers and torturers of children, the genocidal sadists, the men who, for want of the right genes, the right upbringing, or the right ideas, cannot possibly be expected to live peacefully with the rest of us. I will say a few things about pacifism in a later chapter – for it seems to me to be a deeply immoral position that comes to us swaddled in the dogma of highest moralism – but most of us are not pacifists. Most of us would elect to use weapons of this sort. A moment’s thought reveals that a person’s use of such a weapon would offer a perfect window onto the soul of his ethics. Consider the all too facile comparisons that have recently been made between George Bush and Saddam Hussein (or Osama bin Laden, or Hitler, etc.) – in the pages of writers like [Arundhati] Roy and [Noam] Chomsky, in the Arab press, and in classrooms throughout the free world. How would George Bush have prosecuted the recent war in Iraq with perfect weapons? Would he have targeted the thousands of Iraqi civilians who were maimed or killed by our bombs? Would he have put out the eyes of little girls or torn the arms from their mothers? Whether or not you admire the man’s politics – or the man – there is no reason to think that he would have sanctioned the injury or death of even a single innocent person. What would Saddam Hussein or Osama bin Laden do with perfect weapons? What would Hitler have done? They would have used them rather differently. It is time for us to admit that not all cultures are at the same stage of moral development. . . Consider the horrors that Americans perpetrated as recently as 1968 [during the Vietnam War], at My Lai: . . . This is about as bad as human beings are capable of behaving. But what distinguishes us from many of our enemies is that this indiscriminate violence appalls us. The massacre at My Lai is remembered as a signature moment of shame for the American military. Even at the time, US soldiers were dumbstruck with horror by the behaviour of their comrades. One helicopter pilot who arrived on the scene ordered his subordinates to use their machine guns against their own troops if they did not stop killing villagers. As a culture we have clearly outgrown our tolerance for the deliberate torture and murder of innocents. We would do well to realize that much of the world has not. Any systematic approach to ethics, or to understanding the necessary underpinnings of a civil society, will find many Muslims are standing eye deep in the red barbarity of the fourteenth century. There are undoubtedly historical and cultural reasons for this, and enough blame to go around, but we should not ignore the fact that we must now confront whole societies whose moral and political development – in their treatment of women and children, in their prosecution of war, in their approach to criminal justice, and in their very intuitions about what constitutes cruelty – lags behind our own. This may seem like an unscientific and potentially racist thing to say, but it is neither. It is not in the least racist, since it is not at likely that there are biological reasons for the disparities here, and it is unscientific only because science has not yet addressed the moral sphere in a systematic way. Come back in a hundred years, and if we haven’t returned to living in caves and killing each other with clubs, we will have some scientifically astute things to say about ethics. Any honest witness to current events will realize that there is no moral equivalence between the kind of force civilized democracies project in the world, warts and all, and the internecine violence that is perpetrated by Muslim militants, or indeed by Muslim governments. Chomsky seems to think that the disparity either does not exist or runs the other way. Consider the recent conflict in Iraq: If the situation had been reversed, what are the chances that the Iraqi Republican Guard, attempting to execute a regime change on the Potomac, would have taken the same degree of care to minimize civilian casualties? What are the chances that Iraqi forces would have been deterred by our use of human shields? (What are the chances we would have used human shields?) What are the chances that a routed American government would have called for its citizens to volunteer to be suicide bombers? What are the chances that Iraqi soldiers would have wept upon killing a carload of American civilians at a checkpoint unnecessarily? You should have, in the ledger of your imagination, a mounting column of zeros. Nothing in Chomsky’s account acknowledges the difference between intending to kill a child, because of the effect you hope to produce on its parents (we call this “terrorism”), and inadvertently killing a child in an attempt to capture or kill an avowed child murderer (we call this “collateral damage”). In both cases a child has died, and in both cases it is a tragedy. But the ethical status of the perpetrators, be they individuals or states, could hardly be more distinct. Chomsky might object that to knowingly place the life of a child in jeopardy is unacceptable in any case, but clearly this is not a principle we can follow. The makers of roller coasters know, for instance, that despite rigorous safety precautions, sometime, somewhere, a child will be killed by one of their contraptions. Makers of automobiles know this as well. So do makers of hockey sticks, baseball bats, plastic bags, swimming pools, chain-link fences, or nearly anything else that could conceivably contribute to the death of a child. There is a reason we do not refer to the inevitable deaths of children on our ski slopes as “skiing atrocities.” But you would not know this from reading Chomsky. For him, intentions do not seem to matter. Body count is all. We are now living in a world that can no longer tolerate well-armed, malevolent regimes. Without perfect weapons, collateral damage – the maiming and killing of innocent people – is unavoidable. Similar suffering will be imposed on still more innocent people because of our lack of perfect automobiles, airplanes, antibiotics, surgical procedures, and window glass. If we want to draw conclusions about ethics – as well as make predictions about what a given person or society will do in the future – we cannot ignore human intentions. Where ethics are concerned, intentions are everything.
2019-04-26T08:16:38Z
https://edthemanicstreetpreacher.wordpress.com/tag/my-lai/
Download "RELEVANT GOVT CODE AND ED CODE SECTIONS FOR SCHOOL DIST GO BONDS" 1 RELEVANT GOVT CODE AND ED CODE SECTIONS FOR SCHOOL DIST GO BONDS Issues of particular interest to Treasurer-Tax Collectors are highlighted in blue Added comments are highlighted in Yellow GOVERNMENT CODE SECTION GO Bond Ballot Measure Provisions On or after January 1, 2001, any local bond measure that is subject to voter approval that would provide for the sale of bonds by a local agency shall provide accountability measures that include, but are not limited to, all of the following: (a) A statement indicating the specific purposes of the bond. (b) A requirement that the proceeds be applied only to the specific purposes identified pursuant to subdivision (a). (c) The creation of an account into which the proceeds shall be deposited. (d) An annual report pursuant to Section The chief fiscal officer of the issuing local agency shall file a report with its governing body no later than January 1, 2002, and at least once a year thereafter. The annual report shall contain all of the following: (a) The amount of funds collected and expended. (b) The status of any project required or authorized to be funded as identified in subdivision (a) of Section As used in this article: (a) "Local agency" means any county, city, city and county, including a charter city or county, or any special district. (b) "Special district" means an agency of the state, formed pursuant to general law or a special act, for the performance of governmental or proprietary functions, with limited geographic boundaries, including, but not limited to, a school district and a community college district. (c) "Bond" means any bonded indebtedness regardless of state law or charter that requires voter approval, including, but not limited to, general obligation bonds, revenue bonds, and bonds issued pursuant to the Mello-Roos Community Facilities Act (Chapter 2.5 (commencing with Section 53311)). 2 GOVERNMENT CODE SECTION GO Bond Issuance General Provisions As used in this article: (a) "Local agency" means county, city, city and county, public district, or other public or municipal corporation. (b) "General obligation bonds" means bonds, warrants, notes or other evidence of indebtedness of a local agency payable, both principal and interest, from the proceeds of ad valorem taxes or ad valorem assessments which may be levied without limitation as to rate or amount upon property in the local agency subject to taxation or assessment. (c) "Legislative body" means the legislative body of the local agency as defined in Section (d) "Revenue-producing facility" means an improvement, works, system or facility furnishing or providing services or products for which the local agency is authorized to impose a charge. (e) "Pledge" means pledge, assign, place a charge upon and place a lien upon This article applies to all local agencies which have the power to issue general obligation bonds to acquire, construct or finance a revenue-producing facility In any ordinance, resolution, order or indenture providing for the issuance of general obligation bonds of a local agency to provide funds for the acquisition, construction or financing of a revenue producing facility or any addition to, or extension or improvement of a revenue-producing facility, the legislative body of the local agency may pledge all or any part of the revenues of such facility to the payment or security of such general obligation bonds and the interest thereon in such manner and upon such terms as the legislative body may deem advisable In connection with such pledge the legislative body may provide in such ordinance, resolution, order or indenture such covenants, promises, restrictions and provisions as it may deem necessary or desirable including, but not limited to, covenants, promises, restrictions and provisions relating to the use of bond proceeds, the maintenance, operation and preservation of such facility, the rates and charges to be established and collected for the services or products furnished or provided by such facility, the incurring of additional indebtedness payable from such revenues, and the establishment, maintenance and use of reserve funds, sinking funds, interest and redemption funds, maintenance and operation funds and other special funds for the payment or security of the bonds and the interest thereon. In connection with such pledge and in connection with such covenants, promises, restrictions and provisions the legislative body shall have, but shall not be limited to, the powers specified in the Revenue Bond Law of 1941 (Chapter 6 of this part). 3 The pledge and the payment and security provisions authorized by this article shall be in addition to, and not in derogation of, any provisions permitted or required by law, charter or the Constitution of the State of California relating to payment of general obligation bonds from the proceeds of ad valorem taxes or ad valorem assessments and relating to the levy and collection of such taxes or assessments If the legislative body intends to exercise the powers granted by this article it shall make a statement of such intention in any ordinance, resolution or order calling or providing for an election to authorize the general obligation bonds for a revenue producing facility. Such statement may be general only or it may give such detail as the legislative body may deem proper. If any such statement is made, the ordinance, resolution, order or indenture providing for the issuance of such bonds shall be substantially in accord with such statement. 6 (1) "Legislative body" means the governing body of a local agency. (2) "Local agency" means a city, county, city and county, and special district. "Special district" means an agency of the state formed for the performance of governmental or proprietary functions within limited geographic boundaries, and shall not include a school district or community college district. School Districts are specifically excluded (a) Any bond issued under the authority of this article may be refunded pursuant to this or any other applicable law. Any bond may be refunded pursuant to this article regardless of whether the bond or the legislation under which its issuance was authorized explicitly provides that the bond may be refunded. (b) Refunding bonds shall not be issued if the total net interest cost to maturity on the refunding bonds plus the principal amount of the refunding bonds exceeds the total net interest cost to maturity on the bonds to be refunded plus the principal amount of the bonds to be refunded. Subject to that limitation, the principal amount of the refunding bonds may be more than, less than, or the same as the principal amount of the bonds to be refunded Nothing in this article shall limit the authority of the legislative body to enter into any contract in connection with the issuance of the bonds which it is permitted by Section 5922 to enter into After the sale of bonds issued under the authority of this article, the legislative body shall do both of the following: (a) Present actual cost information for the sale at its next scheduled public meeting. (b) Submit an itemized summary of the costs of the bond sale to the California Debt and Investment Advisory Commission. 7 GOVERNMENT CODE SECTION Legal Action Allowed As used in this article "local agency" means county, city, city and county, public district or any public or municipal corporation, public agency or public authority (a) A local agency may bring an action to determine the validity of its bonds, warrants, contracts, obligations or evidences of indebtedness pursuant to Chapter 9 (commencing with Section 860) of Title 10 of Part 2 of the Code of Civil Procedure. (b) A local agency that issues bonds, notes, or other obligations the proceeds of which are to be used to purchase, or to make loans evidenced or secured by, the bonds, warrants, contracts, obligations, or evidences of indebtedness of other local agencies, may bring a single action in the superior court of the county in which that local agency is located to determine the validity of the bonds, warrants, contracts, obligations, or evidences of indebtedness of the other local agencies, pursuant to Chapter 9 (commencing with Section 860) of Title 10 of Part 2 of the Code of Civil Procedure. 8 GOVERNMENT CODE SECTION GO Bond Notice Requirements As used in this article "local agency" means county, city, city and county, public district or any public or municipal corporation, public agency or public authority Whenever by any law of this state a local agency is required to give notice by posting or publication of a hearing on the formation of a local agency or an improvement district, zone, special assessment district or special taxing district within a local agency, or on the consolidation or dissolution of such local agency or the annexation or detachment of territory to or from any of the foregoing, or on the issuance of bonds or other evidences of indebtedness by or for any of the foregoing, the local agency may, in its discretion, cause additional notice of such hearing to be given by mail as follows: (a) By mailing such notice, postage prepaid, to all persons owning real property which will be within such local agency, improvement district, zone, special assessment district or other special taxing district when the same is formed, consolidated or dissolved, or within territory proposed to be annexed or detached therefrom or which will or may be taxed or assessed for the payment of bonds or other evidences of indebtedness issued by or for any thereof, whose names and addresses appear on the last equalized county assessment roll (including the roll of state-assessed property) or are known to the clerk or secretary of the local agency. (b) Such notice shall be mailed at least fifteen (15) days prior to the date fixed for the hearing The clerk or secretary of the local agency shall, upon the completion of the mailing of the notice, file with the legislative body of the local agency an affidavit setting forth the time and manner of such mailing The failure of any addressee of any mailed notice to receive the same shall not affect in any way whatsoever the validity of the proceedings including such hearing nor prevent the legislative body of the local agency from proceeding with any hearing so noticed. 10 year, payable as permitted by law, according to standard tables of bond values Notwithstanding Section or any other provision of law establishing limitations on the rate of interest of any indebtedness or obligation of a city, county, or city and county the rate of interest on any indebtedness or obligation thereof which is payable to the federal government or any agency or instrumentality thereof or any indebtedness or obligation guaranteed by the federal government or any instrumentality thereof may be at a rate higher than the limitations established in any other law if such rate is the rate established by the federal government or any instrumentality thereof. Any such indebtedness or obligation shall be in such form and denomination, have such maturity, and be subject to such conditions as may be prescribed by the federal government or agency or instrumentality thereof Any provision of law to the contrary notwithstanding, a city, county, or city and county may enter into contracts commonly known as "interest rate swap agreements" or "forward payment conversion agreements" with any person providing for the exchange of payments between the person and the city, county, or city and county, including, without limitation, contracts providing for the exchange of fixed interest payments for floating payments or floating interest payments for fixed payments, or a combination thereof. The contracts may be made upon the terms and conditions established by the legislative body of the city, county, or city and county. The authority conferred by this section includes the authority to enter into any and all contracts incident to the exercise of the authority conferred by this section including, without limitation, contracts to obtain credit enhancement devices and contracts for the performance of professional services. However, these contracts may be made only if all securities or bonds included in the contracts are rated in one of the three highest rating categories by two nationally recognized rating agencies selected by the legislative body of the city, county, or city and county, and if there has been receipt, from any rating agency rating the bonds, of written evidence that the contract will not adversely affect the rating. 11 GOVERNMENT CODE SECTION GO Bond Refunding The following terms shall have the following meanings: (a) "Local agency" means public district, public corporation, authority, agency, board, commission, county, city and county, city, school district, or other public entity. (b) "Bonds" means bonds, warrants, notes or other evidence of indebtedness of a local agency or any improvement district or zone thereof payable, both principal and interest, from the proceeds of ad valorem taxes or ad valorem assessments which may be levied without limitation as to rate or amount upon property in the local agency or any improvement district or zone thereof subject to taxation or assessment, or any outstanding indebtedness payable to the State Board of Equalization as repayment of the local agency's share of refunds made as a result of the California Court of Appeal decision in Aerospace Corporation v. State Board of Equalization, 218 Cal. App. 3d 1300, which indebtedness is hereby imposed on all the local agencies that are required to participate in the refund obligations arising from this decision and that are declared and determined to have been imposed by law. (c) "Legislative body" means the board of directors or other governing body of the local agency, unless the context otherwise requires. (d) "Principal act" means the law under which bonds to be refunded were issued. (e) "Costs of issuing the refunding bonds" means those of the following costs and expenses designated by the legislative body in the resolution providing for the issuance of the bonds: (1) All expenses incident to the calling, retiring or paying of the bonds to be refunded and to the issuance of refunding bonds, including the charges of any escrow agent or trustee in connection with the issuance of the refunding bonds or in connection with the redemption or retirement of the bonds to be refunded. (2) Either of the following: (A) Interest upon the refunding bonds from the date of sale thereof to the date of payment of the bonds to be refunded out of the proceeds of the sale of the refunding bonds, or to the date upon which the bonds to be refunded will be paid pursuant to call or agreement with the holders of the bonds. (B) Interest upon the bonds to be refunded from the date of sale of the refunding bonds to the date of payment of the bonds to be refunded or to the date upon which the bonds to be refunded will be paid pursuant to call or agreement with the holders of the bonds. (3) Any premium necessary in the calling or retiring of the bonds to be refunded. (f) "Designated costs of issuing the refunding bonds" means whichever of the items specified in subdivision (e) that are designated by the legislative body in the resolution providing for the issuance of refunding bonds. (g) "Federal securities" means those securities described in Sections 1360 and of the Financial Code. 12 The legislative body of any local agency may issue negotiable coupon bonds, to be denominated refunding bonds, for the purpose of refunding any of the indebtedness of the local agency evidence by bonds, whether due or not due, or which has or may hereafter become payable at the option of such local agency or by consent of the bondholders, or by any lawful means, whether such indebtedness, evidenced by bonds be now existing or may hereafter be created, and there shall not be moneys in a special fund in the treasury of such local agency irrevocably pledged to the payment or redemption of all such bonds; but the amount of such refunding bonds to be issued under the provisions of this article shall first be determined by such legislative body by resolution entered upon the minutes of such legislative body Whenever the legislative body of a local agency determines that prudent management of the fiscal affairs of the local agency requires that it issue refunding bonds under the provisions of this article, it may do so without submitting the question of the issuance of the refunding bonds to a vote of the qualified electors of the local agency, unless the legislative body determines to submit the question to a vote, in which case the election shall be held in accordance with the principal act pursuant to which the bonds to be refunded were issued. Refunding bonds shall not be issued if the total net interest cost to maturity on the refunding bonds plus the principal amount of the refunding bonds exceeds the total net interest cost to maturity on the bonds to be refunded plus the principal amount of the bonds to be refunded, provided that this limitation shall not apply to bonds issued to refund indebtedness imposed by subdivision (b) of Section as a result of the court decision in Aerospace Corporation v. State Board of Equalization, 218 Cal. App. 3d Subject to this limitation, the principal amount of the refunding bonds may be more than, less than, or the same as the principal amount of the bonds to be refunded When the legislative body determines to issue refunding bonds pursuant to this article, it shall adopt a resolution providing for the issuance of such bonds. Such resolution shall: (a) Describe the bonds being refunded; and the date on which it is anticipated that the exchange, purchase or call and redemption necessary to effect the refunding shall occur; (b) Fix the date of such refunding bonds; (c) Designate the denomination or denominations thereof; (d) Fix the rate or rates of interest to be borne by such refunding bonds, which rate or rates shall not exceed 8 percent per annum, payable semiannually, except that interest for the first year from date of issuance may be payable at the end of said year; (e) Fix the maturity dates of such refunding bonds, which shall not exceed 40 years from the date of such refunding bonds, or the latest maturity date of the bonds being refunded, whichever occurs earlier; (f) Designate the place or places of payment of both principal and interest; (g) Prescribe the form of such refunding bonds; and (h) State the designated costs of issuing the refunding bonds. 15 Section the refunding bonds shall constitute indebtedness of the local agency issuing such bonds and shall be included in any computation of general obligation indebtedness of such local agency for purposes of any debt limitation applicable to bonds of such local agency under the principal act or for any other lawful purpose, but the bonds to be refunded shall no longer be considered outstanding in any computation of the general obligation indebtedness of such local agency; (ii) If the local agency has met the test of subdivision (b) Section then such refunding bonds shall, until the date on which the refunding bonds are no longer outstanding, constitute a special obligation of the local agency issuing such bonds and shall not be included in any computation of general obligation indebtedness of such local agency for any purpose, and the bonds to be refunded shall be considered outstanding in any computation of the general obligation bonded indebtedness of such local agency; but from and after the date on which the refunded bonds are no longer outstanding the refunding bonds shall constitute indebtedness of the local agency issuing such bonds and shall be included in any computation of general obligation indebtedness It is hereby declared that it is a public purpose for a local agency to issue refunding bonds for the purposes set forth in this article and to invest and reinvest the proceeds thereof, and any other funds legally available therefor, for the purposes set forth herein; provided, however, that it is the intent of this article, and this article shall be so construed, that in no single fiscal year shall a tax be levied or shall funds of a local agency other than those expressly permitted herein be used to pay the principal of and interest and redemption premium, if any, on both the refunding bonds and on the bonds to be refunded The powers conferred by this article are in addition and supplemental to, and not in substitution for, and the limitations imposed by this article shall not affect the powers conferred by, any other law Before selling any refunding bonds subject to the provisions of this article, any local agency shall advertise such bonds for sale at public sale and shall invite sealed bids therefor by publication of a notice once at least 10 days before the date of such public sale in a newspaper of general circulation circulated within the boundaries of each local agency to be aided by the public project to be financed by the issuance of such bonds; provided that, if an issue of bonds is less than five hundred thousand dollars ($500,000), a local agency is not required to advertise such bonds for public sale or to accept bids thereon pursuant to this section. If one or more satisfactory bids are received pursuant to such notice, such bonds shall be awarded to the highest responsible bidder. If no bids are received or if the local agency determines that the bids received are not satisfactory as to price or responsibility of the bidders, the local agency may reject all bids received, if any, and either readvertise or sell such bonds at private sale. 16 GOVERNMENT CODE SECTION Refunding Revenue Bonds The following terms shall have the following meanings: (a) "Local agency" means public district, public corporation, authority, agency, board, commission, county, city and county, city, school district, any other public entity, or any improvement district or zone thereof. (b) "Revenue bonds" means any of the following: (1) Bonds, warrants, notes, or other evidence of indebtedness of a local agency payable from funds other than the proceeds of ad valorem taxes or the proceeds of assessments levied without limitation as to rate or amount by the local agency upon property in the local agency. (2) Bonds, notes, interim certificates, debentures, or other obligations of a redevelopment agency, including, but not limited to, obligations payable in whole or in part from taxes allocated to, and paid into, a special fund of the agency pursuant to Article 6 (commencing with Section 33670) of Chapter 6 of Part 1 of Division 24 of the Health and Safety Code It is hereby declared that it is a public purpose for a local agency to issue bonds for the purpose of refunding any revenue bonds of the local agency or any revenue bonds of a member of the local agency pursuant to Article 11 (commencing with Section 53580), whether due or not due, or that have or that may hereafter become payable at the option of the local agency, by consent of the bondholders, or by any lawful means. Any refunding bonds may be outstanding at the same time as the revenue bonds for which the refunding bonds are issued, subject to any contractual limitations created in the proceedings for the issuance of the revenue bonds, and may be on a parity with, or subordinate to, the revenue bonds. The refunding bonds may be issued pursuant to Article 11 (commencing with Section 53580) or under any applicable revenue bond law, including, but not limited to, the Revenue Bond Law of 1941 (Chapter 6 (commencing with Section 54300)), the Parking Law of 1949 (Part 2 (commencing with Section 32500) of Division 18 of the Streets and Highways Code), the Parking District Law of 1951 (Part 4 (commencing with Section 35100) of Division 18 of the Streets and Highways Code), the joint exercise of powers provisions contained in Article 1 (commencing with Section 6500) and Article 2 (commencing with Section 6540) of Chapter 5 of Division 7 of Title 1, and the Community Redevelopment Law (Part 1 (commencing with Section 33000) of Division 24 of the Health and Safety Code), and shall be deemed issued for a valid public purpose and a proper bond purpose under Article 11 (commencing with Section 53580) or the applicable revenue bond law, and interest upon the refunding bonds or the bonds to be refunded from the date thereof to the date of payment of the bonds to be refunded or the date upon which the bonds to be refunded will be paid pursuant to call or agreement with the holders of the bonds may be paid from the proceeds of the refunding bonds or the investment of the proceeds. 17 In connection with the issuance of bonds under any law permitting the issuance of refunding bonds, a local agency may declare the proceeds of such refunding bonds to be a revenue producing public facility, including an enterprise under the Revenue Bond Law of 1941, or may declare such proceeds to be part of such revenue producing public facility or enterprise or may otherwise declare such proceeds to be held, in whole or in part, and for such time as the local agency may deem advisable, in trust for the protection of holders of the bonds or of the refunding bonds. 18 GOVERNMENT CODE SECTION Refunding JPA Revenue Bonds The following terms shall have the following meanings: (a) The term "local agency" means public district, public corporation, authority, agency, board, commission, county, city and county, city, school district, or other public entity or any improvement district or zone thereof. (b) The term "bonds" as used in this article means: bonds as defined in Section 53550, or revenue bonds as defined in Section (c) The term "refunding bonds" means bonds issued to refund bonds. (d) The term "federal securities" as used in this article means those securities defined in subdivision (g) of Section and in subdivision (a) of Section Notwithstanding the provisions of any other law, the provisions of this article shall apply to all refunding bonds of any local agency, regardless of the authority for their issuance The proceedings of any local agency authorizing the issuance of bonds shall not require the deposit of any more moneys, obligations, and federal securities as are sufficient, taking into account both the principal amount of the moneys, obligations, and securities and the interest to become due thereon, to implement the refunding of those bonds. Federal securities and the interest thereon shall be used to satisfy any requirement of cash, money, specie, or lawful money in any proceeding conducted by a local agency before September 19, (a) Any local agency may issue bonds pursuant to this article or any revenue bond law under which the local agency is otherwise authorized to issue bonds for the purpose of refunding any revenue bonds of the local agency or, if the local agency is a joint powers authority, any revenue bonds of a member local agency, upon authorization by resolution of that member of the joint powers authority. (b) The proceedings of any local agency authorizing the issuance of any refunding bonds may provide all of the following for those bonds: (1) The form of the bonds to be issued as serial bonds, term bonds, or installment bonds, or any combination thereof. (2) The date or dates to be borne by the bonds. (3) The time or times of maturity of the bonds. (4) The interest, fixed or variable, to be borne by the bonds. (5) The time or times that the bonds shall be payable. (6) The denominations, form, and the registration privileges of the bonds. (7) The manner of execution of the bonds. (8) The place or places the bonds are payable. (9) The terms of redemption. (10) Any other terms and conditions determined necessary by the local agency. THE SALE OF REVENUE BONDS ORDINANCE TOWNSHIP OF FRANKENLUST, MICHIGAN ord. no. 71 eff. REGIONAL TRANSPORTATION DISTRICT. (Colorado) Seventeenth Supplemental Sales Tax Revenue Bond Resolution. (Resolution No.
2019-04-19T22:16:05Z
http://docplayer.net/6929579-Relevant-govt-code-and-ed-code-sections-for-school-dist-go-bonds.html
Happy 4th of July! Check out what is happening this fantastic summer weekend! Celebrate the Canal Days Festival at the Wabash & Erie Canal! This Saturday, July 7th, begins the annual mid-summer festival! Following the big Lions Club street parade in Delphi at 10 a.m. Saturday morning, Canal Days Festival activities will begin immediately and continue at Canal Park until 4 p.m. All activities at the Canal will resume on Sunday, July 8th at 12 p.m. and close at 4 p.m. Admittance is free. The Wabash & Erie Canal Association offers for your entertainment a number of hit venues—the Canal Boat, Case House, Museum, re-enactors, a commemoration of the historic opening of the canal to Toledo, period crafters in the village, and a personal visit with ponies and oxen—all on two days for your enjoyment. You won’t want to miss this unique festival with so much to see and do! For more information, please see their website. Are you a dog owner or just love dogs? You’ll be happy to know that Wolf Park is having a special event this weekend just for you. If you’ve ever wondered about the connection between dogs and wolves, you can find out from experts this Saturday, July 7th from 1-5 p.m. Dogs and wolves are closely related and Wolf Park will help celebrate our animals’ closest cousins with Dog Day! They will be hosting dog groups from the area as they show off what ‘Dogs with Jobs’ can do, and demonstrate what amazing training can accomplish. Learn about your pets at home, and their wild cousins as well. Greetings from Purdue University Students, Emily & Sam! Enjoying Another Broken Egg! Coming up on my fourth year as a student at Purdue University, I am reflecting on how I’ve spent my time in Lafayette-West Lafayette and the surrounding areas. Sure, I’ve been to some of the events on campus like Starry Night, but have I really experienced the Greater Lafayette area? Definitely not! I lived in the residence halls for the past three years, and so all of my activities and knowledge of events was based around campus. However, it wasn’t until joining the staff here at VLWL that I came to realize all of the things there are do and see just off of Purdue’s campus. A big part of working here means that I help visitors and locals connect with events and businesses here in Lafayette-West Lafayette. Two of our senior staff members took another new employee and I out on a tour of the community so that we would be able to educate people who come into our office. It just so happens that we had a lot of fun doing so! I’ve detailed all of the awesome places that we were able to visit, and I encourage everyone who hasn’t ventured off campus to visit as well! Another Broken Egg They say that breakfast is the most important meal of the day! And Another Broken Egg is a great spot to get it at. We started our day off by stopping by and checking out this Purdue staple open since 1996. It’s located on Northwestern Ave next to the Stacked Pickle. We tried a variety of dishes, from sweet to savory – and it was all delicious! This is definitely a great spot for students, faculty and the community to come and grab breakfast or brunch. Please note there is parking in the back. The Farm & Prophetstown State Park As you first enter Prophetstown State Park, you’ll come across The Farm. This place is a must-see for anyone who loves animals! Chickens, sheep, horses, pigs, and more! We were even lucky enough to get the chance to hold kittens that were just weeks old. Surrounded by the beautiful State Park, the Farm is a great place to escape from the hustle of Purdue’s campus. After stopping by the Farm, you can explore the trails and sights of Prophetstown. The State Park is a great spot for bike riding, walking trails, or having picnics. Tippecanoe Battlefield This site commemorates the Battle of Tippecanoe which occurred in 1811. We visited the landmark of this historic battle, which also has a museum nearby telling the story of the battle between U.S Forces led by William Henry Harrison and the Native American confederation led by The Prophet. The Battlefield is surrounded by beautiful scenic hiking trails and picnic areas. This would be a great place for visitors to take some time to come and learn about the impact that Tippecanoe County had on our country’s history! Wolf Park The Wolf Park is home to 13 wolves, including some loveable new born wolf pups! They also host foxes, coyotes and bison there. This place is a wonderful place to walk outside and view some beautiful animals up close. The Park is dedicated to researching wolves, and contributing to education and conservation of the species. It hosts Howl Nights which are a great attraction for students and families alike – staff enter the enclosure and interact with the wolf pack, and you have the opportunity to howl with the wolves! It’s wonderful to see such enthusiasm for growing and protecting this species! Garden Gate Tea Room This place is absolutely adorable! If you’re looking for a cute and unique place to have lunch with friends, this is definitely it. We enjoyed personal pots of tea from a HUGE variety of flavor choices. I also enjoyed a sandwich and a delicious cup of carrot soup! Decorated as a traditional tea room, with doilies and all, the Garden Gate Tea Room in Delphi will make anyone feel like royalty. Reservations recommended for this small, cozy space! Wabash and Erie Canal We had the opportunity to walk through the museum at the canal in Delphi. This museum is really remarkable because it was constructed almost entirely by volunteers! It’s filled with interactive exhibits, countless historic artifacts, and educational information about Indiana’s history. The museum is on the banks of the canal, with beautiful natural views. Just a short walk from the museum is the Canal Village which is a reconstruction of a Pioneer Village, complete with a Blacksmith, one room school house, and others. It is reminiscent of Connor Prairie, but located just outside of Lafayette! More adventure awaits in the afternoon! Check back to this blog on Friday, July 7, for more local afternoon fun in Lafayette-West Lafayette! Samantha, Purdue University Student, shares this blog. Happening Now! The summer season has arrived when the canal boat is floating down the Wabash and Erie Canal in Delphi, Indiana! Experience history, adventure and pure summer fun at the Wabash and Erie Canal Interpretive Center this year. This attraction, 20 minutes north east of Lafayette-West Lafayette, offers an adventure for the whole family. I remember my first visit to the Wabash and Erie Canal Interpretive Center. It was one of awe that such a wonderful museum was created 100% from volunteer efforts from such a small community. The passion to conserve the history of this transportation system and to create a whole village built around it is amazing. The museum offers visitors a chance to learn the history of how the Wabash and Erie Canal was important to our country’s transportation system. Now, you may think, this sounds boring! But believe me it is not! Throughout the whole museum, there are interactive displays for people to enjoy. Many museums have the policy “hands-off”, but this center welcomes people to be a part of the experience. Visitors (especially children) are welcome to play checkers in the recreated indoor canal boat, try on pioneer village clothing and pretend to be living in the 1800s, and play with a recreated canal that demonstrates how a boat would traverse the lock system. Not only does this center have an indoor museum, but a canal boat to ride through a portion of the original Wabash and Erie Canal and a whole pioneer village to explore. Visitors can walk into an original Log School House from the 1800s where students learned their ABC’s. One does not want to miss a tour of the Reed Case’s (contractor for the Carroll County section of the Wabash & Erie Canal) own Federal-style home which anchors the village, complete with period furnishings, many of which came from the Case family. And what is better on a beautiful summer day than a trip on a replica canal boat down the canal? Nothing! Trails, canal boat ride, museum and more! There is a 10 mile trail system, perfect for hiking, biking, bird-watching and even cross-country skiing. Some trails and roads in Canal Park were once the towpath traversed by mules and horses pulling canal boats. Several sites along the way are on the National Register, including the Canal Construction Camp site, Lock #33 and the adjacent lockkeeper’s home site, and the 1857 Harley and Hubbard Lime Kiln site. A host of events take place at the Wabash and Erie Canal all year long. These include the Historic Canal Days Festival, the Harvest of Quilts “Quilt Show” and Christmas at the Canal. Check out http://www.wabashanderiecanal.org for more information about these special events. Welcome Purdue Marathoners!! The fourth annual Purdue Boilermaker Half-Marathon and 5K will take place this Saturday, October 17. Each year this event has drawn more than 2,200 participants and many more are expected this year! The races will start at the home of Purdue Boilermaker football, Ross-Ade stadium, and meanders through the Purdue campus and the cities of West Lafayette and Lafayette. The course will highlight many of the more popular sites among these two cities in addition to the Purdue campus. This will be a great opportunity for Purdue alumni, students and Purdue sports fans to participate in a half marathon and 5k race on the Purdue campus! Good luck! Nearby in Delphi, Indiana, do not miss the Grand Celebration Ball at the Delphi Opera House. This is an opportunity to not only attend a ball decked out in beautiful attire, but check out the beautifully restored opera house! The Grand Celebration Ball will recreate an 1865 ball honoring returning Civil War soldiers and will celebrate the reopening of the newly renovated Delphi Opera House. Period or formal attire required. The event will include period music, dance, and dinner, etiquette instruction, moonlight carriage rides through historic Delphi neighborhoods, cash bar and more. Down the river and through the woods, a hidden treasure is found just outside our county. This treasure is the historic Wabash & Erie Canal, the largest man-made waterway in the United States. Breathtaking views, winding trails, living history, and passionate people all make up one’s experience at the canal. As a student at Purdue, I moved to this area with little knowledge of the history and excitement that this place holds; however, I learn more and more each day. My favorite part of experiencing all of these new things is getting to share the fun with others. After my first unforgettable trip to the canal, I knew I had to spread the word of this amazing attraction. My parents traveled up from Southern Indiana, and I planned a whole day for us in the quaint town of Delphi. Our first stop was to the Wabash & Erie Canal Interpretive Center. The architecture is designed to make guests feel as if they are stepping back in time to the mid to late 1800’s era. Once inside, the volunteers working within the museum greet the guests. Although volunteer-based, the effort and hospitality these workers put in are priceless. Each and every one of the volunteers is extremely passionate about the land and history, and it shines through their work. In fact, the Wabash & Erie Canal Interpretive Center was voted the Best New Volunteer Driven Museum in the United States in 2006 by the American Association of State and Local History! The museum is a self-guided walk through with exquisite displays, plentiful information and artifacts, and many interactive stations for kids. Come and see for yourself how they earned this prestigious recognition! Not only is the Interpretive Center a museum, but it also has excellent event/meeting space. There are two large rooms with windows that look out over the canal and beautiful surrounding land. It is an excellent space for your next event, whether big or small. After my parents and I traveled through the museum, we headed out to look through the reconstructed display of what a historic pioneer village would have looked like in that time era. The models featured include: the Reed Case house, Bowen Cabin, Log School House, Kuns Cabin, Speece Shelter, Robinson Smokehouse, Fur Trapper’s Cabin, and VanDerVolgen’s Blacksmith Shop. The village is usually up and running on weekends, festivals, and holidays with performers who will gladly share with you the history behind the village. Each building features historic furnishings and equipment and runs similarly to how it would have during the time of the canal operation. Next, my parents and I rented a surrey to bike around the renowned Delphi trails. We went around winding corners, under tunnels, and over bridges. The trails follow the canal to beautiful hidden locations not seen by the common eye. Trails also can be followed throughout downtown Delphi or other wooded areas. It was the most fun I’ve had in a long time! Other rentals are available such as paddleboats and kayaks to use on the canal as well as regular bicycles for the trails. Each rental comes with complimentary trail maps and safety equipment. Finally, the newest addition to the canal is a ride on the replica 19th century canal boat, The Delphi. Step onto the boat to experience what an adventure down the canal would have felt like 150 years ago. The 35-minute ride includes a tour guide who speaks of how everyday life was on the Wabash & Erie Canal. As you can see, there is so much to do all in one area! My family and I had an amazing time, and I encourage everyone to make a trip out to Delphi. It is very worthwhile. My next trip to Delphi will be on August 29 for the Indiana Bacon Festival! Bacon is one of my favorite foods, so it only makes sense to attend an entire festival for it! Hosted on the square in Delphi, the event will consist of Indiana Kitchen Bacon, local brews, live music, a bacon eating contest, a cook-off, and so much more! Last year was the first ever debut of the Indiana Bacon Festival, and it was a smashing hit with over 6,000 attendees! Help make this year’s festival even more successful! The town of Delphi may by small, but it is jam-packed with history, Hoosier hospitality, and fun for all. Do not overlook it the next time you are traveling through northwest Indiana. It will give you an experience like no other, and I hope to see you all on August 29th at the Indiana Bacon Festival! Kaley, Visitor Information Specialist for Visit Lafayette-West Lafayette and Purdue University Student, shares this blog. 4th of July Weekend Update! 4th of July Weekend Update! Looking for a fun Indiana weekend getaway? Or do you live in this area and are looking for entertainment close by? Check out the endless possibilities for fun events happening this upcoming weekend in Lafayette-West Lafayette, Indiana. Fireworks, live music, dancing; all this and more can be found during the Stars & Stripes Celebration on July 4, downtown Lafayette. This annual festive fourth concert features the Lafayette Citizens Band and Indiana All-Star Show Choir followed by fireworks at dusk. The concert will end at approximately 10 p.m. followed by the 25-minute fireworks display which will be launched from the south end of Tapawingo Drive in West Lafayette. Head to the Wabash & Erie Canal in Delphi, Indiana for the Canal Days Festival on July 5 & 6. Throughout the weekend, enjoy live artisan demonstrations: tatting/ lace making, blacksmithing, bowl carving, broom making, basket weaving, crocheting/needle arts, and more! Noble Bikes will offer festival special half-hour rates on family paddle boats and pedal surrey rentals. Food and other vendors will also be on hand during the festival, and of course…take a ride on the canal boat, the Delphi, which will be offering rides throughout the weekend! Take a Boat Ride on the Wabash and Erie Canal! Happening Now! The spring/summer season has arrived when the canal boat is floating down the Wabash and Erie Canal in Delphi, Indiana! Experience history, adventure and pure spring/summer fun at the Wabash and Erie Canal Interpretive Center this year. This attraction, 20 minutes north east of Lafayette-West Lafayette, offers an adventure for the whole family. Not only does this center have an indoor museum, but a canal boat to ride through a portion of the original Wabash and Erie Canal and a whole pioneer village to explore. Visitors can walk into an original Log School House from the 1800s where students learned their ABC’s. One does not want to miss a tour of the Reed Case’s (contractor for the Carroll County section of the Wabash & Erie Canal) own Federal-style home which anchors the village, complete with period furnishings, many of which came from the Case family. And what is better on a beautiful spring or summer day than a trip on a replica canal boat down the canal? Nothing! A host of events take place at the Wabash and Erie Canal all year long. These include the Transportation Festival, the Canal Days Festival, the End of Season Festival and the Old Fashioned Christmas. Check out http://www.wabashanderiecanal.org for more information these special events.
2019-04-23T10:31:35Z
https://www.homeofpurdueblog.com/tag/delphi-indiana/
The 2011 report of the Independent Review of the Intelligence Community (the Review), was the first comprehensive review of the Australian intelligence community since the 2004 inquiry conducted by Mr Philip Flood AO. The Flood inquiry recommended that Australia's intelligence agencies undergo external review every five to seven years. The Review found that Australia's intelligence agencies are performing well following a period of significant growth to deal with the security challenges of the 9/11 decade. Australia and its citizens are safer than they would otherwise have been as a result of intelligence efforts. Our intelligence capabilities have contributed significantly to the global security effort. Australia has built intelligence capabilities broadly commensurate with our growing security challenges. The current basic structure of the Australian Intelligence Community (AIC) remains appropriate, including the operational mandate of agencies. The Review covered challenges for the Australian intelligence community stemming from geo-political and technological change and made recommendations to help maintain the performance of the community in a period of resource constraints. These recommendations covered areas such as priority setting and mission integration, performance evaluation, support for innovation and strategies for managing intelligence collection in the age of abundant information. The Review found that the Australian intelligence community played a vital role in keeping Australians safe and protecting Australia's security interests. The review demonstrated that the investment in the intelligence community over the past decade had resulted in more capability and increased performance. With the exception of the Coat of Arms, this publication is licensed under a Creative Commons Attribution 3.0 Australia Licence. The terms under which the Coat of Arms can be used are set out on the Department of the Prime Minister and Cabinet website (see Guidelines and Procedures). The Independent Review of the Intelligence Community (IRIC) in 2011 will review the Australian Intelligence Community (AIC) in accordance with a recommendation of the Inquiry into Australian Intelligence Agencies (the Flood Inquiry) in 2004. The primary focus of this review will be the work of the six AIC agencies – Australian Security Intelligence Organisation (ASIO), the Australian Secret Intelligence Service (ASIS), the Defence Imagery and Geospatial Organisation (DIGO), the Defence Intelligence Organisation (DIO), the Defence Signals Directorate (DSD) and the Office of National Assessments (ONA). Level of resourcing dedicated to the intelligence community and apportionment of resources across the community, noting that any future proposals would need to be offset consistent with the Government’s overall fiscal strategy. The review will prepare findings and recommendations on the above issues and seek to provide a classified report to the Government around mid-year for its consideration in due course, as well as an accompanying unclassified version of that report. The Department of the Prime Minister and Cabinet will establish a secretariat drawn from across the intelligence community and related agencies, as well as provide all other administrative support required. The review team will have full access to all material, including intelligence information and Cabinet documents, relevant to its examination. The heads of all relevant departments and agencies will ensure they and their staff co-operate fully with the review, and provide any requested assistance. Ministers will also be asked to meet with and assist the review team. Prime Minister Julia Gillard today announced arrangements for an Independent Review of the Intelligence Community to start in early 2011. Intelligence plays a key role in preserving Australia’s national security and supports a wide range of our national interests. The Prime Minister said the review will ensure Australia continues to have a well-coordinated, appropriately resourced and adaptable intelligence system that supports our national interests. The aim of the review is to ensure Australian intelligence agencies are working effectively together and are well positioned for challenges in a constantly evolving security environment. The Review will also consider working arrangements between intelligence agencies and their international partners. It will take into account the significant growth in the intelligence community’s resources and capabilities over the past decade. The timing of the review meets a recommendation of the Inquiry into Australian Intelligence Agencies in 2004 by Mr Philip Flood AO, that the intelligence agencies undergo further external review every five to seven years. Funding for the Review was announced in the Budget in May this year. The 2011 Review will be led jointly by Mr Robert Cornall AO and Associate Professor Rufus Black. Mr Cornall has extensive experience at a high level in public administration, particularly as the Secretary of the Attorney-General’s Department until his retirement in 2008. Associate Professor Black is the highly regarded Master of Ormond College at the University of Melbourne, and a notable ethicist, management consultant and theologian. The Review will produce its final report to the Government around the middle of 2011. It is worth making six introductory points about the nature of this Review. It is the first comprehensive review of the Australian Intelligence Community since the 2004 Inquiry conducted by Mr Philip Flood AO. There have of course been various reviews of individual agencies or aspects of their operation over the last seven years but no detailed consideration of the AIC as a whole. Secondly, this Review is being conducted as a periodic review. It is not, as has usually been the case in the past, in response to a precipitating cause or event. As a result, the broad Terms of Reference require a general analysis and assessment of the intelligence community. Thirdly, the primary focus of this Review is the work of the six agencies that have traditionally formed the Australian Intelligence Community – that is, the Office of National Assessments, the Australian Security Intelligence Organisation, the Australian Secret Intelligence Service, the Defence Signals Directorate, the Defence Imagery and Geospatial Organisation and the Defence Intelligence Organisation. However, while they are not directly the subject of this Review, a number of other agencies make significant intelligence contributions in their own areas of operation. Those agencies include military intelligence, the Australian Federal Police, the Australian Crime Commission, the Australian Customs and Border Protection Service, the Department of Foreign Affairs and Trade and the Department of Immigration and Citizenship. The operational relationship and cooperation between the six core agencies and this wider group is important now and will become more important over time. The appointment of a National Security Adviser and an increasing role for the Department of the Prime Minister and Cabinet in intelligence and national security matters. Fifthly, the intelligence agencies have evolved substantially in the period covered by the Review. From agencies whose outputs were primarily directed to the development of policy, they now have a substantial operational role as well. The intelligence agencies have been integrally involved in supporting military operations, protecting our maritime borders, stopping weapons proliferation and thwarting terrorist activities in Australia and our region. Sixthly, the Flood Inquiry had its primary focus on issues concerning the intelligence that had been provided to government on Iraq’s weapons of mass destruction. Those issues had already received a great deal of public attention and had been the subject of a parliamentary inquiry. As a consequence of this general awareness, Mr Flood was able to publish a comprehensive unclassified version of his report. This Review is different. It is not directed to a particular and well-known area of concern. The Terms of Reference called for a broad investigation into many highly classified or sensitive areas of the agencies’ operations and resulted in detailed recommendations, which cannot be made public. Then we set out a general overview of the matters we considered and the conclusions we reached. However, in relation to topics where there has been public comment about broad policy questions – such as overall structure of the AIC or the balance between security and safeguards – we have set out our reasoning in more detail in appendices. What is intelligence and what can reasonably be expected of it? ‘Intelligence’ conjures up many images. We set out in this Chapter what we mean by intelligence to help explain the approach and scope of the Review. Government has come to expect much of intelligence, just as the public have come to expect much of government in providing for their security. So, in order to fairly assess the performance and preparedness of the intelligence community, we need to ask: What can government and the public reasonably expect from intelligence? At the broadest level, intelligence has been defined either by the means it was obtained or by the outcomes it makes possible. ‘Secret intelligence is intelligence that others are seeking to prevent you from knowing, often with formidable security barriers and violent sanctions against those who cooperate with intelligence officers’. ‘Intelligence is the systematic collection and processing of information about the enemy or adversaries into analyses, briefings and other products that are relevant and useful to military commanders’. Given that a central task of this Review is to assess the performance of the Australian Intelligence Community, we decided to use an outcomes based definition of intelligence because we are concerned with evaluating the results the AIC has produced for government and its ability to continue to deliver them. Information that enables you to protect your interests or to maintain a valuable advantage in advancing your interests over those posing threats to them. It is important to note that this definition does not distinguish between information that is obtained by clandestine means or through overt or publicly available sources. What matters is that the information confers an advantage through superior insight or the fact that you are in possession of information when others are not. The definition does recognise that there is an offensive and defensive element to intelligence. It is about both obtaining information that confers an advantage and ensuring that your own information remains secure to protect your advantage. A straight forward definition of ‘foreign intelligence’ is set out in section 5 of the Telecommunications (Interception and Access) Act 1979 (Commonwealth). It says: ‘Foreign intelligence means intelligence about the capabilities, intentions or activities of people or organisations outside Australia’. In that definition, ‘foreign organisation means an organisation (including a government) outside Australia’. We think that distinction remains a valuable one in limiting the realm and nature of different types of intelligence efforts. Tactical intelligence: the more immediate intelligence required in conducting operations. These distinctions are important for this Review because Australia has seen the dramatic expansion of operational and tactical intelligence in the last 10 years. Intelligence is commonly further defined by the method of its collection. These definitions are of particular importance to Australia and its close allies because the structure of the community is built around these different methods of collection. The categories set out below reflect the considerable sophistication and unique expertise that has developed around each of these disciplines. One of the challenges this Review recognises in these definitions is the need to respect the distinctions between the different types of intelligence to preserve their distinctive capabilities but to bring all the information they generate together under one comprehensive definition and into a single outcome. Signals intelligence is derived from the interception of foreign communications. The Defence Signals Directorate is Australia’s collector of foreign sigint. Human intelligence is elicited from a human source by an intelligence officer or agent. The Australian Secret Intelligence Service is Australia’s principal collector of foreign humint. The Australian Security Intelligence Organisation collects humint in its security operations in Australia and overseas. Geospatial information refers to geographic and physical information in the form of maps, three dimensional virtual representations of landscapes in preparation for military operations and data about landscapes which can be used to guide weapons systems. The Defence Imagery and Geospatial Organisation is Australia’s collector of geoint. Official information is information – often confidential in nature – that is non-covert but not publicly available. It is derived from liaison between Australian Ministers and officials and the ministers and officials of foreign governments or organisations or influential, informed individuals. The most obvious and common source of official information is diplomatic reporting through the Department of Foreign Affairs and Trade. Open source information is useful information collected from non-covert published or publicly available sources including newspapers, journals, radio, television, the internet and so on. Open source information is a valuable contributor to the process of assessing intelligence and forming judgments. ‘While intelligence information is important, and often vital, to assessment, it is normally not the main source of information used by intelligence assessment agencies. Open sources ... provide the greater part of the information available to the Australian Government’. The Office of National Assessments has responsibility for Australia’s Open Source Centre. The advantage intelligence delivers comes not only through what we collect but how it is analysed. Assessors of all the intelligence that is collected have the responsibility to create superior insights for decision makers. In Australia, that responsibility falls to the Office of National Assessments, the Defence Intelligence Organisation and, in the case of security intelligence, ASIO. Intelligence activity is not limited to collection and analysis of others’ information. We also gain an advantage in securing our own secrets and protecting the means, methods and people who obtain information for us. All of these activities fall under the definition of counter-intelligence. Given the task of this Review is to assess the performance of the Australian Intelligence Community and its future preparedness, what is it reasonable for government and the public to expect? Some of the most senior members of the intelligence community around the world have been very concerned in recent times that expectations have become unrealistic. ‘I think, too often, people assume that the intelligence community is equally adept at divining both secrets [information that is being kept from public knowledge] and mysteries [knowledge of what might happen in the future] ... but we are not’. ‘In recent years we appear increasingly to have imported from the American media the assumption that terrorism is 100% preventable and any incident that is not prevented is seen as a culpable government failure. This is a nonsensical way to consider terrorist risk and only plays into the hands of the terrorist themselves. Risk can be managed and reduced but it cannot realistically be abolished and if we delude ourselves that it can we are setting ourselves up for a nasty disappointment’. We share their concern. It is important that Australia has realistic expectations about what intelligence can deliver. It may be possible to discover what DNI Clapper called ‘secrets’, which are existing states of affairs such as how many naval vessels a country has or what a foreign leader’s intentions are. While secret information can confer great advantage, an intelligence community can advise government about the difficulty, cost and risk involved in trying to obtain those secrets and the probability of success. If government is prepared to face the difficulty, meet the cost and take the risk, then it is reasonable for government to expect that probability of success. If we are to remain an open society, there are also some absolute limits to what we can know about our citizens’ secret intentions. As a result, there could be lone individuals or small groups seeking to plan and carry out violent plots that will be very difficult to detect. More substantially, there are limits to what we can know about the future, that is, what DNI Clapper called ‘mysteries’. The more closed a society is, the harder it will be to predict its future. That is why many of the greatest intelligence surprises have come from the most closed societies. It is not simply that high walls of secrecy make information hard to obtain. More importantly, when civil society is subjugated, we cannot know how it will operate when it is no longer repressed. It will be very hard to judge, for example, how well supported underground leaders might be when they come to public prominence or how ready individuals will be to risk their lives in protests. We have to tailor our expectations of intelligence accordingly. While there is much intelligence can do for us, on occasion terrorists will succeed and the world will change in ways that surprise and unsettle us. If we have had realistic expectations of what intelligence can do then, hopefully, we will also have invested in creating the capacity to meet the shocks societies will inevitably face. The Review examined the community of six government agencies whose primary mission is to provide the government with intelligence. In this Chapter we provide a brief introduction to each agency. ASIS was established on 13 May 1952 by Executive Direction. ASIS was not publicly avowed until 25 October 1977, when Prime Minister Malcolm Fraser declared the agency’s existence and functions following a recommendation by the first Hope Royal Commission. Until late 2001, ASIS operated under a Government Directive handed down by the National Security Committee of Cabinet to the Director-General. On 29 October 2001, stemming from the Samuels-Codd Commission of Inquiry recommendations, the Intelligence Services Act 2001 (Commonwealth) came into effect, replacing the Directive. The Minister for Foreign Affairs has responsibility for ASIS. The Minister oversees ASIS activities through several mechanisms under the Intelligence Services Act, including the requirement for ASIS to obtain approvals and authorisations before engaging in particular activities. ASIS’s role is to provide a human intelligence capability and secret intelligence not readily available by other means to support and protect Australians and Australia’s national interests. Undertaking other activities as directed by the Minister, such as providing support to the Australian Defence Force and military operations. The forerunner of DSD, the Defence Signals Bureau, commenced operations in 1947. The Bureau’s intelligence role was formally acknowledged by Prime Minister Malcolm Fraser in a 1977 statement to the House of Representatives about the Hope Royal Commission. The Bureau was subsequently renamed the Defence Signals Directorate. The Minister for Defence has responsibility for DSD. DSD is now regulated by the Intelligence Services Act 2001. DSD’s role is to provide signals intelligence and information security support and advice. Its mission statement is: ‘Reveal their secrets. Protect our own’. Providing assistance to Commonwealth and State authorities in relation to cryptography, communication, computer and other specialised technologies and the performance by those authorities of search and rescue functions. DIGO was established under a Cabinet Directive on 8 November 2000 by amalgamating the Australian Imagery Organisation and Directorate of Strategic Military Geographic Information, and the Defence Topographic Agency. On 2 December 2005, DIGO came under the provisions of the amended Intelligence Services Act 2001. The Minister for Defence has responsibility for DIGO. DIGO’s role is to provide geospatial intelligence from imagery and other sources in support of Australia’s defence and national interests. Provide assistance to authorities undertaking emergency response functions. ASIO was established in 1949 pursuant to a directive given by the Prime Minister to the first Director-General of Security, Justice G S Reed. ASIO operated on the basis of this charter until legislation passed in 1956 put ASIO on a statutory rather than executive basis. ASIO’s role is to advise the government of security threats to Australians and Australian interests at home and abroad. ‘Security’ has a specific meaning for ASIO. It is defined in the Australian Security Intelligence Organisation Act 1979 (Commonwealth) as relating to espionage, sabotage, politically motivated violence, promotion of communal violence, attacks on Australia’s defence system, acts of foreign interference and serious threats to Australia’s border integrity. Collection of foreign intelligence in Australia, at the request of the Minister for Foreign Affairs or the Minister for Defence. The Attorney-General has responsibility for ASIO. The forerunner of DIO, the Joint Intelligence Bureau, commenced operations in 1947. In 1970, JIB merged with the intelligence assessment elements of the three armed services to form the Joint Intelligence Organisation. That organisation developed to become DIO in 1990. The Minister for Defence has responsibility for DIO. DIO’s roles and functions are specified in a mandate approved by the Minister. DIO is an assessment agency. It provides defence-related intelligence assessments, advice and services, primarily to the Minister for Defence, members of the Australian Defence Force, senior Defence decision-makers, Defence policy planners and senior leaders of the Australian Government. DIO’s role is to provide strategic level, all-source intelligence and advice to support the Defence of Australia and its interests. Specialist advice to support whole of government strategies, including to counter proliferation and combat terrorism. ONA was established by the Office of National Assessments Act 1977 (Commonwealth) as an independent body directly accountable to the Prime Minister. The Director-General of ONA is an independent statutory officer who is not subject to external direction on the content of ONA assessments. ONA’s role is to deepen Australia’s capacity to act in the world in ways that serve the national interest by increasing government understanding of international developments. The systematic collection, analysis and research of open source material to support Australian and allied government agencies. Asked what the Australian Intelligence Community will need to do to meet these challenges in an age of growing demands and abundant information but constrained resources. In undertaking this task, the Review inquired into the detailed operations of Australia’s intelligence agencies and the way they work with each other, with the agencies in the broader National Security Community and with their international partners. As a result, the Review Report contains a great deal of sensitive and secret information from many sources. That material is so intricately woven into all aspects of the classified Report it is not possible to simply delete it and publish what remains. Instead, we have summarised the essential thrust of the Report’s conclusions in this Chapter, omitting the parts which must be kept secret and the detailed recommendations which go to the heart of the intelligence agencies’ capabilities, activities and working relationships. The terrorist attacks in the United States on 11 September 2001 marked the beginning of a new era of security challenges for Australia. The threat of terrorism has been the gravest challenge, with more than 100 Australians killed in attacks overseas. When these terrorist attacks reached our neighbourhood, we realised we had to step up our effort even more. We increased our homeland security and joined with Indonesia and other partners to degrade the regional threat. Further afield, including twice in Afghanistan, we have supported the United States and other partners in their efforts to disrupt the wider global jihadist network. Failed and fragile states closer to our shores also demanded attention. At the same time, our maritime borders were being compromised by people smugglers and proliferators of weapons of mass destruction were of increasing concern. While the intelligence agencies’ attention was largely focused on those issues, espionage and foreign interference had not gone away and disruptive cyber activity was growing rapidly. To play its part in meeting these challenges, the Australian Intelligence Community had to transform itself in a few short years from its primary task during the post-Cold War period of contributing to policy development to the dual role it has today. Now, intelligence agencies not only inform policy, they also support substantial security and military operations at home and abroad. The principal features of that transformation were new laws and expanded powers, a rapid growth in human and financial resources and a new national security architecture. The anti-terrorism laws which created terrorism offences and expanded the powers of intelligence and law enforcement agencies were forged through a vigorous national debate that ultimately led to bipartisan support in the Parliament. The result of that process of political negotiation is that the Review did not hear any substantial criticism of the balance in our anti-terrorism laws between the security of the community and individual privacy and other civil rights. The most substantial growth in resources came in the areas of security intelligence and foreign human intelligence, which had been substantially scaled back in the post-Cold War environment. Overall, the combined budgets of the intelligence agencies grew by $753 million from 2000 – 2010 at a compound annual growth rate of 14.6% a year to a total of $1.07 billion. Australia’s return on this intelligence investment has been impressive. As a nation, we now possess a new range of well tested intelligence capabilities. Those capabilities have made Australia and Australians far safer than they would otherwise have been and have also made significant contributions to the global security effort. Counter-terrorism: The Australian Intelligence Community has helped keep the Australian homeland safe from terrorist attacks for a decade despite a series of major plots. Those disrupted plots resulted in 38 prosecutions and 22 convictions. Other potential plots have not been allowed to develop thanks to more than 80 foreign nationals being prevented from coming to Australia on security grounds and more than 50 Australians being denied the opportunity to travel to train for, support or participate in, terrorist activities. Countering cyber threats: Since its establishment in 2010, the Cyber Security Operations Centre has identified a significant number of cyber security incidents, involving a wide range of threat sources, seeking to exploit Australian public and private sector computer networks for sensitive information. In conjunction with government and industry partners, the CSOC has provided advice and assistance to mitigate these threats. Australia’s relationship with its international partners, especially long standing allies, has been central to building this important national capability and achieving these outcomes. As a result of Australia’s joint operations with our allies throughout the 9/11 decade, Australia’s intelligence relationships are at a very high point. For Australia these close relationships have provided an enormous dividend. We are able to access a great deal of the intelligence acquired by our partners through their considerable investment in intelligence capability. Access to partners’ intelligence is a huge multiplier to the capabilities and effectiveness of our intelligence agencies. To build and maintain the intelligence capability we need, it is critical that Australia continues to invest in these relationships, working closely with our partners and contributing our share of the combined international intelligence effort. However, Australia’s middle power interests increasingly require our intelligence agencies to obtain global coverage by strengthening or developing other key intelligence relationships outside the allied community. Looking to the future, we are of the opinion that we are entering a new era for intelligence. Important geopolitical and technological changes, which have been underway for some time, have now reached a point of maturity that they demand more attention and capability. The rise of countries in our region has been referred to as the dawning of the Asian Century. In particular, the economic growth of those countries has made them emerging world powers with increasing importance and impact. The internet has maintained its extraordinary growth, expanding the cyber world to all corners of the globe and deep into daily life. The world has become dependent on it. Australia’s own globalisation has continued so that today we are a middle power with global interests. All of these changes are taking place in what has now become an age of information abundance. There is a rising ocean of open source information and yet, at the same time, covert intelligence is increasingly difficult to obtain. While recognising that terrorism, espionage, proliferation and people smuggling remain clear and present dangers, we need to build a stronger national capability to meet the challenges of the multi-polar and cyber worlds. We also have to meet the government’s expectation that, when issues affecting Australians arise beyond our region, often suddenly, the intelligence community can provide prompt insight to inform decisions. Navigating our international relationships will be one of Australia’s greatest strategic challenges in the coming decades. The Australian Intelligence Community will be called upon to support government policy and decision making in a rapidly changing, multi-polar world. There is trouble in cyberspace. Government networks have been penetrated by cyber intrusions. Australian strategic commercial interests have already been subject to cyber exploitation and we are still seeing only a portion of the hostile cyber activity. The United States and China have both publicly acknowledged the importance of cyber war fighting capability, state-supported hacking is becoming a national capability in some countries and organised crime is colonising the cyber domain. Support the development of government and private sector capability to meet the high volume of cyber threats they will need to manage. It is important to remember that, while DSD is in the vanguard of modern cyber applications, the world as a whole is still at what has been called the T-model Ford stage of the internet. While we need to significantly increase our focus on our region and cyber space, they are not the only areas requiring more attention. As a middle power with substantial commercial interests and citizens spread around the globe, we need a cost effective capability to see further afield to identify and understand potentially volatile areas that could affect us. Australia also needs to keep its war fighting capability on a sound footing. We still live in a dangerous world. There are rising powers and simmering tensions in our region. Our neighbourhood has vulnerable states that may again need our assistance. To help, we will need military capabilities that are increasingly more dependent on intelligence, ranging from the information required to operate smart weapons through to the surveillance and understanding of the human terrain that makes tactical operations far safer and more effective. In the course of the last decade, Australia has built the impressive intelligence capability required for modern conflicts. It is vital we retain and build that capability, not only because it does much to secure the effectiveness of military operations but also because it expands policy makers’ options as to how they will respond. The central challenge for the Australian Intelligence Community is to meet both our existing and expanding security challenges in an era of constrained resources. Some have proposed that the community would be more effective and efficient if its structure were to change. They argue that maintaining the distinction between domestic security and foreign intelligence is artificial and hinders effectiveness in a globalised Information Age. The original logic for the distinction between domestic security and foreign intelligence counters this argument. The higher obligations we have towards our own citizens are best safeguarded by ensuring all members of an intelligence agency who deal with our domestic sphere operate according to a single regulatory regime and with one consistent set of operational practices and culture. At the same time, our foreign intelligence agencies need ways of working that are founded on a broader licence to operate effectively and require different skills and training. Our view is that this original logic is sound. The possible compromise of the protections this distinction affords to Australians could not be justified by any of the potential efficiency gains that might come from dismantling it. There are other opportunities to increase the efficiency and effectiveness of the AIC that should enable it to meet the security and intelligence challenges of this new era. Priority setting would be assisted by a more analytic approach that is better aligned with the government’s all hazards approach to national security. Sharper, better defined priorities will aid resource allocations and provide a greater return on our intelligence effort. The return on intelligence effort is also enhanced by how well intelligence missions are integrated. Fusion centres have been an important step towards greater integration. The lessons from these successful mission integration efforts need to be widely applied. In relation to the distribution of intelligence, it is important for agencies to continue to regularly and rigorously assess the utility of their intelligence products to ensure they are tailored to meet the needs of senior decision makers and that the substantial effort that goes into them is therefore well invested. There is considerable reliance on self-assessment and some duplication in the current evaluation process. A cleaner process is needed, involving collectors being evaluated by assessors or operational users, assessors being evaluated by their customers and the performance of the agencies as a whole being evaluated from outside the intelligence community. Constant innovation will be required in the years ahead to meet the rising demands facing the community. The perspectives of people outside the community who understand the challenges facing intelligence agencies are a source of innovation. While AIC agencies already have processes in place to obtain external information and advice, these sources of independent opinion are likely to become increasingly valuable, given the world of abundant information and the complex global environment in which the AIC is operating. The more accessible human information now available thanks to the greater ease of travel and its lower cost. Invest in developing those open source tools and techniques so we can do an even better job of efficiently generating insights out of the rising ocean of data. For all the value of open source reporting, it has its limits. Just as in an earlier age, intelligence agencies’ reliance on signals intelligence led to the degradation of human intelligence to the point of vulnerability, we have to be careful that the amount of information freely available in cyberspace does not tempt us to fall into the same trap. One way to avoid or at least minimise this vulnerability is to ensure our diplomatic service is able to meet the growing demand for insightful reporting about the many countries and issues which are now of interest to Australia. Finally, while modern technologies facilitate the collection of more useful open source information, those technologies are making covert human intelligence gathering more challenging. Careful planning and investment will be needed to avoid these challenges severely constraining covert efforts. There has been a major transformation in how well the Australian Intelligence Community is working together. Their working relationships are particularly strong at the leadership level and can be further enhanced through joint senior management and leadership training. At lower levels, where some issues remain, it is important that the practices which have helped with improved collaboration, including rotations through other agencies and secondments, continue to expand. At the institutional level, the community should continue to review the various fusion arrangements it has established to ensure the lessons learnt are shared. As these arrangements grow, care will need to be taken to disband some of them as well when those fusion centres or other cooperative arrangements have completed their task or met their objectives. The intelligence agencies play an important role supporting the operations of some other agencies in the expanded National Security Community, which includes law enforcement agencies, the Department of Foreign Affairs and Trade, the Department of Immigration and Citizenship and the Australian Customs and Border Protection Service. While these operational relationships are working well, the intelligence agencies should continue with their efforts to improve the way they work with the broader National Security Community. Some care needs to be taken that the broad thrust to develop a larger National Security Community does not lead to collaborative arrangements and meetings whose size and complexity compromises any gain in effectiveness or efficiency they might have been intended to achieve. In a free society, it always important to keep the safeguards of our liberty, privacy and other human rights under review to maintain the balance we have struck as a nation between these individual rights and our security as a community. The Review believes the legal framework that enshrines that balance is sound and does not need any adjustment at present, while recognising that periodic amendments will be needed to ensure the purpose and intention of the legislation keeps pace with changes in the nature of the threat and a rapidly evolving, technical operating environment. This balance is not just protected by law and the regulatory and oversight regimes that regulate and monitor agency conduct. It is also protected by the culture of each agency and the intelligence community as a whole. Maintaining the culture that sustains the balance between security and liberty, especially after a period of dramatic AIC growth, will require continued attention. The intelligence community presently has to deal with the non-state actors who live largely outside existing legal and ethical frameworks. Australia should take an active role in international discussions about the evolution of those ethical and legal frameworks and their effect on intelligence agencies and the way they should operate. In addition to those challenges, the international community will face new questions that will arise about the appropriate and justifiable use of technologies like unmanned aerial vehicles and the possible outcomes of cyber attacks (including the potential for disproportionate harm to civilian populations). For all that intelligence has done and can do, there are real limits on intelligence in a free society in a complex world. There will be closed societies whose futures will surprise us and there will be small extremist cells and even lone actors who will be very difficult to detect or stop. What will matter on those occasions is that we have a robust society and an agile national security community as ready to respond to those events as they have responded to challenges of the past decade. The principal new challenges for the next five years or so will be to better align the AIC’s priorities with the new geo-political and technological realities facing Australia as a middle power with global interests. We believe that this periodic review has been very useful for both government – in assessing the intelligence agencies’ current performance and future challenges – and for the agencies themselves by providing a formal opportunity for them to assess their current situation. What can the government reasonably expect the Australian Intelligence Community will be able to tell it? This question comes into sharp focus when events come as a surprise. Most recently, uprisings in the Middle East give rise to the question: Why were these events not foreseen? Given the task of the Review to assess the relative performance of the AIC and the expectations government should have of it in the future, it is important to set out our basis for answering these questions. Over the years, senior members of the intelligence community – both in Australia and overseas – have been at pains to point out the limits to what intelligence can do. ‘Puzzles can be solved: they have answers which only need to be revealed – how many intercontinental ballistic missiles did the Soviet Union hold? But a mystery, Treverton says, “poses a question that has no definitive answer because the answer is contingent; it depends on a future interaction of many factors, known and unknown. A mystery”, he says, “cannot be answered, it can only be framed, by identifying the critical factors and applying some sense of how they have interacted in the past and might interact in the future”’. The question the Review has asked is: What determines whether something is theoretically knowable? To help make that distinction and to determine what are reasonable expectations of government, we distinguish between the expectations of what can and what cannot be known about existing and future states of affairs. Existing states of affairs – which range from facts like how many naval vessels a country has to what its leader’s intentions are – are theoretically knowable. It may prove very expensive, difficult and time consuming or even practically impossible to obtain that knowledge. What is important is that, because the state of affairs exists, in theory it could be known. Second, government can reasonably expect that the intelligence community will be able to undertake its collection and analytic efforts in line with the trade-offs it identifies. However, this expectation is subject to a critical qualification. In an open society, there is an additional constraint on what can reasonably be expected. The civil and political freedoms of our open society (including the right to privacy) have to be respected unless there is evidence that an individual or group is planning harm of a sufficiently grave kind to justify the limitation of those freedoms. Respecting those freedoms means that the state cannot seek to know the intentions of all individuals or of such a large number of them that it would be hard for any individual to escape detection by the state (as occurred in East Germany). The state cannot begin by seeking to know the intentions of every individual who may have malign intent. It must begin by operating at the level of the established social system. Therefore, consistent with an open society, the state can seek to identify groups or movements that might pose a threat. If such threats can be demonstrated then the state can move to focus on individuals of concern within those groups or movements. Practically, this approach means that it may be very difficult to detect and stop small groups or lone individuals who are not part of some larger movement or group planning to carry out a violent plot. It is possible that the intelligence agencies could detect those individuals but it is also quite possible that they would not. The harm such individuals could cause is the price of an open society. Individuals within these groups or movements intent on causing harm. However, as with any existing state of affairs, what is reasonable in any particular case will depend on the trade-off the government is prepared to accept between the challenge, risk and cost of pursuing the target. What it is not reasonable for a government committed to an open society to expect is that the intelligence community will be able to identify and stop all security threats. ‘Our aim is to reach a position of assurance where any threat is identified and action taken to disrupt it before any harm is done, and particularly before there is an imminent danger to the public. This is of course easier said than done, and will never be fully achievable, but it is the aim. ‘It is interesting to note in this context that in the last ten years what might be called a “zero tolerance” attitude to terrorist risk in Great Britain has become more widespread. While it has always been the case that the authorities have made every effort to prevent terrorist attacks, it used to be accepted as part of everyday life that sometimes the terrorists would get lucky and there would be an attack. In recent years we appear increasingly to have imported from the American media the assumption that terrorism is 100% preventable and any incident that is not prevented is seen as a culpable government failure. This is a nonsensical way to consider terrorist risk and only plays into the hands of the terrorist themselves. Risk can be managed and reduced but it cannot realistically be abolished and if we delude ourselves that it can we are setting ourselves up for a nasty disappointment’. When it comes to future states of affairs, a very helpful approach can be built on the analysis of Nassim Taleb – author of ‘The Black Swan’ – who is particularly noted for his analysis of what can and cannot be known and predicted. In a recent article with Mark Blyth in Foreign Affairs, Mr Taleb addressed the question of what intelligence can know. ‘Humans simultaneously inhabit two systems: the linear and the complex. The linear domain is characterised by its predictability and the low degree of interaction among its components, which allows the use of mathematical methods that make forecasts reliable. In complex systems, there is an absence of visible causal links between the elements, masking a high degree of interdependence and extremely low predictability’. When it comes to future states of affairs that are in the linear domain – for example, what a small terrorist cell is plotting to do next week – the expectation is essentially the same as with existing states of affairs. The key difference to existing states of affairs is that the intelligence community has to add its advice to an assessment of the probability that events will unfold as anticipated. What is knowable about future states of affairs that belong to the domain of complex systems is a very different question. Mr Taleb’s analysis is very helpful because it highlights that the extent to which the future is knowable is dependent on how open a society is. Where a society is open – in other words, where there is a high level of civil and political freedoms including freedom of speech and association and the rule of law – it is possible to observe and map how the social, political and economic system works and, therefore, to form some conclusions about the likely directions of that society. In closed societies – repressive states such as totalitarian dictatorships, theocracies and autocratic monarchies – the system is hidden. For example, the size and even the existence of opposition groups may be very veiled. It will be unknown how many citizens would join any movement. It is possible to speculate about such situations but such speculation will have high degrees of uncertainty attached to it and may prove very wide of the mark if there are social dynamics that are not visible or even in existence because of the level of repression. ‘Complex systems that have artificially suppressed volatility tend to become extremely fragile, while at the same time exhibiting no visible risks’. With such fragility, it will be unknowable what exactly will tip the system over the edge, as we saw very clearly with events that triggered the Arab Spring. What would make the society more knowable – for example, AIC agencies should be able to identify factors that would enable intelligence officers to better inform the government about the system, such as the rise of the free press. Finally, reasonable expectations of intelligence change when a closed system starts to transition to an open society. Initially, the government will need to look to open source reporting while the AIC develops assessments about the society and how it operates. However, as the society begins to operate, it will be possible for the AIC to provide more accurate and long-term assessments. Agencies should then be able to make assessments about individual groups and power balances and how they might play out. ‘Good intelligence will not necessarily lead to wise policy choices. But without sound intelligence, national policy decisions and actions cannot effectively respond to actual conditions and reflect the best national interest or adequately protect our national security’. Intelligence reports provide information and intelligence assessments offer judgments based on the best information then available to assist decision makers. But intelligence is only one factor decision makers take into account in making decisions. Other factors include government policy, competing demands, legal and international obligations and so on, together with the decision maker’s own judgment about the issue under consideration. Generally speaking, intelligence was historically well hidden and hard to get. One of the major changes affecting intelligence agencies today is the ready availability of huge amounts of information which would previously have been difficult to obtain or simply not available. Two factors contributing to this situation are the successful collection of sigint and the evolution of the internet. ‘We need to make tough decisions about which haystacks deserve to be scrutinised for the needles that can hurt us most. And we know in this information age that there are endless haystacks everywhere’. In 2004, the Flood Report defined intelligence as covertly obtained information. Open source information was a supplement for assessors. In 2011, the Director-General of ONA defined intelligence more broadly as useful information irrespective of source. Arguments can be made in support of both statements, but they illustrate the major shift in the availability of valuable information that we believe will have a significant impact on our intelligence agencies over the next five to seven years. That shift also highlights the fact that any helpful definition of intelligence has to go well beyond the collection and dissemination of useful information. Intelligence has to be clearly linked to the needs of individual customers and tailored for the purposes to which they can apply it. Otherwise, the recipients of intelligence reports will be overwhelmed by the volume of material they receive which will effectively reduce or even negate its ultimate usefulness for them. The separation of security and foreign intelligence efforts. Collects and assesses intelligence on security issues. The rationale for this exception is that threats to Australia’s security can arise at home or abroad and separating the collection of security intelligence could compromise ASIO’s central operational tasks, far outweighing any gain in the objectivity of its assessments. It has been said that the structure and operation of our intelligence agencies reflects an out-of-date Cold War model. This Review does not agree with that opinion. We consider that the original logic for the current arrangements remains strong and there is no need for any change in the basic structure of the Australian Intelligence Community. The separation between intelligence collection and assessment accords with the recommendations made in the Hope Royal Commission on Intelligence and Security and has stood the test of time. The Royal Commissioner found that, if intelligence assessments are to be accepted as objective, ‘intelligence producers and the intelligence assessment process must be independent and be seen to be independent’. ‘The national assessment organisation should be separate from the collection agencies. The appearance and the dangers of a large, all-embracing central secret intelligence organisation, with collectors and assessors tending to support each other within the enclosed confines of the organisation must be avoided. The acceptability of assessments produced by such an agency could well be reduced, and people of high calibre might be deterred from association with the new assessment organisation’. We accept the soundness of Justice Hope’s arguments and believe that they are as applicable today as they were at the time of his Royal Commission. While different options are available for structuring this community, we accept that the optimal approach for Australia in managing its security machinery, given its federal structure and the history and culture of our particular government agencies, is likely to be based on a number of smaller, nimble, well connected organisations rather than fewer large organisations. We also argue that there is considerable advantage in the structure of the Australian Intelligence Community agencies aligning well with our international counterparts. The similarity in their activities, functions and responsibilities facilitates joint operations, knowledge and capability transfers, effective staff exchanges and the embedding of liaison officers with similar training, skills and tradecraft. Given how important this collaboration is to the overall effectiveness of our intelligence effort, there is significant merit in retaining a structure that meshes neatly with our major intelligence partners. Some people argue that, in the globalised Information Age, it is artificial and hinders effectiveness to maintain the distinction between domestic security and foreign intelligence. ‘The domestic collection capacity should be institutionally separate from the foreign collectors. The constraints within which the domestic agency should and must work, and its obligations of propriety, are fundamentally different from those of the foreign agencies. The demarcation should not be blurred, or be seen to be blurred’. Today, as a result, Australia’s foreign intelligence collectors are subject to different regulatory regimes than ASIO in its security functions. While there are effective oversight and authorisation arrangements in place that regulate the foreign intelligence agencies, those agencies are not subject to the more stringent legislative regime appropriate to ASIO’s security activities. As a general proposition, this Review is of the opinion that it would unnecessarily complicate the activities of a foreign intelligence agency and its legal compliance if it was to have security intelligence powers and functions comparable to ASIO’s powers and functions in addition to its existing foreign intelligence responsibilities. Equally, it is important to the protection of the rights of Australians that ASIO’s culture and practices are shaped by an unambiguous legal and ethical framework which balances individual rights with national security concerns. Ultimately, the important point of the domestic security and foreign intelligence distinction is not to do with the sphere of operation. It is based on the fact that significant rights and protections are afforded to citizens, residents and the general public in Australia and that different checks and balances apply to the security and foreign intelligence regimes. Therefore, even if over time technology and globalisation require a weakening or elimination of the distinction between spheres of operation, the basic principles that separate agencies dealing with security and intelligence concerning Australian citizens and agencies dealing with citizens of other countries remain sound. The only – or at least the principal – remaining purpose in merging or restructuring agencies must be to obtain more effective and efficient performance of their functions. However, this outcome can be achieved by other means. For example, it has been said that structures are one thing, how well they are joined up and work together is another. What is needed is to develop and build on proposals for more effective coordination among agencies, and to identify and address any legislative, technical or cultural obstacles to the integrated delivery of intelligence and security. ‘The initial instinct to create one agency to deal with a problem as broad as homeland security is inadequate to the task at hand... The problem of homeland security ... does not fit in one box. To the student of 21st century government, the question is not “Where do the boxes fit on the chart?” but “How do they operate and how do they communicate with each other”’? Over the last few years, the intelligence agencies have conscientiously worked to achieve more coordinated intelligence outcomes within their existing structures by, among other things, the development of coordination or cooperation centres, shared training and facilities and so on. Some brief details of three examples of this coordination and cooperation are set out below. They are the Counter-Terrorism Control Centre, the Cyber Security Operations Centre and the National Threat Assessment Centre. The CTCC was established in accordance with the 2010 Counter-Terrorism White Paper to coordinate terrorism intelligence and investigative activities at the operational and tactical level. Ensuring the processes of collecting and distributing CT information are fully harmonised and effective. The CTCC has the following members: ASIO (Chair), ASIS, DSD, DIGO and the AFP. It is located within ASIO. The CSOC commenced operation within DSD in January 2010. It coordinates and assists with operational responses to cyber events of national importance. The Centre provides government with a consolidated understanding of the cyber threat through its intrusion detection, analytic and threat assessment capabilities. The CSOC will in due course include a continuously staffed watch office and analysis team, which has the following members: DSD (lead agency), the ADF, DIO, ASIO, the AFP, DSTO and the Attorney-General’s Department. The NTAC is a 24/7 threat analysis and assessment centre set up in ASIO in 2003. The NTAC analyses terrorist threats to Australian interests overseas and terrorist threats and threats from violent protests in Australia. The Centre provides threat assessments and country reports on the planning of attacks abroad – which informs DFAT travel advisories – and threats to high office holders and significant events to inform protective security measures. The Centre, which is chaired by ASIO, comprises all AIC members plus the Department of Foreign Affairs and Trade, the AFP, the Office of Transport Security and the NSW Police. There have also been improvements in IT connectivity and the sharing of corporate and back office functions between the three Defence intelligence agencies along with a number of other initiatives. As a result of these considerations, this Review is of the opinion that there is no need to consider any significant restructure of the existing agencies at present although the agencies will have to consider carefully how they will adapt in response to the future challenges they face within those existing structures and cooperation arrangements. The terrorist attacks in the United States on 11 September 2001 marked the start of a decade of legislation creating new terrorism offences and conferring new powers – particularly on ASIO and the Australian Federal Police – to deal with terrorism. A number of these laws were controversial. They prompted wide public discussion and debate about what were seen by some as a conflict between individual rights and the entitlement of the community to live in safety. The Review has considered the anti-terrorism laws and related legislation as part of its investigation into how the intelligence community is positioned to support Australia’s national interests now and into the future. The resolution of the perceived conflict between individual and community rights was not found in rejecting the proposed legislation but in establishing the appropriate balance between the two competing points of view. The process of resolution in the Parliament often involved extensive negotiation between the Government and the Opposition. In some cases, significant amendments were made to draft bills before they were acceptable to both major parties. As a result of those negotiations, all of the significant anti-terrorism and related Acts adopted since 2001 were passed with the support of Government and Opposition and there are many examples of Ministers and Shadow Ministers saying: ‘We think we have got the balance right’. We believe this process is a good example of the Parliament establishing the wider consensus that strong democracies obtain when an important adjustment is sought in the balance of rights. The strength of the broad social consensus and solidarity we have established about the new balance is itself a bulwark against those forces whose goal is instability. Perhaps further evidence of the success of this process is that none of the submissions to this Review argued that the balance struck in the anti-terrorism laws should be substantially amended. Individual rights have to sit comfortably with this overriding human right to which everyone in the community is entitled. ‘Terrorism constitutes a fundamental assault both on the security of a democracy – indeed, on the peace and security of our hemisphere – as well as an assault on the most fundamental of rights – the rights to life, liberty and the security of the person. Accordingly, counter-terrorism involves the protection of both the security of a democracy – including the protection of international peace and security – and the protection of the most fundamental of our rights’. Mr Cotler described those most fundamental rights as the right to life, liberty and security of the person and the collective right to peace. In reaching our conclusion that the balance between security and other rights is sound, we took careful note of the significant safeguards that have been built into the anti-terrorism laws. One person consulted during the Review stressed that, while the laws contained strong provisions and some of them have not yet been required in operations, if the laws are needed in future they will be needed immediately. Accordingly, the safeguard when granting strong powers to intelligence agencies and police forces is to ensure that there is strong oversight and accountability. Internal training, supervision, monitoring compliance with corporate directions and policies with a strong emphasis on adhering to ethical standards. The Minister for Defence is required to issue a ministerial authorisation before DSD can undertake activity to produce intelligence on an Australian person and, if the matter involves a threat to security, the Attorney-General must also agree. The Inspector-General of Intelligence and Security is an independent statutory office holder appointed under the Inspector-General of Intelligence and Security Act 1986 (Commonwealth). The functions of the Inspector-General are prescribed under sections 8, 9 and 9A of the Act. The key role of the Inspector-General is to ensure that the intelligence agencies conduct their activities legally, behave with propriety, comply with any directions and guidelines from the responsible Minister and have regard for human rights, including privacy. Can independently initiate own motion inquiries. The Parliamentary Joint Committee on Intelligence and Security is appointed under section 28 of the Intelligence Services Act. To review any matter in relation to any of the AIC agencies referred to the Committee by the responsible Minister or by a resolution of either House of the Parliament. The Committee gives the Parliament an annual report on its activities during the year. The Jack Thomas case illustrates the role of the courts in ensuring the legality of an agency’s actions. Jack Thomas was convicted in the Supreme Court of Victoria for offences which included intentionally receiving money from a terrorist organisation and falsifying a passport. The conviction was overturned by the Court of Appeal which ruled that a record of interview containing admissions was inadmissible. The interview had been conducted by a joint AFP-ASIO team in Pakistan. The decision indicates the procedures to be followed by Australian police officers conducting interviews in other countries if the records of those interviews are to be admissible in criminal proceedings in Australian courts. Australian intelligence agencies take their legal and ethical responsibilities very seriously and train their staff accordingly. As part of the selection and training of its intelligence officers, ASIS looks for and imbues ethical behaviour in its staff. The commitment to ethical behaviour permeates all aspects of organisational culture from recruitment through training to deployment. Ethical conduct applies to the way ASIS officers manage their operations and the agents working for them. The Inspector-General regularly reviews ASIO and ASIS files for both legality and the propriety of their operational conduct. The most recent addition to this supervisory regime is the Independent National Security Legislation Monitor. The Independent National Security Legislation Monitor Act 2010 (Commonwealth) provides for the appointment of an Independent National Security Legislation Monitor. ‘The Government introduced the legislation creating this new position in response to recommendations from the Parliamentary Joint Committee on Intelligence and Security, as well as recommendations from the Independent Security Legislation Review Committee (the Sheller Committee) and the Clarke Inquiry into the case of Dr Mohammed Haneef’. To assess whether Australia’s counter-terrorism or national security legislation is being used for matters unrelated to terrorism and national security. In summary, the Monitor will review the operation, effectiveness and implications of Australia’s counter-terrorism and national security legislation, reporting to the Prime Minister and, through his or her annual report, to the Parliament. The impetus for the legislation and this appointment can be found in the extensive parliamentary and public debates that surrounded the introduction of significant pieces of counter-terrorism legislation passed by the Parliament in the years following the terrorist attacks in the United States on 11 September, 2001. However, there was no mechanism in the legislation, other than the usual process of parliamentary review, to monitor whether the balance between individual and community rights was still proportionate and being maintained over time. In 2008, the Attorney-General, the Hon Robert McClelland, discussed the role of a similar position in the United Kingdom with the then British Independent Reviewer of Terrorism Legislation, Lord Carlile of Berriew QC. The tradition of independent review of terrorism legislation in the United Kingdom stretches back to the 1970s. Between 1978 and 1984, reviews of the Prevention of Terrorism (Temporary Provisions) Acts and the Northern Ireland (Emergency Provisions) Acts were carried out by Lord Shackleton, Earl Jellicoe and Sir George Baker. Between 1984 and 2001 annual reports to the Parliament were produced by Viscount Colville and J J Rowe QC. Lord Carlile held the position for more than nine years until he was replaced by David Anderson QC on 21 February 2011. ‘Keeping Australia safe is the job of security, intelligence and law enforcement agencies. The Government equips them with strong counter-terrorism laws to ensure they can do their jobs properly while ensuring there is necessary accountability and oversight. These laws were extensively reviewed during 2009 and 2010 and after a period of public consultation, were amended to ensure police have adequate powers to protect the community, especially in circumstances where a dangerous device or substance is involved. ‘At the same time, additional protections that had been recommended by four different inquiries were included in the amending legislation, which passed through Parliament with the support of both major parties. This reflects a general consensus that the laws achieve the appropriate balance – this week’s events (that is, the killing of Usama Bin Laden) have not created a situation where that balance needs to be recalibrated. The national security laws regulating and conferring powers on the intelligence agencies and, in some cases, the Australian Federal Police require regular monitoring. In reaching this conclusion, the Review has taken note of the safeguards and oversights contained in the present system as set out in this Appendix. The Review considers the monitoring and review functions to be undertaken by the Independent National Security Legislation Monitor should provide significant reassurance to the government and the community that the strong powers granted under counter-terrorism and national security legislation will continue to contain appropriate safeguards and remain proportionate to the then existing threat of terrorism or threat to national security over the coming years. The Independent National Security Legislation Monitor should be given time to establish himself in his role and to form his views on national security legislation before any significant amendments are considered which could affect the current balance of the legislation. The Review has considered the difficulties presented by issues that are running ahead of domestic and international legal frameworks or of significant sustained ethical analysis. This Review is of the opinion that there needs to be international discussion and agreement about rules for and limits on cyber warfare. A thoughtful exploration of these and other ethical issues in the right forums will make it far more likely that publicly acceptable boundaries can be determined by a constructive conversation rather than reactively by a defensive one. It is important for the future operations of the AIC and intelligence organisations globally that the public understanding of these issues catches up with operational realities and possibly even gets ahead of them. The Review conducted detailed investigations into the key issues raised by the Terms of Reference. The Review invited and received thorough briefings and detailed submissions from the six intelligence agencies and several departments. The Australian, the Sydney Morning Herald, the Canberra Times and the Age on Saturday 12 February 2011. A list of submissions received by the Review is set out below in Table 1. Officers engaged in operations in Afghanistan. A list of organisations and people interviewed during the course of this Review is set out below at Table 2. The Reviewers or members of the Review Secretariat conducted focus group sessions with middle ranking officers in each of the six intelligence agencies and some relevant departments. The focus groups are set out below in Table 3. In all of its activities, the Review received full cooperation and assistance from the intelligence agencies, other interviewees and our international allies. The members of the Review Secretariat for their professional, competent, conscientious and dedicated assistance.
2019-04-19T01:02:29Z
https://pmc.gov.au/resource-centre/national-security/2011-independent-review-intelligence-community
Yesterday we looked at a photo of a very old bridge, in today's photo we see a piece of Venice's newest bridge. The fourth bridge to cross the Grand Canal has in interesting sort of "spine", made of these metal frames, which remind me of whale vertebrae I once saw on a beach in Alaska. "I think this is a sample piece of steel from the Calatrava Bridge's main girder. Whether or not they intended it to stand as a statue, I think it's still located besides the Santa Lucia railway station in late 2010, although at a slightly different spot. Thanks for the photo Tamás. Looking at the bridge, I can see how this "vertebrae" piece might fit into the structure. Santiago Calatrava has built more than just a bridge from Piazzale Roma to Santa Lucia, his projects can be admired in many places. on June 21st, 2010, I put up a post on a bridge of his in Redding, California. You can't travel around Venice without crossing a bridge. Sure, if you really tried, I suppose you could figure out a way to traverse the city by boat, and planning your route carefully, avoid bridges to get where you want to go. But for those of us who don't have limitless time to take on such a challenge, there are these amazing feats of architecture known as bridges. Over four hundred of these spans can be found in La Serenissima. Most are stone, but there are bridges made of iron, and a number of wooden ones still exist too. Originally all of the bridges in Venice were built of wood. Wood, iron or stone, we approach a bridge these days and expect it to have railing of some sort, but not all of Venice's bridges originally had such a feature. In fact several of the bridges in the city were built without a railing or parapet for good reason - it made them better for battle. An in-depth look at one such bridge can be read in my post "Ponte dei Pugni". Many bridges also didn't have steps, this may have been easier on the horses; it's hard to envision it but until the sixteenth century Venetians rode horses around town. Whether it was for safety, convenience, or the all-too-common concern of liability, most of the bridges in Venice now have a railing - most, but not all. There is one bridge still standing that doesn't have a railing or parapet. For the record, a parapet is a type of wall which serves as a rail. The last remaining "rail-less bridge" is the Ponte Chiodo, and Martina has given us a great photo of it. Located in the Cannaregio sestiere, crossing a canal known as the Rio di San Felice, is a bridge you may think twice about crossing. It's funny how we take some things for granted. However, if you choose to cross over the Ponte Chiodo, and are looking for a place to stay in Venezia, on the other side of the bridge is the 3749 Ponte Chiodo guest house. I've never stayed there, but I'll probably check it out the next time I'm in town. I wonder how many people have fallen off that bridge. As we ramp up to Valentine's Day, my staff and I have been working dilligently toward what is usually the busiest week of our year. One project, which is normally quite difficult in January, is getting a boat painted - we always seem to play dodgeball with rain clouds. But this year we've been enjoying really great weather, and this week, my "right-hand-man" Steve and I have had a different kind of problem: it's been too darn sunny here! but that's not always an option. but schedule conflicts seem to conspire against it. Awnings are great but you can't always put one up. So this week we've been using the "towel trick". Arriving at the boat, Steve and I wipe down the boat with the same thinner we use with our paint (this cleans the surface of yesterday's coat and softens it up so the next coat will adhere better). Next we drape towels over the sides of the hull to get the sun off and help cool things down. If the surface needs extra time to cool down, Steve and I like to go for fish tacos, but that's not a crucial part of the recipe. Once the towels have done their job, we mix the paint and tool-up for a spirited rolling-and-tipping session. If conditions are really hot, or if the towels have left some dust or lint, we give another quick wipe-down with thinner, and then we begin our paint application. We pull off a towel, one guy rolls the paint on, the other guy tips it out, moving quickly but carefully. At the end of it we pack up the towels and look over our work. This process works well for building up coats, or to do just one or two. I've used sheets and blankets instead of towels, but I like towels because they're easy to work with and just the right size for the "yank and paint" approach we use. I'm sure this isn't the first time anyone's thought of this, and there are probably other names for it, but in my operation we call it the "towel trick". Sean Jamieson in Coronado, California (San Diego area) is celebrating the fact that he's one year older than he was last year. Amazing how that just keeps happening. I shamelessly ripped off this photo from Sean's Facebook page. I probably owe somebody photo credit - if so, let me know. - He has what I believe to be the only Venice-built gondolino in the US. - By far the nicest passenger caorlina anywhere, was built by Sean and his staff. - Sean was also man enough to show us his worms...(yes, I'm waiting to hear gasps and confusing sounds)...wood worms to be exact. And while it might not be something you'd want to share with others, Sean chose to do so in the hopes that we, his colleagues, might manage to avoid the same headache that is worms eating your boat. - And who can forget the Santa-spotting of 2008? So happy birthday to you Sean! Buon Compleanno and good rowing from the Gondola Blog. January 26th may be just another day to folks here in the US and elsewhere, but in Australia, it's their anniversary - a celebration of the arrival of the "first fleet" into Sydney harbour. There are several gondola operations "Down Under". The photo above is from a post on the operation in Adelaide. Locations like Noosa, Brisbane, Sydney and Melbourne either have or have had gondolas plying their waters in recent years. There are a number of unique gondola designs in Australia; one of my favorites resides in Perth. So to all of my friends in "Oz", I wish you a "Happy Australia Day!" This post marks the 1,300th entry on the Gondola Blog. Since I'll be writing it more than a few times in this post, I'm gonna go with "13" rather than spelling it out each time. So what's so special about 13? The number 13 holds a special significance for many of us - some good, some bad. - Here in the US we celebrate our origins from the "13 original colonies", in fact that's why we still have 13 stripes on our flag. - Basketball fans may recognize 13 as the number worn by Wilt Chamberlain. - In 1999, the Canadian government established Nunavut, giving the second largest country in the world, 13 provinces. - There are 13 countries represented in South America. - We have terminology like: a "baker's dozen", the "13th disciple", and who can forget Friday, the 13th? - Last time I counted, there were gondolas in active operation in 13 US states. - In May of last year, a 13 year old became the youngest person to climb Mount Everest. - In the 13th week of pregnancy, each and every one of us developed something uniquely our own: fingerprints. - There are 13 vitamins recognized as necessary for humans to survive. - While we often find 13 to be an unlucky number, some Italians have told me that 13 is considered to be lucky in their country. - There was Apollo 13 - unlucky in some ways, arguably lucky in others. - In some European and South American countries, it's not Friday, but Tuesday the 13th that is considered to be unlucky. - Many architects avoid having a 13th floor in buildings they design - the elevator goes from 12 to 14. So why do we consider Friday the 13th to be unlucky? Historically, the first signficant thing that happened on this date was an arrest order, given out by Philip IV of France in 1307, demanding that all members of the Knights Templar be seized. And while that may seem long ago and far away, it is believed that the surviving Templars took refuge within Masons, and since our founders in the US were mostly Freemasons, it makes sense that Friday the 13th would retain it's negative reputation. There's also a Norse superstition that if 13 people gather, one of them will die on the one-year anniversary of that meeting. As for me, I love Friday the 13th. Not because of any of the above points. I love it because on Friday the 13th in August of 1993, I married my wife Elisa. For over 17 years now we've had a wonderful life together and every time any Friday the 13th rolls around, we celebrate. So here's to the number 13! The gondola is the most iconic boat of Venice, and some say the most recognizable vessel in the world. Riding at the tip of her bow, the end-iron known as a ferro, is arguably the most recognized part of the boat. Like most parts of the gondola, they all appear to be the same until you take a closer look. But like cavalli, deck trim, and many other parts of the gondola, there are different versions of the ferro. Stainless steel and aluminum are the most common materials used, but there are others seen here and there. Most have six fingers forward and one facing back, but we've observed five in front, a few times, even four. Lots of ferri have decorative pieces between some of the forward fingers. Other ferri have a simpler approach. Engravings, incised fields, mounted emblems, and other adornments make appearances here and there too. In many cases it could be said that the ferro of a gondola says a lot about the guy who owns the boat. So what's your favorite ferro design? If you were putting together a gondola and could choose the design, or if you had to replace a ferro on your gondola, what details would you include? Sure there are plenty of areas where it feels like an amusement park, with sweaty tour groups following their guides around, and boats zipping about, setting up plenty of moto ondoso. But then there are the quiet peaceful places, with laundry hanging to dry in the sun, against a backdrop of peeling plaster and old bricks. These are views of a Venice most tourists never see, because they are too busy following someone holding an umbrella, and leading them past yet another fantastic mask shop on their way to another spot on the must-visit tourist map they got on the cruise ship. I once asked a Venetian why they don't use clothes dryers very much in Venice. His answer surprised me. I thought he'd talk about saving money, keeping with tradition, or how dryers wear out clothes faster (not sure if that's true but I've heard it before). Instead he went straight to the sun. This Venetian told me that there was a difference when clothes were dried in the sun, going so far as to say that you could "smell the sunshine in the clothes" that were dried by the sun's rays. It may or not be a record, and to be honest, I'm not sure what the symbolism is here. I just know that it's the biggest sock I've ever seen. Nereo sent me this shot, taken during the Regata delle Befane. My guess is that the giant stocking draped over the side of the Rialto, is like those hung over the chimney at Christmas time, and that the Befane might be bound by tradition to place treats or gifts in it. That is one big sock. There are so many things to point out in the picture. and a gondola preparing to board passengers. while the gondolier steps towards the back. Behind passengers waiting to board the gondola, a conversation takes place between workmen (I believe they're sanitation workers). Under the roof, gondoliers at the servizio appear to have their hands full with a large tour group, or maybe those folks are waiting (or looking) for the vaporetto. Most gondolas don't live past twenty-five or thirty years. In Venice, if your boat is coming apart, you can replace her with a new one from a squero that's a short row away. When a gondola is removed from La Serenissima, she becomes exotic. Not surprisingly, most of the oldest gondolas still afloat...are floating in places far from the Grand Canal. Here in the US we probably have half a dozen gondolas over fifty years old - I've got two here in Newport. But as proud as I am of my "classics", in the category of well-preserved gondolas there's one boat that's got them all beat. The "Oldest Gondola in the World" resides in the United States. Like many others that came later, she was brought over, treated as a special boat, and has survived well because of it. I had the opportunity to see this historic gondola in 2007, while consulting for Moondance Gondolas in Virginia Beach. My family and I drove up to the Mariners' Museum in Newport News, Virginia, and got to spend a little time viewing and photographing this magnificent vessel. "The Oldest Gondola in the World", complete with photos and commentary of our adventure. Boats of this significance, and boats of this, shall I say..."vintage" don't get moved around much, so I was surprised to find out that she's making a trip to the capitol. Complimenting a display of Canaletto paintings which are coming to D.C., the "Oldest Gondola in the World" is making a short journey from her home in Newport News to spend a few months in the National Gallery of Art. To read more about the gondolas' move, here's a brief article that sums it up. I know some of you will welcome the chance to see such a boat, and if you're a true "gondola fanatic", you really must see her if you're in the area. "I wonder who the last person to row it was." As winter is upon us, many gondola operators have their boats out of the water til spring. Further south, cooler temps prompt gondoliers and their passengers to reach for warm clothes. Keep traveling south, and you'll find a totally different type of "gondola experience" going on, complete with different weather, different dress code, and a very different kind of boat. Friends and gondola fanatics, I give you...Jamaica's gondolas! Ok, so they're a bit far from the mark. They're using bamboo rafts, punting with poles, and there are no striped shirts (except maybe on a passenger now and then), but the spirit of romance is part of the package. Couples book rides on these things for some of the same reasons they would book a gondola ride elsewhere. And there are a bunch of guys who make their living on the end of a boat in ways that are similar to what we do. I've watched some of these guys talk about their job in TV interviews, and it's clear that they love it. With as much rainfall as the island receives, Jamaica has many rivers, and I'm told these rafting services operate on several of them. The whole thing started with mountain farmers bringing their produce to market. The road system wasn't always what it is today, and for many of these farmers, the "family car" was a donkey. With bamboo in ready supply, these farmers would build rafts out of it, load their crops on these vesseels made from lashed-together poles, grab one more long pole for pushing and steering, and cast off. As legend has it, in 1950, Errol Flynn was the first guy to put a seat on one and market it as a passenger excursion. Flynn was a popular movie star, mostly famous for his roles in pirate movies. Eventually he retired to Jamaica. He is also believed to be the first to compare these 30-foot rafts to Venetian gondolas. Tourism is the island's number one moneymaker, and visitors looking for adventure have taken to this experience. I'm sure rivalries and friendships exist between the various rafting "servizios". The rafts are said to weigh 500 pounds or more. Some operators truck their rafts back up river, while others walk and swim them back upriver after each cruise. I've heard that some operations have a seniority-based system where the younger guys "make their bones" by hauling the rafts up for the older guys. Some things seem to be universal. I've researched a bit, and found that some of these companies have websites, while others simply rely on outside sources (like cruise lines and hotels) to feed them clientele. Dig deeper and you're likely to find reviews of some of these services - giving an interesting view of things from a passenger's perspective. One of the more interesting rafting tour operations is on a river known as the Martha Brae. Like many others, they include different elements of Jamaican culture into their tours. Jamaica has a special place in my heart. I grew up next door to a Jamaican family, have spent time on the island as a missionary and have enjoyed a few vacations there too. Sadly, I've yet to visit one of these rafting operations as I didn't know they existed until recently. Rest assured that next time I'm there, it will be on my "must do" list. Nereo Zane was in Venice recently for the Regata delle Befane. Now and then we see photos of this unusual event. It reminds me of a Halloween stunt - and makes for some great pictures. The befana (also known as marantega in Venice) is an old ugly woman who riding her broom brings cakes, candies, sweets and other gifts to babies and kids. Somebody says she's Santa Klaus wife. Every year the Canottieri Bucintoro organize a (short) regatta on one oar mascarete whose participants are old members dressed like befane. The start is close to San Tomà and the end is just before the Ponte di Rialto. To see more photos of the event, here's a link to Nereo's blogpost. Men Dressed as Old Women, Rowing - now THAT'S worth watching! Heck, some day I'd love to throw on a shawl and join the row. As most of you probably know, today is January 11th. That's 1-11-11 in some parts of the world, and in others it's 11-1-11. Either way, it's a date that can be defined by raising all five fingers on one hand. Here's an example of such a gesture. This photo comes from my post "Experiencing the Blue Grotto in Capri". This guy wasn't actually indicating the date, he was just saying "Hi". In the spirit of things, and because for no particular reason, I'm a fan of the number eleven, I'm posting a link to the blog post of July thirteenth entitled "Eleven". We're getting close to our 1300th post here on the Gondola Blog, and you'll know it when we get there. Martina has an eye for things most folks might not notice. In this photo, we see rusty chain wrapped around a large cleat. It could be anywhere in Venice, but it captures at least a small piece of the feel of the Veneto. On the afternoon of January 4th, we re-launched the Wedding Gondola on the waters of Newport Harbor. Whenever you put a boat back in the water, especially if she's been moved around alot, it's best to wait a while and make sure she doesn't have any new leaks to surprise you with. so I wanted to be certain she was sound. While we watched her float (and not leak), I snapped a few shots of her stainless steel ferro, with the sun reflecting off the water behind. Here's a set of photos from a few years ago, when Venice had another squero. This one was different from the others - it was run by Thom Price, and had a number of other squerarioli from different places. Squero Canaletto wasn't in operation for more than a few years, but they made an earnest effort, and some interesting things came out of there. Joe Gibbons from Boston sent these images. This may have been the most unique boat to come out of the Squero Canaletto. "Thom Price was building a half-size gondola for a boat show in Venice. Showcasing squero Cannalletto. The building is not the squero - the maritime museum hosted this event." Building a half-size gondola, right there on the museum floor is a pretty eye-catching move, and it looks like they definitely got people's attention. Mathias Luhmann working on a piece before fitting it to the gondola. Mathias has been seen here on the Gondola Blog - see "Sochetto in Squero Canaletto" from August of 2008. Thom and Mathias answering questions from museum patrons, while other onlookers examine the work in progress. I don't know if this gondola was ever completed. They can't really be used for passenger service, but it seems like a shame to break apart a project like this halfway through. If the boat was completed, I'd love to see her, maybe try and row her. I enjoy cathcing up on writings by Rick Steves; he does a great job of following developments in european travel. Here's an informative article on "What's New in Italy" from the Seattle Times. As a dad, I understand how important it is to be prepared for any contingency. He's ready for all sorts of things - including high water. Notice that his son is carrying a foot-pump...just in case they need to inflate their boat a little more. And as they make their way through Venice, on a potentially acqua-alta day, they are ready, ready for anything. Somewhere out there, I'll bet someone has a photo of them using the inflatable dinghy. Steve and I re-launched the Wedding Gondola yesterday. She'd been out of the water since we used her in a film shoot. After Steve rowed away from the launch ramp, I grabbed my video camera and took advantage of it's incredible zoom capability. Sorry if the frame's a bit jumpy, guess I should have brought a tripod. About halfway through the video, a Tern (bird) makes a splashdown right next to the boat, and flies away. Hopefully he got a fish for his efforts. This image, captured along the quay at San Marco, is one I just can't stop looking at. Waves collide with marble and take flight, with sunlight illuminating them perfectly. A few weeks ago I posted "Gondolas" - Egyptian-Style - featuring some clever little boats that were in pretty good shape, but my guess is that a lot of you wished that they were authentic Venice-built craft. but I suspect most of you will wish they were better taken care of. and like the ones in my previous post - it looks like they also push with poles rather than row with remi. which is located in the Porto Marina Resort. An earlier version of their website can be viewed here. Their current site is here - with one or two high-resolution photos of a couple in a gondola (I'll let you do the hunting). A better quality image of one of the Porto gondolas can be seen at this link. Click on the displayed image to get a bigger version on most computers. Upon closer inspection, the boat is pretty beat up. It's easy to criticize someone else's gondola, but we must remember that this is Egypt we're talking about. I haven't crawled through these gondolas personally, but my guess is that they were either built to pretty close Venetian specifications, or more likely, bought in Venice and brought to the property in Egypt. Chances are also good that if they were bought in Venice - they weren't bought new. All the same, I applaud the gondoliers who are trying to make things work in their given situation. and I hope they do their best to represent the city their boats came from. Maybe this image will help you understand why we are longing for summer today. Its January 1 and its 50 degrees and sunny here in Boston. The Charles River would normally be thick with many inches of ice. I think the photo speaks for itself. "Addio 2010 e felice anno nuovo!"
2019-04-18T11:13:29Z
http://www.gondolagreg.com/2011/01/
Alonzo L. Gaskill, “‘To Every Man Is Given a Gift’: The Spiritual Legacy of Wilford Woodruff,” in Banner of the Gospel: Wilford Woodruff, ed. Alexander L. Baugh and Susan Easton Black (Provo, UT: Religious Studies Center, Brigham Young University; Salt Lake City: Deseret Book, 2010), 167–204. Alonzo L. Gaskill is an assistant professor of Church history and doctrine at Brigham Young University. When we examine the numerous spiritual encounters Wilford experienced throughout his lifetime, we conclude he may have actually experienced every spiritual gift mentioned in scripture, and a number more besides. Perhaps this should not be surprising. One passage in the Doctrine and Covenants states that to “some it may be given to have all those gifts, that there may be a head, in order that every member may be profited thereby” (D&C 46:29). And speaking of the President of the Church, another passage reads: “Behold, here is wisdom; yea, to be a seer, a revelator, a translator, and a prophet, having all the gifts of God which he bestows upon the head of the church” (D&C 107:92). What is curious is that these spiritual endowments became somewhat common in Woodruff’s life well before he was called as an Apostle or as President of the Church. What follows are examples of the spiritual gifts and endowments received and exercised by Wilford Woodruff during his lifetime. Because he left a meticulous journal, I have confined my comments primarily to his own words. Constraints on the length of this paper allow me to offer but a few examples of his spiritual endowments. Suffice it to say that many others could be given. Elder [Zera] Pulsipher opened with prayer. He knelt down and asked the Lord in the name of Jesus Christ for what he wanted. His manner of prayer and the influence which went with it impressed me greatly. The spirit of the Lord rested upon me and bore witness that he was a servant of God. After singing, he preached to the people for an hour and a half. The Spirit of God rested mightily upon him and he bore a strong testimony of the divine authenticity of the Book of Mormon and of the mission of the Prophet Joseph Smith. I believed all that he said. The spirit bore witness of its truth. Elder [Elijah] Cheney then arose and added his testimony to the truth of the words of Elder Pulsipher. Liberty was then given by the elders to anyone in the congregation to arise and speak for or against what they had heard, as they might choose. Almost instantly I found myself upon my feet. The spirit of the Lord urged me to bear testimony to the truth of the message delivered by these elders. I exhorted my neighbors and friends not to oppose these men; for they were the true servants of God. They had preached to us that night the pure gospel of Jesus Christ. When I sat down, my brother Azmon arose and bore a similar testimony. He was followed by several others. In his patriarchal blessing, President Woodruff was promised, “Thine eyes shall be open to look within the veil to behold the things of eternity. Yea the Lord of Glory shall appear unto thee. Thou shall put thy hands upon his feet and feel his wounds with thy hands, that thou mayest be a special witness of his name.”He did not record the fulfillment of this blessing. Perhaps, like most Presidents of the Church, he felt such an experience was too sacred to share. Of course, he acknowledged to the Saints that the very day he first heard a Mormon preach he received a witness from the Spirit that the Church was true. And certainly this qualifies him as one having a “personal knowledge” that Jesus is the Christ. But there were other experiences President Woodruff had which, although spoken of only in veiled terms, indicate that he received a more literal fulfillment of the promise. One brother in attendance at the dedication of the Salt Lake Temple reported, “President Wilford Woodruff told some of the saints that our Savior had appeared unto him in the east room in the Holy of Holies, and [Jesus] told him that he had accepted of the Temple and of the dedicatory services. . . . President Woodruff saw the Savior and talked with him face to face.” Thus, while this promised blessing appears to have been fulfilled in literal terms, it seems well to acknowledge that in varying degrees, this gift was his throughout his life, even before he was baptized into the Church of Jesus Christ. The poison [from the dead cow] had so thoroughly penetrated my whole system, that my strength left me; I could not stand, I was led to my bed, my bowels and stomach ceased to act, my speech was like that of a drunken man. President [Brigham] Young called, in company with Dr. Sprague, and laid hands upon me, and rebuked the disease and the power of the destroyer which had seized my body, and promised me in the name of the Lord, that I should not die, but live to finish my work which was appointed me upon the earth. I soon began to recover. The poison and mortification left my system and . . . in a few days I was well again. President Woodruff was a believer in the power of the priesthood. The words he penned during this experience stand as a testament to his conviction that through faith in God and his holy priesthood, one can be spared from both suffering and premature death. A man of the world, knowing of the miracles which had been performed, came to [the Prophet Joseph] and asked him if he would not go and heal two twin children of his, about five months old, who were both lying sick nigh unto death. They were some two miles from Montrose. I have possession of the handkerchief unto this day. A notable miracle was wrought by faith and the power of God in the person of Sister Mary Pitt. . . . She had been confined six years to her bed, with [a] spine which mostly deprived her of the use of her feet and ankles; and had not walked for eleven years, only with the use of crutches. Elders Young, Richards and [I] laid hands upon her and rebuked her infirmity, and her ankle bones received strength and she now walks without the aid of crutch or staff. Woodruff concluded each year’s journal with a summary of the significant events of that year. In his December 1846 summary, he wrote, “I looked over my journals commencing with AD 1834 ending with AD 1846 making thirteen . . . years, during which time. . . . I have administered by anointing and [the] laying on of hands unto three hundred and sixty four sick persons, . . . many of which were healed. I blessed . . . one hundred and ninety-four children.” Woodruff lived another fifty-two years, blessing thousands more as an Apostle and then as President of the Church. He unquestionably had the gift of faith to heal others. December 3rd found my wife very low. . . . She seemed to be sinking gradually, and in the evening the spirit apparently left her body, and she was dead. The sisters gathered around, weeping, while I stood looking at her in sorrow. The spirit and power of God began to rest upon me until . . . faith filled my soul, although she lay before me . . . dead. I had some oil that was consecrated. . . . I took it and consecrated it again before the Lord, for anointing the sick. I then bowed down before the Lord, prayed for the life of my companion, and in the name of the Lord anointed her body with the oil. I then laid my hands upon her, and in the name of Jesus Christ I rebuked the power of death and of the destroyer, and commanded the same to depart from her, and the spirit of life to enter her body. Her spirit returned to her body, and from that hour she was made whole. Having the spiritual courage to pronounce such a blessing is a testament to both Wilford’s faith and his spiritual awareness of the Lord’s will. One biographer wrote, “‘Wilford the Faithful.’ That was the title given to Wilford Woodruff in the early days of the Church, and it was a title justly earned.” This experience alone would be sufficient to justify the title. We retired to rest in good season, and I felt well in my mind and slept until twelve at night. I awoke and meditated upon the things of God until near three o’clock; and while forming a determination to warn the people in London and overcome the powers of darkness by the assistance of God, a person appeared unto me, which I considered was the Prince of Darkness or the devil. He made war with me, and attempted to take my life. He caught me by the throat and choked me nearly to death. . . . As he was about to overcome me I prayed to the father, in the name of Jesus, for help. I then had power over him, and he left me, though much wounded. Three personages dressed in white came to me, and prayed with me, and I was immediately healed, and [they] delivered me from all my troubles. On later occasions, Woodruff wrote of Satan doing physical harm to both him and George A. Smith, and had it not been for “three holy messengers . . . dressed in temple clothing” who gave each a priesthood blessing, both of them would have been killed by Satan on that occasion. Elder Woodruff was the recipient of visitations from both heavenly and demonic beings—the former attesting to his personal righteousness, and the latter attesting to the threat his work posed to the adversary. I prayed to the Lord to give me His spirit and to show me the hearts of the people. I promised the Lord, in my prayer, that I would deliver to that congregation whatever He would give to me. I arose and spoke one hour and a half, and it was one of the best sermons of my life. The lives of the congregation were open to the vision of my mind, and I told them of their wicked deeds and the reward they would obtain. The men who surrounded me dropped their heads. . . . Soon I was shown to a . . . room adjoining . . . one in which were assembled many of the men whom I had been preaching to. I could hear their conversation. One man said he would like to know how that Mormon boy knew of their past lives. Woodruff did not record what came of the experience. But it is clear that the specific manifestation of the gift of discernment planted a seed in the hearts of those who heard him speak. The reason for his lack of details regarding the manifestations of these gifts is unclear. Certainly his silence is in keeping with the Prophet Joseph’s declaration, “The gift of tongues is the smallest gift perhaps of the whole, and yet it is one that is the most sought after.” Joseph also stated that it is “not necessary for tongues to be taught to the Church.” Regardless, on several occasions the gift of tongues and interpreting tongues were manifest by Woodruff. In each case, these gifts were manifest in context of preaching the restored gospel, which Joseph indicated was the primary reason for these specific gifts of the Spirit. During the evening a hard thunderstorm was approaching us. My mules were tied to a large oak tree on the opposite side of the street. I felt impressed to move my mules away to another place. I did so. I also removed my children out of the carriage and made them a bed in the house. I also moved my carriage one rod down to the house in which Mrs. Woodruff, myself, and one child slept. We had just retired to bed when the storm reached us with great fury. In a moment the large oak tree came thundering to the ground with a mighty crash. Had I not . . . moved my mules it probably would have killed them. Had I not . . . moved my carriage it would have crushed it to atoms and killed us, . . . for the body of the tree fell where my carriage [previously] stood. . . . I considered it an interposition of providence. Some years [ago] I had a part of my family living in Randolph, Rich County. I was there on a visit, with my team, in the month of December. When I named it to my family who were at Randolph they urged me strongly to stop longer. Through their persuasion I stayed until Saturday morning, with the Spirit continually prompting me to go home. I then began to feel ashamed to think that I had not obeyed the whisperings of the Spirit to me before. I took my team and started early on Saturday morning. When I arrived at Woodruff, [Utah,] the Bishop urged me to stop until Monday and he would go with me. I drove on sprightly, and when within fifteen miles of Wasatch, a furious snow storm overtook me, the wind blowing heavily in my face. In fifteen minutes I could not see any road whatever, and knew not how or where to guide my horses. I left my lines loosely on my animals, went inside my wagon, tied down the cover, and committed my life and guidance into the hands of the Lord, trusting to my horses to find the way, as they had twice before passed over that road. I prayed to the Lord to forgive my sin in not obeying the voice of the Spirit to me, and implored Him to preserve my life. My horses brought me into the Wasatch station at 9 o’clock in the evening, with the hubs of my wagon dragging in the snow. I got my horses under cover, and had to remain there until the next Monday night, with the snow six feet deep . . . and still snowing. It was with great difficulty . . . that I saved the lives of my horses by getting them into a box car and taking them to Ogden; while if I had obeyed the revelation of the Spirit of God to me, I should have traveled to Salt Lake City over a good road without any storm. Woodruff gave his own explanation of the lesson learned from this experience. He said, “As I have received the good and the evil, the fruits of obedience and disobedience, I think I am justified in exhorting all my young friends to always obey the whisperings of the Spirit of God, and they will always be safe.” While he experienced the gift to receive personal revelation countless number of times, he learned that this gift of the Spirit was of no value if not strictly obeyed. On October 25, 1891, he recorded in his journal his remarks to the Saints: “I have received a revelation and a commandment from the Lord, which I have not revealed to any man, which I shall reveal to this assembly. And the command of the Lord I shall give to this people, which is this.” He then proceeded to describe what he saw in vision regarding what would happen to the Church and its leaders and properties if the practice of plural marriage was not ended: “the confiscation and loss of all temples; the cessation of all temple ordinances for the living and the dead; the imprisonment of the First Presidency, the Twelve, and many other leaders, including many heads of families; and the confiscation of the personal property of the Saints who continued to practice plural marriage. Some had thought that revelation had ceased, but this is not the case. The Lord is with us and gives us revelation. But I will say for myself that I wish to avoid saying “Thus saith the Lord” as far as I can when I give the will of the Lord to the people. In the days of Joseph Smith, it was “Thus saith the Lord” almost daily until the revelations now embodied in the Book of Doctrine and Covenants had been given. Since that day President Brigham Young, John Taylor, and myself have seldom used the words (thus saith the Lord) when giving the word of the Lord to the people. These are but a representative handful of the hundreds of such revelatory experiences in the life of Wilford Woodruff. Each revelation evidences he was in possession of the gift of receiving revelation. The prophet Joel spoke on behalf of the Lord, saying, “I will pour out my spirit upon all flesh; and your sons and your daughters shall prophesy, your old men shall dream dreams, your young men shall see visions” (Joel 2:28; emphasis added). This verse is a perfect introduction to the next three gifts of the Spirit—the gift of prophecy, the gift of dreams, and the gift of visions. Wilford Woodruff enjoyed each of these gifts in abundance. Regarding prophecy, Wilford’s journal often refers to his having the gift, but he typically does not elaborate on what he prophesied. Usually he simply states that he had the gift of prophecy that day. For example, on March 25, 1849, he wrote that he performed ordinations and was “filled with the spirit of God, prophecy and rejoicing.” Similarly, on April 7, 1837, he wrote, “The power of God and the spirit of prophecy and revelation rested upon us. . . . And I, Wilford, testify in the name of Jesus Christ that many precious things were shown me concerning my brethren, by the Holy Spirit, in prophecy and revelation.” Of course, there are examples where he recorded the specifics of what he had prophesied. On May 1, 1836, he wrote, “I had the spirit of God and of prophecy. I prophesied to the people of the judgments of God that await them.” And on January 1, 1862, he spoke prophetically of the destiny of the United States: “And the Lord will continue to weaken this nation until they are broken to pieces and cast down, to rise no more forever.” He recorded a rather significant prophecy on January 23, 1881: “[I] Bore testimony to the work of God and . . . said Joseph F. Smith, [who] was one of the First Presidency, . . . would be President of the Church of Jesus Christ of Latter-Day Saints in his day.” In fulfillment of the prophecy, twenty years later, in 1901, Joseph F. Smith became President of the Church. Woodruff put a great deal of credence in dreams and held that God regularly spoke through them. He was so convinced that God used dreams as a means of divine communication that he seldom distinguished between a dream and a vision. As far as he was concerned, they were one and the same. Of Woodruff’s perception of the sacred and oft-inspired nature of dreams, one author notes, “Woodruff had learned to pay close attention to his dreams and to act on any truth that he felt they conveyed.” Owing to the fact that so many of his dreams proved to be inspired, prophetic, or divine, it is little wonder he believed in them so strongly. He even held that some dreams that he could not find an interpretation for were nonetheless inspired and meaningful. It was not uncommon for him to record a dream and then comment that he believed it was of God but did not know what it meant. This particular dream gave him a sense of urgency about the work and added to his general feeling that the Lord’s coming was near. In some respects, President Woodruff’s dreams must have been a burden to him, yet his entries indicate no sense of anxiety. It appears that he considered this gift as simply one more way in which the Lord communicated with him. One of President Woodruff’s most detailed visionary accounts was one wherein he saw what appears to be a futuristic vision of the United States. In this vision, he saw wickedness, abominations, corruption, and . . . in consequence of these, the judgments of God poured out upon this once chosen land. The details are graphic, the specifics amazing, and the warning ominous. One can only guess if he understood what he saw to be literal or figurative. Regardless, President Woodruff was a visionary in the most literal sense of the word. And like his predecessors in the prophetic office, both ancient and modern, he was the recipient of the visions of heaven. The messages contained in those visions sobered him. [June 11, 1837] I returned with several elders to Elder Stoddard’s to spend the night, and there was a woman present who was possessed with the devil. She was oft times dumb and greatly afflicted by the evil spirits that dwelt in her. She believed in Jesus Christ of Nazareth, and us as his servant[s], and called upon us to cast the devil out of her. According to her request, four of us laid hands upon her and commanded the devil, in the name of Jesus Christ, to depart out of her. . . . It was immediately done, and the woman arose with great joy and gave thanks and praise unto God, for according to her faith she was made whole from that hour. [January 18, 1840] I had not been with Elder Clayton but a few minutes before I was called upon to visit three sick persons and administer to them according to the order of the gospel (i.e., by prayer and the laying on of hands). One case was very distressing. We found the sister possessed of the devil and a burning fever on the brain. She was raging and trying to tear herself, although [being held down by] the hands of three or four men. We laid hands upon her and commanded the devil to depart and the fever to stand rebuked in the name of Jesus Christ, and it was done, though not without a great struggle. [January 24, 1848] Brothers Pratt and Levi Richards and myself visited Brother Henman’s family to administer to them, for the whole family was sick and had been troubled with evil spirits. We prayed with this family, and laid hands upon seven that were sick. . . . The spirit of the Lord was with us, and we rebuked the sickness and commanded the evil spirits to depart, and they received a blessing upon the family. He had numerous encounters with those possessed by Satan, and God granted him the power and the faith to cast out foul spirits and rebuke their influence in the lives of believers. In reference to the gifts of the Spirit listed in Doctrine and Covenants 46, 1 Corinthians 12, and Moroni 10, Elder Bruce R. McConkie stated, “These are by no means all of the gifts. In the fullest sense, [the gifts of the Spirit] are infinite in number and endless in their manifestation.” Thus, it should be noted that there are other “gifts” that are no less divine in their origin and no less important to those who are privileged to receive and exercise them. President Woodruff experienced many of these other gifts. I walked out of the house and cast my eyes towards the heavens and a glorious scene presented itself to our view. [A] light commenced in the northeast and spread to the west, and soon rolled up over head; . . . it centered in the heavens and rolled forth fire, blood, and smoke like contending armies: the whole heavens was illuminated with blood and fire for the space of half an hour. . . . It seemed at times as though the veil was about to rend in twain, and the throne of God to appear. . . . This is one of the signs in the heavens in the last days spoken of by the ancient, as well as modern, prophets. Oh, may God hasten the day when the scenery will be wound up. About seven o’clock p.m. I discovered a stream of light in the southwest quarter of the heavens. The rays of light were in the form of a broadsword, with the hilt downward [and] the blade raised, pointing from the west southwest, raised to an angle of 45 degrees from the horizon and extending nearly . . . to the zenith of the degree where the sign appeared. This sign gradually disappeared from half past seven, and at nine o’clock immediately disappeared. The significance of these two experiences is not immediately apparent. But, as Woodruff notes, the Prophet Joseph certainly saw these as signs that great turmoil was about to overtake the earth. They also stand as evidence of Wilford’s gift to behold the signs of the times in a very dramatic fashion. Fell into a cauldron of boiling water (age three). Fell from the beam of a barn, striking his face on the floor and nearly breaking his neck (age five). Broke an arm by falling down the stairs, then broke the other arm by falling onto a pile of timber (age five or six). Was chased by an angry bull (age six). Broke both bones in his leg while riding in a carriage (age six). Nearly suffocated under a large pile of hay (age seven). Was in a wagon that overturned when the horse pulling it was spooked (age 8). Fell fifteen feet from a tree, landed on his back, and had the air knocked out of him (age nine). Nearly drowned in the Farmington River (age twelve). Nearly froze to death in a winter storm (age thirteen). Split his foot nearly in two with an ax (age fourteen). Was bitten by a rabid dog in the last stages of hydrophobia (age fifteen). Was thrown from a horse that was running full speed down a rocky precipice. He landed on his feet but broke his left leg in two places and injured both ankles (age seventeen). Fell headfirst from the top of a waterwheel and was nearly crushed by the wheel (age twenty). Fell about twenty feet from the top of a flourmill’s breast wheel, landing on the rocks below, and being nearly crushed by the wheel (age twenty-four). Got a severe case of “lung fever” or pneumonia (age twenty-four). On the day of his baptism, had a horse kick his hat off, missing his face by about two inches. That same day he was dragged by two horses down a hill (age twenty-six). Was nearly shot when a rifle discharged, missing his chest by inches (age twenty-seven). Was nearly shot again when the trigger of a musket pointing at his chest was accidentally pulled, but the gun misfired (age twenty-seven). Was dragged for about half a mile by horses when his wagon broke (age thirty-two). Became delirious from a severe attack of bilious fever. He was confined to bed for forty days from the sickness. He experienced two more relapses, one of which caused him to stop breathing (age thirty-five or thirty-six). Was in a train crash where his boxcar was thrown from the tracks. Several passengers were killed or seriously injured, but Wilford was unharmed (age thirty-six). Was struck in the chest by a tree he was felling. He broke his breastbone and three ribs and bruised several vital organs (age thirty-nine). Became poisoned by skinning a dead, diseased cow (age forty-nine). I have been a marked victim . . . of the destroyer from my infancy up to the present day. I have faced accident, misfortune, and apparently death so many times and in so many shapes and forms, from my childhood through life thus far, that it has become a proverb with me to say that there has seemed to be two powers constantly watching me and at work with me: one to kill and the other to save me. Thus far the power to save me and preserve my life has prevailed. How long I shall be blessed with this preserving power and care, time must determine. It took me two years to gather up everybody [who was a member of the Church] . . . in New England and Canada . . . (there were about one hundred of them). We arrived at Pittsburgh one day at sundown. We did not want to stay there, so I went to the first steamboat that was going to leave. I saw the captain and engaged passage for us on that steamer. I had only just done so when the Spirit said to me . . . very strongly, “Don’t go aboard that steamer, nor your company.” Of course, I went and spoke to the captain, and told him I had made up my mind to wait. Well, that ship started, and had only got five miles down the river when it took fire, and three hundred persons were burned to death or drowned. If I had not obeyed that spirit, and had gone on that steamer with the rest of the company, you can see what the result would have been. Shortly before his death, President Woodruff penned, “It is very remarkable how my life has been preserved through so many years, considering what I have passed through in my day and generation. I have to acknowledge the hand of God in the preservation of my life up to the present hour. God moves in a mysterious way.” Perhaps Satan’s knowledge of President Woodruff’s future contributions explains the onslaught of the physical attacks. Regardless, it seems evident that a gift was operative in his life, ensuring his constant preservation. In the fall [of 1834] I had a desire to go and preach the gospel. I knew the gospel which the Lord had revealed to Joseph Smith was true, and of such great value that I wanted to tell it to the people who had not heard it. It was so good and plain, it seemed to me I could make the people believe it. I was but a teacher, and it is not a teacher’s office to go abroad and preach. I dared not tell any of the authorities of the Church that I wanted to preach, lest they might think I was seeking for an office. I went into the woods where no one could see me, and I prayed to the Lord to open my way so that I could go and preach the gospel. While I was praying the Spirit of the Lord came upon me, and told me my prayer was heard and that my request should be granted. I felt very happy, and got up and walked out of the woods into the traveled road, and there I met a high priest who had lived in the same house with me some six months. I told him I was willing to do whatever the Lord required of me. I did not tell him I had just asked the Lord to let me go and preach. In a few days a council was called at Lyman Wight’s, and I was ordained a priest and sent on a mission into Arkansas and Tennessee, in company with an elder. President Woodruff’s description of the event leaves one strongly doubting that coincidence could be the explanation behind the miracle. He had a pure intent and pure desire, and the Lord heard his pleadings—as he will hear each of us as we develop this gift and exercise it in faith. I have had this spirit [of journal writing] upon me since I first entered this Church. I was baptized [after] the first sermon I heard, and from that day until now I have kept a daily journal. Whenever I have heard Joseph Smith preach, teach, or prophesy, I have always felt it my duty to write it. . . . I could not eat, drink, or sleep in peace until I did write it, and my mind has been so exercised upon this subject that when I heard Joseph Smith teach and I had not pencil and paper I would go home and sit down and write that whole sermon almost word for word and sentence by sentence as it was delivered. And when I had written it, it was taken from me. I remembered it no more. This gift from God both drove him to write and endowed him with the ability to retain the words he heard so they could be accurately recorded. Many of Joseph Smith’s sermons included in the Prophet’s published history and Joseph Fielding Smith’s edited version of Teachings of the Prophet Joseph Smith are drawn from Woodruff’s handwritten accounts written under the influence of this gift of the Spirit. So much could be said of President Woodruff’s spiritual legacy. The examples in this paper are just a sampling. One historian wrote, “His faith was such that he saw the hand of God in everything.” Specifically speaking of his many gifts of the Spirit, Thomas G. Alexander states, “He coupled a firm dependence on inspiration in its various forms—dreams, visions, revelations—with a strong sense of personal destiny and Providential protection.” President Woodruff’s innately spiritual and believing approach left its mark on many with whom he interacted—believer and nonbeliever alike. At his funeral, George Q. Cannon described him thus: “In the passing of President Woodruff, a man has gone from our midst whose character was probably as angelical as that of any person who has ever lived upon the earth. . . . He was a heavenly being. It was heaven to be in his company.” As prophets always are, President Woodruff was an example to the Saints, not only of courage and faithfulness, but also of spirituality and fidelity to the Father. He was both the embodiment and realization of the scriptural declaration, “To every man is given a gift by the Spirit of God” (D&C 46:11). Truman G. Madsen, Joseph Smith the Prophet (Salt Lake City: Bookcraft, 1989), 48–49. Lawrence R. Flake, Prophets and Apostles of the Last Dispensation (Provo, UT: Religious Studies Center, Brigham Young University, 2001), 47. The Discourses of Wilford Woodruff, ed. G. Homer Durham (Salt Lake City: Bookcraft, 1998), 45. Matthias Cowley, Wilford Woodruff: History of His Life and Labors (Salt Lake City: Bookcraft, 1965), 14–15. In their commentary on the Doctrine and Covenants, Stephen E. Robinson and H. Dean Garrett concluded, “According to [D&C 46] verse 29, the head of the Church possesses all the gifts of the Spirit” A Commentary on the Doctrine and Covenants [Salt Lake City: Deseret Book, 2001], 2:81). Joseph Fielding McConkie and Craig J. Ostler wrote, “The president of the Church not only presides over all of its members but also over all of the gifts given them of God to aid in the building of his earthly kingdom. Under the direction of the prophet countless calls are made to utilize those gifts in sharing the gospel with all the nations and peoples of the earth and in teaching and strengthening those already in the Church” (Revelations of the Restoration [Salt Lake City: Deseret Book, 2000], 369). Thomas G. Alexander, Things in Heaven and Earth: The Life and Times of Wilford Woodruff, a Mormon Prophet (Salt Lake City: Signature Books, 1991), 21. Alexander, Things in Heaven and Earth, 21. Wilford Woodruff’s Journal, 1833–1898, Typescript, ed. Scott G. Kenney (Midvale, UT: Signature Books, 1983), 3:586, December 20, 1850. In an effort to make Woodruff’s words more reader friendly, the spelling, punctuation, and capitalization in his journal entries have been standardized throughout this paper. Clynn L. Davenport, comp., Biography of John Lee Jones, 1841–1935 (n.p.), 147–48, April 6, 1893, as cited in Matthew B. Brown and Paul Thomas Smith, Symbols in Stone: Symbolism on the Early Temples of the Restoration (American Fork, UT: Covenant Communications, 1997), 136; see also 121, 160. Wilford Woodruff’s Journal, 4:415, April 28, 1856. Wilford Woodruff, “History of Wilford Woodruff,” Millennial Star, June 24, 1865, 392; see also Wilford Woodruff’s Journal, 4:414–16. Wilford Woodruff’s Journal, 1:118–19, January 3, 1837. Wilford Woodruff, Leaves from My Journal, Third Book of the Faith-Promoting Series (Salt Lake City: Juvenile Instructor Office, 1882), 65. Wilford Woodruff’s Journal, 1:455, June 3, 1840. Wilford Woodruff’s Journal, 3:111. For other examples of healings performed by Woodruff, see Wilford Woodruff’s Journal, 3:66; 3:68; 3:147; 7:268; 7:286. Cowley, Wilford Woodruff, 97. President Woodruff adds, “While I was undergoing this ordeal (as my wife related afterwards) her spirit left her body, and she saw it lying upon the bed and the sisters there weeping. She looked at them and at me, and upon her babe; while gazing upon this scene, two persons came into the room, carrying a coffin, and told her they had come for her body. One of these messengers said to her that she might have her choice—she might go to rest in the spirit world, or . . . she could have the privilege of returning to her tabernacle and continuing her labors upon the earth. The condition was that if she felt she could stand by her husband, and with him pass through all the cares, trials, tribulations, and afflictions of life which he would be called to pass through for the gospel’s sake. . . . When she looked at the situation of her husband and child she said, ‘Yes, I will do it.’ At the moment that decision was made the power of faith rested upon me, and when I administered unto her, her spirit reentered her tabernacle, and she saw the messengers carry the coffin out of the door” (Cowley, Wilford Woodruff, 97–98). Preston Nibley, The Presidents of the Church (Salt Lake City: Deseret Book, 1974), 101. Dean C. Jessee, “Wilford Woodruff,” in Leonard J. Arrington, ed., The Presidents of the Church (Salt Lake City: Deseret Book, 1986), 128. Wilford Woodruff’s Journal, 1:142, April 15, 1837. Wilford Woodruff’s Journal, 1:532, October 18, 1840; see also Jessee, “Wilford Woodruff,” 128–29. Wilford Woodruff, March 3, 1889, discourse in Brian H. Stuy, ed., Collected Discourses (Burbank, CA, and Woodland Hills, UT: B. H. S. Publishing, 1987–92), 1:218; Woodruff, Leaves from My Journal, 109–10; Wilford Woodruff, October 19, 1896, discourse in Stuy, Collected Discourses, 5:236–37. No reference to this event by George A. Smith has survived. President Woodruff once said: “I have referred to the administration of angels to myself. What did these angels do? One of them taught me some things relating to the signs that should precede the coming of the Son of Man. Others came and saved my life” (Wilford Woodruff, discourse on October 19, 1896, in Stuy, Collected Discourses, 5:238). The Teachings of Joseph Smith, ed. Larry E. Dahl and Donald Q. Cannon (Salt Lake City: Bookcraft, 1998), 671. Teachings of Joseph Smith, 670. “Tongues were given for the purpose of preaching among those whose language is not understood; as on the day of Pentecost, etc.” (Teachings of Joseph Smith, 670–71). Wilford Woodruff’s Journal, 3:355–56, July 5, 1848. Wilford Woodruff’s Journal, 4:517, December 16, 1856. Woodruff, Leaves from My Journal, 90–91. Woodruff, Leaves from My Journal, 91. Wilford Woodruff’s Journal, 9:168, October 24, 1891. See, for example, Wilford Woodruff’s Journal, 1:524; 7:615; 7:616; 7:618; 6:20; 9:67; 9:464; 9:467; 9:469. Wilford Woodruff’s Journal, 1:524; 2:429; 3:382; 7:331; 7:531; 9:463–69. For examples of the gift of prophecy, see Wilford Woodruff’s Journal, 1:101; 1:411; 5:533; 7:464. Wilford Woodruff’s Journal, 3:447, May 16, 1849. Wilford Woodruff’s Journal, 1:137, April 7, 1837. Wilford Woodruff’s Journal, 1:68, May 1, 1836. Wilford Woodruff’s Journal, 6:3, January 1, 1862. Elder Bruce R. McConkietaught that: During the Millennium “both church and state, as the world knows them, will . . . cease to be. When the Lord comes again, he will set up anew the political kingdom of God on earth. It will be joined with the ecclesiastical kingdom; church and state will unite; and God will govern in all things. . . . Once again the government of the earth will be theocratic. God will govern. . . . And all of this presupposes the fall of Babylon, and the death of false religions, and the fall of all earthly governments and nations. And these things, as we are aware, shall surely come to pass” (The Millennial Messiah [Salt Lake City: Deseret Book, 1983], 596). Wilford Woodruff’s Journal, 8:8, January 23, 1881. See Wilford Woodruff, in Journal of Discourses (London: Latter-day Saints’ Book Depot, 1854–86), 22:331–33; see also Stuy, “Wilford Woodruff’s Vision of the Signers of the Declaration of Independence,” Journal of Mormon History 26, no. 1 (Spring 2000): 78 n. 38. Stuy, “Wilford Woodruff’s Vision,” 79. Wilford Woodruff’s Journal, 2:24; 2:29; 2:448; 2:478; 3:116; 4:515; 8:429. Brian Stuy wrote that Wilford recorded in his personal journal at least three dozen of his own dreams, and numerous other dreams which he deemed significant that were had by his friends and acquaintances. Stuy further noted: “After recording a dream, he would frequently comment something like ‘What this Dream means time will soon Determin[e]’” (Stuy, “Wilford Woodruff’s Vision,” 78 n. 38). Wilford Woodruff’s Journal, 2:478–479, November 1, 1844. Wilford Woodruff, discourse delivered October 19, 1896, recorded in Stuy, Collected Discourses, 5:237–38; see also Wilford Woodruff’s Journal, 3:578–79, October 20, 1850. For an excellent analysis and interpretation of the historical events surrounding Woodruff’s experiences, see Richard E. Bennett, “‘Line upon Line, Precept upon Precept’: Reflections on the 1877 Commencement of the Performance of Endowments and Sealings for the Dead,” BYU Studies 44, no. 3 (2005): 39–77. Wilford Woodruff’s Journal, 9:293, March 19, 1894. For example, see Wilford Woodruff’s Journal, 5:4, January 4, 1857. Woodruff did not record the vision immediately. He indicated in his journal under the date of June 15, 1878, that he received the vision on the evening of December 16, 1877. (Wilford Woodruff’s Journal, 7:419–23). It appears he may have received a similar vision during the evening of January 26–27, 1880 (Wilford Woodruff’s Journal, 7:546). For example, see Wilford Woodruff’s Journal, 2:471; 3:401; 4:517; 5:5. Wilford Woodruff’s Journal, 1:408. The day after this encounter, Wilford was called back to the same house. He recorded: “I was called upon with my Brethren to visit a child possessed of the devil, that endeavored to destroy the child. It was the child of the woman that was possessed with the devil, upon whom we laid hands Saturday evening. We laid hands upon the child that was writhing under the power of the devil, and commanded the devil to depart, in the name of Jesus Christ, and it was instantly done, and the child fell asleep” (Wilford Woodruff’s Journal, 1:409). Bruce R. McConkie, Mormon Doctrine, 2nd ed. (Salt Lake City: Bookcraft, 1966), 315. Likewise, Elder Marvin J. Ashton taught: “Taken at random, let me mention a few gifts that are not always evident or noteworthy but that are very important. . . . The gift of asking; the gift of listening; the gift of hearing and using a still, small voice; the gift of being able to weep; the gift of avoiding contention; the gift of being agreeable; the gift of avoiding vain repetition; the gift of seeking that which is righteous; the gift of not passing judgment; the gift of looking to God for guidance; the gift of being a disciple; the gift of caring for others; the gift of being able to ponder; the gift of offering prayer; the gift of bearing a mighty testimony; and the gift of receiving the Holy Ghost. We must remember that to every man is given a gift by the Spirit of God” (“There Are Many Gifts,” Ensign, November 1987, 20). Wilford Woodruff’s Journal, 2:219, March 10, 1843; emphasis added. See also Joseph Smith, History of the Church of Jesus Christ of Latter-day Saints, ed. B. H. Roberts, 2nd ed. rev. (Salt Lake City: Deseret Book, 1971), 5:300–301. The list is taken from “History of Wilford Woodruff,” Millennial Star, see June 10, 1865, 359–60, June 17, 1865, 374–76, and June 24, 1865, 391–92; see also Cowley, Wilford Woodruff, 5–11. Wilford Woodruff’s Journal, 4:414–15, April 28, 1856. Wilford Woodruff, in Durham, Discourses of Wilford Woodruff, 294–95. This is but one of many examples of preservation. See also Wilford Woodruff’s Journal, 1:48; 2:129–30; 2:319–21; 3:469; 3:555–56; 3:563–65; 7:41–43; 7:483; 9:16; 9:85; 9:87. Wilford Woodruff’s Journal, 9:449, March 1, 1897. Woodruff, Leaves from My Journal, 8. See Wilford Woodruff’s Journal, 7:55, January 20, 1872. Madsen, Joseph Smith the Prophet, 99. President Woodruff reported that Joseph Smith encouraged or commanded him to write. Speaking of journal keeping, Woodruff remarked, “I have many times thought the Quorum of the Twelve and others considered me rather enthusiastic upon this subject; but when the Prophet Joseph organized the Quorum of the Twelve, he counseled them to keep a history of their lives, and gave his reasons why they should do so” (Cowley, Wilford Woodruff, 476). “Following the death of Joseph Smith, Brigham Young encouraged Wilford to ‘keep an account of things’ as he would ‘look to me for his journal some day’” (Jessee, “Wilford Woodruff,” 139). Wilford Woodruff’s Journal, 5:36, March 17, 1857. Wilford Woodruff’s Journal, 7:55, January 20, 1872. Alexander, Things in Heaven and Earth, 332. See Nibley, Presidents of the Church, 134–35; see also Flake, Prophets and Apostles of the Last Dispensation, 47–48.
2019-04-23T04:31:03Z
https://rsc.byu.edu/archived/banner-gospel-wilford-woodruff/5-every-man-given-gift-spiritual-legacy-wilford-woodruff
Wild edible plants (WEPs) refer to edible species that are not cultivated or domesticated. WEPs have an important role to play in poverty eradication, security of food availability, diversification of agriculture, generation of income resources, and alleviating malnutrition. In the present study, an inventory of traditionally used WEPs from Udhampur district of J&K, India, has been prepared. A systematic and extensive ethnobotanical survey was carried out in different villages of the district for the collection of information on WEPs. The data collected through questionnaire and interviews was then analyzed for cultural importance index (CI) and factor informant consensus (Fic) to know the cultural significance of WEPs and consensus for the knowledge of WEPs among the informants. A total of 90 plant species belonging to 45 families and 78 genera were edible and serve as wild phytofoods in the present study. Species richness of wild edible species was the maximum for vegetables (46 species) followed by fruits (37 species) and medicinal plants (36 species). Culturally (on the basis of CI), the most important vegetable and fruit species were Diplazium esculentum, Fumaria indica, Taraxacum campylodes, Urtica dioica, Phyllanthus emblica, Punica granatum, Cordia dichotoma, Syzygium cumini, Ficus palmata, etc. The highest use-report (626) was recorded for vegetables whereas the maximum mean use-report (14.8) was recorded for fruits. On an average, 20.7 wild edible species were used per informant. Informant consensus index (Fic) varied between 0.83 and 0.94 for raw vegetables and preserved vegetables, respectively. One of the most important issues of this era is hunger for which one of the possible solutions is the usage of WEPs. The local populace of Udhampur has good knowledge of WEPs, and this legacy of traditional culture must be conserved. Wild edible plants (WEPs) refer to plant species that are not cultivated or domesticated but are accessible from various natural habitations and used as food . WEPs are generally gathered from diverse habitats, viz, forests, cultivable fields, and even anthropogenically disturbed zones like roadsides and wastelands by different traditions throughout the world. A huge number of ethnic communities and local populace residing in the developing countries draw a significant part of their subsistence and livelihood from wild plants . Historically, humans may have utilized more than 7000 WEPs so far , but many such food resources and valuable plants are still to be explored . Despite the fact that most of the societies primarily rely upon agricultural crops, the tradition of utilization of WEPs has not completely vanished. According to Food and Agricultural Organization (FAO) report, at least one billion people are thought to use wild food in their diet . WEPs have important role to play in poverty eradication, security of food availability, diversification of agriculture, generation of income resources [6–8], and alleviation of malnutrition . The high nutrient and vitamin value of many WEPs [9–12] reduces the susceptibility of local societies to food insecurity thereby furnishing a safeguard in times of food scarcity, famine, or conflict [13–17]. WEPs have, by tradition, occupied an important position in the cultural, religious, and health sector of rural and ethnic lives of Indians. In India, the presence of varied climatic zones and ecological diversity creates a basis for rich phytodiversity and this fact is strongly supported by various studies carried out on WEPs by various researchers throughout India [18–29]. Arora and Anjula have given a detailed account of WEP species occurring in India while Rathore reported 600 WEP species from India. From J&K state, there are only a few studies [32–36] regarding usage of WEPs. District Udhampur, located in Jammu division of J&K state, is a hilly terrain and many villages of the region are cut off from the frequent visits of the town. Since antiquity, the rural populace of the district has been dependent on wild plants as food because of their free availability, effectiveness against a background of undeveloped infrastructure, cultural and religious preferences, and insufficient provision of primary services. The main occupation of the local populace is agriculture. But, due to possession of small land holdings and insufficient earning, the male folk work either as laborers or are engaged in small home run shops like blacksmith and cobbler whereas the womenfolk and children are engaged in livestock rearing. On their to-and-fro journey to forests, they also collect WEPs for self-consumption and for sale in local markets as a source of income generation. The usage of WEPs has generated among them a strong base of traditional knowledge regarding phytofoods which in turn is based on their needs, instinct, observation, trial, and error coupled with experiences and has been providing them food security since antiquity. This knowledge base has developed through age-old experience and has descended orally from one generation to another as a domestic practice. But, in the present scenario, this tradition and associated knowledge is dwindling owing to developmental activities, migration from rural to urban areas for occupation and education, changing cultural traditions, attraction towards western ways of life, temptation of fast foods, declining natural resources [37–39], changing environmental conditions, deforestation, etc. [40, 41]. Balick and Cox have also stated that modernization of traditions often results in the alteration of native knowledge systems as the whole community moves away from their conventional ways and adopts untraditional foreign principles. So, it is the prime need of our generation to collect and document this valuable traditional knowledge for the betterment of humanity. The present study was therefore undertaken to (i) inventorize this rich legacy of traditional knowledge available with the villagers of Udhampur district, (ii) find the cultural significance of WEPs, and (iii) evaluate consensus among the locals for the traditional knowledge of wild edible plants. District Udhampur, located in Jammu division of J&K state, lying between 32° 34′ and 39° 30´ North latitude and 74° 16′ and 75° 38′ East longitude, has a total area of 2380 km2 (Fig. 1). The district is situated in the southeastern part of J&K with an altitude ranging from 600 to 2900 m above mean sea level. The topography of the district is hilly, interwoven with the Shivalik range of the Himalayas, and has largely a difficult and rugged terrain divided into three geographic zones: (a) temperate/intermediate zone, (b) sub-tropical/intermediate zone, and (c) intermediate zone. The district has an average rainfall slightly over 1551 mm . Most of the rainfall takes place during July, August, and September months. Snowfall usually occurs during December to February months and nearly 25% of the study area remains snowbound during winter. A systematic and extensive ethno-botanical survey was carried out in different villages of the district during June 2014 to June 2017 for the collection of information on wild edible plant species being used by locals in the study area. Before initiating the present study, a detailed survey was conducted during which various villages were visited and information was gathered about the people having the knowledge of wild edible plants or those involved in collection and sale of these plants. During the survey, informants were selected randomly and information was gathered by conducting interviews and group discussions with the informants in their local language on the indigenous uses of wild flora as food. A total of 88 informants (52 females and 36 males) between the age group 12–80 years were interviewed with a questionnaire. The information collected included common wild edible plant species, local name of plant species, habit, flowering time, plant part used, and recipe prepared individually or in combination with other plants. The specimens of plant species were collected from the study site and then identified from the herbaria of the Department of Botany, University of Jammu, Jammu, and Indian Institute of Integrative Medicine, Jammu, and also with the help of various regional floras [43, 44]. The final list of the plants was prepared following the International Plant Names Index (http://www.ipni.org) and Tropicos (2017) for the botanical nomenclature of species. The plant specimens were submitted to the herbarium of the Department of Botany, University of Jammu, Jammu, J&K, India. The wild edible plants were classified into nine categories based upon the local usage and recipes (Table 1). The vegetable use category was further subcategorized as cooked (VegC), raw (VegR), and preserved (VegP). The vegetables which are consumed after cooking, grinding or boiling, and mixing with yogurt were categorized as cooked whereas preparations preserved in mustard oil and consumed as food during shortage period were classified as preserved and those consumed directly after washing or as salad were designated as raw. Fruit usage was subcategorized as raw (FrR) and processed (FrP). Due to less number of fruit species, both cooked and preserved subcategories were merged as processed. Other categories included spices (Sp), beverages (Bv), and medicinal plants (Med). Fruit pulp is eaten fresh. Fruits are eaten raw and infusion is sieved for making sharbat (cooling drink); fruit is used as medicine. Vegetable, pickled, used as salad; medicinal. Seeds are consumed after roasting/frying; flower buds are added to yogurt to make raita or aasara, pickled. Vegetable is prepared in yogurt; flower buds are added to yogurt to make raita or aasara, pickled. Fruits are eaten raw; root is medicinal. Pakora (prepared by deep frying leaves coated with wheat flour), chutney (prepared by grinding leaves); medicinal. Juice is added to chutneys, eaten raw. Pickled, juice is added to chutneys; medicinal. Boiled and eaten with spices and juice of Citrus medica; cooked as vegetable. Fruits are eaten raw, murabba (prepared by shade drying boiled fruits and preserving them in sugar). Dried fruits are eaten; medicinal. Fruits are eaten raw; medicinal. Young shoots are boiled, cut into small pieces, and added to yogurt to make raita or aasra; medicinal. Vegetable; chapatti of flour are eaten during severe cold. Young leaves are cooked with diluted yogurt to make curry, leaves are also cooked with meat; fruits are eaten raw; medicinal. Fruits are eaten raw; tea. Chutney (prepared by grinding fruits and seeds). Fruits are eaten raw, chutney is prepared; medicinal. Vegetable, young seeds are eaten; fruits are eaten raw. Nepeta laevigata (D. Don) Hand.-Mazz. Sharbat (cooling drink prepared as infusion or decoction); medicinal. Persicaria amplexicaulis (D. Don) Ronse Decr. Fruits are eaten raw, pickle, murabba; medicinal. Fruits are eaten raw and cooked as vegetable. Fruits are eaten raw, anaardana (dried seeds) are ground to make chutney; medicinal. Whole plant in vegetative stage is washed, sun dried, and oil and tatri are added and consumed as pickle. Gulukand (prepared by preserving petals in sugar); medicinal. Vegetable, curry made in yogurt. Vegetable; fruits are eaten raw. Fruits are eaten raw after removing outer covering; medicinal. Vegetable is prepared in yogurt. Vegetable is prepared from leaves; dried seeds are cooked as pulse; fresh seeds are eaten raw. Chutney is prepared from seeds; fruits are sun dried, fried in oil, and used as pickle; medicinal. The field information gathered through questionnaire and interviews was analyzed quantitatively using two ethnobotanical indices described as follows. where nur refers to the number of use-reports for a particular use category and nt refers to the number of taxa used for a particular use category by all the informants. Fic values are low (near 0) if plants are chosen randomly or if there is no exchange of information about their use among informants, and approach one (1) when there is a well-defined selection criterion in the community and/or if information is exchanged between informants [46, 47]. CI index can also be seen as the sum of the proportion of informants that mention each species use. This additive index takes into account not only the spread of the use (number of informants) for each species but also its versatility, i.e., the diversity of its uses. The theoretical maximum value of the index is the total number of different use-categories (NC), reached in the unlikely case that all the informants would mention the use of the species in all the use-categories considered in a survey. In the case of species with only one use, this index would be equal to RFC . Wild edible plants remain a significant source of food and income for many countryside populations of the world. In the present study, the main occupation of the local populace is agriculture. But due to small land holdings, the male folk work either as laborers or are engaged in small home run shops, blacksmiths, cobblers, etc. Knowledge about wild vegetables and their recipes was mainly confined to women folk (86.4%). This unequal distribution of knowledge owes to the fact that collection of WEPs was mainly done by them during agricultural activities and on their to-and-fro journey to fields and forests for livestock-rearing activities. Gender is a crucial variable that influences the traditional knowledge of an area because it is highly correlated with numerous sociocultural factors like livelihood, education, accessibility to resources, status, and networking in the society . Women of every society tend to have an edge over these sociocultural factors and hence their knowledge is much more than others . As evident from the present study, women are usually unemployed in these far-flung areas and fully dedicate themselves to household and other cattle-related activities. They combine this day-to-day information with culturally attained knowledge to enhance their subsistence . A total of 90 plant species (89 angiosperms and 1 pteridophyte, viz, Diplazium esculentum) belonging to 45 families and 78 genera serve as wild phytofoods in Udhampur (Table 1). Out of the 89 species of flowering plants, 95.5% (85 species) belong to dicots and 4.5% (4 species, viz, Commelina benghalensis, Tulipa clusiana, Colocasia esculenta, and Phoenix sylvestris) belong to monocots. Singh et al. have reported 111 wild edible plants from Kashmir Himalayas whereas Thakur et al. have recorded 50 phytofoods from tribal areas of Western Himalaya. Some other studies from different parts of the world have reported 49 to 173 wild edible plants [53–55]. The high usage of wild plants as vegetables and fruits, in the present study, is an indicator of rich diversity of plants, easy availability, deep knowledge of wild edible plants, day-to-day requirements, well-maintained forests, far-off residential places from the local markets, and/or poor economic status of the local populace. In terms of number of species used, Leguminosae was the most dominant family (12 species) followed by Rosaceae (7 species), Moraceae (6 species), Rutaceae and Polygonaceae (5 species each), Lamiaceae (4 species), and Combretaceae (3 species) (Fig. 2). Twenty-eight families were represented by a single species each. In contrast to Rosaceae, being the most dominant family used in other studies worldwide [8, 52, 54, 55], Leguminosae was the most important family in the present study. This may be ascribed to the dominance of Leguminosae in the local flora or higher relevance of vegetables in the day-to-day life of the local populace of Udhampur. Pardo-de-Santayana et al. have reported Lamiaceae as the most important plant family in Montesinho, Portugal, owing to the higher significance of condiments in the area. Approximately, 20.7 wild edible species were used per informant in the present study. Highest value of usage was recorded for vegetable (mean 7.2), followed by fruits (mean 6.2), and food medicine plants (mean 5.0). Thakur et al. have recorded 23.7 species per respondent in the tribal areas of Himachal Pradesh, India; Geng et al. have recorded an average of 20.6 taxa per informant by the Naxi in northwest Yunnan, China; Kang et al. have stated an average of 20.8 wild edible species per informant from Gansu province of China, and Dolina et al. have reported a mean of 13.2 and 14.6 species per informant in Poljica and Krk areas of Croatia, respectively. In all these studies, the mean number of vegetable species per informant ranged between 7.1 and 13.2 and the mean number of fruit species per respondent between 6.3 and 6.9. The values reported in the present study are well within these ranges for total wild edible species, vegetable and fruit species. Informant consensus index (Fic) varied between 0.83 for raw vegetables and 0.94 for preserved vegetables (Table 2). Wild fruits eaten raw and chutney preparations also recorded high values (0.93 each) for Fic. Similar results of high Fic values have also been reported by Rao et al. , Bhatia et al. , Bhatia et al. , Singh et al. , and Kumar et al. from various parts of Jammu and Kashmir owing to high level of sharing of indigenous knowledge among the informants. These findings point towards the fact that despite huge variation in communities, climatic conditions, and forests, informants have good knowledge of WEPs which is being shared to a great extent among the inhabitants and also wild phytofoods are presently in use among the local populace. The present study site is having rich diversity of vegetables, fruits, and medicinal plants (Table 2). Species richness of WEPs was the maximum for vegetables (46 species) followed by fruits (37 species) and medicinal plants (36 species). Vegetables were mainly consumed after cooking (93.5%) and fruits as raw (94.6%). Highest use-report (626) was recorded for vegetables whereas maximum mean use-report (14.8) was recorded for fruits. Edible value was not confined to one or more plant parts. Fruits were the edible part in majority of the cases (35.5%) followed by leaves (26.4%), seeds (10.0%), shoots (8.9%), flowers (5.5%), tubers (4.6%), roots (2.7%), and pods (1.8%) (Fig. 3). The wild edibles were mainly herbs (47.8%, 43 species) followed by trees (32.2%, 29 species), shrubs (14.4%, 13 species), and climbers (5.6%, 5 species) (Fig. 4). The cultural index value for vegetables was 34.9% of the total CI, closely followed by fruits (30.5%) and medicinal plants (24.3%). Culturally (on the basis of CI), the most important vegetable species were Diplazium esculentum (0.52), Fumaria indica (0.51), Taraxacum campylodes (0.50), Urtica dioica (0.49), Zanthoxylum armatum (0.42), etc. The most common fruits consumed by the locals were Phyllanthus emblica (CI, 0.94), Punica granatum (CI, 0.68), Cordia dichotoma (CI, 0.60), Syzygium cumini (CI, 0.57), Ficus palmata (CI, 0.51), Berberis lycium (CI, 0.43), Prunus armeniaca (CI, 0.33), Prunus persica (CI, 0.31), Pyrus pashia (CI, 0.22), and Rubus ellipticus (CI, 0.18). Most of the species with high CI in the present study are also used as vegetable in most parts of the Himalayas [8, 15, 52, 59]. The immature fronds of Diplazium esculentum are either cooked as vegetable or preserved as pickle in the study area, same as in other parts of the Himalayas [8, 15, 52, 59–61]. According to Zeghichi et al. , vegetables gathered from the wild have diverse, potentially more nutrients than the commercially cultivated species. Seal has reported the leaves of Diplazium esculentum with high moisture content to have good nutritive value (3413.2 Kcal Kg−1) and crude protein content (143.8 g Kg−1). The values of protein content are even higher than many commercial fruits and leafy vegetables like apple, litchi, cabbage, and cauliflower [63, 64]. Taraxacum campylodes as vegetable is a rich source of proteins, calcium, phosphorus, and dietary fiber . Urtica dioica has a huge local value as vegetable in India and other parts of the world [8, 37, 52, 66–68]. It is a good source of vitamin A, dietary calcium, iron, crude proteins, fiber, fat, and carbohydrates [68, 69]. Nelumbo nucifera (CI, 0.06) grows in ponds, lakes, and marshy and swampy areas. Fresh rhizome of this plant contains 83.8% water, 0.1% fat, 1.6% reducing sugar, 0.4% sucrose, 2.7% crude protein, 9.3% starch, 0.8% fiber, l.1% ash, and 0.1% calcium . Rhizomes/petioles of Nelumbo nucifera are eaten as vegetable prepared either in tomato puree or in yogurt; the dish prepared in yogurt is locally known as nadroo ki yakhni and is considered a delicacy during marriages and other festive occasions. A combination of yogurt and vegetables is also common in many Middle East countries . A good number of vegetables are sun-dried or preserved as pickle (10 species). The sun-dried vegetables are meant for usage in winters, the period of scarcity, especially in the hilly zones. This is again a tradition practiced in the Himalayas; some plants are preserved in mustard oil and salt in the form of pickles, viz, young fronds of Diplazium esculentum [8, 52, 61], pods and roots of Moringa oleifera [35, 72], flowers of Agave americana , and whole plant of Ranunculus arvensis. Fruits are mainly consumed raw. Some of the most common fruits consumed by the locals were Phyllanthus emblica, Punica granatum, Cordia dichotoma, Syzygium cumini, Ficus palmata, Berberis lycium, Prunus armeniaca, Prunus persica, Pyrus pashia, Rubus ellipticus, etc. Arya has also reported Rubus ellipticus, Pyrus pashia, Elaeagnus parvifolia, Carissa spinarum, and Ficus palmata to be wild edible fruits used by the locals of Garhwal Himalaya, India. Thakur et al. have also recorded the usage of Prunus armeniaca, Pyrus pashia, Pyrus pashia, and Rubus ellipticus as raw fruits from the tribal area of Western Himalaya. As per Johns , wild fruits contain more fiber and have higher concentrations of vitamins and greater diversity of secondary metabolites in comparison to cultivated species. Fruit pulp of Aegle marmelos and seeds of Ocimum basilicum are used for preparation of traditional beverage or drink (locally known as Sharbat) during summers. Both Aegle marmelos and Ocimum basilicum are used as drinks in various parts of India and other neighboring countries. Fruits of Phoenix sylvestris, being calorie-rich and having numerous vital and refreshing compounds, are consumed worldwide especially by Muslims during the holy month of Ramadan to break the day-long fast . Some fruit species, viz, Cydonia oblonga and Phyllanthus emblica, are preserved for months or even years in the form of a local preparation called murabba (local jam) prepared by boiling whole or sliced fruits followed by shade drying and storing in airtight containers containing sugar or sugar syrup. Fruits of Artocarpus lacucha (Fig. 5), Phyllanthus emblica, and Citrus medica are preserved in mustard oil along with spices and salt as pickle. All these practices of preservation of fruits for the period of scarcity are part of local culture and also practiced in various other parts of India and in the Himalayas . It is a well-known fact that wild edibles are used as medicines worldwide , and in general, these plants are called as nutraceuticals . A good number of the wild edibles were reported as food medicine in the present study. They stand third, after the vegetable and fruits, in all respects as number (36 species), citations (436), and citations per informant (5.0). These species that can be a wild vegetable or fruit are consumed as per the availability or on special occasions like locals cook the leaves of Taraxacum campylodes (CI, 0.50) as vegetable especially as pre- and post pregnancy food for ladies to overcome weakness. It is a rich source of minerals particularly potassium as well as protein, boron, calcium, choline, copper, iron, manganese, magnesium, potassium, silicon, and zinc and a rich source of vitamins A, B complex, C, and D [40, 58, 82]. Urtica dioica (CI, 0.49) is a multi-utility medicinal species . The plant is diuretic and its tender leaves are picked up and cooked as local delicacy. Cissampelos glaberrima (CI, 0.40) is consumed only at the time of diarrhea . Jam (gulukand) prepared from the petals of rose after adding sugar is used as medicine to cure mouth ulcers and improve digestion and use against jaundice. On an average, 1.6 wild edible species per informant were mentioned to be utilized for the preparation of chutney. Leaves of Mentha longifolia are grinded separately in mortar and pestle with subsequent addition of salt and spices resulting in the preparation of chutney. It is a ready-to-eat food for instant consumption and generally referred to as the poor man’s food adjuster . Chutney is part of daily meal especially during summer season as it is a very good appetizer, antigastric, and antispasmodic and improves digestion [38, 40]. Seeds of Punica granatum, Zanthoxylum armatum (Fig. 5), and Flemingia prostrata are also consumed as chutney. This recipe improves digestion and is a good appetizer . Ramachandran and Ali also reported the fruit and seeds of Zanthoxylum armatum to be consumed as aromatic and tonic, in fever and dyspepsia and in expelling round worm. In the study area, four species, viz, Viola odorata (flowers), Persicaria amplexicaulis (roots), Flacourtia indica (inner bark), and Acacia catechu (heartwood) are boiled in hot water and serve as tea substitutes (hot drinks) after adding sweeteners. Tea prepared from flowers of Viola odorata is used against cough, cold, fever, and jaundice. Viola odorata contains alkaloids, mucilage, and vitamin C having diuretic and antioxidant properties and used against bronchitis, cancer, cold and cough, fever, kidney troubles, liver disorders, rheumatism, sneezing, and urinary infections [88, 89]. Owing to their aromatic properties, three species, namely Artemisia scoparia (seeds, flowers, and leaves), Carum carvi (fruits, seeds), and Murraya koenigii (leaves), are added to pulses and vegetables as condiment and spice in the study area. Carum carvi is a valuable spice found in the wild all through Europe, Russia, Siberia, and the Himalayas , having antibacterial, antiproligerative, antifungal, antitumor, and antihyperglycemic properties . The aromatic leaves of Murraya koenigii are highly valued, in different parts of Asia, for their utility as condiment and spice [60, 92–94] and for medicinal properties such as antidiabetic, antidysenteric, antioxidant, anti-inflammatory, anticarcinogenic, and hepatoprotective [93, 94]. Hunger, one of the most important concerns of this generation, can be supplemented, to a great extent, by the inclusion of WEPs in diet. Present study revealed that the traditional knowledge about the use of WEPs is still in practice among the ethnic communities of the study area. High diversity of vegetable, fruit, and food medicine plants in use along with greater consensus for their usage also supports this statement. The informants depend on these resources, developed in an agricultural and pastoral context, not only for food and nutrition but also for income generation. The culturally important plants of the study site are also common in use in other parts of the Himalayas which shows that broadly the dweller of the great Himalayan range have some similarities in their traditions. Persistence with the conventional foods is a powerful tool in the conservation of ethnic identity and cultures. So, the need of the hour is that the national and international authorities recognize the contribution of rural communities to the diversification of human nutrition and work in collaboration for the reappraisal of folk knowledge on WEPs. No funding was received for this research. This is a self-financed study. All data generated or analyzed during the conduct and writing up of the manuscript is incorporated in the research article. HB and KK carried out field surveys and collected the data. RKM and YPS planned the study and reviewed the final manuscript. RKM and HB did the data analysis and wrote the manuscript. All the authors have read the final manuscript and hereby approved it.
2019-04-19T05:23:12Z
https://ethnobiomed.biomedcentral.com/articles/10.1186/s13002-018-0272-1
It’s rare that someone would suggest you only need to know the bare minimum about a topic. In the case of SEO for small businesses, however, the bare minimum is better than nothing. Based on your priorities and goals, focusing on only the bare minimum at times can be the best decision you can make. This can ring true when you’re talking about getting small business SEO services. SEO is becoming a subject most people need to know about, but there’s too much information to learn. Even if you do work in an SEO department, you’ll still need to give a few lessons to your coworkers who don’t. This leads to the issue of needing to determine what to focus on to understand basic SEO. This department need to understand SEO to know why they should prioritise one page over another. This department need to report consumer queries to the SEO department to help the SEO team optimise. This department makes connections that the SEO department can use for links or reviews on blogs. This department needs to understand why the images and content about the products go on certain places on websites. Even though there are professions that can get away with knowing nothing about SEO, most can use a basic understanding of the subject. For this reason, make sure all of your company’s departments understand the basics. Your type of operating system should help narrow down your choices of downloadable player. Are you downloading the player for Windows, Mac OS X, or Linux? While there are programs that can run on any platform, there are still those that provide advanced features only for a specific OS. So don’t forget to take into account your operating system. Your media player should offer flexibility in terms of the video formats that it can play. The most common media formats out there include Flash, MPEG-4 AVC (H.264), WMV, and AVI. Some media players have limited capabilities although they can accept extra codecs to expand their range. Poor sound and video quality can spoil your viewing experience. So make sure the media player you choose is capable of providing excellent sound and video quality. The images should look crisp and clear. The sound has to be of stereo quality. Almost all viewing boxes and controllers look the same. There are players, however, that feature a more sophisticated and professional-looking interface. The difference, however, may sometimes lie in their usability. Once you’ve narrowed down your choices, check out their features and see if you’re going to be comfortable using them. For example, do you want something with separate virtual consoles or do you prefer a player with a tighter look? Ultimately, deciding on which one is the best is a matter of personal preference. Proposals are one of the sweetest events in a relationship. Still, it’s not just about the engagement ring from a trusted jeweller in Melbourne you’ll have to worry about. You also have to think how you will pop the question. Travel to the beach and set up a small picnic. Make sure that the food you’ll prepare is something that you both enjoy. When the sun’s about to set, bring out the ring from a jeweller like Robert Parker & Sons or Harry Winston and pop the question. The hues of the sunset will surely add romance in the event and your would-be spouse would remember it for the rest of your time together. Instead of going to a restaurant, why not head to your home? Take time to cook your spouse-to-be’s favourite meals. Bring out the candles and light them up. Buy a bouquet of flowers and play some light, romantic music. When it’s time for dessert, open a bottle of wine, have a toast, and pop the question. Having private time for a romantic dinner removes the distractions of a restaurant. You could also make the timing work for you. New Year’s Eve, for one, is a great time to be romantic. A few minutes before midnight, head to a rooftop with a great overlooking view. Stay there and reminisce about your time together as a couple. Once the fireworks light up the sky, get down on one knee and propose. That’ll surely be a start of the year both of you will remember. Finding a good jewellery designer in Melbourne isn’t the only thing you’ll have to think about when proposing. It’s important that you have a memorable experience to create a story worth sharing with your children. One of your basic duties as a citizen is to pay your taxes. The bigger your income, the higher your taxes should be. Computing your tax returns can be confusing, though. Apart from determining your taxable income, you also have to take into account different factors. This depends on your financial status. As an entrepreneur, for example, your tax responsibilities include obligations from your business income to your employees’. You need to keep track of these to make sure you’re not paying less than you owe. One of the most important parts of your income tax is the capital gains tax. This entails payments for selling properties, shares, and other assets. You can defer some of your capital taxes if your business can buy a certain asset you can exchange for another in your possession. Find out more about tax compliance with the conditions set to property ownership. This will help you see if you can defer some of your tax obligations, if possible. There’s a 10% value-added tax on the sale of most goods and services in Adelaide and other parts of Australia. Find out if this applies to your company and register accordingly. This way, you can get tax credit for the items you bought for commercial use. As an employer, you’ll have to remit the taxes of your workforce every month. The amount you’ll deduct will depend on the salary of each member of your staff. Check your state laws for the regulated tax you need to submit so your employees will meet their tax obligations. Check with your accountant to determine what other types of taxes apply to your business. Take time to understand the process, so you can calculate your own taxes. This way, you can make sure that your business is paying the right amount. Having well-trained employees is important to make sure that your day to day work is completed on time. Properly trained staff can finish work on time to ensure that your products and services meet the client’s or customer’s expectations. During festive seasons or other seasonal peaks, however, it is not easy for your regular in-house staff to keep up with various job requirements. When this happens, it can have a negative impact on your business operation if your staff begin to lag. In such cases, the best option is to turn to companies offering temporary staffing services. Such companies offer outsourcing services for various business functions. Hiring temporary staff during peak seasons is not a new idea. In fact, many companies have been adopting this concept to meet their strict job demands. You can also do the same to ensure the continued efficiency of your business. Companies that offer staffing services will make sure that they only employ staff that match your requirements. Here are a few tips on hiring staffing services. If you are looking to utilize the services of a temporary staffing company, you need to choose carefully. You need to hire companies that have been in the industry for many years. This is to make sure that they will provide you the right service. Once you’ve decided to get the services of a staffing company, choose a firm that specializes in your industry or type of operation. Determine if you need staffing employees for a short-term or long-term assignment, or permanent job placement. If you want to hire permanent employees, find out if the company will let you submit interview questions for job applications. There are various staffing firms offering different types of outsourcing functions. To find a staffing firm, check out a few companies and ask for references. Know about their fees and turnover rate. Make sure the firm will take the time to visit or know more about your company. An effective staffing company is an important management tool for your business. This is why you need to do a little investigation to choose your firm. And once you’ve found the right company, maintain a good relationship with them so that your arrangement will be mutually beneficial. Medical equipment plays a major role in the proper treatment of patients. This is why medical professionals put extra attention when it comes to these health care supplies. Nowadays, many of these supplies and equipment can be used even outside the hospital. With these, patients can comfortably receive treatments at home or other private facilities. One of the best ways to look for these health care supplies for home use is through the Internet. There are companies that offer health products depending on your needs. However, there are a few points you need to keep in mind before you make any purchases. Lack of medical equipment at home can be tough for people who need constant medical attention. Before, patients had to endure weekly or even daily visits to the hospitals just to gain access to medical equipment. Now, with a prescription from a health care provider, they can use home medical devices with ease. People can now own medical equipment like an automatic wheelchair, a nebulizer, oxygen concentrators, electric beds, and patient lifts at home.These machines can be a bit pricey, however, so it’s important to choose a reliable supplier to avoid even costlier mistakes. Always choose a trustworthy dealer when buying medical equipment for personal use. Make sure that the equipment is new, unless you’re buying second-hand machines. They have to be durable and contain the seal of Original Equipment Manufacturer warranty (OEM). Also, learn to use the machines and other health supplies properly, with the guidance of a medical health practitioner. Caring for patients can be challenging, so you should take advantage of any help that can make the process easier. If you need more information on home medical equipment, research online for additional details. For most kids and kids at heart, riding a slam rage scooter is absolutely fun. Wanting to perform a few tricks and jumps, more and more youngsters are becoming interested in owning one. As fun and exciting as it is, though, riding a push scooter does present some risks to riders of any age. Falls from scooters are the common cause of injuries in this activity. In many cases, inexperience and the eagerness for more adventurous riding are the reason for injuries. To ensure safety in riding a scooter, here are few things you should always bear in mind. When buying a new scooter, always follow the manufacturer’s guide for age, height, and weight. Don’t forget to read the safety information that comes with the product. Moreover, make sure that your child can easily reach the handlebars and use the brakes on the scooter.Buy safety gear that fits your child’s size and weight. Before letting your kid ride the scooter, make sure it is working properly. Check the handle bars and the steering column and make sure these are securely in place. You also need to check the nuts and bolts to see that none are loose or broken. Apart from checking the scooter, teach your child to balance the scooter to prevent falls. Teaching them to steer and control the scooter is also necessary to ensure their safety. When your kid is ready to ride the scooter, have them wear the right safety gear such as helmet, knee pads, and elbow pads. Make sure that the helmet fits properly and is securely fastened. Your child doesn’t need wrist guards, as it will just make it difficult to grip the handle and steer the scooter. When it comes to footwear, sneakers or closed-toe shoes are the best choice. Traffic is very dangerous for young scooter riders. Let your kid ride on smooth and paved surfaces. Avoid uneven, rocky, or sandy surfaces. Always ride in safe places such as school yards, parks, or paved trails. When crossing the intersection, don’t let your child ride the scooter. Instead, walk the scooter or carry it across the intersection. As there are more potential dangers at dawn or night, let your child ride the slamm scooter during daytime. If they have to ride in the evening, have them wear light-coloured or reflective clothing. Always keep an eye on them and watch for hazards such as tree roots, uneven pavement, and drain covers. Your house needs regular upkeep and occasional tune-ups to stay in good condition. What began as little maintenance issues can turn into major repairs. Overlooking these problems may cause bigger liabilities in the future. Luckily, with proper house maintenance tasks, you can avoid them. After a rainy spring, check your roof. Whatever material they’re made of, your roof is your house’s first line of defense. Use binoculars to check if there are loose shingles, mildew,mold or any water damage. Do you think it’s time for a replacement? Search online for companies that offer quality roofing services. Also, inspect your basement for signs of leaks and moisture can cause fungi and rust. If you have an attic, see if there are holes or thin spots in the insulation. Remember that the temperature inside your attic should only be between 5° to 10° warmer than the air outside. Also, clean your gutters. Gutters are important as they direct rain away from your house, so keep them free from any clutter. Clean the vents behind your dryer.As winter means heavier clothes, drying them will generate more lint. Having a clean vent will help your machine to dry your clothes faster. This will save you money as it reduces the time that your dryer has to run. Keep in mind that a plugged vent can also cause a house fire. Also, check your furnace filter or heat pump and make sure it’s dust-free. Clean your chimney. To avoid moisture buildup and masonry damage, make sure to get rid of fireplace ashes. Also, remove firewood stored near your house. Examine your home’s exterior for cracks and other damage caused by harsh winter weather.If you have a garden, use a rake to remove leaves and other winter debris to prepare your soil for new growth. Doing these tasks may take some time, but don’t think of them as chores. Instead, consider them as crucial preventative measures that will help you save money. If you need more information on professional service for house repairs, like affordable roof replacements and air conditioning system checkups, you can search for companies online. Although you may feel a bit relieved after leaving a troubled marriage, you’ll still need support to get ready for the consequences of divorce. The end of a marriage can cause plenty of distress. To help you through the ordeal, you’ll need legal assistance from local divorce lawyers in West Palm Beach. There are different types of assistance you can receive, including financial help, emotional counseling, and legal advice. Legal advice is crucial, and the importance of emotional support shouldn’t be underestimated. Around 30% to 40% of those who undergo a divorce experience symptoms of depression and anxiety. You’ll also require financial assistance to educate and help you cope with managing a single household. If you are about to get your first job, you may need job training assistance as well. Look for a divorce lawyer in West Palm Beach as soon as you’re considering divorce. Obtaining legal advice early helps you get familiar with the divorce process and what you can anticipate in court. Divorce-support groups and counseling help you navigate through emotional ups and downs. Seeking financial assistance will prepare you financially for single life or single parenthood by helping you understand how you can manage your household afterwards. There are plenty of forums that provide anonymous divorce assistance in the comfort of a group sharing the same experiences. You’ll receive advice concerning the emotional and practical repercussions of divorce, as well as referrals to other valuable sources of assistance. You can also receive emotional support from self-help books, counselors, or religious leaders. Children are also greatly affected, getting emotionally and physically affected by a divorce. They’ll need your support to cope. There are several assistance programs, like Children in the Middle, which teaches parents and kids to develop the skills needed to handle divorce. A divorce carries plenty of consequences, including physical, emotional, and financial costs.Searching for a divorce lawyer and getting the assistance you need will guide you throughout the divorce process, during, before, and after.
2019-04-21T03:17:45Z
http://nettalkworld.net/2013/11/
Many people could dismiss arthritis as an easy and organic means of ageing when actually it is not. It is a severe infection; gradual yet decapitating. Arthritis has many forms and enclosed uncomfortable symptoms. Somehow, in the advent of modern-day technology and medical breakthroughs, we try to find a natural option means of fighting arthritis understanding that it is better and inexpensive yet effective. Arthritis merely means irritation of the joints. We have a number of joints inside our human anatomy, and this disorder pertains to the swelling and suffering occurring in the influenced section of somebody inflicted with it. What goes on to the influenced place is coined as "cartilage and bone gravel." Due to the overstretching of muscles which cause damage to the joints, what's remaining of the bones as well as the cartilage, could vigorously rub against one another which causes throbbing suffering as well as worsening the injury of the influenced joints. That continues to take place around and once more; it becomes a uncomfortable routine, and it gets worse around time. Although it appears to become a useless conclusion, there are plenty of option organic therapy solutions, and there is one that'll match your criteria perfectly. In this context, we want to recommend hemp seed gas pill, that is said to be "nature's many perfectly balanced gas" and "the absolute most nutritionally complete food source there is on earth ".Its water system can be used with a scoop and actually choices good. That is advised for long-term use. It has a bonus around its other alternatives since it includes a perfectly balanced fatty acid profile. Moreover, this also contains crucial fatty acids (EFA's) and gamma linoleic acid (GLA), equally that are very imperative to reaching over all perfect health. GLA (Gamma-Linolenic Acid) studies have established that hemp gas decreases the danger of heart attack and strengthens the immune defences. Are you hunting about florida water bestellen? Go to the earlier mentioned site. The primary fatty acids help decrease blood cholesterol, promote great blood movement, and assists improve over all organ function. Cannabis sativa is called as the most crucial of all crops as it has offered people with helpful delicious vegetables, gas, and medicine. Imbalances in certain fatty acids appear to be correlated to common conditions such as for example arthritis, eczema, acne, and a lot more. That further stimulates the utilization of hemp gas as it is rich in crucial amino acids and crucial fatty acids. It can also be rich in protein. It can also be utilized in cooking delicious and balanced dishes. It has a distinct mad taste to it rendering it perfect to add in your part recipes with vegetables, which can make this a must-have for vegetarians. It could also be taken within delicious dips and salad dressings. Better yet, it may be taken in its organic kind as a dietary supplement. We are all familiar with specific things like journey simulators applied to train flight pilots, but did you realize that additionally, there are specific things like forex simulators? Forex simulators, which perform very much like several PC activities which start off by providing you a situation and then placing you a goal, allow you not alone to apply trading in a secure setting without endangering anything, but also allow you to'rewind'your trading and analyze only what you got right and what you got wrong. Additionally they allow you to training trading in your time and at your personal speed and may pack days of old-fashioned instruction in to just a couple days. Here are some of the benefits of employing a forex simulation package. Learning currency relationships. Several traders have no issue understanding the functions of an individual currency but find it too difficult to become accustomed to working together with a currency pair. A simulator, but, teaches and reinforces the connection on a single currency to a different and the influence any particular one currency may have on another. Knowledge industry conditions. An understanding of the forex industry and, moreover, knowledge of how to make use of the market to your personal gain is crucial to success. Simulation upgrades traders on economic problems and news which could influence the market and shows, usually rather significantly, how economic functions may move trading currencies. This is a powerful training to learn because it is simple to evaluating when to enter and when to quit the market. Differentiating between short-term and long-term trading. By enabling you to work well with short-term and long-term trades, simulation clearly illustrates there are significant differences between to two and that forex traders usually decide to business in one or one other, although not both. Knowledge the advantages and dangers of caution. Are you hunting about mt4 simulator? Go to the previously mentioned site. All too many traders, and specially beginner traders, are also careful when trading and simulation lets you toss warning to the wind and test out placing stop deficits less tightly than you would otherwise do in live trading. Pinpointing trading preferences. Simulation may allow you to business independently or with the help of a broker and, in so performing, choose whether you prefer to involve a broker in your trading conclusions or to create your personal trading choice, based upon your personal information and guidance wanted from a variety of different respected sources. Pinpointing and placing trading strategies. One of the most important things for just about any forex trader is to set himself a trading technique and then stick to it. However, establishing the best trading technique could be difficult, and traders tend to be persuaded to change strategies thinking an option might just be more profitable. With simulated trading, you have the opportunity to test out as numerous different strategies as you wish rapidly and in a secure setting and to choose the most effective technique before you enter the entire world of live trading. The world of forex trading is equally exciting and profitable, however it can also be very harmful if you do not know precisely what you are doing. The first step for just about any beginner trader should, therefore, be to learn every thing he is able to about the currency trading earth and then be in some serious training before you begin live trading. Cell phones have become an integrated part of our lives. We can rarely consider our active living without a mobile phone which keeps us to obtain linked to our near and beloved ones. In the cellular industry, there are many mobile production organizations which are discovering their latest handsets. Some of the common organizations like Nokia, Samsung, Rim and Sony Ericsson are competitive with each other. Every one of these organizations are repeatedly engaged in taking brand new lucrative handsets to attract more and more mobile users. Samsung is the main one among these companies which may have released several successful mobile phones. T-series, E-series, M-series and A-series are a few of the popular number of Samsung gadgets. All the crooks to satisfy every sounding users is it a student, a housewife or a small business person. Besides having therefore several incorporated functions, these handsets include appealing looks. The Samsung mobile devices have eye-catching looks and can be found in different versions just like a dual slider and change open. Some of the devices with this trusted company attended with QWERTY keyboard feature. The phone such as the Samsung i907 Epix includes a TFT shade display that offers large monitor resolution. Its whole QWERTY keyboard gives comfort to an individual while writing text on the screen. If you are searching to learn more about dual sim phones, go to the earlier mentioned website. The memory in that telephone has room enough to store a large number of contact numbers, picture documents and video files. Because the phone is preloaded with GPRS, EDGE and HSCSD knowledge transfer features, you can move information from this system with ease. The WAP 2.0 HTML Net browser of this thin device facilitates quickly Web accessibility. Its two megapixels camera allows you to capture photographs and supplies a quality of 1600 x 1200 pixels. With this specific camera, it's possible to also record wonderful instances in the proper execution of the movie file. The stuck strong battery with this cellular phone enables an individual to enjoy the conversation for long hours without any interruption. The telephones like C6620, F268 and i740 are extremely sophisticated devices including a music person and media player features in them. Any music sweetheart could absolutely like to own such telephones which offer unrivalled audio experience. An individual may enjoy remarkable functions in these cellphones apart from this audio features. You can find the step by step information regarding the Samsung cell phone discounts; you can go to the trusted Net websites. The devices from this important cellular manufacturing organization can be found with pay as you move, agreement and SIM free deals. If you should be concerned with the regular phone expenditure, then you can certainly select pay as you get Samsung phones. This way you are able to avoid large monthly bills at the month end. This is good for students or people who want to check their repeated contact rate. These to will also be simple to replenish as top-ups that are available very conveniently. Working people mainly choose contract telephones to prevent normal refilling of a phone. You can get cost-effective offers to truly save his or her precious income through on the web retailers. If one isn't interested in opting Samsung products with the above mentioned stated two offers, he is able to go for SIM free phones. With SIM free telephone one isn't destined to decide on any particular mobile with any unique network provider. There are numerous online stores which give several desirable offers to customers. The agreement Samsung products are available with beautiful offers and gifts. To avail such advantages one will look for Websites and contrast web portals wherever people can buy their favorite Samsung phone at most readily useful probable rate. If you are perhaps not interested in any contract package, then these internet sites give alternatives for you really to select pay as you move telephones or SIM free phones. Here, you obtain complete freedom to decide on your system provider. The internet comparison companies facilitate the customers to have a correct choice. Select any of the best Samsung cell phone discounts to savor hassle-free communication. What is kitesurfing? Effectively a dictionary definition could possibly record it as an is "a floor water activity that employs the wind to pull a rider through the water on a tiny kiteboard" but that is actually missing the point. Kitesurfing is about the rider using a kite and its force to primary them over the outer lining of the water utilising the same simple theory as sailing. The rider is attached to the kite via a harness that offers balance and control over the kites way and speed. You can kitesurf on most open regions of water which may be heavy or low, peaceful or rough and when possible with regular winds of between 8 and 50 knots. To have the ability to kitesurf you will demand certain skills. The very first and possibly most important is the capability to fly and get a grip on the kite, which will be your main source of propulsion. When the capability to fly a kite has been perfected the rider must then learn to experience the panel and use the kite to move them throughout the water area by flying a kite in the proper region continually to produce enough force to move equally rider and kiteboard. After the rider has become successful at the fundamental, they could test more complicated manoeuvres such as for example gets and tricks. Due to the nature of the game and their associated flexibility, there is no limit to the range of the manoeuvres and tricks that may be achieved. It is price going out that kitesurfing may be harmful to both kitesurfer and different users of the water and encompassing parts, with this specific in mind it's important that individuals thinking about the activity first get skilled instructions from a kitesurfing school. Are you hunting about kiteboarding greece? View the earlier described site. Effectively first allow look at the kite itself, it's not one particular plastic and bamboo efforts you enjoyed on the seaside as a young child that for sure. In kitesurfing, the kite is the method of space, it's the engine and needs to be able to get wind. To achieve this, the kite uses a platform to include rigidity; the framework is frequently produced from inflatable tubes, stable battens or a double layer of cloth. This provides the kite a mobile layout which helps keep a repaired shape. Inflatable kites are far more frequent because they are regarded easy to re-launch after an accident to the water. Many kites are managed by bars which include a "depower" system which decreases the kites angle of connecting to the wind, thus finding less wind and reducing power. Bars are also more suited to one-handed cycling which provides the kite surfer more scope when performing tips and jumps. Connecting the bar to the kite is attained by a method of lines made from non-stretch materials. Several lines and difficulty range with regards to the form of kite, but usually you can find four or five lines with a typical amount of 23 meters. Kitesurfing harnesses come in several forms, seats with knee loops, middle or vest. The harness connects to the get a handle on club and takes nearly all any risk of strain used via the kites display the rider's arms. There's a large number of kitesurfing boards available on the market, but typically the most popular are multi-directional double idea board, symmetrical boards. Boards have sandal form base straps that fix the rider to the table; the rider may remove and add these very easily. Kitesurfing panels are of an identical structure as snowboards with high compression cores and harder rails. Most serious injuries that occur while kitesurfing is due to being lofted to the air or drawn uncontrollable causing collisions with hard objects including sand, water, houses and power lines. Sure, it is possible to severely injure yourself colliding with water from top at rate! Lofting and hauling frequently occur in excessive weather situations, therefore a good comprehension of the elements is just a must. You need to also have a stream place downwind of any difficult or dangerous things to give yourself enough response time. Never kitesurf alone, generally have a buddy and watch on each other. Ultimately acquire some kitesurfing teaching, it's the only way to begin and enjoy kitesurfing, and there are lots of good schools giving kitesurfing lessons. Anyone who runs a business must have access to industrial cleaning services, as this allows you to focus on other aspects of your business while keeping the premises clean. These industrial services vary in scope, so you will want to take a look and find the company that will do the most for you. You will also want to find a company that will handle your equipment cleaning, as this remains a vital part of keeping your business running smoothly. Every industrial site needs to be cleaned, as things get dirty and if this dirt is allowed to escalate, it can lead to the equipment breaking down prematurely. To keep things running smoothly, you will want to make sure that it is as clean as possible. Industrial cleaning is an essential service for these companies, so make sure that you have the industrial services that you need. The first thing that many industrial cleaning companies will do is bring in a high-pressure water system. These water systems allow the experienced operators to clean in areas that they cannot reach, which ensures that you will have a complete clean every time. There are some different nozzles that these water systems use, with each nozzle being used to clean a different area. You will want to find an experienced cleaning company to handle this cleaning for you because they will know which nozzles to use in which areas. Using an incorrect nozzle could damage the equipment and, therefore, should be avoided. Vacuum loading is another important aspect of industrial cleaning since it allows cleaners to remove harmful materials from confined spaces. This includes getting dust and other substances out of air vents, as this will affect the quality of the air in the building. Removing debris from any pits in the industrial zone is also highly important, as this debris can add up and start hindering production over time. Many industrial services require the use of these pits, so keeping them clean remains essential. If your industrial site includes a tank, it is vital that you have it cleaned on a regular basis. This aspect of industrial cleaning must involve a professional cleaner since there could be toxic materials found inside of the tank. Are you looking for commercial kitchen ducting deep cleaners? View the before discussed site. You will also want to make sure that the waste is disposed of properly, as limiting your impact on the environment should remain important. Many cleaning companies are now using robotic technology to clean these tanks, which allows them to do a thorough clean without exposing any humans to potential risks. There are many cleaning services available throughout the country who handles the cleaning work beautifully. However, residential cleaning is not the same as industrial cleaning. Residential cleaning is a small scale project and can be done by a small group of people. Industrial cleaning, on the other hand, is a large-scale project where many people are employed by the cleaning service to clean a particular industry. The cleaning products also vary with the specific cleaning project. Residential Cleaning does not need so hi-tech instruments for the cleaning of a residence. Residential cleaners have a limited job. They only have to clean the ceiling, doors, windows, floors, carpets, curtains and furniture etc which is not that big a task so they only need common cleaning products like stainless steel cleaner, surface cleaners, furniture polish, glass cleaners, scrub pads, floor cleaners, bathroom cleaners, magic erasers, broom, dustpan, vacuum cleaner, dust mop, grout brush, step ladders small toothbrush and cleaning cloths.
2019-04-23T13:54:16Z
http://foodinnovation.ca/2017/10/page/2/
Mesial temporal lobe epilepsy (mTLE) is the most common focal epilepsy in adults and is often refractory to medication. So far, resection of the epileptogenic focus represents the only curative therapy. It is unknown whether pathological processes preceding epilepsy onset are indicators of later disease severity. Using longitudinal multi-modal MRI, we monitored hippocampal injury and tissue reorganization during epileptogenesis in a mouse mTLE model. The prognostic value of MRI biomarkers was assessed by retrospective correlations with pathological hallmarks Here, we show for the first time that the extent of early hippocampal neurodegeneration and progressive microstructural changes in the dentate gyrus translate to the severity of hippocampal sclerosis and seizure burden in chronic epilepsy. Moreover, we demonstrate that structural MRI biomarkers reflect the extent of sclerosis in human hippocampi. Our findings may allow an early prognosis of disease severity in mTLE before its first clinical manifestations, thus expanding the therapeutic window. Roughly one percent of people in the world suffer from epilepsy, a disorder in which individuals experience seizures due to abnormal electrical activity in the brain. Seizures can vary from brief episodes of amnesia or déjà-vu to convulsions and loss of consciousness. In adults, the most common form of epilepsy is known as temporal lobe epilepsy. As the name suggests, this type of epilepsy originates in a region of the brain called the temporal lobe, usually within a structure called the hippocampus. Many patients who develop temporal lobe epilepsy will have experienced a head injury or infection earlier in life that damaged their hippocampus. However, damage to the hippocampus does not always lead to epilepsy. Moreover, many years may pass between the damage and the onset of regular seizures. While some patients find that anti-epileptic drugs can control their seizures, others experience no benefit. For these patients, the only effective treatment is to remove the damaged brain tissue. At present, there is no way of knowing which patients with a damaged hippocampus will go on to develop temporal lobe epilepsy. To identify the deciding factors, Janz, Schwaderlapp, Heining et al. treated mice with a toxin that can damage the hippocampus. After roughly two weeks most of the mice were experiencing regular seizures. Imaging the animals’ brains during this two week period revealed that mice whose hippocampi showed more severe cell death shortly after exposure to the toxin surprisingly developed a milder form of epilepsy. The same was also true for animals whose hippocampi showed signs of being extensively reorganized. Further experiments show that samples of hippocampal tissue from the brains of human patients with temporal lobe epilepsy also showed these same cellular features. The next step is to test whether these changes can be used to predict which patients with hippocampal damage will develop epilepsy later in life. Identifying at-risk individuals would allow them to be treated earlier and hopefully prevent them from developing epilepsy in the first place. Epilepsy is a devastating disease, with a prevalence of about 1%, which makes it one of the most common neurological disorders. Of particular clinical significance is mesial temporal lobe epilepsy (mTLE), in which seizures arise from mesial temporal limbic structures, as it is the most frequent form of epilepsy in adults (40%) and particularly resistant to pharmacological treatment (Engel, 2001). Hippocampal sclerosis (HS), characterized by the loss of CA1 and CA3 pyramidal cells, gliosis and associated with granule cell dispersion (GCD), represents the most common pathological hallmark of intractable mTLE (Thom, 2014; Walker, 2015). HS can emerge secondary to an initial precipitating insult, e.g. status epilepticus (SE), head trauma, febrile seizures or limbic encephalitis (Engel, 2001). To date, resection of the lesioned, epileptogenic tissue is the only therapeutic intervention. However, not all patients remain seizure-free (Ryvlin and Kahane, 2005). In this context, non-invasive MRI techniques have become an important method to identify sclerotic tissue as a biomarker in both human patients (Gomes and Shinnar, 2011; Urbach et al., 2014) and rodent TLE models (Nehlig, 2011; Shultz et al., 2014; Sierra et al., 2015a). Up to now, this has been, however, restricted to the chronic stage of epilepsy when seizures have already emerged. A promising notion is to start medical treatment during early epileptogenesis before the first seizure arises. This stands in contrast to current anti-epileptic treatments that target clinical symptoms, namely the seizures themselves, but do not cure the underlying disease. However, progress in this direction is impeded by the impossibility to identify patients before they develop epilepsy and experience their first seizure. In mTLE patients, the period between the initial epileptogenic insult and chronic epilepsy spans many years (Lukasiuk and Becker, 2014), severely hindering the search for and validation of predictive biomarkers in human studies. Conversely, in animal models, epileptogenesis can be induced within weeks to months (Lévesque and Avoli, 2013), providing an excellent opportunity to identify putative anatomical and physiological biomarkers of epileptogenesis. Considering that multiple cellular and molecular processes accompany the progression of HS, it may be possible to image early pathological changes during epileptogenesis that may prospect the later state. So far, a few MRI biomarkers have been identified that indicate epilepsy onset or seizure susceptibility secondary to pilocarpine-induced SE (Roch et al., 2002; Choy et al., 2010), traumatic brain injury (Kharatishvili et al., 2007; Immonen et al., 2013) or prolonged febrile seizures (Choy et al., 2014). However, since distinct unilateral HS is lacking in these animal models, prognostic MRI biomarkers for the most common etiology of pharmacoresistant epilepsy have not been identified yet. To address this issue, we applied longitudinal multi-modal MRI in the intrahippocampal kainate mouse model that replicates the major features of human mTLE (i.e. the development of HS and of spontaneous recurrent seizures during epileptogenesis; Bouilleret et al., 1999; Riban et al. (2002); Heinrich et al., 2011). We monitored distinct features of the pathogenesis focusing on the hippocampus (Figure 1—figure supplement 2), which is mainly affected in pharmacoresistant mTLE (Malmgren and Thom, 2012; Cendes et al., 2014; Walker, 2015). We performed a retrospective correlation of MRI measures with structural changes identified by immunohistology, and determined the prognostic value of imaging biomarkers with respect to the severity of HS. Moreover, we applied multivariate data analysis to evaluate and compare the performance of individual biomarkers to predict also the seizure severity. Our study demonstrates for the first time that the extent of epileptogenesis-associated tissue alterations in the hippocampus directly mirrors the ensuing severity of intractable mTLE. Little is known about the variability of histopathological changes across kainate-injected mice; yet this information is critical to relate early imaging biomarkers to HS severity in mTLE. Therefore, we quantified the degree of histopathological features associated with HS (i.e. cell death-associated microgliosis and GCD) in all injected mice individually (Figure 1). The severity of histological changes associated with HS varies in chronically epileptic mice. (A) Representative DAPI-stained sections at different levels along the rostro-caudal hippocampal axis showing the extent of GCD (arrow indicates the transition to non-dispersed regions). (B) Corresponding quantitative analysis of the GCD area along the rostro-caudal axis, and (C) the calculated mean GCD volume from all analyzed sections tested for individual kainate-injected mice (one-way ANOVA, Bonferroni’s post-test; ***p<0.001; n = 8). (D) Representative photomicrographs of NeuN (turquoise; neurons) and Iba-1 (magenta; microglia) double immunostaining (upper panel) and Fluoro-Jade B (FJB) staining in consecutive sections. Clusters of amoeboid microglia are tightly associated with FJB-stained dying neurons (arrows and asterisks). (E) Quantitative analysis of cell death-associated microglial scarring in different regions (CA1 ipsi and contra; CA3 ipsi). (F) Regression analysis for the degree of GCD and the extent of microgliosis (summed for all regions) in kainate-injected mice (n = 8; Pearson’s correlation). Kainate-injected mice (NP10, NP11, NP14, NP26, NP27, NP31, NP34) are color-coded. Scale bars in A, 1 mm; in D, 200 µm. (G) Schematic of the mouse brain adapted from Witter and Amaral, 2004. Representative EEG traces of non-epileptic mice (controls or mice displaying only single epileptic spikes, NP10) and one example of an epileptic mouse displaying both epileptic spikes and paroxysmal discharges (NP31). Horizontal scale bars (left) 50 s, (middle) 5 s, (right) 0.5 s; vertical scale bar 2 mV. (H–I) Quantitative analysis of the total GCL volume (summed for all analyzed sections) and extent of microgliosis for epileptic (dark grey) and non-epileptic mice (light grey), respectively. Student’s t-test; **p<0.01, ***p<0.001; nnon-epi = 6, nepi = 7. All values are presented as the mean ± SEM. The extent of GCD (Figure 1A–C) and cell death-associated microgliosis (Figure 1D,E) varied substantially across kainate-injected mice (nKA = 8), but was positively correlated with each other (Figure 1F; r² = 0.69, p<0.01). In addition, intrahippocampal EEG recordings validated the presence of epileptiform activity in all kainate-injected mice (Figure 1G). However, one kainate-injected mouse (NP10) had no paroxysmal discharges, even though it exhibited single epileptic spikes, and therefore it was considered as non-epileptic. All epileptic mice showed robust GCD indicated by an increase in the total GCL volume compared to non-epileptic mice (Figure 1H; non-epi.: 415.8 ± 9.6 * 106 µm³; epi.: 1379.0 ± 164.5 * 108 µm³, p<0.01) and a high spatial extent of cell death-associated microgliosis (Figure 1I; non-epi.: 563.8 ± 493.7 µm; epi.: 6965.0 ± 811.8 µm, p<0.001). To monitor the temporal development of epileptic activity another set of mice was implanted with electrodes directly after kainate injection and recorded at different time points during 2 (n = 3) or 3 weeks (n = 5) of disease progression (Figure 1—figure supplement 1). Consistent with previous studies in the same animal model (Riban et al., 2002; Arabadzisz et al., 2005; Heinrich et al., 2011), we observed prolonged seizures during SE, followed by a period exhibiting mainly isolated epileptic spikes and low-amplitude bursts. The first high-amplitude recurrent paroxysmal episodes were recorded consistently after approximately two weeks (Figure 1—figure supplement 1H; number of epileptic discharges, 1d: 0.014 ± 0.004; 0.5w: 0.002 ± 0.002; 1w: 0.036 ± 0.019; 2w: 0.240 ± 0.065, p<0.01 vs 1w; 3w: 0.274 ± 0.070, p<0.01 vs 1w). In only two out of eight mice regular paroxysmal episodes were already evident at one week after SE. In conclusion, this shows that although the speed of disease progression varies among mice, the chronic epileptic stage is reached within the second week after SE in this animal model. Considering the inter-individual histopathological differences observed in kainate-injected mice during the chronic stage of mTLE, we investigated the extent to which high-resolution T2-weighted imaging reflects SE-induced hippocampal injury and whether observed early tissue damage and anatomical changes during epileptogenesis might predict the subsequent HS severity in chronically epileptic mice (Figure 2). Initial hippocampal damage detected by T2 imaging predicts the degree of HS. (A1-6) Overview of whole-brain T2 intensity maps along the rostro-caudal axis before (pre) and at distinct time-points following kainate-induced SE (1d, 4d, 8d, 16d and 31d). (B1-6) Enlarged view of the ipsilateral hippocampus. Dashed lines denote the hippocampal fissure. Open arrows mark the GCD. (C–D, E–F) Direct comparison between T2 images and NeuN (turquoise) and Iba-1 (magenta) double-stained sections. Upper and lower panels show the septal and temporal regions of the hippocampus, respectively. Arrows indicate the transition from the dispersed to the non-dispersed GCL. (D1-3, F1-3) High-magnification confocal images corresponding to photomicrographs in D and F display the loss of neurons and accompanied microglial scarring in the CA1 region and the hilus. Principal neurons in the GCL remain intact but are highly dispersed. H, hilus; gcl, granule cell layer. Scale bars: A, 2 mm; B,E,F, 200 µm; F3, 20 µm. (G, I) Quantitative analysis of T2 changes in CA1 and the DG during epileptogenesis plotted for individual animals (left panel: controls, black, n = 5; kainate-injected mice, color-coded), and (right panel) statistically tested for the epileptic (dark grey) and non-epileptic group (light grey). Source data is provided in ‘Figure 2—source data 1'. Two-way ANOVA; Bonferroni’s post-test; *p<0.05, ***p<0.001, nnon-epi = 6, nepi = 7. Values are presented as the mean ± SEM. (H, J) Corresponding linear regression analysis of T2 intensity at distinct time points during epileptogenesis (color-coded) with region-specific histopathological changes in epileptic and non-epileptic mice (n = 13; Pearson’s correlation; corrected for multiple testing; *p<0.05, **p<0.01, ***p<0.001). T2-weighted imaging revealed a biphasic rise in hippocampal T2 intensity, characterized by a transient increase at day 1, followed by a drop to baseline at day 4 and a subsequent increase at 8 days after SE (Figure 2A,B). The early increase of T2 intensity was observed in the dentate gyrus (DG) (Figure 2I; 1d: 10.6%) and the CA1 region (Figure 2G; 1d: 26.9%; both p<0.001), whereas in the late phase it was restricted to the DG (8d: 7.8%; 31d: 7.9%, both p<0.05). Accordingly, in chronically epileptic mice both regions showed distinct histopathological changes. Extensive death of CA1 pyramidal cells was associated with dense microglial scarring (Figure 2F,F1). Moreover, hilar interneurons (Figure 2F,F3) were also lost. Dentate granule cells, however, remained intact but dispersed broadly (Figure 2F2). Importantly, 1 day following SE, T2 intensity in the CA1 region significantly correlated with cell death-associated microgliosis (Figure 2H; r² = 0.88, p<0.001). Similarly, in the DG both early (at 1 day) and subsequent T2 hyperintensities (at 8–31 days) were related to the later degree of GCD (Figure 2J). No significant change of T2 intensity was found in the piriform cortex or the amygdala (Figure 2—figure supplement 1). The dynamics of neurodegeneration during epileptogenesis were further characterized by 1H-MR spectroscopy (Figure 3). N-acetyl aspartate (NAA), serving as a surrogate marker for neurons, and the neurotransmitters glutamate and GABA were measured to differentiate between excitatory principal neurons and inhibitory interneurons, respectively. As early as 1 day following SE, the concentrations of NAA (−45.3%), glutamate (−35.1%) and GABA (−39.4%; all p<0.001) decreased substantially (Figure 3C,E,G) which was correlated with the later extent of cell death-associated microgliosis (Figure 3D,F,H; for NAA: r² = 0.89; for glutamate: r² = 0.93; for GABA: r² = 0.77; all p<0.001). In contrast to glutamate, GABA concentrations remained correlated also at day 4 (r² = 0.74; p<0.01), but this disappeared from 8 days onward, which was accompanied by a gradual increase of GABA above control values after 31 days. Conversely, NAA and glutamate concentrations remained low during subsequent epileptogenesis correlating with microgliosis. We also found an early upregulation of lactate and a delayed rise of myoinositol (Figure 3I,K), serving as markers for micro- and astroglial activation, respectively (Nehlig, 2011). However, changes in both metabolites showed weak correlations with chronic histopathological changes (Figure 3J,L). Early decline of glutamate and GABA predict HS. (A) Representative horizontal and coronal T2 images illustrating the region-of-interest in the ipsilateral hippocampus (turquoise boxes) for 1H-MR-spectroscopy. N-acetyl aspartate (NAA) served as a marker for neurons. Glutamate (Glu) and gamma-aminobutyric acid (GABA) allowed to estimate the loss of excitatory and inhibitory neurons, respectively. Lactate (Lac) and myoinositol (Myoi) were used as surrogate markers for microglial and astroglial activation. (B) Representative photomicrographs of NeuN (turquoise, neurons) and Iba-1 (magenta, microglia) double-stained sections from one saline- (control) and two kainate-injected mice exhibiting different degrees of hippocampal sclerosis (NP26, moderate; NP34, strong) for qualitative comparison with the degree of metabolic alterations. Arrow, borders of the GCD; Asterisks, cell loss and microglial scarring in CA1. Scale bar in A, 2 mm; B, 200 µm. (C, E, G, I, K) Quantitative analysis of NAA, Glu, GABA, Lac and Myoi concentrations plotted for individual mice (left panel; controls, black, n = 5; kainate-injected animals color-coded) and groups (right panel; epileptic, dark grey; non-epileptic, light grey) during epileptogenesis. Source data is provided in ‘Figure 3—source data 1'. Two-way ANOVA; Bonferroni’s post-test; *p<0.05, **p<0.01, ***p<0.001; nnon-epi = 6, nepi = 7. Values are presented as the mean ± SEM. (D, F, H, J, L) Corresponding linear regression analysis of metabolite concentrations at distinct time-points during epileptogenesis (color-coded) with the extent of cell death-associated microgliosis in epileptic and non-epileptic mice (n = 13; Pearson’s correlation, corrected for multiple comparison; *p<0.05, **p<0.01, ***p<0.001). These results show that the magnitude of initial neurodegeneration following SE, as quantified by MR biomarkers, predicts the severity of HS in the chronic stage of epilepsy. SE-induced neurodegeneration is known to trigger various cellular responses, including inflammatory processes, synaptic plasticity and migration of surviving neurons and glial cells. To probe our hypothesis that these responses might entail microstructural alterations detectable by MRI, specifically diffusion-weighted imaging (DWI), we first identified the morphological changes of granule cells and radial glia cells, two major cell populations which survive in the sclerotic hippocampus (Figure 4). We used transgenic Thy1-eGFP mice, in which a subset of dentate granule cells is intrinsically labeled by eGFP, to investigate their dendritic and axonal morphology as well as the progression of GCD. Accordingly, quantitative analysis revealed a continuous increase of the GCL width at day 7, reaching significance at 14 and 21 days after SE when compared to controls (Figure 4A,B; control: 67.8 ± 2.5 µm; 14d: 132.6 ± 13.8 µm; 21d: 168.6 ± 9.9 µm, both p<0.001). This increase was accompanied by a strong disorganization of their distal dendrites in the molecular layer, whereas proximal dendritic segments residing within the GCL became longer and appeared more organized, possibly due to traction forces mediated by GCD. Furthermore, proximal dendrites significantly thickened as early as day 7 (control: 1.54 ± 0.04 µm, 7d: 1.86 ± 0.12 µm, p<0.05), while proximal axons increased in volume only during later stages of epileptogenesis at 14 and 21 days after SE (Figure 4C,D; control: 0.70 ± 0.02, 14d: 1.15 ± 0.08 µm; 21d: 1.63 ± 0.09 µm, both p<0.001). Microstructural alterations in the DG during epileptogenesis. (A1-6 and C1-6) Representative confocal images show changes in the cytoarchitecture of the DG (double-headed arrows denote the dispersion of the GCL) and morphological features of individual eGFP-labeled granule cells, respectively (left panel: Overview; upper and lower right: High-magnification of granule cell dendrites or somata, respectively; red arrowheads, axon initial segments; red arrows, stem dendrites; red open arrows, dendritic swellings; red asterisks, degenerating granule cells. (B) Quantification of the GCL width (ncntrl = 7, n1d = 3, n4d = 5, n7d = 6, n14d = 3, n21d = 6) and (D) the diameter of initial axons and stem dendrites (ncntrl = 5, n1d = 3, n4d = 5, n7d = 4, n14d = 3, n21d = 5). (E1-6) Representative confocal z-plane images of ZnT-3 staining in the DG to determine the dynamics of mossy fiber sprouting (red arrows; ncntrl = 8, n1d = 4, n4d = 5, n7d = 5, n14d = 5, n21d = 9). Locations of granule cell somata are spared (dotted outlines). (F) Quantitative analysis of ZnT-3 optical density. (G1-6) Representative confocal images of GFAP-stained sections (upper panel) and corresponding 3D-reconstruction in the GCL (lower panel). h, hilus; gcl, granule cell layer; ml, molecular layer; slm, stratum lacunosum moleculare. (H–I) Quantitative analysis of the mean and total volume of GFAP-stained processes from radial glia cells in the GCL (ncntrl = 5, n1d = 4, n4d = 5, n7d = 4, n14d = 4, n21d = 5). All statistics were performed with one-way ANOVA, Dunnett’s post-test (compared to saline controls); *p<0.05, **p<0.01, ***p<0.001. (J, K) Representative sections stained for DAPI (turquoise) and GFAP (magenta) in controls and chronic epileptic mice (21d following kainate injection), respectively. Dashed lines denote the borders of the GCL. (L) Quantitative analysis for the optical density of GFAP in individual sections from three controls and in sections from three kainate-injected mice exhibiting weak and strong GCD (one-way ANOVA, Dunnett’s post-test; *p<0.05, **p<0.01, ***p<0.001; number of sections, ncntrl = 51, nw-GCD = 6, ns-GCD = 14). (M) Corresponding linear regression analysis for the integrated GFAP optical density and (I) the area of the GCL (Pearson’s correlation). Scale bars in A, 50 µm; in C (left), 100 µm; in C (right), 10 µm; in E (left), 100 µm; in E (right), 10 µm; in G, 30 µm; in K, 200 µm. Next, we determined the time course of axonal rearrangement within the GCL, by analyzing the optical density of ZnT3-labeled mossy fibers. A few ZnT-3-labeled profiles were already evident at days 4 and 7 in the subgranular region, but a significant increase of ZnT-3 was only detected at 14 and 21 days after SE (Figure 4E,F; control: 4.02 ± 0.50, 14d: 11.64 ± 2.39, p>0.05; 21d: 14.57 ± 2.11, p<0.001). Although sprouting of mossy fiber collaterals is impressive, it is important to note that these axons are not uniformly aligned, limiting their detectability by DWI. In contrast, processes of radial glia cells are known to radially transverse the GCL in a highly organized fashion (Heinrich et al., 2006). Accordingly, we reconstructed GFAP-labeled radial glia processes in three-dimensional space to perform quantitative morphometry. Interestingly, the mean volume of radial glia processes significantly increased as early as 4 days after SE (Figure 4G,H,I; control: 6.47 ± 1.15 µm³, 4d: 19.09 ± 0.55 µm³, p<0.001). Compared to controls this increase was further augmented at later time points during epileptogenesis (7d: 20.59 ± 1.37; 14d: 29.26 ± 4.03; 21d: 28.75 ± 2.59, all p<0.001). Moreover, the optical density of GFAP was correlated with the size of the GCL in chronically epileptic mice (Figure 4M; r² = 0.89, p<0.0001), showing that radial gliosis is tightly associated with GCD. Taken together, our results demonstrate that during epileptogenesis distinct microstructural alterations emerge at different time points within the DG: Radial gliosis starts early after SE, whereas neuronal hypertrophy, dendritic displacement and synaptogenesis accompany GCD at later stages. Next, we monitored the dynamics of microstructural alterations in vivo using DWI, in order to test whether they could predict the later extent of histopathological changes (Figure 5). Microstructural reorganization quantified by DWI during epileptogenesis predicts disease progression. (A1-6) Representative coronal sections from diffusion-weighted tractography at different time points during epileptogenesis (before injection = pre; 1d, 4d, 7d, 14d and 31d following SE). (B1-6) Enlarged images of the ipsilateral hippocampus at different levels along the rostro-caudal axis. The orientation of computed streamlines is color-coded [dorsoventral (DV), turquoise; mediolateral (ML), red; rostrocaudal (RC), blue]. (C–D) Representative tractography image and a Nissl-stained section (modified from Paxinos and Franklin, The Mouse Brain in Stereotaxic Coordinates, 2001) of corresponding brain regions for anatomical comparison. Computed fibers relate to major axonal pathways and brain regions exhibiting highly oriented dendrites (cc, corpus callosum; cp, cerebral peduncle; Cx, cortex; Dlg, dorsal lateral geniculate nucleus; ec, external capsule; eml, external medullary lamina; Hc, hippocampus; HyTh, hypothalamus; ic, internal capsule; ml, medial lemniscus; opt, optic nerve; Th, thalamus). (E, G) Enlarged tractography images demonstrating the distinct orientation of streamlines in different hippocampal layer (dashed lines; cc, corpus callosum; so, stratum oriens; py, pyramidal layer; sr, stratum radiatum; slm, stratum lacunosum moleculare; ml, molecular layer; gcl, granule cell layer; asterisks denote the region of pyramidal cell loss). (F, H) Corresponding DAPI-stained sections. Scale bars in A, 2 mm; B-D, 500 µm; H (left), 100 µm. (I, K, M, O) Quantitative analysis of DWI metrics [mean- (MD), radial (RD), axial diffusivity (AD) and fractional anisotropy (FA)] in the DG, plotted for individual mice (left panel; controls, black, n = 5; kainate-injected animals color-coded) and for groups (right panel; epileptic, dark grey; non-epileptic, light grey) during epileptogenesis. Source data is provided in ‘Figure 5—source data 1'. Two-way ANOVA, Bonferroni’s post-test, **p<0.01; ***p<0.001; nnon-epi = 6, nepi = 7. Values are presented as the mean ± SEM. (J, L, N, P) Corresponding linear regression analysis of DWI metrics at distinct time points during epileptogenesis with the total GCL volume in epileptic and non-epileptic mice (n = 13; Pearson’s correlation, corrected for multiple comparison; *p<0.05, **p<0.01, ***p<0.001). Refer to ‘Figure 5—figure supplement 1' for DWI metrics acquired in CA1. In fact, DWI reflected the extensive changes of hippocampal microstructure during epileptogenesis (Figure 5A,B), characterized by a robust increase of dorsoventrally-oriented streamlines in the GCL and a decrease in the stratum radiatum of CA1 (Figure 5E,G). Correspondingly, fractional anisotropy (as a measure of tissue organization) was increased in the DG during late epileptogenesis (Figure 5O; 16d: 19.9%, p<0.05; 31d: 28.1%, p<0.001), but exhibited an early and transient decrease in the CA1 region (Figure 5—figure supplement 1G; 1d: −17.8%, p<0.05). Direct histological analysis suggested that these changes indeed correspond to GCD and the loss of CA1 pyramidal cell dendrites, respectively (Figure 5F,H). Detailed quantitative analysis revealed that all DWI metrics (mean diffusivity, MD; axial diffusivity, AD; radial diffusivity, RD; fractional anisotropy, FA) progressively increased in the DG and exhibited similar dynamics during epileptogenesis (Figure 5I,K,M,O). Particularly, the rise of AD during intermediate disease progression showed the most reliable correlation with chronic histopathological changes: AD significantly increased as early as 8 days after SE in epileptic mice (Figure 5M; 8d: 10.6%, p<0.01; 16d: 19.9%; 31d: 18.0%, both p<0.001) and was correlated with the volume of the GCL (Figure 5N; 8d: r² = 0.68, p<0.01; 16d: r² = 0.84, p<0.001; 31d: r² = 0.66, p<0.01), suggesting that AD is sensitive to microstructural alterations associated with GCD. No significant diffusivity changes were found in the piriform cortex or the amygdala (Figure 5—figure supplement 2). Given that radial glia cells appear to enlarge and proliferate, concomitantly with the progression of GCD (Figure 5G–M), it is conceivable that dorsoventrally-directed radial gliosis might represent an early anatomical substrate affecting the DWI metrics, in particular diffusivity along the dorsoventral axis (dvD) in the DG (Figure 6). Indeed, dvD increased continuously reaching significance at day 8 (Figure 6F; 8d: 22.7%; 16d: 26.6%; 31d: 21.7%, all p<0.001) similar to the rise in AD. Importantly, from 4 days onward the magnitude of dvD as well as its calculated volume was highly correlated with the later GCL volume (Figure 6G) and the integrated density of GFAP labeling in the GCL (Figure 6J; 4d: r² = 0.61, p<0.01; 8d: r² = 0.85; 16d: r² = 0.87; 31d: r² = 0.81; all p<0.001). This suggests that radial gliosis largely affects early diffusivity changes. However, mossy fiber sprouting and reorganization of granule cells (Figure 4A–F) likely contribute to changes of DWI metrics observed during further disease progression. Radial gliosis contributes to DWI metrics. (A, C) Representative DWI tractography maps of control and epileptic mice. Dashed lines, borders of the hippocampal layers; cc, corpus callosum; so, stratum oriens; py, pyramidal layer; sr, stratum radiatum; slm, stratum lacunosum moleculare; ml, molecular layer; gcl, granule cell layer. Scale bar, 100 µm. (B, D) High-magnification confocal images of GFAP staining in the region-of-interest corresponding to A and C (indicated as white boxes). Scale bar, 30 µm. (E, H) Quantitative analysis of dorsoventral diffusivity (dvD) in the DG and the calculated volume of increased dvD, respectively, plotted for individual mice (color-coded). (F) Groups analysis of dvD for epileptic (dark grey) and non-epileptic (light grey) during epileptogenesis. Source data is provided in ‘Figure 6—source data 1'. Two-way ANOVA, Bonferroni’s post-test, **p<0.01; ***p<0.001; nnon-epi = 6, nepi = 7. Values are presented as the mean ± SEM. (I) Quantitative analysis of GFAP optical density plotted for controls (black, n = 5) and individual kainate-injected mice (color-coded). One-way ANOVA, Bonferroni’s post-test, **p<0.01; ***p<0.001, number of sections, ncntr l= 40 (8 sections from five controls each), nNP10 = 8, nNP11 = 8, nNP14 = 8, nNP25 = 8, nNP26 = 8, nNP27 = 8, nNP31 = 8, nNP34 = 8. (G, J) Linear regression analysis of dvD and the calculated dvD volume at distinct time points during epileptogenesis with the total GCL volume and the integrated density of GFAP staining, respectively, in epileptic and non-epileptic mice (n = 13; Pearson’s correlation, corrected for multiple comparison; *p<0.05, **p<0.01, ***p<0.001). In summary, our results show that during epileptogenesis microstructural reorganization in the DG identifies disease progression and predicts the later severity of GCD associated with HS. Next, we investigated the potential translational value of the observed microstructural changes as an imaging biomarker in humans based on ex vivo DWI scans and subsequent histology on resected hippocampi from seven patients with intractable mTLE (Figure 7). Quantitative DWI evaluation, however, was only feasible in five hippocampi due to limited tissue integrity and slice thickness. Validation of DWI biomarkers in human mTLE. (A1–C1) T2-weighted images of sclerotic human hippocampi from mTLE patients scanned ex vivo. (A2–C2) Corresponding FA maps (color-coded for orientation: dorsoventral, turquoise; mediolateral, red; rostrocaudal: blue). Mean diffusivity (MD) and fractional anisotropy (FA) values for CA1 and DG are denoted in the lower-left, respectively. (A3–C3) Representative NeuN staining of scanned sections. Different Wyler grades according to the severity of neuronal loss (W I: mild, W III: moderate; W IV: strong). Scale bars, 3 mm; inset, 200 µm. (D–E) Representative confocal images of hippocampal sections (Wyler I and IV) double immunolabeled for NeuN (turquoise, neurons) and GFAP (magenta, astrocytes and radial glia cells) or (F–G) NeuN and Synaptoporin (magenta, mossy fiber synapses), respectively, revealing differences in the microstructure of the human DG between Wyler grades. (D1–E1, F1–G1) GFAP and Synaptoporin staining alone. (D2–E2, F1–G2) NeuN staining displayed together with reconstructed radial glia processes and mossy fiber boutons within the GCL, respectively. (H–I, J–K) Quantitative analysis for MD and FA in CA1 and in the DG, respectively (nWI = 2, nWIII = 2, nWIV = 1; no statistical test performed). Refer to ‘Figure 7—figure supplement 1' for MRI metrics acquired lower scanning resolution. (L) Quantitative analysis for the mean volume of GFAP-labeled radial glia processes as well as (M) Synaptoporin-labeled mossy fiber synapses, (N) and for GFAP optical density as well as (O) the density of Synaptoporin-labeled profiles within the GCL (nWI = 3, nWIII = 2, nWIV = 2; no statistical test performed). (P, Q) Correlation of FA values with the GFAP optical density and the density of Synaptoporin-labeled profiles, respectively (nWI = 2, nWIII = 2, nWIV = 1; Pearson’s correlation). Similar to our results obtained in mice, human epileptic hippocampi with strong HS (i.e. Wyler grade III or IV) exhibited elevated MD and FA values in the DG, while FA was reduced in the CA1 region (Figure 7H–K). These changes could still be detected at lower spatial resolutions achievable in a clinical setting (Figure 7—figure supplement 1). Moreover, quantitative morphometry revealed that the density and volume of GFAP-labeled radial glia cell processes also increased with the Wyler grade (Figure 7L,N) demonstrating that radial gliosis accompanies HS also in humans. Conversely, only the volume but not the density of Synaptoporin-labeled mossy fiber boutons appear to increase with the Wyler grade (Figure 7M,O). Importantly, FA values in the GCL were positively correlated with the density of radial glia processes (Figure 7P; r² = 0.78, p<0.05), suggesting that DWI biomarkers sensitive to microstructural changes in the DG are applicable in intractable mTLE in humans. In our MRI dataset several biomarkers were inter-correlated (Figure 8A), presumably because they originate from similar physiological processes and/or are mathematically dependent. In order to clarify which biomarkers are interchangeable, and which are more suitable to predict the severity of histopathological changes, we performed a principal component analysis (PCA). Mapping principal components (PCs) of the biomarker dataset onto histopathological changes associated with HS, we found a strong linear relationship between PC1 and GCD (r2 = 0.86, p<0.01), microgliosis (r2 = 0.68, p<0.05) and a trend for radial gliosis (Figure 8B–D). Higher order PCs were not significantly correlated with histopathology. Control animals formed a well separated group on the PC1-axis, indicating that PC1 is not only suitable to predict the histopathological changes in the epileptic group, but also to distinguish epileptic from healthy animals. The first two PCs accounted for 58% of the variation (PC1, 38%; PC2, 20%). To estimate how much information the individual markers share with the first two PCs, we correlated each biomarker with PC1 and PC2 and identified four distinct clusters (Figure 8E). The largest cluster was especially interesting due to its strong correlation with PC1 (r2 = 0.73, black variables). In fact, a subset of biomarkers of this cluster was remarkably close to PC1 = 1, comprising early changes (T2 in CA1 and 1H-MR for NAA, glutamate and GABA), but also intermediate changes (DWI metrics) during epileptogenesis. Early alterations in diffusivity grouped into a separate cluster (white variables) and were represented almost exclusively by PC2. Conversely, changes in myoinositol, early and late lactate or FA, and intermediate GABA (light grey variables) were represented by PC1 (negative correlation) and PC2 (positive correlation). Similarly, intermediate NAA, glutamate and FA as well as early-to-intermediate changes of T2 intensity in the DG were correlated with PC1 and PC2 (dark grey variables; positive correlation with both PCs). PCA-based evaluation of MRI biomarkers. (A) Correlation matrix of imaging parameters used for PCA. Only data of kainate-injected mice was analyzed. Positive and negative correlation coefficients are color-coded in red and blue, respectively. (B) Pearson’s correlation analysis of PC1 scores and total GCL volume, (C) extent of microgliosis and (D) radial gliosis (i.e optical density of GFAP in the GCL) in epileptic mice (color-coded, n = 7). Controls (grey, n = 5) are plotted but not included in the analysis. (E) Correlation plot showing the similarity of individual MRI variables with PC1 and 2. Clusters of variables, indicated as numbers, are grey scale-coded. Arrows denote the population vector of the corresponding cluster. Coefficients are indicated as circles (small = 0.5; large = 1.0). Finally, we tested whether our PCA-validated MRI biomarkers also relate to the seizure burden in chronic stages of mTLE. Therefore, we identified seizure-like episodes (Figure 9A; spike-and-wave trains >10s) in intra-hippocampal EEG recordings of epileptic mice (n = 6) using an automated algorithm. Across animals we found a considerable variability with respect to their individual seizure frequency (Figure 9B; NP11 = 0.73 ± 0.09; NP14 = 0.47 ± 0.11; NP25 = 0.30 ± 0.05; NP27 = 0.73 ± 0.01; NP31 = 0.64 ± 0.10; NP34 = 0.45 ± 0.04 seizure-like episodes / min). Correlating the seizure frequency with PC1 revealed an inverse relationship between both parameters (Figure 9; r² = 0.94, p<0.01), suggesting that our identified biomarkers are also predictive for the seizure severity in chronically epileptic mice. PCA-verified biomarkers predict the seizure severity. (A) Representative EEG recordings from the ipsilateral hippocampus showing three examples of identified seizure-like episodes. Scale bars: Horizontal 5 s, vertical 2 mV. (B) Quantitative analysis of seizure-like episodes for individual epileptic mice (color-coded; note that EEG data is lacking for NP26). One-way ANOVA, Bonferroni’s post-test, *p<0.05, **p<0.01, number of recordings: nNP27 = 5, nNP11 = 7, nNP31 = 5, nNP14 = 4, nNP34 = 5, nNP25 = 7. Values are presented as the mean ± SEM. (C) Pearson’s correlation analysis of PC1 scores and the frequency of seizure-like episodes (n = 6). In summary, our PCA results corroborate the idea that T2-weighted imaging and 1H-MR spectroscopy are useful tools for early prognosis (1–4 days after the precipitating insult) of later epilepsy severity, whereas DWI is informative at subsequent stages of disease development. The present study provides a comprehensive, time-resolved analysis of MRI biomarkers for pharmacoresistant mTLE. The identification of biomarkers and their prognostic value was based on the variable severity of histopathological and pathophysiological changes among intrahippocampally kainate-injected mice. Importantly, this well-regarded mTLE model replicates all the major pathological hallmarks of the human disease (Bouilleret et al., 1999; Lévesque and Avoli, 2013), comprising SE-induced acute unilateral hippocampal cell loss, progression of HS and network reorganization, as well as the emergence of spontaneous recurrent seizures in the chronic epileptic stage. Although the initial epileptogenic insult triggering mTLE in humans is apparently different (Lukasiuk and Becker, 2014), HS is the common pathology in both human mTLE and animal models (Wieser and ILAE Commission on Neurosurgery of Epilepsy, 2004; Thom, 2014), and is thought to be critically involved in seizure generation (Pallud et al., 2011; Krook-Magnuson et al., 2015; Walker, 2015). Similar to the human pathology, we found inter-individual differences in the disease severity of epileptic mice, determined by the degree of pyramidal cell death-associated microgliosis and GCD, as well as the frequency of paroxysmal episodes in chronic epilepsy. In a parallel set of experiments we also show that these seizure-like events typically occur in a highly recurrent fashion around the second week after SE, which is in line with previous observations in the same model (Riban et al., 2002; Arabadzisz et al., 2005; Heinrich et al., 2011). Thus, we consider the emergence of recurrent paroxysmal episodes at around two weeks after SE as the onset of the chronic phase. Remarkably, during the first two weeks – typically considered as the latent phase - the dynamics of DWI metrics in the hippocampus, its histopathological reorganization and the development of epileptic activity appeared similar. We would like to emphasize, however, that it was unfeasible to directly relate MRI changes to the progression of epileptic activity, since chronically implanted electrodes would have massively interfered with MRI measurements. Probing our hypothesis that initial SE-induced hippocampal damage might predict later histopathological severity, we performed longitudinal high-resolution T2-weighted imaging and 1H-MR spectroscopy at 7T using a mouse brain adapted cryo-coil. We found an acute and transient increase of hippocampal T2 intensity. Accordingly, previous studies have shown that pyramidal cells and hilar neurons are massively lost 1 day following SE (Heinrich et al., 2006; Marx et al., 2013), demonstrating the spatial and temporal specificity of the observed T2 hyperintensity with respect to cell death. In line with our interpretation, increased T2 intensity is thought to represent acute cell loss, subsequent edema, and gliosis (Jackson et al., 1993; Wall et al., 2000). An acute rise of hippocampal T2 intensity had already been demonstrated at 4.7T by Bouilleret et al. (2000) following intrahippocampal kainate application, however, the authors did not assess their prognostic value with respect to disease severity. Our present analysis reveals that this signal increase predicts the degree of later HS. Similarly, early T2 changes were also found in the hippocampus of pilocarpine-injected rats predicting its volume reduction in chronic stages of epilepsy (Choy et al., 2010). In contrast, pilocarpine-injected mice exhibited increased hippocampal T2 values after the first week of epileptogenesis, indicating that the extent and time course of SE-induced hippocampal damage also depends on the disease model (Kharatishvili et al., 2014). Beyond animal studies, transient T2 hyperintensity was reported in children 3 or 5 days after experiencing prolonged febrile seizures (Scott et al., 2002, 2003; Shinnar et al., 2012). Importantly, this rise of T2 intensity predicted the emergence of HS in longitudinal studies, but its relation to epilepsy onset is yet unclear (Provenzale et al., 2008; Lewis et al., 2014). Given that T2 hyperintensity is not inevitably linked to cell loss (Dubé et al., 2004; Thom et al., 2005), 1H-MR spectroscopy represents a practical complementary method to monitor tissue damage. Reduced NAA levels can successfully identify the sclerotic hippocampus in both human epilepsy patients (Ng et al., 1994; Hetherington et al., 2002) and animal models (Tokumitsu et al., 1997; Gomes et al., 2007; Filibian et al., 2012), which is in line with our results showing an early and long-lasting decrease of NAA in the epileptogenic hippocampus. Moreover, we show that, as early as 1 day following SE, reduced NAA correlated with the extent of cell loss-associated microgliosis. In addition, we quantified alterations in the concentration of the major neurotransmitters synthesized in excitatory principal cells (glutamate) and inhibitory interneurons (GABA). Both neuron populations are known to be substantially diminished in the sclerotic hippocampus (Marx et al., 2013; Thom, 2014). Consistent with these findings, we found that glutamate and GABA rapidly decrease following SE. However, one has to bear in mind that during and early after SE dramatic changes occur in the hippocampus, including cerebral edema and compensatory changes that affect 1H-MR metrics at early time points after injury. Similar to NAA, the early decrease of glutamate levels was long-lasting and predicted the degree of HS. Conversely, GABA levels increased again at 8 days onwards. Taking into account that hippocampal neurodegeneration is thought to be progressive in rodent mTLE (Pitkänen et al., 2002; Nairismägi et al., 2004); and own unpublished observations and in human patients (Kälviäinen et al., 1998; Briellmann et al., 2002a), both long-lasting glutamate decline as well as the restoration of GABA levels following SE appear counterintuitive. We hypothesize that during epileptogenesis the sprouting of glutamate and GABA-producing mossy fibers (own unpublished observations) likely obscures ongoing neurodegeneration on the molecular level. Accordingly, microstructural reorganization subsequent to hippocampal cell loss was monitored by DWI determining the speed and orientation of water diffusion along biological membranes (Mori and Zhang, 2006) for example of axonal fibers (Harsan et al., 2010, 2013). In the epileptic hippocampus of several rodent epilepsy models DWI successfully identified changes of water diffusion, which is discussed to primarily relate to mossy fiber sprouting and reorganization of myelinated axons (Kharatishvili et al., 2007; Kuo et al., 2008; Laitinen et al., 2010; Sierra et al., 2015a, 2015b; Salo et al., 2017). However, it is important to note that the above mentioned epilepsy models do not fully reflect the histopathological hallmarks of pharmacoresistant mTLE (i.e., unilateral HS including GCD) complicating a translation to the human disease. Using the intrahippocampal kainate mouse model we demonstrate that the degree of HS-associated microstructural alterations can be predicted by the progressive increase of diffusivity in the DG as early as 4 days following SE. Similar results were obtained in epileptic rodents, either after traumatic brain injury or after systemic pilocarpine injection (Kharatishvili et al., 2007, 2014), suggesting that DWI biomarkers identified in our study are robust among different models. In rats undergoing traumatic brain injury the increase of hippocampal mean diffusion spans approximately three months (Kharatishvili et al., 2007), indicating a longer duration of disease progression in this model. Conversely using pilocarpine-injected mice, Kharatishvili et al. (2014) showed that the apparent diffusion coefficient in the hippocampus increased within the first week following SE, predicting the spiking frequency, however, the relation to seizure frequency remained unclear. Moreover, several studies using systemic epilepsy models also revealed T2 or diffusivity changes in the piriform cortex or the amygdala (Roch et al., 2002; Choy et al., 2010, 2014; Kharatishvili et al., 2014), suggesting that in these animal models both, the hippocampus as well as extrahippocampal brain regions sensitive to excitotoxic injury are affected. We did not observe these changes, highlighting the key role of the lesioned hippocampus in driving epileptogenesis in the intrahippocampal kainate mouse model. As discussed by Gomes and Shinnar (2011), an attractive biomarker should ideally infer the progression of epileptogenesis and not only its presence. Indeed, DWI changes in the DG steadily progressed over the first 2 weeks of epileptogenesis, resembling the aggravation of epileptiform activity during this period (Heinrich et al., 2011). Importantly, the fact that early MRI biomarkers are strongly correlated to later biomarkers makes epileptogenesis as a whole predictable. Early changes (i.e. cell death identified by T2 and 1H-MR) might scale more or less linearly to the later disease development (i.e., microstructural reorganization monitored by DWI), however, it remains to be determined whether different MRI dynamics might also reflect different times of seizure onset. Given this interconnectivity of MRI biomarkers, our PCA results validate early changes in T2, 1H-MR and subsequent changes in DWI metrics as highly prognostic for both, later HS severity and seizure frequency. Interestingly, PC1 is positively correlated with histopathological changes associated with HS, but negatively with seizure frequency. This data indicates that more severe early hippocampal injury and subsequent tissue reorganization lead to the development of stronger HS and lower seizure burden, compared to a milder, but still epileptogenic insult. We hypothesize that hippocampal damage needs to exceed a certain threshold until epilepsy develops, whereas further cell loss might attenuate epilepsy severity because fewer neurons are able to participate in seizure generation. Investigating the anatomical correlates of DWI changes further, our in-depth morphological analysis clearly suggests that the early (4 to 8 days) rise of DWI values is largely driven by radial gliosis, whereas in later stages (8 days onward) neuronal hypertrophy, mossy fiber sprouting and translocation of granule cell dendrites might also contribute. Our results are in line with Budde et al. (2011) and Salo et al. (2017) showing that FA increases with glial scarring in the perilesional cortex following cerebral trauma or the CA3 region following SE, respectively. The notion that changes in DWI metrics are influenced by gliosis is further supported by our observation that DWI changes in the DG were accompanied by T2 hyperintensity, known to correlate best with the number of local glia cells (Briellmann et al., 2002b). Conversely, in systemic epilepsy models reorganization of myelinated fibers in the molecular layer, but not of local astrocytes, appear to effectively drive DWI changes in the DG, particularly with respect to FA and AD (Salo et al., 2017). Considering that in these models GCD is not present, we conclude that the region-specific orientation of glial cells in the DG and their reorganization during GCD formation is critical to affect DWI metrics. Accordingly, as a prerequisite for radial glia cells to affect diffusion anisotropy, they traverse the GCL perpendicularly and respond quickly to epileptiform activity with hypertrophy, branching and proliferation (Heinrich et al., 2006; Sierra et al., 2015c). In turn, we show that processes of these glia cells are still dorsoventrally organized in the dispersed septal DG, thus contributing to the observed increase in dvD, AD and FA. Indeed, we demonstrated that FA in the DG of human mTLE patients relate to the increase of radial gliosis at higher Wyler grades. Our finding is supported by previous studies revealing that the radial glia processes traverse the GCL and are correlated with the extent of GCD and HS in patients (Fahrner et al., 2007). Moreover, our analysis demonstrated that MD and FA are inferior to AD and dvD regarding their ability to predict HS-associated microstructural reorganization in the DG. Previous animal studies attributed increased diffusivity and anisotropy to mossy fiber sprouting (Kharatishvili et al., 2007; Parekh et al., 2010) and reorganization of myelinated fibers (Laitinen et al., 2010), but in these studies histological validation was performed only in the chronic stage of epilepsy. Our histological analysis expands this view revealing that significant mossy fiber sprouting is restricted to the later stages of epileptogenesis (around 14 days onward), which is consistent with previous observations for the CA2 region (Häussler et al., 2016). Although it is well conceivable that mossy fiber sprouting alters DWI metrics during this period, earlier changes (4 to 14 days) particularly of AD and dvD likely correspond to radial gliosis. In vivo DWI studies performed in human mTLE consistently reported an increase of MD, but a decrease of FA in the sclerotic hippocampus (Thivard et al., 2005; Salmenpera et al., 2006; Liacu et al., 2010) which can be explained by the expansion of the extracellular space secondary to cell death and the subsequent loss of tissue organization. However, these studies addressed diffusivity changes in the whole hippocampus, disregarding the differential effects of neuronal reorganization in hippocampal subfields (Janz et al., 2017). Consistent with this notion, we found an opposing trend of FA values for the CA1 region and the DG in resected hippocampi from mTLE patients with high Wyler grades. Similarly, in epileptic mice we encountered an initial decrease of FA in the CA1 stratum radiatum, but an increase in the GCL, clearly demonstrating the importance of hippocampal subfield imaging with respect to DWI biomarkers. However, one has to bear in mind the high spatial resolution used to detect these subfield-specific changes. Our DWI protocol employed a planar resolution of 60 × 60 µm² to image the mouse hippocampus spanning a cross-sectional area of about 2.5 × 1.5 mm². In contrast to our setup optimized for the mouse brain, a clinical setup might reach 800 µm isotropic resolution in a 1 hr scan using state-of-the-art imaging sequences at 7T (Heidemann et al., 2012). Considering the much larger cross-sectional area of the human hippocampus (about 8 × 8 mm²), it should become feasible to retrieve accurate DWI metrics from hippocampal subfields in a clinical setting. Indeed, degeneration of the perforant path in aging humans has already been shown at 3T (Yassa et al., 2010). Moreover, imaging of subfield-specific pathology in human TLE was successfully performed at 3T and at 7T at planar resolutions of 1000 × 1000 µm² and 500 × 500 µm², respectively (Goubran et al., 2016). These technical advances provide the foundation for the application of our imaging biomarkers in a clinical setting with the ultimate goal to identify and even prevent epileptogenesis before seizure onset. In this context, longitudinal MRI experiments similar to the FEBSTAT study (Lewis et al., 2014) will be essential, to determine the dynamics of hippocampal alterations in humans who just suffered from prolonged seizures (e.g., due to SE, head trauma, febrile seizures or encephalitis). These studies would require repeated MRI measurements over many years, starting with short intervals early after the initial precipitating injury and lasting until the first clinical seizures arise (Figure 9—figure supplement 1). MR measurements would need to rely on multiple imaging modalities to integrate the most promising MRI biomarkers evaluated in the present study (i.e., T2 hyperintensity in CA1, changes in hippocampal NAA, glutamate and GABA levels and AD, dvD and FA increase in the DG). We propose that the quantitative relationship between these biomarkers will be highly informative for the course of epileptogenesis and may allow a prognosis for subsequent disease progression and early pharmacological intervention. Experiments were performed on adult (9–12 weeks) male C57Bl/6N wildtype (Charles River, Sulzfeld, GER) or transgenic Thy1-eGFP mice in which eGFP is expressed under the control of the Thy1 promoter (RRID:IMSR_JAX:007788, M-line, C57BL/6 background; Feng et al., 2000). Each animal represents an individual experiment, performed once. A total of 13 wildtype and 25 transgenic mice were used for longitudinal MRI experiments and complementary histological investigation at individual time points, respectively. Additionally, 8 Thy1-eGFP mice were used for longitudinal EEG recordings. Mice were kept at room temperature (RT) in a 12 hr light/dark cycle providing food and water ad libitum. All animal procedures were in accordance with the guidelines of the European Community’s Council Directive of 22 September 2010 (2010/63/EU) and were approved by the regional council (Regierungspräsidium Freiburg). Mice received a single, unilateral kainate injection into the hippocampus as described previously (Heinrich et al., 2006; Häussler et al., 2012). In brief, anesthetized mice (ketamine hydrochloride 100 mg/kg, xylazine 5 mg/kg, atropine 0.1 mg/kg body weight, i.p.) were stereotaxically injected with 50 nL of a 20 mM kainate solution (Tocris, Bristol, UK) in 0.9% saline into the right dorsal hippocampus (coordinates relative to bregma: anterioposterior = −2.0 mm, mediolateral = −1.5 mm, and relative to the cortical surface: dorsoventral = −1.8 mm). Controls were injected with 0.9% saline. After recovery from anesthesia, behavioral SE was verified by observing mild convulsions, chewing or rotations. Four mice, which died between the fourth and sixth day following kainate injection, were excluded from the study. Seven resected hippocampal specimens from mTLE patients (mean age: 36.8 ± 8.8 years) were used in this study. All patients had experienced pharmacoresistant complex partial seizures and underwent amygdalohippocampectomy to achieve seizure control. Patients were treated according to the Epilepsy Surgery Program of the University Medical Center Freiburg. Informed consent was obtained from all patients. Tissue selection was approved by the Ethics Committee at the University Medical Center Freiburg. Classification of Ammon's horn sclerosis was carried out by a clinical neuropathologist according to Wyler (Hermann et al., 1992): Grade 1, slight (<10%) or no loss of pyramidal cells in the cornu ammonis 1–4 (CA1-4); Grade 2, gliosis and moderate loss (10–20%) of CA1, CA3 and/or CA4 pyramidal cells; Grade 3, gliosis with >50% pyramidal cell loss in CA1, CA3 and CA4, but sparing CA2; Grade 4, gliosis with >50% pyramidal cell loss involving CA1-4. All MR measurements were performed on a 7T preclinical MRI system equipped with a mouse head adapted 1H transmit-receive CryoProbe (MR system: BioSpec 70/20, software ParaVision 6.0, Bruker, Ettlingen, Germany). For animal handling, a dedicated mouse bed (Bruker) was used that provided a three point-fixation system (tooth-bar and ear-plugs), isoflurane anesthesia and stabilization of the body temperature of the mice. Respiration was measured by a pressure sensor and isoflurane anesthesia (1.5%) was adjusted to keep the respiration rate at 50–60 breaths/min during the scans. At the beginning of each session, a B0 field map (isotropic resolution 0.3 × 0.3 × 0.3 mm3) was acquired and used to improve the B0 field homogeneity inside the mouse brain (calculation of the local map-based shims), followed by adjustments of the local frequency and reference power (flip angle). This process was repeated a second time to optimize the B0 field inside the brain (linewidth of the whole brain water signal 30–50 Hz). For spectroscopy the B0 field was optimized according to the region-of-interest (line width of the unsuppressed water signal inside the voxel 8–12 Hz). A RARE sequence was used with the parameters: TR 3 s, TE 50 ms, RARE factor 4, matrix 440 × 256, (interpolated) in-plane resolution 29 × 29 µm², interpolation factor in the read and phase directions 1.4, 22 slices, slice thickness 0.4 mm, NA 6. The acquisition time 828 s was prolonged by respiratory triggering to ≈20 min. Differences in the distance from the brain to the surface transmit-receive coil induce inhomogeneous acquired signal intensities between scans. To eliminate this effect all images were normalized by equalizing the mean intensity in the ipsilateral thalamus. All acquired images and a labeled mouse brain atlas (Australian Mouse Brain Mapping Consortium AMBMC, University of Queensland, AUS) were registered to one reference data set (Richards et al., 2011) using FLIRT (RRID:SCR_002823, FSL toolbox, FMRIB, Oxford, UK). Subsequently mean signal intensities were quantified in hippocampal subfields using MATLAB (MathWorks, Massachusetts, USA). 1H-MR spectra were acquired from two voxels (2 × 1.4 × 1.4 mm3) located in the septal part of the ipsi- and contralateral hippocampus, respectively. The parameters of the PRESS sequence were: TR 2.5 s, TE 20 ms, acquisition bandwidth 5000 kHz, 2048 points, VAPOR water suppression, working chemical shift offset −2.5 ppm, NA 400, drift and eddy current correction in ParaVision 6.0, acquisition time 1000 s. The spectra were quantified by LCModel (RRID:SCR_014455, S. Provencher, LCModel Inc., Ontario, CAN) and absolute concentrations were calculated using the unsuppressed water signal as reference. In naive mice, the standard deviations (Cramér-Rao lower bounds) of the relevant compounds were <15% [NAA 3%; glutamate 3%; GABA 8%; myoinositol 4%; lactate 11–14%; full width at half maximum 0.033 ppm and signal-to-noise ratio (SNR) 28]. For DWI, a spin-echo EPI sequence was used with the parameters: TR 2.5 s, TE 33 ms, matrix 220 × 128, in-plane resolution 58 × 58 µm2, interpolation factor in the read and phase directions 1.4, 22 slices, slice thickness 0.4 mm, 3 segments, NA 6, 3 non-diffusion-weighted images, 30 diffusion-weighted images, diffusion gradient duration 2.5 ms, separation 14 ms, b = 1000 s/mm2. The acquisition time of 1485 s was prolonged by respiratory triggering to 45–60 min. Movements during the scan caused by frequency drifts and actual head motion were corrected by registration of the images to the first non-diffusion weighted image using FLIRT (FSL toolbox). Subsequently the diffusion tensor and corresponding DWI parameter maps (MD, AD, RD, dvD and FA) were calculated. In addition, the extent of the diffusion tensor ellipsoid in the DV direction was calculated as measure for the diffusivity in the DV direction. Registration of images to a reference data set and registration of a labeled brain atlas was done as described in the previous section. Additionally, a microstructural streamline model was reconstructed from the measured high angular resolution diffusion data using a tractography method based on a global optimization approach (Reisert et al., 2011). This method globally estimates the optimal structural configuration of connected line segments whose influence on water diffusion best matches the measured MR data. For ex vivo DWI of human hippocampal tissue, a 3D spin-echo EPI sequence was used with the parameters: TR 4 s, TE 80 ms, 4 segments, matrix 98 × 98×10, isotropic resolution 200 × 200 × 200 µm3, 5 non-diffusion weighted images, 50 diffusion directions, 2 b-values: 1000 and 2000 s/mm2, diffusion gradient duration 30 ms, separation 38 ms, NA 1, acquisition time 4 hr and 40 min. Stronger diffusion weighting was applied because the fixation of the tissue (see below) decreases the diffusivity substantially (Sun et al., 2005; Hui et al., 2008). A longer duration of the diffusion gradients was chosen to achieve gradient conditions that would also be realizable in clinical MRI systems. Visual inspection of the acquired images revealed no frequency drift or motion of the sample during the scan. Accordingly, no motion correction was applied. For quantification of DWI parameters in specific hippocampal subfields, regions-of-interest were manually selected in each sample according to the subfields identified by immunohistochemistry. Some methodological factors might influence the obtained results. The most relevant aspects concern the quantification of the metabolite spectra and the set of diffusion tensor imaging (DTI) acquisition parameters. There are commonly two different approaches for metabolite quantification, one quantifies metabolite ratios, for example the ratio to total creatine (creatine plus phospho-creatine, CrPCr), and the other quantifies absolute values using water as reference. As SE led to massive cell loss, creatine (and other metabolites) may be altered and not necessarily suitable as a reference. Therefore it was decided to use water for absolute quantification. This may be affected by edema in the tissue, but we found no systematic change of all metabolites that matched the time-course of T2 intensities that could be explained by changes in the water reference. The ratios NAA/CrPCr and glutamate/CrPCr (data not shown) also showed persistent decreases demonstrating that the observed changes were also present independent of the water reference. In diffusion measurements there is always a tradeoff between desired features – high resolution, strong diffusion weighting (b-value) and many diffusion directions – and the resulting acquisition time and SNR. For in vivo measurements, acquisition time is critical, necessitating some tradeoffs. This study focused on alterations within the hippocampus, in which much finer structures are present in transverse slices than along the longitudinal axis. Thus, we also utilized an anisotropic voxel geometry. Choosing an isotropic voxel geometry with the same in-plane resolution would drastically reduce the SNR while adding comparatively little information. It has even been shown that in DTI an anisotropic analysis, averaging noise along a rather homogeneous direction and reducing partial volume effects, could lead to increased sensitivity of detecting pathology (Van Hecke et al., 2010). For in vivo DTI a b-value of 1000 s/mm2 and 30 diffusion directions is in the optimal range. Although fiber tracking approaches generally benefit from higher b-values und more diffusion directions, higher b-values would have led to low SNR and several studies have validated the results of the applied tractography method using similar acquisition schemes (Harsan et al., 2013; Anastasopoulos et al., 2014; Horn et al., 2014). For EEG recording after MR measurements (31 days after saline or kainate injection), mice were anesthetized and were stereotaxically implanted with platinum-iridium wire electrodes (Ø 125 µm; World Precision Instruments, Berlin, GER) in both hippocampi. Coordinates relative to bregma: anterioposterior = −2.0 mm, mediolateral = +1.4 and −1.4 mm, and relative to the cortical surface: dorsoventral = −1.6 mm. Two stainless-steel screws implanted above the somatosensory cortex were used as reference and ground. Subsequently, mice were connected to a miniature preamplifier (Multi Channel Systems, Reutlingen, GER). Signals were amplified (1000-fold, bandpass 1 Hz to 5 kHz) and digitized (sampling rate 10 kHz; Power1401 analog-to-digital converter; Spike2 software, RRID:SCR_000903, Cambridge Electronic Design, Cambridge, UK). Mice were recorded at five consecutive days, 2–3 hr each day, to check for epileptiform activity. For longitudinal EEG recordings, eight mice were chronically implanted with platinum-iridium wire electrodes into the ipsilateral hippocampus directly after kainate injection and recorded (same parameters as described above) at 6 hr, 1 d, 3–5 d, 6–7 d, 12–16 d and 17–21 d after injection. Epileptic discharges identified by trains of high-amplitude population spikes (≥5 s; see Figure 1—figure supplement 1E,F) were quantified by two blinded observers using Spike2. The mean of the values obtained by both observers was used for statistical analysis. Each mouse represents the biological and the number of recordings per mouse the technical replicate. Only recordings from electrodes located in the molecular or granule cell layer (verified in DAPI-stained sections) were used for further evaluation. Prior to analysis, artifacts were removed by visual inspection of the LFP trace. Epileptiform discharges were detected by a custom algorithm that had been validated by a human observer on a different data set (sensitivity: 0.87, false positives/min: 1.9). Detection performance on our data-set was checked for each recording on individual subsets of hits. We regarded trains of epileptiform discharges as ‘seizure-like episodes’ when lasting longer than 10 s. Mice were anesthetized 36 days after kainate injection and transcardially perfused with 0.9% saline followed by 4% paraformaldehyde in 0.1 M phosphate buffer (PB; pH 7.4) for 5 min. Postfixation was performed in the same fixative overnight at 4°C. Brains were subsequently cut (coronal plane, 50 μm) on a vibratome (VT1000S, Leica, Bensheim, GER). Each mouse represents the biological and the number of brain sections per mouse the technical replicate. Resected human specimens were first trimmed to blocks of about 5 mm thickness and subsequently immersion-fixed in 4% paraformaldehyde in 0.1 M PB overnight at 4°C, transferred to 30% sucrose at 4°C overnight, shock-frozen and finally stored at −80°C. Prior to ex vivo DWI scans, tissue blocks were thawed in 0.1 M PB at RT. For subsequent histology, tissue blocks were further cut into 100 µm serial sections on a VT1000S vibratome (Leica). Each resected hippocampus represents one biological and the number of sections per hippocampus the technical replicate. For immunofluorescence staining, free-floating serial sections were pre-treated with 0.25% TritonX-100 in 1% bovine serum albumin for 1 hr (mouse) or 2 hr (human). Subsequently, serial tissue sections were incubated with the following primary antibodies at 4°C for 24 hr (mouse) or 48 hr (human): Guinea pig anti-NeuN (1:500; RRID:AB_2619988, Synaptic Systems, Göttingen, GER), rabbit anti-ZnT-3 (1:2000; RRID:AB_10894885, Synaptic Systems), rabbit anti-Synaptoporin (1:1000; RRID:AB_2619748, Synaptic Systems), rabbit anti-Iba-1 (1:1000; RRID:AB_839504, Wako Chemicals, Neuss, GER) or rabbit anti-GFAP (1:500; RRID:AB_10013482, Dako, Hamburg, GER). For detection, Cy2-, Cy3- or Cy5-conjugated secondary donkey anti-guinea pig or goat anti-rabbit antibodies (1:200; RRID:AB_2340462, RRID:AB_2338000 and RRID:AB_2307385, Jackson ImmunoResearch Laboratories Inc., West Grove, USA) were used. All secondary antibodies were applied for 3 hr (mouse) or 12 hr (human) at room temperature followed by rinsing in 0.1 M PB for 6 × 15 min (mouse) or 6 × 1 hr (human). Counterstaining was performed with DAPI (4‘,6-diamidino-2-phenylindole; 1:10.000, Roche Diagnostics GmbH, Mannheim, GER). Sections were mounted on glass slides and coverslipped with ProLong Gold (Molecular Probes, Invitrogen, Carlsbad, USA) the next day. Fluoro-Jade B (FJB, Millipore, Schwalbach, GER) staining was performed to monitor cell death. Sections were mounted on gelatin-coated glass slides and incubated with 0.06% potassium permanganate solution for 15 min followed by 0.0004% FJB solution for 30 min. Sections were then rinsed in xylene and coverslipped with Hypermount (Thermo Fisher Scientific, Dreieich, GER). To quantify the severity of HS, two parameters (cell loss in CA1-3 and GCD) were investigated using an AxioImager2 microscope (Zeiss, Göttingen, GER). Using a 10x objective (Plan-APOCHROMAT, Zeiss), photomicrograph composites were acquired with a digital camera (MR605, Zeiss) from Iba1- and/or DAPI-stained sections, processed with Zen software (RRID:SCR_013672, Zeiss) and analyzed with Fiji ImageJ software (RRID:SCR_002285, Schindelin et al., 2012). The individual extent of pyramidal cell death was estimated by measuring the spatial extent of microgliosis in the cornu ammonis, since activated, amoeboid microglia build a dense scar tightly restricted to the region of pyramidal cell loss (Figure 1D). For each mouse eight to twelve Iba-1 stained sections were categorized into five levels (L1-5) according to the rostocaudal axis: Approximate coordinates relative to bregma, L1 = −0.9 to −1.6 mm, L2 = −1.6 to −2.3 mm, L3 = −2.3 to −2.9 mm, L4 = −2.9 to −3.6 mm, L5 = −3.6 to −4.0 mm. The mean length of microglial scarring was calculated for each level and summed up. The degree of GCD, which is characterized by a broadened cell layer and reduced cell density, was assessed by measuring the area of the GCL in DAPI-stained sections (Figure 1A) and calculating the overall volume, taking in to account the slice thickness of 50 µm. Since the number of available sections varied across mice (51 ± 7 sections), possibly due to slightly different brain sizes or non-uniform shrinking of perfused tissue, we normalized the rostocaudal axis to 2500 µm (50 sections per animal x 50 µm slice thickness). This ensured that correlations with MRI measures actually represent their relationship to HS-associated anatomical changes rather than the variability in the number of sections. In addition, we estimated individual degree of radial gliosis by quantifying the optical density of GFAP in the GCL of the septal hippocampus (see parameters below) using Fiji ImageJ, followed by multiplying its mean with the calculated GCL volume. Considering that GCD is not present in more temporal regions of the kainate-injected hippocampus, the mean of GFAP control values was used for calculating its integrated density in the non-dispersed GCL. Microstructural alterations in the DG were analyzed by confocal laser scanning microscopy in MR-scanned wildtype mice and in complementary experiments using transgenic Thy1-eGFP mice. For each animal, four to eight confocal stacks were acquired in two sections with an Olympus FV10i (Olympus Deutschland, Hamburg, GER) at high resolution (60x oil-immersion objective, 1024 × 1024 pixels; 4x frame-average; confocal aperture 1 airy unit; z-step size: 0.5 µm). Laser power and detector sensitivity were kept constant for each staining to allow comparison between samples. For quantitative morphometry, image stacks were transferred to Imaris 7.7.1 software (RRID:SCR_007370, Bitplane AG, Zurich, CH). Morphological changes of eGFP-labeled dentate granule cells (10–20 per z-stack) were investigated by measuring the diameter at three positions along the dendrite and axon segments close to the soma. Changes in the density and volume of GFAP-labeled processes from radial glia cells and Synaptoporin-labeled mossy fiber boutons were inferred by surface reconstruction of a predefined region-of-interest within the GCL (Figure 7—figure supplement 2). Additionally, for each sample the optical density of GFAP within the GCL was quantified in six to eight confocal planes taken from the section surface using Fiji ImageJ. Similarly, the amount of sprouted mossy fibers was determined by measuring the optical density of ZnT-3 within the GCL. For optical density measurements the intensity spectrum was optimized for contrast by histogram equalization to obtain quantitative values representing more the actual density of labeled profiles than differences in labeling intensity itself. Due to the apparent anatomical changes in the kainate-injected hippocampus blinded observation was unfeasible. However, all analyses were performed semi-automatically, and both MRI and histological data were collected independently and combined subsequently to avoid a putative bias. Data was tested for statistical significance with Prism five software (RRID:SCR_002798, GraphPad Software Inc., La Jolla, USA). Comparison of two groups was performed with an unpaired Student’s t-test (two-tailed). When more than two groups were compared either one-way ANOVA followed by Dunnett's or Bonferroni’s post-test, or two-way ANOVA followed by Bonferroni’s post-test were used to correct for multiple comparison. Significance thresholds were set to: *p<0.05, **p<0.01, ***p<0.001. For all values, mean and standard error of the mean (SEM) are given. Correlations were tested using Pearson’s correlation (slope significantly non-zero, confidence interval set to 95%, corrected for multiple comparisons). PCA was performed with Python (RRID:SCR_008394, Python Software Foundation, Beaverton, USA). All statistical results are summarized in Supplementary file 1. The MRI dataset has been made available (https://osf.io/7gmvn/). American Journal of Neuroradiology 35:291–296. Mesial temporal lobe epilepsy: what have we learned? Magnetic Resonance in Medicine 58:230–235. Journal of Magnetic Resonance Imaging 16:477–483. Brain Structure and Function 219:683–706. The Journal of Physiology 593:2379–2388. Neuroscience & Biobehavioral Reviews 37:2887–2899. Frontiers in Cellular Neuroscience 7:167. Progress in Brain Research 135:67–83. American Journal of Roentgenology 190:976–983. The hidden causes of surgery-resistant temporal lobe epilepsy: extratemporal or temporal plus? Current Opinion in Neurology 18:125–127. Brain Structure and Function 220:781–801. Magnetic Resonance in Medicine 53:1447–1451. Neuropathology and Applied Neurobiology 40:520–543. AJNR. American Journal of Neuroradiology 21:1841–1852. In: G Paxinos, editors. The Rat Brain. San Diego: Elsevier Academic Press. pp. 637–703. Thank you for submitting your article "Early tissue damage and microstructural reorganization predict disease severity in experimental epilepsy" for consideration by eLife. Your article has been reviewed by two peer reviewers, and the evaluation has been overseen by a Reviewing Editor and Sabine Kastner as the Senior Editor. The reviewers have opted to remain anonymous. This manuscript addresses the important issue of the relationship between early neuronal damage and subsequent development of temporal lobe epilepsy in a rodent animal model of unilateral focal hippocampal injury. The experiments are well designed and the results well illustrated and carefully discussed. Multimodal imaging methods are used to determine early changes associated with the epileptogenic phase, and correlate these with cellular/tissue level changes. Correspondence is also made with similar imaging approaches in human epileptic patients. Overall these results suggest that imaging biomarkers might be critically useful biomarkers for the epileptogenic state, fulfilling an important clinical need. Epileptogenesis: The intrahippocampal KA model is technically challenging to master. In contrast to most TLE other models, there is electrographic activity in the hippocampus throughout the early epileptogenic period. Thus it can be difficult to clearly discriminate between the latent phase and the onset of the chronic phase, and this issue is not addressed. Were the electrographic characteristics of the latent and chronic phase distinct enough to discriminate between epileptogenesis and epilepsy? Please clarify these points in the Results and Discussion. Further, it would be important to reproduce these results in other models such as like the systemic KA or pilocarpine systemic model in which the onset of the chronic phase is clearer. At the very least this potential limitation needs to be adequately discussed. Hippocampus target focus: Previous studies using MRI have shown that signal changes better predicting epilepsy are not located in hippocampus but in piriform cortex (pilocarpine) or amygdala (febrile seizures). The authors should justify why they concentrated only on hippocampus. Biomarkers: The authors propose that their findings allowed the identification of a new biomarker for predicting epileptogenesis and possibly the severity of the disease and this approach could be translated to the human disease. How would they propose to do so and how would they select their population at risk, which criteria, TBI, SE, FS, etc…? Metabolite measurement: Metabolite concentrations were determined using water as reference, yet significant edema was present in the tissue as indicated by T2 contrast. Please estimate how much that could explain the detected apparent decrease in metabolite concentrations. DG dispersion: The authors describe mossy fiber sprouting and reorganization of granule cells as potential contributing factors to Diffusion changes in DG. However, a recent study shows that myelinated axons in outer molecular layer may also contribute (Laitinen et al. Neuroimage. 2010 Jun;51(2):521-30). This should be discussed. Discussion of DWI: The authors state: "DWI successfully identifies changes of water diffusion in several rodent epilepsy modes. However, in these studies detailed histological correlation with DWI metrics is lacking". This statement is incorrect. There is a significant body of work combining high resolution diffusion MRI in hippocampus with histology in epilepsy models (see e.g. Kuo et al. Kuo Neuroimage. 2008 Jul 1;41(3):789-800; Laitinen et al. Neuroimage. 2010 Jun;51(2):521-30. Salo RA et al. Neuroimage. 2017 Mar 4;152:221-236, Sierra 2015b). DTI methods: Voxel size in DTI is far from isotropic (spaghetti voxel). Also b-value of 1000 s/mm2 can be considered relatively small for approaches going beyond conventional DTI. Please discuss influence of these on DTI and especially fiber tracking approaches. Thank you for resubmitting your work entitled "Early tissue damage and microstructural reorganization predict disease severity in experimental epilepsy" for further consideration at eLife. Your revised article has been favorably evaluated by Sabine Kastner (Senior Editor), and a Reviewing Editor. The one remaining issue is that the reporting on epileptogenesis (Figure 1—figure supplement 1) is anecdotal. No quantification is provided, nor any source data or statistical evidence to support the new findings described in the last paragraph of the subsection “Inter-individual variability of histological changes associated with mTLE”. We follow the reviewer's opinion, that the issue of discriminating between the latent phase and chronic epilepsy was not sufficiently addressed in the former manuscript. Given that chronically implanted electrodes would massively interfere with MRI measurements, we performed new experiments in another set of animals investigating the time-course of neuronal activity during the first two weeks following SE, the time span which is typically considered as the latent phase in the intrahippocampal KA mouse model. Our new data is consistent with previous observations made in the same model, showing a development from mainly isolated epileptic spikes and low-amplitude bursts to prolonged high-amplitude recurrent paroxysmal discharges over a period of approximately two weeks (Riban et al., Neuroscience, 2002, 112(1):101-11; Arabadzisz et al., Exp Neurol, 2005, Jul;194(1):76-90; Heinrich et al., Neurobiol Dis, 2011, Apr;42(1):35-47). Therefore, we consider the emergence of recurrent paroxysmal discharges at around two weeks after SE as the onset of the chronic phase. These results are presented (subsection “Inter-individual variability of histological changes associated with mTLE”, last paragraph; Figure 1—figure supplement 1) and discussed (Discussion, first, fourth paragraphs), and the Methods section was adapted (subsection “Animals”; subsection “Electrode implantation and local field potential recordings”). We also rephrased potentially misleading parts in the Introduction (last paragraph) and the Discussion (first paragraph). Moreover, in the Discussion we extended the comparison of our biomarkers with findings made in systemic epilepsy models to better delineate the reproducability of the identified biomarkers (second and fourth paragraphs). In the present study, we focused on the hippocampus since the sclerotic hippocampus represent the most common epileptogenic focus in drug-resistent mTLE (Malmgren and Thom, Epilepsia, 2012, Sep;53 Suppl 4:19-33; Cendes et al., Acta Neuropathol, 2014, Jul;128(1):21-37; Walker, Semin Neurol, 2015, Jun;35(3):193-200). A corresponding statement can be found in the revised Introduction (last paragraph). However, we appreciate the reviewer's impulse to include also other limbic brain regions (i.e. the piriform cortex and the amygdala) which are known to be vulnerable to epileptogenic insults. Therefore, we also analyzed T2 and DWI changes in the piriform cortex and the amygdala. Our findings are presented (subsection “Early neuronal cell death determines disease severity in chronic epilepsy”, second paragraph;subsection “Microstructural alterations during intermediate epileptogenesis correspond to disease progression"; Figure 2—figure supplement 1; Figure 5—figure supplement 2) and discussed accordingly (Discussion, fourth paragraph). We agree with the reviewer's suggestion and now propose an experimental design for a translational approach in the revised Discussion (last paragraph). To illustrate this approach we added a schematic to the supplementary figures (Figure 9—figure supplement 1). A common practice is to use total creatine as reference, but we refrained from this as there is no guarantee that the creatine concentration remains constant during the course of epileptogenesis. On the contrary, massive cell loss after SE inevitably leads to reduced concentrations of many metabolites. Therefore it was decided to use water for absolute quantification. The reviewer is right that several processes in the septal HC – cell death, edema and gliosis – gave rise to increased signal intensities in the T2-weighted images. Certainly these effects might also influence the water reference for the metabolite measurements. As a quantitative assessment of this is hardly possible, we can only qualitatively consider how much that influenced the metabolite quantification. The signal intensity in the images went back to baseline between the time-points day one and four after SE. As all metabolites were scaled by the same reference, this trend – increase at day 1 and decrease at day 4 – would have also been visible in all metabolites if it was purely due to changes in the water reference. Looking at several spectra we can reject this hypothesis. For instance, glutamine and alanine revealed no significant changes, creatine decreased but remained decreased and phosphocreatine decreased but returned to baseline not until day 8 (see Author response image 1). Therefore we can conclude that, although changes of the water concentration might have a small influence on the metabolite quantification, the significant portion of the concentration changes reflect the described metabolic processes. A strategy for a better quantification in the future would be to take the contralateral water concentration as reference. But this approach requires the acquisition using a volume coil, as a surface coil (like the used two-element cryo-probe) leads to different intensities depending on the loading of the respective coil-element. We additionally show (Author response image 1) some examples of longitudinal metabolite concentrations relative to creatine instead of water, demonstrating that the observed trends were also present independently of water. We have now summarized the above points in the Methods (subsection “Methodological considerations of MR acquisitions”, first two paragraphs). Although we have not addressed the reorganization of myelinated fibers in the present study, we agree that this could also contribute to diffusion changes in the DG. We therefore added this point to the Discussion (fifth paragraph). We understand that our statement is framed too drastically and does not necessarily give justice particularly to the studies the reviewer quoted. We rephrased our statement accordingly (Discussion, fourth paragraph). In diffusion measurements there is always a tradeoff between desired features – high resolution, strong diffusion weighting (b-value) and many diffusion directions – and the resulting acquisition time and signal-to-noise ratio (SNR). In our ex-vivo measurements of human hippocampal tissue, acquisition time was less critical permitting a 3D scan with 200µm3 isotropic resolution, b-values up to 5000s/mm2 and 50 diffusion directions. For in-vivo measurements time is critical and we had to compromise. This study focused on alterations within the hippocampus. In the transverse axis different layers within the hippocampus reveal much finer structures as compared to the longitudinal axis. Consequently, we also utilized an anisotropic voxel geometry. Choosing an isotropic voxel geometry with the same in-plane resolution would drastically reduce the SNR while adding comparatively little information. It has even been shown that in DTI an anisotropic analysis, averaging noise along a rather homogeneous direction and reducing partial volume effects, could lead to increased sensitivity of detecting a pathology (Van Hecke et al., Hum Brain Mapp, 2009, Jan;31(1):98-114). For in-vivo DTI a b-value of 1000s/mm2 and 30 diffusion directions is in the optimal range (Derek Jones; Diffusion MRI: Theory, Methods, and Applications; Oxford University Press, 2012). Although fiber tracking approaches generally benefit from higher b-values und more diffusion directions, higher b-values would have led to low SNR and several studies have validated the results of the applied tractography method using similar acquisition schemes [Harsan et al., PNAS, 2009, May 7;110(19):E1797-806; Anastasopoulos et al., AJNR Am J Neuroradiol, 2014, Feb;35(2):291-6; Horn et al., Neuroimage, 2014, Nov 15;102 Pt 1:142-51]. We have added a section in the Methods considering these issues (subsection “Methodological considerations of MR acquisitions”, last paragraph). We followed your request and performed a quantitative analysis of our longitudinal EEG data. We added these results to the revised manuscript (subsection “Inter-individual variability of histological changes associated with mTLE”, last paragraph; Figure 1—figure supplement 1G, H) and described the analysis in the Methods section (subsection “Electrode implantation and local field potential recordings”, first paragraph). The detailed results of the statistical testing have also been added to Supplementary file 1. We thank Andrea Djie-Maletz and Enya Paschen for excellent technical assistance and Dr. Thomas Lange for useful advice on MRI data analysis. This work was supported by the German Research Foundation as part of the Cluster of Excellence ‘BrainLinks-BrainTools’ within the framework of the German Excellence Initiative (grant number EXC 1086 to JK, JH, UE, PL, and CAH); by the ERA-Net (grant number NEURON II CIPRESS to CAH); by the Bundesministerium für Bildung und Forschung (grant number FKZ 1GQ0830 to UE), co-financed by the European Union/European Regional Development Fund (UE). Human subjects: Informed consent was obtained from all patients. Tissue selection was approved by the Ethics Committee at the University Medical Center Freiburg. Animal experimentation: All animal procedures were in accordance with the guidelines of the European Community's Council Directive of 22 September 2010 (2010/63/EU) and were approved by the regional council (Regierungspräsidium Freiburg). © 2017, Janz et al. New insights into epilepsy: Listen to Carola Haas talk about how early changes in the brain can predict disease severity.
2019-04-19T13:01:41Z
https://elifesciences.org/articles/25742
As you can tell I have been having a bit of a play around on my blog and fancied a bit of a change – a bit like decorating. I will be updating my blogroll as a lot of the sites I used to follow are sadly no more or do not blog anymore. There seems to be quite a few people who have given up recently and I really enjoyed their blogs but I can understand the time pressures of life get in the way and I think once you have a gap it is hard to get back into the routine of blogging – I know this from experience having had a good year off in 2016. One of the hardest parts is not so much writing on your own blog but having to catch up with the news on everyone else’s. So much had happened in that year. I am continuing my quest for a simplified life and continuing the good sort out at home – and I am loving it every time I declutter a space I feel a sense of the whole place feeling lighter and more manageable. I even felt I needed to do my blog as well and perhaps get rid of any clutter that has collected here so you may see things disappearing along the tabs as these have never worked for me – I may keep the craft tab as it is a record of the few things I manage to make at Christmas. As I am simplifying and trying to pare down to the bare minimum we need (or really want to keep in the case of items that are more sentimental than useful) I am starting to ‘beautify’ each area. I am not sure this is the right descriptive word for what I am doing but it is close enough. In essence I am looking at each space I clear and the decorative quality of how my possessions are displayed and how it makes me and the room feel. Rather than going out shopping for anything new I am firstly shopping at home – reviewing what I already have then swapping things around a bit, putting decorative items together in different rooms. Our new ‘guest room’ is coming along slowly but progress is being made and we are still planning that it will be ready in November for my mum’s visit to go Christmas shopping. OH has now dismantled the 1980’s MFI mirrored sliding wardrobes and a very nice man has been to measure up to fit new ones which will also have sliding doors because of the tight space. I was amazed at how much bigger the room looks without the wardrobes but wardrobes are a bit of a necessity and this is the only place that is suitable to put them. They will be slightly shorter in width but slightly deeper in-depth and so we have had to move the double socket a bit more to the right and then repair the wall. Whilst doing this a new double socket has been added on the other end of the same wall and the bed will fit comfortably between them. We have also had the single socket on the window wall made into a double. Six sockets should surely be enough for anyone and any amount of technology/electrical appliances in the future. With that job done we are now moving on to filling the holes and cracks. There is, I can assure you, a Polyfilla for any job – fine cracks, big holes, cracks that have movement – I think we have got the whole Pollyfilla range in the garage! I had been undecided on the colours I would have for this room – the base colour will be the same soft pale grey of the previous room. The wardrobes are also grey but slightly deeper than the walls and the accent colour I first thought of was a blue probably duck egg maybe turquoise or teal, however, I have had a big change of heart and I have now settled on a soft vintage pale blush colour and natural linen. I still intend to keep the room in a Scandinavian style but with a tiny bit of blingy metallic added here and there. Sparkle is not my usual style but will suit my mum – she is not a blue fan either but loves that dusky pink colour so I think she will like the room when it is finished. Whilst in TK Max the other day I came across some pretty pink and grey patterned storage boxes which have a silver strip across the lid closure and go perfectly with my chosen colour palette. I also came away with a candle in a pink tinged silver jar. I am now looking for a bedside table of modest price – I came across a rather unusual Scandinavian style retro ones on the Sue Ryder site but they are not the right colours. So I continue to browse around. A normal week this week so I finished work on Wednesday night and then did a bit of a shop in Sainsbury’s taking advantage of any items on offer – so now one of those huge 1kg tubs of Lurpack butter sits in my fridge as it was the only one available on offer and I never buy butter at full price. Last time this happened we got the butter dish out of the cupboard and kept decanting slabs of butter into it. It is actually quite nice to have a proper butter dish on the table and the saving on buying the very large size is really good at 60p for 100 grams against 75p per 100 grams for the smaller size – I might buy this size again even though it almost fills a shelf by itself! When I came to put the food away I was too tired to do any more than just pushing it in where it would fit with the intention of sorting it out later so my first job on Thursday morning was cleaning and sorting the two fridges. We have a small under the counter one in the kitchen now 30 years old and showing its age but still going strong and a larger one in the laundry room where we keep our vegetables, salad and fruit. We invested in this a few years ago because our veg goes off quickly in either the kitchen or the garage. I still store potatoes and onions in the garage though. Whilst sorting and cleaning I decided to wash and chop some of the veg and put it into bags so that it will be ready when we want to make a meal. I don’t usually do this but the idea came to me because we already pre-prepare a large bowl of mixed fresh fruit for our breakfast and salad for our lunch or my packed lunches. So I prepared Leeks, Celery and Spring onions as I find these most time-consuming. I keep the prepared salad in these ‘handy’ containers – I nickname it our ‘Salad Bar’ – the deep one with 3 sections is great to take any combination of radish, cucumber, tomatoes, grated carrot, peppers etc but I would never put the chopped spring onions or beetroot in here as they would end up making the container smell or stain. The larger square container has a plastic rack that sits on the bottom to keep the lettuce crisp and fresh and it does seem to work. …and voila all sorted! If this works I might try to pre prepare a lot more of our veg now I have a bit more time at home. Whilst in the kitchen I moved on to cleaning the herb and spice rack. My collection of four little chickens had become a trifle dusty and some of the herbs past their best by a few years. I tend to use fresh herbs that have been frozen more than the dried ones so they end up well out of date before I get to the end and eventually smell and taste of very little. I will need to replenish some of them and also buy some of the spices I will need for bonfire night and Christmas (I did whisper that word!). There is something special about the taste and smell of the spices that mark this season – warming ginger for the Parkin and Ginger cake, mixed spice and cinnamon for the Christmas cake and cloves that will be used for my pomanders. I always buy organic when I can but find that the Whole food shops sell it in bags that are far too big a quantity for us so I get the smaller packets from Waitrose. As luck would have it a coupon has just dropped through my door for £10 off a £50 spend! I shall make a list and maybe go on Saturday when we are out and about. In between all this cleaning and clearing I managed to get our double mattress protector washed and hung on the line for a good blow before the next rain shower. …and I just love the mustard yellow seed heads bobbing around with the finely cut Monbretia petals which are a softer orange than most and contrast well against the mauve of the hydrangea. For anyone reading my last post about clippings these are my binders full of ideas – I even have one called Clippings – this is just a place to put any interesting newspaper and magazine articles about the area our cottage is in. When we had the flood we hit the local newspapers! One day soon I will go through them and try to reduce the amount. If you have been following my recent decorating posts you will know we have just finished one bedroom and are about to start on the middle bedroom which belonged to my elder daughter and now used by my mum when she comes to stay. So I thought I would show you the before pictures. As you will see it is well overdue a complete overhaul. The pictures are cheap ones bought when we ‘styled’ my mum in laws house to sell. Rather than just take them straight to charity I put them up in here but they won’t be going back as they are not really my taste. I might keep the silver frames and put new pictures in. I am clearing the room bit by bit as the wardrobes are being dismantled to make way for new ones that will hopefully be more space effective and only have two doors rather than three as at the moment there is always a bit you cannot get to easily creating pockets of wasted space. Eventually this wardrobe will give mum some hanging space when she visits and hold our out of season clothes as we will be losing six drawers. The two sets of Ikea drawers will be going up to my daughters new house with the single bed and mum will be getting a bigger double bed and this can then be used when either daughter and partners stay over too. The retro nursing chair was my mum-in-laws – it was meant for the cottage so I am having to store it here now until the cottage is ready. I am still undecided about keeping it, it needs recovering and estimates have been about £200. Once we have the new bed the chair will not fit back in here so I need to make a decision soon. Tomorrow we will be resuming our hunt for reasonably priced sliding doors – I am really out of touch with prices for furniture but the estimates we have been given seem far too high for a spare bedroom. The ones we are removing were less than £90 from MFI in early nineties! They have to be sliding doors as there isn’t enough room for opening doors in this room. Well that is my update hope your weekend goes well. This room was our younger daughter’s bedroom, part of the extension we had built above the garage in 1997, and pine was fashionable back then together with red check fabric and stencilled walls. So this is a guided tour of the before and after. I made the curtains from a duvet cover to get the look she wanted – notice how they had faded over time. After she left home it became a bit of a dumping ground and a handy place to dry the washing. We even had a settee in here for a while waiting to transport it up to the cottage. I can’t believe it got this messy – I took this picture after Christmas one year – I obviously didn’t know where to put all the new presents! …it is light and bright – the walls are a soft grey called Amonite by Farrow and Ball and the woodwork All White Eggshell. The new fitted wardrobes are from the PAX range at IKEA they are the 30cm deep ones with plain white shaker style doors and we added the white-painted wooden handles which OH lovingly made! The carpet is a little too creamy now but we have laid it back down until we finish the other rooms after which we will buy all the same colour throughout the house. Upstairs on the mezzanine – the Lloyd loom bedside cabinet belonged to my mum-in-law, a definite keeper and so the colours had to work around this. We decided not to paint the pine bed for the time being as you cannot really see the pine colour until up close. OH made this bed in our first house in 1979 so it does not owe us anything only a new mattress which we will try to find in the sales. The quilt cover is from Next it ties in the blue of the cabinet and the blue snuggly throw I found in IKEA for only £4. I am pleased with the way this room has turned out the soft grey has proved to be better than paining the room all white and in some lights actually can look white. It may not be to everyone’s taste but I love the clean spacious look – it is not too minimalist but I have been careful not to overfill the room. So two rooms finished now, we finished the family bathroom a while ago, and only four more rooms to go upstairs. Next on the list is the middle bedroom once the residence of my older daughter. This will become our main guest room and will be mainly used by my mum when she comes down to stay. At the moment we have a single bed in there but will change this for a double. There is a considerable amount of decluttering to do in here too but having already started to rid ourselves of any excess I am quite enjoying all the new space. Surprisingly, I managed to get down my pile of paper work though it took me two whole days and a lot of concentration to balance the statements, change mobile provider and file. OH signed us up to a new gas provider EDF so we are hoping for savings there and better customer service in the event we need to contact them. I also discovered in checking our accounts that more interest had been added to one or two of our ISA savings which was a nice surprise. Once the finances were back under control I decided to turn my attentions to doing more decluttering and organising and have been spending quite a bit of time reorganising the storage in the bedrooms. The new wardrobe in the recently decorated bedroom is now my linen store which has freed up space in the main wardrobe in our bedroom. As luck would have it my younger daughter, who is in North Yorkshire, is moving soon to a bigger house so she will take a lot of the excess towels and linens that I have found and don’t really need freeing up even more space. A knitted cushion made by my mum but it requires sewing together. A Xmas stocking that I found had a pin left inside lodged in the padding – this needed unpicking a little at the top edge – the pin removing and then sewing back up so I did this straight away and it didn’t even get a mention on my To-do list. It took all of 10 minutes and it must have been waiting for a few months! As we have 3 new family members now – the partners of each of my daughters and my granddaughter – I need to make three additional Xmas stockings. I have the fabric ready to make them I just need some time to get down to doing it. Bunting – left over from the wedding I have a number of cut out flags and I always intended sewing these together.The bits and pieces of fabric from the wedding bunting too small for flags will be used to make patchwork squares or strips for a memory quilt for my daughter. I bought a set of tea towels from Sainsbury’s with hens printed on intending to make a tea cosy. A silk scarf that I bought turned out to be a square with fringing all round rather than a long scarf. I was never keen on the fringing so decided to remove it – a 10 minute job and now I have a new scarf. and a pile of fringing! So out of seven sewing tasks I did 2 of them within half an hour but I need to put aside some time to complete at least the cushion cover and the new Xmas stockings very soon. Whilst all the sorting has been going on we have been putting the finishing touches to the newly decorated room. OH made the wardrobe door handles as I wanted white-painted wood and IKEA do not sell theses without the free-standing wardrobe they go with. The last coat has gone on and these have now been screwed in place. He has also put up some narrow picture ledges for the books and pictures, cut down the blind and fitted it today – we have gone for just a plain white one and are not putting curtains up again – I like the simplicity of the blind – you might think otherwise when you see it. For the time being we have put the old carpet back down. Although it is 20 years old it is still in reasonable condition but the colour looks a bit too creamy now against the cooler grey walls, however, it will be better than having dusty floorboards until all the rest of the house is done and we have the same colour carpet put down throughout. The duvet quilt cover I have bought is not what I had originally intended either – the one piece of furniture, besides the bed, that we are keeping in this room is a vintage blue Lloyd loom bedside cabinet that once belonged to my mum-in-law and it is something that I have always coveted since I first visited my mum-in-law’s house back in the seventies and now it is ours. To tie in the blue I decided on a duvet cover from Next children range called Vintage Ditsy which features a very similar blue to the cabinet amongst the pink flower print. I had not intended it to be flowery at all in this room – but there you go! Rather than me trying to describe everything I will take some photos soon. I am back at work tomorrow so it will be later this week. Promise. Meanwhile here are some photos taken whilst at the caravan the weekend before last and a progress report. We now have grass again on the seaside side of our garden – the contractors laid down new topsoil and grass seed once they finished the reconstruction of our stream bank – albeit complete with many dock leaves – but our main problem is with the rabbits eating our new plants. We extended the trellis border making it wider to accommodate some seaside plants that we bought in the summer. We are hoping they will seed and spread quickly and eventually provide a natural look along the stream bank. We have had to put chicken wire around these until either the plants recover or the rabbits get fed up and move on to something else – hopefully the docks! They seem to be leaving the Delphiniums in the Woodland walk alone this year and I have a nice clump of them – some are still to flower. I love this deep blue against the orange of the Monbrettia. There is not a lot of colour going on around the pond at the moment so I might add some late summer / early Autumn planting to rectify this next year although I often quite like to have a parts of the garden that are just restful – the pond is definitely a Spring / early summer corner. For bursts of colour you cannot beat Hydrangeas – this is one of my favourites and it really brightens up this spot by the daisy path. Back at home I now have Sweet Peas to cut at last – I planted them late and so this is the first of them – a lovely velvety deep purple with a sprig of – you’ve guessed it – orange Monbrettia – it colour coordinated so well with my mixed fresh fruits for breakfast today. During my ‘sorting out’ I discovered some instructions and directions that I had photocopied to turn into care cards – see here if you are unfamiliar with my way of dealing with this kind of information – I have now laminated these and they can be placed where I need them to refer to. Tomorrow is work again and it will be a day or two before I can get back to the decluttering. My next project is to go through the boxes in the wardrobe in the middle bedroom to reduce the amount of stored ‘stuff’ and get the room emptied ready to decorate. The wardrobe in here which has sliding doors is to be dismantled to make way for a newer version.
2019-04-21T02:23:42Z
https://wherethejourneytakesme.wordpress.com/category/homesteading/
The following piece was first published in 2001, but watching Mute Swans in High Park today reminded me of a time when I had a lot invested in these beautiful creatures. I became part of a group of “swan-watchers” who daily checked on the progress of the nesting, hatching and growth of the cygnets. For hours I would sit on the grass by a pair as they tended to what turned out to be unviable eggs. Still we sat until they were long past due, and I pinned all my hopes on those eggs hatching as a sign that my life in Vancouver would be successful. Here’s a story I wrote for the local paper about the dramatic events that unfolded in Lost Lagoon that spring. At High Park, a stand off between a male Mute Swan and a Canada Goose. I was reminded because today I spoke to a gentleman who told me that the nest of the pair of swans in Parkside pond had been upset and probably ruined by a few kids who have been regularly fishing on a log shooting out in the middle of the pond, where the pair had made their nest. It’s true that swans mourn their losses, just like humans, so I wasn’t surprised to see their forlorn behaviour today. The male kept a Canada Goose at bay, chasing it across the pond and away from the barren nest, still protecting what had been lost. The female wondered around aimlessly, only reviving herself when her partner came near. I can only hope she has more eggs to lay, though I can’t see a safe place for a nest, among the plastic bottles, discarded pizza bags and other debris. These are delicate creatures and we’ve done them a disservice by holding them captive for esthetic purposed – to beautify our parks – and thereby making them vulnerable to harm while stopping them from living out their natural lives. On June 13th, after 37 days of incubation, four cygnets were born to a pair of Mute Swans nesting in Lost Lagoon. The hatching began at 9 am when the first ball of wet, grey down tumbled out of one of the eggs. At 2:30 pm a second cygnet burst out of its shell, this one ivory coloured, with unusually pink feet and a lighter grey beak that its sibling. Evidently exhausted from their efforts to break free of their embryonic shelters, the babies napped frequently while their parents waiting patiently for five more hours until the final two beaks started poking out of their eggs. The tiny grey “twins,” as they were dubbed, toppled out within a couple of minutes of each other at around 7:30 pm. Delight and relief were immeasurable among a group of Stanley Park “regulars” who had been keeping vigil at three swan nests since mid-April, as if their very presence would send positive energy for a healthy, new generation of Lost Lagoon swans. A week later, only one cygnet remained alive, the three others were killed, eaten or drowned. In the past few years, the hatching, and rearing of swans has been precarious at best, and rumours abound among this dynamic group of wildlife watchers as to why. The Vancouver Parks board characterized this year’s cygnet hatching as a “miracle,” for more than one reason. At approximately 16.5 hectares in area, Lost Lagoon is thought to be much too small for more than one pair of nesting swans, since swans typically require an area at least the size of the whole of Stanley Park (1,000 acres) to accommodate the protectiveness they exhibit while they incubate, hatch and bring up their young. Two other female swans laid seven eggs each but all were lost, allegedly either from spoiling, predators like racoons and otters, or to humans. The four cygnets that did hatch were laid by a young mother who, at two years of age, had supposedly not yet reached reproductive maturity, since Mute Swans usually do not lay their first eggs until at least three years of age. Her partner is estimated to be in his twenties, and to never have successfully parented any young. Although swans habitually mate for life, this male’s partner died last year and it was his first mating season with a new, much younger female. Mike Mackintosh, of the Vancouver Parks Board, who has been involved with the swans in Stanley Park since the 1960s, is not concerned with their low birth rate. “The nine we have now is a much more realistic and manageable number.” In the past they were much larger in number in the park, and were kept company by a few Australian Black Swans that were subsequently stolen, and some native North American Trumpeters and Tundra Swans, that eventually moved on. The Mute Swan is perhaps the most replicated of all the swans species in art, poetry and literature, and commercially in company logos, insignias, and advertising. This is the one species most known to people, due to the fact that it was introduced to North America from England over a hundred years ago, and lives in parks, lagoons and waterways across this continent, close to urban areas. Most Mute Swans are considered relatives to the “royal” English Swans, raised along the Thames River and therefore originally the property of the British royal family, except for a sub species known as Polish Mutes, who have pink feet, compared to the black of the English Mutes and, when mated with them produce a white or light coloured cygnet rather than the usual grey. They are admired for their natural, ornamental beauty (especially when they cup their wings above their backs) and, in their semi-domesticated homes in urban settings, they have learned to have little or no fear of humans, and are therefore susceptible to their attention. The Mute Swans in Stanley Park are the descendants of the original number that were introduced from England in the park’s early history. Although the record keeping on the Stanley Park swans has been poor at best, Mike Mackintosh remembers that fifty years ago as many as seventy-five lived in the natural habitat of Beaver Lake and Lost Lagoon, which both provided plenty of what the Swans thrive on—a vegetarian diet consisting of pond weed, various grasses, and some invertebrates like insects, molluscs and tadpoles. Over the years, through natural attrition due to old age and death by predators, their numbers gradually dwindled. At certain points new swans were introduced in an effort to avoid inbreeding. The Mute Swans are distinguished from the native North American Trumpeter and Tundra Swans by their black knobs that protrude above their bright orange beaks (the knob is more pronounced in the male Mute, than the female). They are known for their territorial nature, especially during nesting periods, and in order to keep them from mixing with or moving the other species out of their migratory spots, the Mute Swans are required by law in Canada to be pinioned. This procedure, which is recommended to be done in the first 2-5 days in a cygnet’s life, but which is carried out three or four months into their life at Stanley Park, permanently prevents the swans from flight. The great debate about whether pinioning is humane or not remains unsettled, but by most accounts it is a relatively painless cut made in the wing of a young bird before it grows its flight feathers, so the swan is none the wiser about its ability to fly. The result is a bird that is perceived to be more domesticated, but which is still governed by the survival-of-the-fittest laws of nature, and any close observer of our Mutes can easily see that these two factors are in constant conflict these days in Lost Lagoon. Among the group of regulars, there are distinctions as to which members have the best interests of the swans in mind, and those who have perhaps too much of an emotional investment in them and have forgotten that they are wildlife, and not mere pets, or worse, human. The former are lovers of waterfowl and wildlife alike and respectfully observe, take photos, and chat with other nature-lovers, as well as keep the Parks Board and Stanley Park Nature House (the two on-sight organizations) informed of any harm or mischief being perpetrated on park wildlife. The latter are the repeat feeders, who believe that there is not enough natural food in the Lagoon for the swans and have taken the care and feeding of them upon themselves, sometimes to a harmful conclusion. The unofficial leader of the “swan-watchers” is a woman named Jean who, after many years of keeping an eye on park wildlife, has by far the best memory and documentation of the swans. She also knows who belongs on which side in terms of healthy and unhealthy interest in the swans, and pulls no punches when it comes to telling people not to feed them, get too close, or to please put their dog on a leash. Everyday throughout the spring during the long transit strike, she travelled from New Westminster, walking into the park from the closest Skytrain station and could be found somewhere along the Lost Lagoon path, between the three swan nests. She kept copious notes on when each swan laid which egg and likely knew more accurately than the Stanley Park Nature House staff and the Parks Board itself about when the hatching would begin. She explained to any and all that hatching was not guaranteed and that even if the cygnets hatched, they may not live to adulthood. She happily showed off her photos from last year and she spoke lovingly about how the proud parents fuss over their young, described the cygnet’s first swim, and the way they ride the lagoon on the protective backs of their mothers, their little beaks peaking out from her wings. Her enthusiasm, tinged with sadness for the lost cygnets over the years, easily ignited interest in others about the pending births. Over the course of the time of the nesting, the group grew in number. Some members were first-timers, some old-timers, and all gravitated toward Jean to learn the latest progress of the swans. By the end of May it looked like only one set of swans would produce the coveted cygnets, and “regulars” could be seen peering over the fenced-off nest closest to the causeway as the hopeful parents stubbornly tended to their eggs, although they were long past their hatching date. Soon, all focus and anticipation was directed to the four remaining eggs in the middle nest. And what had started out as a few people strolling along the Lost Lagoon’s 1 km pathway had turned into a group of people with a common interest meeting to chat about life and nature in the company of the swans. Melanie Beeson, founder of the Swan Sanctuary in Surrey, England advises that our cygnet is quite special as it is in fact a Polish Mute which, she says, tend to be more delicate. “I would say a Polish cygnet tends to need his parents that little bit more. This could be why you’ve lost cygnets in previous years.” She recommends reintroducing the cygnet sooner than later to diminish the risk of rejection. For the first time in many years, the swans basked in the limelight of media attention. The Vancouver Sun carried a daily account of the life of the cygnets, and both VTV and Global Television featured segments on them. Many regulars were reluctant to speak on camera or be quoted in print and were so protective of the swans and their story that one reporter, sensing a conspiratorial air, commented, “This is about the swans isn’t it?” What was really happening was wariness about the way ordinary people had been implicated in the media as part of the problem, and frustration with the misrepresentation of the swans as vicious, or neglectful parents. The oft quoted Ziggy Jones claims that she was misquoted in the stories. After allowing the Vancouver Sun a photo of the cygnet in its new home, she is refusing any other media access for the time being. That photo, and another one just published clearly shows the cygnet to be “ivory” the second born with white down and pink feet, who possesses the less common genes of the Polish Mute, and therefore is a rarity. “No,” says Ziggy, “it’s the second lightest one.” Several photographs taken by the regulars prove, however, that there was never a second lightest coloured cygnet in the clutch. The others were the typical grey colour, with dark beaks and black feet. All are mystified by this confusion and await the day they can actually see the young swan, whose gender also won’t be known until it is taken to the vet for pinioning in another month or so. In honour of Kate’s 31st birthday today, here’s a piece I wrote in July 2011, just after the newlyweds took their first trip abroad to Canada. The other day I tripped on a busy city sidewalk and fell in plain public view. I can only hope my skirt didn’t fly up as I landed. At the time I was too busy trying to buffer myself from too much injury to notice. Now, anyone who knows me well will tell you I’m clumsy, so tripping and falling is not all that unusual; the one and only time I’ve ever broken anything – my foot – was during a fall from two harmless and not even steep concrete steps. But, my recent tumble is different. It happened because I was trying to BE Kate Middleton. One day after the Duke and Duchess left Canada, and following days of my obsessive royal watching, I tried to emulate Kate’s flawless, confident walk. Instead of the normal cautious stride of a serial klutz, head down, carefully watching my step for any potential risks, I breezed along, head high, looking forward. I wish I could tell you my heels were too high, or my shoes were too tight, but no – nothing. Just klutziness and, well, the sidewalk might have been uneven. Something the Duchess likely never has to worry about, what with all the planning and inspections and all the practicing and coaching that goes into being a royal on display to the fawning public and unforgiving media. Well, because there’s a little bit of Kate Middleton in all of us, isn’t there? Sure, she’s a Duchess now, married to a prince who will one day helm one of the most influential monarchies around. She’ll likely produce a child who will also one day inherit the throne. Her parents are now millionaire entrepreneurs, but at the time of her birth in 1982, they were airline employees. She’s what is known in British circles as a “commoner” – not so different from the women in the crowd that lined the royal wedding route with signs on their backs reading “it should have been me.” It well could have been. Kate’s 29, born in 1982. I’m 50, born in 1960. There’s no way I could ever be her at this point in my life, but watching her reminds me of the promise that life holds in your 20s, when anything is possible, everything achievable. Life before too much heartache; thwarted dreams, lost jobs, men, parents, friends; events that can affect even the way you stand, and walk in the world. I realized, watching Kate, that I’ve developed a hunch – part weariness, part self-protectiveness. It’s been awhile since I approached my life with the confidence I once exuded, with the poise my mother insisted I learn, with the spark constantly remarked upon and admired. And, I honestly never thought life could drag me so far down that it would show in my countenance. In fact, my mantra has always been, “just keep moving forward.” Yet somewhere along the way, I stopped doing it, no matter how often I give this advice to others. Of course it didn’t immediately occur to me why the royals gripped me so strongly. But now I see that they look exactly like I used to feel. Happy, friendly, looking out, focused on the moment, ready for anything, generally game for life. Prince William is compelling enough on his own – born and bred to one day be King, adored and protected by his mom, Diana, Princess of Wales, he was probably one of the most photographed babies ever. Who can forget his silent, heartbreaking walk behind his mom’s coffin after her tragic death? We felt invested in his growing up, his success at school and his struggle to learn to live within the stricture of his destiny. We watched and waited to see who William would choose for a partner. And though we saw all the tabloid “waity Katy” fluff, depicting her as a woman he trifled with and didn’t intend to marry, when they finally became engaged after eight years of dating, living together and one very public break up, everyone began to focus not just on what Kate wore, but on who she really is. Who is this steady, calming influence on our beloved Wills? We caught glimpses of her on their wedding day – elegant and glowing, she looked to the entire world nothing but ready to become the Duchess of Cambridge, with all the attention – positive or negative, and service that is involved in being a member of the British royal family. But, it wasn’t until she stepped onto Canadian soil for her first official Royal trip abroad with her husband that we saw her true nature. Leading up to the wedding I wrote a number of feature articles on the plans and preparations and I’ll admit it, I kind of fell in love with them. Now, since I’m a journalist I’m supposed to be naturally wary, or jaded or something that I can never quite pull off. So the thing is, they looked and seemed so down to earth, that I believe I was seeing one fairly normal human being, who just happened to be born Royal and bred to be King. And one natural beauty that just happened to appear in his sphere and become the object of his affection. Some have said Kate Middleton quite strategically became Catherine, Duchess of Cambridge. That she set her sights on William at St. Andrew’s university where they both studied, and manipulated her way into his heart, that her mother helped her come up with ways to ensure she’d one day marry that prince. Tell me, though, what teenage girl doesn’t dream of marrying a prince, real or figuratively? And if you happen to live in England and are around the same age as him, sure you’d have his photo on your wall. “Harry Hunters” have had the “spare” prince squarely in their sights for years. These are girls, mostly from abroad, who enroll in British universities and then track down Prince Harry in clubs for a chance to meet him. At 20, when Prince Charles and Lady Diana were married, the younger Prince Andrew attended an Ontario boy’s school in Lakefield, where my best friend lived. We weren’t aristocracy like Diana, but we felt sure we had a chance with him. We may not have had the breeding but we did have the poise, the manners and, most important, pureness of heart. The princess dream starts early and dies hard, or never. Now, I’m not looking for a prince. One good man will do. And that’s something else about Kate and my sidewalk tumble. The dapper Prince is entirely protective of his bride. Never too far from her side, he often extends a reassuring hand to her back. Since royal protocol restricts too much, or any PDA, this is his way of letting her – and us avid watchers looking for signs of affection – know how he feels (I don’t want to even talk about the adoring and knowing looks that pass between them). They are obviously in a true partnership. They are clearly there for each other. Since stumbling is par for the course for me, I’m usually pretty good at catching myself before I fall. This time however, I walked beside a male companion – someone I’ve spent a good deal of time with, whom I trust and care for. As I began to fall, I reached out for assistance, grabbing his arm with my hand as I went down. He let it go. He didn’t catch me; he said he thought I would catch myself. Come to think of it, if there’s anything strategic about Kate Middleton’s behavior it’s that she was smart enough to leave a man who exhibited ambivalence about her. And he was clever enough to look inside his heart and out at his options, and see he had a good thing going and went back to get her. So, what I learned from Kate Middleton is something I used to know. A little thing called confidence goes a long way to achieving the rewards you want, and deserve. Is it possible to suffer a broken heart because of a failed relationship with the city of your dreams? Moving home from Vancouver almost a year ago was like saying goodbye to a lover I didn’t want to leave, but with whom I knew there’d only ever be heartache. It’s not surprising then, that I would be filled with a longing that is most times very difficult to put into words. If you haven’t lived in a place that doesn’t get ridiculously cold and, worse, barren for 6 months of the year, then it’s hard to understand what you’re missing, or even that there are liveable, viable places like that in the world to conduct your life (that aren’t resorts, I mean). If you have, then this would be the longest winter of your entire life!!! Sweet and helpful people tell me that it’s been a good winter, not too many cold snaps or snow, but that’s really besides the point for me. In October when the leaves started changing colour (admittedly pretty), and then falling off (oh dear!), I knew I was in for a long lush-less period of browning grass and cold, dark concrete, dirty, slushy snow that hangs around for eons. But I never would have anticipated the impact of it on my psyche – I guess I thought, well I was born here and survived 39 winters in a kind of desolation I never named, because I didn’t know any damn different! So, what’s the problem? Well,, I only learned to appreciate nature by waking up to its unrelenting beauty every day. It really does change your whole perspective! Lovely Desiree, my friend in Vancouver, said last night, “well, it’s raining here.” Another well-meaning friend commented, “We have our own weather issues… it’s cloudy” Um… big flippin’ deal!!! My umbrella has been sitting under my work desk for months now, and I would kill to be able to use it over dragging on coat, scarf, hat and boots for the 5th month in a row!!! My dear West Coast friends, you probably don’t know this but RAIN and cloudiness is far better. You see, it means things are green, spring comes early and it never gets all that cold. Each region of Canada has a way (and means actually) of life that is based purely on geography and climate. A road trip across the country is the best way to understand this. The things that concern us here in the centre of the universe don’t even register on the radar of rural Albertans, prairie folk, Islanders or west coast dwellers. This is the main reason why both sides of the country feel alienated, to one degree or another, by a centrist government and media. Who can blame ’em? Folks in Vancouver have impeccable shoes, hair and very clean cars. Nothing is weather-beaten. It’s one of the first things I noticed, with pleasure. By the time I left Toronto 6 years ago, I had grown to hate winter and that fact was a big influence on the decision to live in a part of our country that pretty much skips that season. I guess I forgot that part! Last week I spent a day at Canada Blooms, a gardening trade exhibit. We were shooting stories for the tv show I work on and it sure felt strange to have to go inside at this time of year to see trees, waterfalls, streaming rivulets and flowers. It was so out of context for me that some of the displays looked downright funereal. At first struck by the crowd, I soon realized I was one of them, desperate to see green, growing things; willing to drop any amount on whatever it takes to make my 2×4 Toronto garden look lush for as long as possible (AND I DON’T EVEN HAVE ONE). Here’s the crux of it: I never want to be a person who feels desperate for anything, least of all for want of a pretty flowering tree to gaze upon. But there’s also a deeper psychological issue at play here. I was brought up in a household full of extremes where I perfected the art of crisis management in order to feel any semblance of normal. To step out of the spiral I figured out that the extremes in weather too closely mirrored my early life. I had to find moderation in all things – the ubiquitous balance to which everyone here gives lip service. As crazy as it sounds, for me that included weather, maybe even started with it. I thought I had succeeded , so this winter (and the horrific heat and humidity of this past summer) have been as much a test of endurance, as a barometer of personal growth. The truth is, as beautiful as Vancouver was and is, I could never quite find a way to make it feel like home. Had I been able to conquer that I would never have left. It was truly the biggest bout of unrequited love I’ve ever experienced. Geesh, you’d think I’d be happy it’s over! Still… Spring has never been more welcome, and having said that I will rest my fruitless and exhausting comparisons and just find a way to make peace with my decision to live here. For a long time it’s been my intention to write about my time spent living in Vancouver (2000-2006) but for one reason or another I never have. Since Vancouver is my unrequited love, it might have been a bit painful for awhile. But in honour of my visit there later this month, and as a primer for it, I offer these small memory vignettes. In my freelancing writing quest in Vancouver, one magazine that I pursued had a “Take That Toronto” column. My idea was to write a short piece on how perfect everyone’s hair looked and how immaculate their shoes were. The editor wrote back telling me “Vancouverites don’t need to be told we have great style, we know we do.” Well, she told me! But if you’ve ever lived in Toronto, with its humidity, over-treated, hard water, and snow and salt then you can appreciate what I meant. I never understood the term “manageable hair” until lived in the land of soft water. It was softer, shinier and for the first time I could use “product” in it without worrying about buildup. In Toronto my hair was always BIG. That it could, or ever would be any different is one of those happy discoveries that, while not life-changing by any stretch, certainly goes a long way to making your aging self feel better. The shoe thing is just a matter of getting longer life out of a pair of shoes or boots due to little or no snow or salt. That means you’re more inclined to spend more on them, hence the well heeled feet of Vancouverites. (you could say the same about their cars actually). Moving to Vancouver coincided with the first time since I was a teen that I grew my hair long, so having it so easy to take care of was a delight. In fact, I didn’t go for a haircut until about two years in. You can read about that harrowing experience in a piece I wrote called Of Human Blondage . That’s where Martin Hillier let loose my curls – yes, curls, which I didn’t even know I owned – and showed me how to enhance them with product! Product, I might add, that washes out just fine! Now that changed my life. Let’s just say, men really like curly hair. So as I sit here with a lump of build up at the back of my head, after years of detox shampoos, extra long rinses in the shower and narrowly escaping my own threat to just cut it out and off, I am really looking forward to 5 days of great hair in Vancouver later this week! And even though I cannot afford to get my hair cut and styled for the wedding I’m attending, I do know that no matter what, my hair will feel soft and look shiny clean! No buildup!
2019-04-22T14:50:43Z
https://carlamarialucchetta.com/category/the-vault-best-of-herkind-com/
The need for programmers and other affiliated coding skills continues to rise, as the technology industry continues to grow rapidly particularly with the oncoming deluge of Internet of Things (IoT). Making the right choice is very important as coding and programming skills are highly sought after and often the highest paid job positions in tech companies. Employers across the globe will look for talent who are very knowledgeable with programming languages, skills and right education in this field. Skills such as coders or Android developers or data scientists are high in demand and employers are ready to pay handsome salaries to skilled employees. Therefore, students and professionals who are looking to build their career in the above fields need to have good knowledge of coding and programming. Depending on performance and projects in hand, the salaries of developers start from Rs. 6 lakh per annum, which increases from thereon. Objective-C is a general-purpose, object-oriented programming language that adds Smalltalk-style messaging to the C programming language and is widely used in Apple. This is a good programming code to learn for app development and to develop the Mac OS X platform. Python is a widely used high-level programming language used for general-purpose programming, as it is simple and readable. Python is the easiest coding language to learn for the first time learners. In order to become a seasoned professional, every beginner should at least know this language. Several libraries have been created for Python related to mathematics, physics and natural processing due to its use in the educational field. Tech giants like Google and Yahoo along with NASA, PBS, and Reddit use Python for their websites. C++ is a general-purpose programming language based on C language. It has imperative, object-oriented and generic programming features. Many large organisations use this programme. C Sharp is a simple, modern, general-purpose, type safe, object-oriented programming language, which is developed by Microsoft. The language is intended for use in developing software components suitable for deployment in distributed environments. It is used in a number of applications such as .NET. Java is one of the most popular, most adopted and general purpose programming language in the world among others. It is a class-based, object-oriented language and designed to be portable, which means that you can find it on all platforms, operating systems and devices. It is used to develop all kinds of Android apps, desktop apps, and video games. It is also commonly used as a server-side language for enterprise-level backend development. This programming language has long-term compatibility and developers are comfortable with Java. Pronounced as sequel, SQL (Structured Query Language) is a special-purpose domain-specific language used in programming and designed for managing data held in a relational database management system (RDBMS), or for stream processing in a relational data stream management system (RDSMS). It is top most requirements for an employer. Demand for SQL is high technologies such as MySQL, PostgreSQL and Microsoft SQL Server back businesses, universities, hospitals, banks. All Android smartphones and iPhones have access to a SQL database- SQLite- and it is certainly in popular demand. I am only writing to make you understand what a notable discovery my friend’s girl experienced browsing the blog. She discovered several details, which included what it is like to possess a great giving spirit to have many people without difficulty master chosen very confusing topics. You actually did more than our own desires. Thanks for rendering those useful, trusted, explanatory and even cool tips about this topic to Evelyn. A lot of thanks for your own labor on this web site. My daughter really loves making time for investigations and it’s simple to grasp why. I know all of the lively ways you provide priceless techniques through this website and in addition invigorate participation from other individuals about this area then our daughter is really learning so much. Take advantage of the rest of the new year. You are always performing a superb job. Thanks for all of your efforts on this website. My mother takes pleasure in going through internet research and it’s simple to grasp why. We know all about the dynamic way you present worthwhile guidelines by means of the web site and as well improve contribution from other ones about this issue while my girl is always discovering a whole lot. Have fun with the remaining portion of the year. You have been doing a pretty cool job. I definitely wanted to develop a simple message to say thanks to you for these great strategies you are writing on this site. My particularly long internet investigation has at the end been recognized with reputable details to write about with my close friends. I ‘d declare that most of us site visitors are quite endowed to live in a magnificent network with so many perfect individuals with interesting plans. I feel really fortunate to have discovered the webpages and look forward to plenty of more pleasurable moments reading here. Thanks once more for everything. My wife and i were absolutely peaceful when John managed to complete his analysis while using the precious recommendations he discovered from your own blog. It’s not at all simplistic to simply be giving out information which often many others have been making money from. Therefore we discover we now have the blog owner to appreciate for this. The type of illustrations you made, the simple site navigation, the relationships you aid to foster – it is mostly spectacular, and it is facilitating our son in addition to the family do think that concept is exciting, which is highly important. Thank you for all the pieces! I have to convey my respect for your generosity for women who absolutely need guidance on your situation. Your special commitment to getting the message up and down came to be incredibly invaluable and have surely enabled guys much like me to realize their goals. The insightful tutorial entails a whole lot to me and much more to my office workers. Warm regards; from all of us. My husband and i ended up being now cheerful that Raymond managed to do his survey through the entire precious recommendations he came across out of the weblog. It’s not at all simplistic to just happen to be offering thoughts which usually most people might have been trying to sell. And now we take into account we’ve got the blog owner to thank for this. The most important illustrations you’ve made, the simple site navigation, the friendships you make it possible to create – it’s got mostly superb, and it’s really assisting our son and us recognize that this matter is exciting, which is highly vital. Thank you for all the pieces! I want to show some appreciation to you just for rescuing me from this particular setting. As a result of researching throughout the internet and seeing ways which are not beneficial, I was thinking my entire life was well over. Being alive devoid of the approaches to the issues you have sorted out all through your report is a critical case, and those which may have adversely affected my career if I hadn’t encountered the website. Your own personal talents and kindness in touching all the things was precious. I don’t know what I would have done if I had not discovered such a stuff like this. I can at this point look ahead to my future. Thanks a lot very much for your professional and sensible guide. I will not hesitate to refer the website to any individual who ought to have direction about this subject. Thanks a lot for providing individuals with remarkably pleasant opportunity to check tips from here. It is often very good and also packed with amusement for me and my office colleagues to visit your website on the least three times weekly to read through the fresh tips you have got. Of course, I’m so always impressed considering the spectacular hints served by you. Selected 3 areas in this post are undeniably the most impressive we’ve had. Thank you a lot for giving everyone an extremely remarkable possiblity to read in detail from this site. It’s usually very amazing and packed with a lot of fun for me and my office co-workers to visit your blog a minimum of 3 times a week to see the fresh items you have. And indeed, I am actually impressed with all the amazing pointers you serve. Certain 1 facts on this page are unquestionably the most impressive we have all ever had. Needed to create you a little remark to thank you yet again regarding the great pointers you have discussed in this case. It is incredibly open-handed of people like you in giving openly exactly what a number of us would have advertised as an e book to earn some profit on their own, specifically seeing that you might well have tried it if you considered necessary. Those ideas in addition acted to be a good way to be certain that some people have the identical zeal just like mine to know more with regards to this problem. I’m sure there are lots of more pleasant situations up front for individuals who look into your site. work on. You’ve performed an impressive task and our whole community can be grateful to you. I have to voice my passion for your kind-heartedness giving support to men and women who require help with this area of interest. Your special dedication to getting the message all-around appeared to be amazingly helpful and have constantly enabled girls much like me to reach their aims. Your amazing helpful useful information indicates this much a person like me and extremely more to my office colleagues. Thanks a lot; from everyone of us. I precisely desired to say thanks once again. I am not sure what I would’ve implemented without these techniques shared by you about such a subject matter. It was before a very hard difficulty in my position, however , looking at the very professional tactic you handled the issue took me to jump with gladness. I am just happy for your support and as well , expect you are aware of an amazing job that you are undertaking teaching people via your website. Most probably you’ve never encountered any of us. I enjoy you because of all your effort on this website. My aunt take interest in engaging in research and it’s easy to see why. We learn all of the powerful tactic you produce very important tactics through the blog and therefore encourage response from some others on the area plus our favorite princess is actually becoming educated a lot of things. Take pleasure in the rest of the new year. You’re performing a pretty cool job. I not to mention my guys ended up following the great techniques found on the blog while then I had a terrible suspicion I had not expressed respect to the blog owner for those techniques. The ladies became for this reason warmed to read through all of them and now have simply been taking advantage of these things. Thank you for indeed being indeed considerate and also for going for these kinds of marvelous topics most people are really desirous to understand about. Our sincere regret for not expressing appreciation to earlier. I would like to express my appreciation for your kind-heartedness for men who should have help with in this niche. Your personal commitment to getting the message all over became pretty powerful and have frequently permitted many people much like me to arrive at their dreams. Your entire warm and helpful facts indicates a great deal to me and additionally to my office workers. Thanks a lot; from all of us. I want to show some thanks to you just for rescuing me from this type of issue. As a result of browsing through the search engines and meeting advice which are not beneficial, I assumed my entire life was well over. Being alive without the presence of solutions to the problems you’ve solved through your review is a crucial case, and the kind that would have negatively damaged my career if I had not noticed your website. Your primary understanding and kindness in maneuvering every aspect was vital. I’m not sure what I would have done if I hadn’t come across such a step like this. It’s possible to at this moment look forward to my future. Thanks very much for this specialized and sensible guide. I won’t think twice to endorse your web blog to any individual who would like assistance about this matter. I want to express my gratitude for your kindness in support of those who need help on this particular question. Your personal commitment to getting the message across became exceptionally practical and have specifically made folks much like me to realize their dreams. Your new insightful guide indicates so much a person like me and much more to my fellow workers. Thank you; from each one of us. I simply wanted to say thanks yet again. I do not know the things I would have done without those suggestions shared by you regarding my situation. It has been a fearsome situation for me, however , understanding a new specialized avenue you managed that forced me to jump over delight. I am happy for this assistance and wish you know what a great job you happen to be putting in teaching other individuals all through your blog. I’m certain you’ve never met any of us. I know this web site gives quality depending content and additional information, is there any other website which gives these kinds of information in quality? I really wanted to compose a small message to say thanks to you for all the superb secrets you are writing on this site. My rather long internet search has at the end of the day been honored with really good content to write about with my friends and family. I would point out that we readers actually are truly fortunate to be in a magnificent place with many outstanding individuals with insightful tips. I feel quite grateful to have come across the webpages and look forward to some more fun minutes reading here. Thank you once again for all the details. I intended to draft you the little bit of remark just to give many thanks yet again for these extraordinary secrets you have provided at this time. It has been certainly tremendously open-handed of you to deliver openly all that numerous people would’ve marketed for an ebook to end up making some bucks on their own, primarily since you could possibly have done it in case you desired. The smart ideas also acted like a fantastic way to recognize that other people online have similar interest like my personal own to realize lots more regarding this condition. I think there are a lot more pleasant periods ahead for individuals that go through your blog. Thanks for every one of your hard work on this web page. My mother takes pleasure in getting into research and it is easy to understand why. Almost all notice all about the compelling ways you provide sensible tips by means of the web blog and in addition attract response from other individuals on this area of interest and our favorite princess has always been studying so much. Have fun with the remaining portion of the new year. You’re the one doing a powerful job. I simply wanted to type a quick comment in order to appreciate you for all of the superb hints you are placing here. My rather long internet research has now been honored with brilliant knowledge to share with my co-workers. I would mention that many of us website visitors actually are unequivocally lucky to be in a very good community with many special people with good pointers. I feel really happy to have discovered the web page and look forward to so many more enjoyable times reading here. Thank you again for all the details. Hello, the whole thing is going sound here and ofcourse every one is sharing data, that’s really fine, keep up writing. Thanks so much for providing individuals with such a nice possiblity to read from this site. It really is very sweet plus packed with a lot of fun for me and my office mates to visit your site more than thrice in one week to learn the fresh issues you will have. And of course, I am certainly motivated with your mind-boggling solutions served by you. Certain 3 ideas in this article are unquestionably the most impressive we have ever had. I precisely had to thank you very much all over again. I do not know what I would’ve worked on without the type of tricks discussed by you concerning that subject. Previously it was a very terrifying dilemma in my position, however , viewing the very specialised strategy you handled the issue forced me to cry with delight. Now i’m thankful for the assistance and in addition hope that you really know what a great job you are always doing teaching the others by way of your web blog. I know that you have never come across all of us. Thanks a lot for giving everyone an exceptionally superb chance to check tips from this web site. It can be so enjoyable and also stuffed with amusement for me personally and my office mates to visit your web site at minimum thrice a week to learn the new secrets you have got. Not to mention, I’m so actually impressed concerning the cool tips and hints you serve. Selected 3 points in this post are undoubtedly the finest we’ve ever had. I simply wished to thank you very much once more. I do not know the things I could possibly have implemented in the absence of the hints shared by you directly on such a industry. Completely was an absolute traumatic matter in my view, but taking a look at this well-written avenue you solved the issue made me to jump over delight. I am just grateful for this assistance and in addition have high hopes you know what a powerful job you are always providing teaching some other people all through a web site. More than likely you’ve never got to know any of us. I definitely wanted to type a small remark to be able to appreciate you for these magnificent steps you are posting on this website. My extended internet research has finally been rewarded with wonderful tips to share with my friends and family. I ‘d assert that most of us readers actually are undeniably blessed to dwell in a notable website with many lovely people with insightful concepts. I feel quite grateful to have seen your weblog and look forward to tons of more brilliant minutes reading here. Thanks a lot once more for everything. I enjoy you because of all your hard work on this web page. Debby really loves conducting research and it’s really easy to understand why. We learn all about the lively tactic you offer efficient tips and tricks through the blog and in addition recommend response from the others on the situation so our favorite princess has always been being taught a great deal. Take advantage of the remaining portion of the new year. You have been carrying out a glorious job. This submit actually made my day. You can not imagine just how much time I had spent for this information! Thanks! I wanted to create you this tiny word in order to thank you again for these pleasant concepts you have shared on this page. It’s extremely generous with people like you to deliver unreservedly just what a few people would have distributed as an e book in order to make some profit for themselves, certainly now that you could have tried it in case you wanted. The tips also worked to be the great way to know that other individuals have the same dream really like my personal own to know the truth more and more in respect of this condition. I think there are lots of more enjoyable sessions ahead for many who check out your website. I and also my guys came reading through the excellent recommendations from your web page and the sudden developed a horrible suspicion I had not expressed respect to the web site owner for those tips. All of the women had been joyful to study all of them and already have quite simply been taking pleasure in them. Appreciation for turning out to be considerably helpful and also for going for variety of helpful ideas most people are really desperate to understand about. Our sincere apologies for not expressing appreciation to sooner. I wanted to draft you this very small observation to say thank you over again over the fantastic views you have discussed in this article. It’s certainly seriously generous of people like you to grant unreservedly just what a few people could possibly have distributed as an ebook to end up making some cash for themselves, most importantly now that you might have done it if you decided. These tips additionally served as a fantastic way to be sure that other individuals have the same dream really like my very own to understand a little more in regard to this condition. I’m certain there are numerous more fun moments up front for people who find out your blog post. I would like to show my thanks to you for bailing me out of this trouble. After surfing around throughout the world-wide-web and coming across methods that were not powerful, I believed my entire life was well over. Existing without the presence of answers to the problems you’ve sorted out by way of this article is a crucial case, as well as those that would have in a wrong way damaged my career if I hadn’t encountered your blog post. Your good knowledge and kindness in controlling all areas was excellent. I don’t know what I would have done if I hadn’t encountered such a subject like this. I can also at this time relish my future. Thanks very much for the impressive and effective help. I won’t hesitate to suggest your site to any person who requires care on this problem. My spouse and i ended up being so ecstatic when Raymond could round up his basic research through the entire ideas he gained out of the blog. It’s not at all simplistic just to happen to be giving out methods that many a number of people have been making money from. And now we do understand we have got you to appreciate because of that. The type of explanations you made, the simple blog navigation, the friendships you will assist to foster – it is most unbelievable, and it’s helping our son and us reason why that matter is exciting, and that is quite essential. Thanks for all the pieces! I in addition to my guys have been following the excellent recommendations from the website while immediately I got a terrible feeling I had not expressed respect to the blog owner for those secrets. My men ended up totally passionate to see all of them and already have truly been making the most of those things. Appreciate your genuinely well thoughtful and for getting certain fine subject areas millions of individuals are really desirous to be aware of. My very own honest regret for not saying thanks to earlier. I simply needed to say thanks again. I’m not certain the things that I would have achieved in the absence of the type of opinions shared by you about such a question. It was actually the frightful concern for me, however , considering this expert approach you resolved it forced me to cry with happiness. Extremely grateful for the work and as well , expect you know what an amazing job you are always putting in training most people by way of your website. I am sure you’ve never met all of us. I together with my buddies were found to be digesting the good secrets located on the blog while before long developed a terrible feeling I never expressed respect to the web blog owner for those techniques. The guys appeared to be as a result stimulated to study all of them and have unquestionably been tapping into these things. Thanks for being considerably kind and for selecting certain superior topics most people are really wanting to learn about. My very own honest apologies for not saying thanks to sooner. Thank you for all your efforts on this site. Gloria really likes working on internet research and it’s obvious why. A lot of people learn all of the lively tactic you offer sensible tactics through the web site and therefore improve participation from some others on that situation and our own princess is starting to learn so much. Take advantage of the remaining portion of the year. You are carrying out a first class job. I simply needed to appreciate you once again. I do not know the things that I would have followed without those hints shown by you concerning my question. It has been a very frightening scenario for me, however , observing the specialized technique you dealt with it took me to leap over contentment. Now i’m thankful for the advice and thus have high hopes you realize what a great job you were getting into educating men and women via your webpage. Most probably you haven’t encountered all of us. I together with my pals ended up checking the excellent information and facts located on your web page and suddenly got a horrible suspicion I had not thanked the website owner for those techniques. All the guys appeared to be consequently joyful to see them and already have without a doubt been making the most of them. Appreciate your truly being simply helpful and for making a choice on these kinds of smart areas millions of individuals are really desirous to learn about. My honest regret for not expressing gratitude to you sooner. I’m commenting to let you be aware of what a notable encounter my cousin’s daughter enjoyed studying the blog. She came to find lots of issues, including how it is like to possess a wonderful helping character to get the rest just fully understand some hard to do things. You undoubtedly exceeded readers’ desires. I appreciate you for coming up with those useful, safe, educational and even easy tips about the topic to Kate. My spouse and i felt so joyful when Emmanuel managed to complete his inquiry from your ideas he gained when using the web page. It is now and again perplexing just to always be giving out thoughts that many other folks may have been trying to sell. And we realize we’ve got the blog owner to appreciate because of that. The specific explanations you’ve made, the simple website navigation, the relationships you help engender – it’s got mostly wonderful, and it’s really helping our son in addition to our family consider that this article is satisfying, and that’s quite essential. Many thanks for everything! I want to voice my gratitude for your generosity giving support to those people who should have assistance with that issue. Your personal commitment to passing the message all over has been wonderfully advantageous and has always permitted those just like me to achieve their aims. This invaluable tips and hints implies so much a person like me and extremely more to my office colleagues. Best wishes; from everyone of us. I抦 impressed, I need to say. Actually hardly ever do I encounter a blog that抯 each educative and entertaining, and let me inform you, you could have hit the nail on the head. Your concept is outstanding; the issue is one thing that not sufficient persons are talking intelligently about. I am very comfortable that I stumbled throughout this in my search for something relating to this. inform the reality however I’ll definitely come again again. My spouse and i felt so joyous Emmanuel could finish up his research by way of the precious recommendations he was given from your weblog. It’s not at all simplistic to just choose to be making a gift of secrets which often a number of people may have been selling. We do understand we have the website owner to give thanks to for this. The explanations you have made, the simple website navigation, the friendships you will make it easier to foster – it’s got many incredible, and it is letting our son in addition to us believe that this issue is fun, and that’s especially fundamental. Thank you for everything! Thank you so much for giving everyone an extremely terrific possiblity to read articles and blog posts from this blog. It is always very useful and as well , jam-packed with a lot of fun for me and my office co-workers to visit your web site the equivalent of three times in a week to learn the new guidance you have got. And of course, we’re at all times happy with all the brilliant solutions served by you. Certain 4 points on this page are clearly the very best we’ve ever had. Thanks so much for providing individuals with an extraordinarily superb chance to read articles and blog posts from here. It really is so ideal and also jam-packed with fun for me and my office friends to visit your website at the least thrice weekly to see the latest stuff you have. And indeed, I am always pleased with the incredible inspiring ideas served by you. Some 3 ideas in this post are absolutely the most beneficial we’ve had. I am also commenting to make you know what a useful experience my friend’s daughter obtained checking the blog. She learned so many things, which include what it’s like to have a wonderful giving style to let many people really easily comprehend specific advanced subject matter. You truly exceeded our own desires. Thanks for rendering those precious, dependable, informative and also cool guidance on that topic to Jane. I am just commenting to make you know of the awesome experience my friend’s child undergone going through yuor web blog. She came to understand such a lot of issues, most notably what it’s like to have an ideal helping nature to have others clearly learn about a number of very confusing matters. You undoubtedly surpassed her desires. Many thanks for offering those useful, safe, explanatory as well as easy thoughts on that topic to Ethel. I as well as my pals have already been checking out the excellent techniques on your web blog and unexpectedly I had a horrible suspicion I never expressed respect to the web blog owner for those secrets. These men became for this reason glad to see them and have now sincerely been taking advantage of these things. Appreciation for indeed being very kind and then for making a choice on variety of useful areas most people are really desperate to be informed on. My sincere regret for not saying thanks to you sooner. Needed to compose you one bit of note to be able to say thank you as before for your incredible strategies you’ve featured in this article. It’s so particularly generous of you to deliver publicly precisely what some people could have advertised as an electronic book to get some bucks for their own end, principally now that you might well have done it if you desired. The good tips in addition served to become great way to know that some people have the same zeal just as my own to realize much more concerning this matter. I’m certain there are several more pleasant occasions ahead for many who look over your blog. I wish to show appreciation to you for rescuing me from such a condition. As a result of looking throughout the internet and coming across tricks which were not helpful, I figured my life was done. Being alive minus the strategies to the difficulties you have sorted out as a result of the blog post is a critical case, and those that would have negatively damaged my entire career if I hadn’t encountered your blog. Your good know-how and kindness in taking care of all the stuff was priceless. I don’t know what I would have done if I hadn’t discovered such a stuff like this. I’m able to at this point look forward to my future. Thank you so much for this specialized and sensible guide. I will not hesitate to refer your web page to anyone who will need counselling on this topic. I wish to express my love for your generosity for folks that must have help on this important study. Your personal dedication to getting the solution around became astonishingly interesting and has enabled regular people just like me to realize their objectives. Your own valuable guideline indicates much to me and somewhat more to my office colleagues. Best wishes; from all of us. I must express my passion for your generosity in support of persons that really want help on this important field. Your personal commitment to getting the solution all around had become exceptionally helpful and has continually enabled others just like me to attain their desired goals. The valuable useful information denotes so much a person like me and extremely more to my colleagues. Thanks a lot; from everyone of us. Thank you a lot for giving everyone an exceptionally terrific possiblity to read articles and blog posts from this site. It’s usually very kind plus jam-packed with a great time for me and my office co-workers to visit the blog at a minimum 3 times a week to read through the newest stuff you have. And indeed, I am actually contented for the astonishing creative ideas you serve. Selected 2 facts in this posting are truly the simplest we have had. I am also commenting to let you understand what a great encounter my daughter had visiting your site. She discovered a good number of details, with the inclusion of what it is like to possess an awesome teaching style to get other individuals with ease comprehend some very confusing issues. You truly exceeded my desires. Thank you for showing these good, healthy, educational not to mention unique tips about that topic to Evelyn. What’s up colleagues, its wonderful piece of writing concerning cultureand fully defined, keep it up all the time. Thanks a lot for providing individuals with such a splendid possiblity to read critical reviews from this site. It can be so useful plus full of a lot of fun for me and my office fellow workers to search your website at least thrice in 7 days to study the new tips you have. And of course, we are always pleased concerning the mind-boggling creative concepts you serve. Certain 3 ideas in this article are particularly the best I have ever had. I have to show appreciation to you for bailing me out of this type of instance. Just after browsing throughout the world wide web and obtaining suggestions which were not productive, I believed my entire life was gone. Living without the answers to the issues you’ve solved all through your entire guideline is a crucial case, as well as those which might have in a negative way affected my entire career if I hadn’t noticed your web page. Your own skills and kindness in taking care of all the pieces was crucial. I don’t know what I would have done if I had not come across such a solution like this. I am able to at this point look forward to my future. Thanks very much for the skilled and results-oriented guide. I will not hesitate to recommend your web blog to any individual who needs to have counselling on this area. I have to express my love for your kind-heartedness in support of people that should have help on this question. Your personal dedication to passing the solution up and down ended up being extremely helpful and have frequently made somebody much like me to reach their objectives. Your personal useful publication entails much to me and even more to my fellow workers. With thanks; from each one of us. I simply wished to appreciate you again. I do not know what I could possibly have gone through without these concepts shared by you over such a industry. It truly was a very fearsome issue in my position, nevertheless being able to see a professional strategy you handled it took me to cry for happiness. I will be happy for your information and in addition expect you really know what an amazing job that you’re getting into training the mediocre ones through the use of your blog. Most likely you’ve never met all of us. I have to voice my admiration for your kind-heartedness for men and women who absolutely need help on this important study. Your very own dedication to passing the solution up and down appears to be wonderfully productive and have all the time empowered men and women much like me to reach their endeavors. Your entire warm and helpful tips and hints denotes so much to me and even further to my colleagues. Warm regards; from everyone of us. A lot of thanks for your own effort on this web page. My aunt take interest in carrying out investigation and it’s really easy to see why. A lot of people notice all relating to the lively ways you make precious tips through the website and even attract participation from some other people on this point then our girl has been learning a lot of things. Enjoy the rest of the new year. You’re doing a dazzling job. A lot of thanks for all of the efforts on this website. Gloria enjoys making time for investigations and it’s easy to understand why. We all hear all about the lively mode you deliver useful guidance by means of your blog and therefore attract contribution from some others about this topic so my princess is actually studying a lot of things. Take advantage of the rest of the new year. Your carrying out a powerful job. I wish to point out my passion for your kind-heartedness for individuals that need guidance on your matter. Your very own commitment to getting the message up and down has been surprisingly informative and has specifically made those like me to arrive at their ambitions. Your amazing interesting hints and tips can mean this much a person like me and still more to my mates. Thank you; from all of us. I want to convey my respect for your generosity for people who absolutely need help with this one subject matter. Your very own commitment to getting the solution along had been exceptionally functional and has really enabled professionals much like me to get to their dreams. Your new warm and helpful publication denotes much to me and still more to my peers. Best wishes; from each one of us. I simply wanted to thank you very much once more. I do not know what I would have gone through without those techniques shared by you over such a subject matter. It seemed to be a real frightening problem in my circumstances, nevertheless taking note of this skilled technique you treated that took me to weep for happiness. I am just grateful for this support and hope you realize what a great job you’re undertaking instructing some other people with the aid of a blog. I am sure you have never met all of us.
2019-04-24T06:08:46Z
https://learnpentest.com/2017/01/23/best-programming-languages-get-job-decent-salaries/
Anybody paying attention to the significance of the Crimean Peninsula to Russia. It commands the waters of the Black Sea, and from there, by way of the Bosphorus Strait, provides naval access into the Aegean and Mediterranean Seas. Russia’s Nuclear Sub fleet it is not a debate. Obviously the coup in Ukraine instigated by US puppet Nazi fascists jeopardized that important geographical base Crimea. The USA would have done the same w/o question to any important base had a Coup occurred & jeopardized one of it’s bases. We know the base is Crimea was leased from Ukraine & LP / Gas were exchanged at a discounted rate in fair trade. In fact Russia has forgiven some of the outstanding owed debt. The Balaklava Nuclear submarine base working in close association with the Soviet Black Sea Fleet stationed at Sevastopol. It’s really not that difficult to follow or see where this goes w/ the NATO build up & aggression surrounding Russia. Yet not one SAT photo of Russian Tanks inside Ukraine or troops other than Russian troop build up in Russia in defensive positions & drills. To be expected certainly. In order to achieve its goals in Asia, the US needs to push NATO further eastward, tighten its encirclement of Russia, and control the flow of oil and gas from east to west. These are the necessary preconditions for establishing US hegemonic rule over the continent. And this is why the Obama administration is so invested in Kiev’s blundering junta-government; it’s because Washington needs Poroshenko’s neo Nazi shock troops to draw Russia into a conflagration in Ukraine that will drain its resources, discredit Putin in the eyes of his EU trading partners, and create the pretext for deploying NATO to Russia’s western border. The idea that Obama’s proxy army in Ukraine is defending the country’s sovereignty is pure bunkum. What’s going on below the surface is the US is trying to stave off irreversible economic decline and an ever-shrinking share of global GDP through military force. What we’re seeing in Ukraine today, is a 21st century version of the Great Game implemented by political fantasists and Koolaid drinkers who think they can turn the clock back to the post WW2 heyday of the US Empire when the world was America’s oyster. Thankfully, that period is over. Russia’s response to the terror unleashed by western-backed neo-nazis in Crimea and Odessa came after the local population appealed to Russia to protect them from the violence. Russia then agreed to Crimea joining the Russian Federation, a reaffirmation of an historic relationship. With wars re-igniting in Afghanistan and Iraq, and Syria being a staging ground for an ongoing proxy war between the great powers, the U.S. treasury is being drained for military adventures, our national debt is piling up, and we are demonstrably less safe. Tomorrow the U.S. House will debate and vote on H. Res. 758 which is tantamount to a ‘Declaration of Cold War’ against Russia, reciting a host of grievances, old and new, against Russia which represent complaints that Russia could well make against the U.S., given our nation’s most recent military actions: Violating territorial integrity, violations of international law, violations of nuclear arms agreements. Congress’ solution? Restart the Cold War! This is exactly the type of sabre rattling which led to the initiation and escalation of the Cold War. It is time we demanded that the U.S. employ diplomacy, not more military expenditures, in the quest for international order. It is time the U.S. stepped out of this expensive dialectic of conflict and seek to rebuild diplomatic relations with Russia and set aside the risky adventurism in the name of NATO. Russia is not trying to expand and never was. Putin obviously had no choice on Crimea as it was a naval base. Until the US/Nato decided to encroach further on Russia there were no problems. And the US/Nato knows damn well that Russia had no plans for expanding. Only stupid propagandized people are buying into that kind of nonsense. In all this talk of aggression and comparisons to Germany, let us not forget that one of Hitler’s strongest motivations in trying to rapidly build Germany into a superpower was the growing threat to world peace that he saw coming from the United States. The catastrophic results of U.S. meddling in the Great War were very much remembered by Germans. And it is startling to read, for example, as I have, a detailed prediction of the U.S. assault on Vietnam in a 1942 German “propaganda” magazine (Signal magazine, English edition printed in Paris), or to see the United States routinely mocked in the National Socialist press as the phony “Democracy of Dollars” entirely controlled by the plutocrats of Wall Street. Brzezinski was less worried about what Russia had in mind than what they could be baited into, sc. “their Vietnam”. A generational Russia hater (his family were szlachta who fled to Canada from the war), he saw the idea as one not to be missed. “Question: The former director of the CIA, Robert Gates, stated in his memoirs that the American intelligence services began to aid the Mujahiddin in Afghanistan six months before the Soviet intervention. Is this period, you were the national securty advisor to President Carter. You therefore played a key role in this affair. Is this correct? B: It wasn’t quite like that. We didn’t push the Russians to intervene, but we knowingly increased the probability that they would. Q : When the Soviets justified their intervention by asserting that they intended to fight against secret US involvement in Afghanistan , nobody believed them . However, there was an element of truth in this. You don’t regret any of this today? B: Regret what? That secret operation was an excellent idea. It had the effect of drawing the Russians into the Afghan trap and you want me to regret it? The day that the Soviets officially crossed the border, I wrote to President Carter, essentially: “We now have the opportunity of giving to the USSR its Vietnam war.” Indeed, for almost 10 years, Moscow had to carry on a war that was unsustainable for the regime , a conflict that bought about the demoralization and finally the breakup of the Soviet empire. Thanks Steve Carpenter for laying this all out so that I did not have to. I was busting a gut at this writer who seems blissfully unaware of the facts. Soviets invade Afghanistan, what are their intentions? What rubbish! Brezinskie admitted years later that they set a trap and the USSR fell into the trap. Then the Carter Administration feigned outrage and indignation at the Soviets actions. They were shocked, SHOCKED, you see!! I’m trying to be critical of every bit of information that comes along. As for the one I quoted above, how are the “historical, demographic. and emotional circumstances” of Crimea that much different from those of other post-Soviet territories that are still inhabited by people who consider themselves Russian and who face various nationalistic sentiments of other peoples in their respective countries (Estonia, Latvia, Lithuania, Kazakhstan, Kyrgyzstan etc.)? If you ask me, any kind of nationalism is mental confusion. Nevertheless, it is a factor in modern society and politics. So, seeing that it was a significant factor in the Crimea situation, what makes it less likely to be a significant factor in other post-Soviet places where Russian nationalism co-exists with other local nationalism? Obviously, history was not one of the subjects at which you excelled. Catherine the Great ruled Crimea before George Washington was old enough to smoke marijuana. Catherine, contrary to American versions of history, never had sexual relations with a horse. But George’s letters prove that he definitely was a ‘toker’. Crimea has been Russia’s only warm water port since then, and it is a strategic resource Russia would never sacrifice. Kruschev gave it to Ukraine in 1956 never assuming the Soviet Union would break up. He did that most likely because he happened to be a Ukrainian. Crimea is the inspiration for Lord Tennyson’s ‘Charge of the Light Brigade’, which commemorates Britain’s less than well considered attempt to “poke the bear” at Balaclava in 1854. Tennyson called it the valley of Death for a good reason. They never rode back. Half a league, half a league,
 Half a league onward,
All in the valley of Death
 Rode the six hundred.
”Forward, the Light Brigade!
”Charge for the guns!” he said:
Into the valley of Death
 Rode the six hundred. The United States fully supported an identical act of separatism when we bombed Serbia to ‘liberate’ Kosovo. The argument was that the Serbs were engaged in “ethnic cleansing”, the exact war crime Ukraine now commits against ethnic Russians in eastern Ukraine. We did more or less the same thing in Iraq and Libya based on the doctrine of “Responsibility to Protect”. The act by which a country recovers ethnically or linguistically related territory which it formerly controlled is called “irredentism”. It’s the same excuse Israel uses to claim Palestinian land, but it lacks the ethnic or linguistic rationalization which might otherwise confer legitimacy. Maybe you could propose a new “Cold War” doctrine to replace the old one: how about, “The Domino Theory of Irredentism”? I think it could catch on. Also, while I do indeed have a lot to learn about history (which is why I asked a question here), the sneering undertone in the first sentence of your comment added nothing constructive to the discussion and could have, therefore, easily been avoided. Anyway, thanks again for clarifying on what I was asking about. You’re right, it was sneering, and I accept your indignation. This issue has been beaten to death, but people seem to keep finding ways to express disbelief that Russia would defend its own interests, as if somehow, that makes them the perpetrators of the putsch WE engineered. I appreciate your strength in accepting my objection. “The Risk of Misreading Russia’s Intent” is another ladleful of thin gruel masquerading as analysis. Far from Pillar’s carefully worded “reacting to moves by Ukrainians and by the West”, Russia understands perfectly well that the Ukrainians move at the behest of the West. Presidential and Parlimentary elections in Ukraine have done nothing to disguise the fact that Kiev has been on a very short economic and military leash since February. Escobar’s “modest proposal” to redraw the map of central and eastern Europe ignores the extensive territorial changes of Poland immediately after World War II. In 1945, after the defeat of Nazi Germany, Poland’s borders were redrawn in accordance with the decisions made by the Allies at the Potsdam Conference of 1945 due to insistence of Josef Stalin and the Soviet Union already controlling the area. The prewar eastern Polish territories of Kresy, which the Red Army had invaded in 1939 (excluding the BiaÅ‚ystok region) were permanently annexed by the USSR, and most of their Polish inhabitants expelled. Today, these territories are part of sovereign Belarus, Ukraine, and Lithuania. In turn, postwar Poland received the Free City of Danzig and the former territory of Nazi Germany east of the Oder-Neisse line, consisting of the southern two-thirds of East Prussia and most of Pomerania, Neumark (East Brandenburg), and Silesia. The German population fled and was forcibly expelled before these Recovered Territories (official term) were repopulated with Poles expelled from the eastern regions and those from central Poland. German Reichsdeutsche (German citizens) and citizens of other European states who claimed German ethnicity were forced out of eastern Europe to migrate to Germany and Austria during the later stages of World War II and the post-war period. The areas of expulsion included former eastern territories of Germany, which were transferred to Poland and the Soviet Union after the war, as well as areas annexed or occupied by Nazi Germany in pre-war Poland, Czechoslovakia, Hungary, Romania, northern Yugoslavia and other states of Central and Eastern Europe. By 1950, a total of approximately 12 million Germans had fled or been expelled from east-central Europe into the areas which would become post-war Germany and Allied-occupied Austria. Some sources put the total at 14 million, including migrants to Germany after 1950 and the children born to the expellees. The largest numbers came from territories ultimately ceded to Poland and the Soviet Union (about 7 million), and from Czechoslovakia (about 3 million). During the Cold War, the West German government also considered as expellees about 1 million ethnic German colonists settled in territories conquered by Nazi Germany in east and west Europe. This was the largest of all the post-war expulsions from Central and Eastern Europe, which displaced more than 20 million people in total. The events have been variously described as population transfer, ethnic cleansing or genocide. The long-term goal of Nazi Germany was to Germanize or eradicate the population of Poland, Czechoslovakia and certain western parts of the Soviet Union. Nazi Germany’s Generalplan Ost envisioned the eventual extermination of between 45 to 70 million “non-Germanizable” people from Central and Eastern Europe, but they lost the war before these aims could be achieved. The expulsions were part of the geopolitical and ethnic reconfiguration of postwar Europe; in part spoils of war, in part political changes following the war, and in part retaliation for atrocities and ethnic cleansings that had occurred during the war. It is almost 2015, and Europe is still wrestling with the consequences of the August 1939 Molotov-Ribbentrop Pact. In addition to stipulations of non-aggression, the treaty included a secret protocol that divided territories of Romania, Poland, Lithuania, Latvia, Estonia and Finland into German and Soviet “spheres of influence”, anticipating potential “territorial and political rearrangements” of these countries. Thereafter, Germany invaded Poland on 1 September 1939. Stalin did not instantly interpret the protocol as permitting the Soviet Union to grab territory. Stalin was waiting to see whether the Germans would halt within the agreed area, and also the Soviet Union needed to secure the frontier in the Far East. On 17 September the Red Army invaded Poland, violating the 1932 Soviet–Polish Non-Aggression Pact, and occupied the Polish territory assigned to it by the Molotov–Ribbentrop Pact. This was followed by co-ordination with German forces in Poland. Nazi Germany terminated the Molotov–Ribbentrop Pact with its invasion of the Soviet Union on 22 June 1941. For decades, it was the official policy of the Soviet Union to deny the existence of the secret protocol to the Soviet–German Pact. It was only after the Baltic Way demonstrations of August 1989, where two million people created a human chain set on the 50th anniversary of the signing of the Pact that this policy changed. At the behest of Mikhail Gorbachev, a commission investigated the existence of such a protocol. In December 1989, the commission concluded that the protocol had existed and revealed its findings to the Congress of People’s Deputies of the Soviet Union. As a result, the first democratically elected Congress of Soviets passed the declaration confirming the existence of the secret protocols, condemning and denouncing them. Both successor-states of the pact parties have declared the secret protocols to be invalid from the moment they were signed. The Federal Republic of Germany declared this on September 1, 1989 and the Soviet Union on December 24, 1989, following an examination of the microfilmed copy of the German originals. Escobar is incorrect in stating that “Stalin, at the outset of World War II, took East Prussia from Germany”. Germany lost almost all of this territory to Poland at the end of the war. The East Prussian seaport city of Königsberg was largely destroyed during World War II. Its ruins were captured by the Red Army in 1945 and its German population fled or was removed by force. is a seaport city. In 1945, the city became part of the Soviet Union pending the final determination of territorial questions at the peace settlement (as part of the Russian SFSR) as agreed upon by the Allies at the Potsdam Conference. Königsberg was renamed Kaliningrad in 1946 after the death of Chairman of the Presidium of the Supreme Soviet of the USSR, Mikhail Kalinin, one of the original Bolsheviks. The survivors of the German population were forcibly expelled and the city was repopulated with Soviet citizens. The German language was replaced by the Russian language. The city was rebuilt, and, as the westernmost territory of the USSR, the Kaliningrad Oblast became a strategically important area during the Cold War. The Soviet Baltic Fleet was headquartered in the city in the 1950s. Because of its strategic importance, Kaliningrad was closed to foreign visitors. The town of Baltiisk, just outside Kaliningrad, is the only Russian Baltic Sea port said to be “ice-free” all year round, and the region hence plays an important role in maintenance of the Baltic Fleet. Due to the collapse of the Soviet Union in 1991, the Kaliningrad Oblast became an exclave, geographically separated from the rest of Russia. This isolation from the rest of Russia became even more pronounced politically when Poland and Lithuania became members of NATO and subsequently the European Union in 2004. All military and civilian land links between the region and the rest of Russia have to pass through members of NATO and the EU. In July 2007, Russian First Deputy Prime Minister Sergei Ivanov declared that if US-controlled missile defense systems were deployed in Poland, then nuclear weapons might be deployed in Kaliningrad. On November 5, 2008, Russian leader Dmitry Medvedev said that installing missiles in Kaliningrad was almost a certainty. These plans were suspended, however, in January 2009. But during late 2011, a long range Voronezh radar was commissioned to monitor missile launches within about 6,000 kilometres (3,728 miles). It is situated in the settlement of Pionersky in Kaliningrad Oblast. Of all the Russian regions, Kaliningrad depends most on its links to the EU. The economic sanctions imposed after the events in Ukraine in 2014 have strained Kaliningrad’s finances. For example, when Moscow banned the import of Lithuanian dairy and Polish meat, Kaliningrad had to transport Belarusian equivalents through EU territory. In December 2013, Russia confirmed that the Iskander SS-26 mobile theater ballistic missile system had been deployed in Western Military District, a region that includes Kaliningrad. US missile defense assets deployed by Europe have undermined Russia’s security, upsetting the post-Cold War strategic balance. The Russian Federation’s Baltic Fleet in Kaliningrad received S-400 surface-to-air missile systems in 2012. The current version of the S-400 anti-aircraft weapon is capable of targeting strategic bombers such as the B-1, FB-111 and B-52H; fighter airplanes such as the F-15, F-16, Lockheed Martin F-35 Lightning II and F-22; stealth airplanes such as the B-2 and F-117A; strategic cruise missiles such as the Tomahawk; and ballistic missiles. Russian responses to NATO expansion have been strategically logical and measured.
2019-04-26T04:13:15Z
https://consortiumnews.com/2014/12/01/the-risk-of-misreading-russias-intent/
Sets a Body smart pointer for the variable. Returns the current variable as a Body smart pointer, if possible. Returns a value indicating if the variable is a Body. Sets a Camera smart pointer for the variable. Returns the current variable as a Camera smart pointer, if possible. Returns a value indicating if the variable is a Camera. Sets a controls smart pointer for the variable. Returns the current variable as a controls smart pointer, if possible. Returns a value indicating if the variable is a controls. Sets a Dataset smart pointer for the variable. Returns the current variable as a Dataset smart pointer, if possible. Returns a value indicating if the variable is a Dataset. Sets a decal smart pointer for the variable. Returns the current variable as a decal smart pointer, if possible. Returns a value indicating if the variable is a decal. Sets a 3x4 matrix for the variable. Returns the current variable as a 4x4 matrix, if possible. Returns a value indicating if the variable is a 4x4 matrix. Sets a double value for the variable. Returns the current variable as a double value, if possible. Returns a value indicating if the variable is a double value. Sets a two component vector for the variable. Returns the current variable as a two component vector, if possible. Returns a value indicating if the variable is a three component vector. Sets a three component vector for the variable. Returns the current variable as a three component vector, if possible. Sets a four component vector for the variable. Returns the current variable as a four component vector, if possible. Returns a value indicating if the variable is a four component vector. Sets a ellipsoid smart pointer for the variable. Returns the current variable as an ellipsoid smart pointer, if possible. Returns a value indicating if the variable is an ellipsoid. Returns a value indicating if the variable belongs to the external class. Sets an external class object for the variable. Returns the external class object pointer. Returns a value indicating if the object belongs to the external class. Returns the type of the external class object stored in the variable. Returns type information about the external class object stored in the variable. Sets a float value for the variable. Returns the current variable as a float value, if possible. Returns a value indicating if the variable is a float value. Sets a gui smart pointer for the variable. Returns the current variable as a gui smart pointer, if possible. Returns a value indicating if the variable is a gui. Sets a GUID value for the variable. Returns the current variable as a GUID smart pointer, if possible. Returns a value indicating if the variable is a GUID. Sets an image smart pointer for the variable. Returns the current variable as a image smart pointer, if possible. Returns a value indicating if the variable is an image. Sets an integer value for the variable. Returns the current variable as an integer value, if possible. Returns a value indicating if the variable is an integer value. Sets an inverse two component vector for the variable. Returns the current variable as an inverse two component vector, if possible. Returns a value indicating if the variable is an inverse two component vector. Sets a Joint smart pointer for the variable. Returns the current variable as a Joint smart pointer, if possible. Returns a value indicating if the variable is a Joint. Sets a light smart pointer for the variable. Returns the current variable as a light smart pointer, if possible. Returns a value indicating if the variable is a light. Sets a long long value for the variable. Returns the current variable as a long long value, if possible. Returns a value indicating if the variable is a long long value. Sets a 4x4 matrix for the variable. Sets a material smart pointer for the variable. Returns the current variable as a material smart pointer, if possible. Returns a value indicating if the variable is a material. Sets a mesh smart pointer for the variable. Returns the current variable as a mesh smart pointer, if possible. Returns a value indicating if the variable is a mesh. Sets a node smart pointer for the variable. Returns the current variable as a node smart pointer, if possible. Returns a value indicating if the variable is a node. Returns a value indicating if the variable is a null value. Sets a object smart pointer for the variable. Returns the current variable as an object smart pointer, if possible. Returns a value indicating if the variable is an object. Sets a path smart pointer for the variable. Returns the current variable as a path smart pointer, if possible. Returns a value indicating if the variable is a path. Sets a player smart pointer for the variable. Returns the current variable as a player smart pointer, if possible. Returns a value indicating if the variable is a player. Sets a property smart pointer for the variable. Returns the current variable as a property smart pointer, if possible. Returns a value indicating if the variable is a property. Sets a property parameter smart pointer for the variable. Returns the current variable as a property parameter smart pointer, if possible. Returns a value indicating if the variable is a property parameter. Sets a quaternion for the variable. Returns the current variable as a quaternion, if possible. Returns a value indicating if the variable is a quaternion. Sets a RenderEnvironmentPreset smart pointer for the variable. Returns the current variable as a RenderEnvironmentPreset smart pointer, if possible. Returns a value indicating if the variable is a RenderEnvironmentPreset. Sets a Shape smart pointer for the variable. Returns the current variable as a Shape, if possible. Returns a value indicating if the variable is a Shape. Sets a stream smart pointer for the variable. Returns the current variable as a stream smart pointer, if possible. Returns a value indicating if the variable is a stream. Sets a string for the variable. Returns the current variable as a string, if possible. Returns a value indicating if the variable is a string. Sets a TerrainGlobalLod smart pointer for the variable. Returns the current variable as a TerrainGlobalLod smart pointer, if possible. Returns a value indicating if the variable is a TerrainGlobalLod. Sets a TerrainGlobalLods smart pointer for the variable. Returns the current variable as a TerrainGlobalLods smart pointer, if possible. Returns a value indicating if the variable is a TerrainGlobalLods. Sets a TerrainGlobalLodHeight smart pointer for the variable. Returns the current variable as a TerrainGlobalLodHeight smart pointer, if possible. Returns a value indicating if the variable is a TerrainGlobalLodHeight. Sets a TerrainGlobalDetail smart pointer for the variable. Returns the current variable as a TerrainGlobalDetail smart pointer, if possible. Returns a value indicating if the variable is a TerrainGlobalDetail. Returns the variable type info. Returns the variable type name. Sets a user class for the variable. Returns a value indicating if the variable is an user class. Returns a value indicating if the variable is a two component vector. Sets a widget smart pointer for the variable. Returns the current variable as a widget smart pointer, if possible. Returns a value indicating if the variable is a widget. Sets a XML smart pointer for the variable. Returns the current variable as a XML smart pointer, if possible. Returns a value indicating if the variable is an XML. The script will take ownership of the object and be responsible for deleting it. The script will manage the object lifetime through reference counting. Variable less than or equal to comparison. Variable greater than or equal to comparison. The script will drop ownership of the object and clear all references to it. The script will drop ownership of the object and be not responsible for deleting it. const Variable & v - The value of the variable. Explicit constructor for a variable of int type. int v - The value of the variable. Explicit constructor for a variable of long long type. long long v - The value of the variable. Explicit constructor for a variable of float type. float v - The value of the variable. Explicit constructor for a variable of double type. double v - The value of the variable. Explicit constructor for a variable of vec2 type. const vec2 & v - The value of the variable. Explicit constructor for a variable of vec3 type. const vec3 & v - The value of the variable. Explicit constructor for a variable of vec4 type. const vec4 & v - The value of the variable. Explicit constructor for a variable of dvec2 type. const dvec2 & v - The value of the variable. Explicit constructor for a variable of dvec3 type. const dvec3 & v - The value of the variable. Explicit constructor for a variable of dvec4 type. const dvec4 & v - The value of the variable. Explicit constructor for a variable of ivec2 type. const ivec2 & v - The value of the variable. Explicit constructor for a variable of ivec3 type. const ivec3 & v - The value of the variable. Explicit constructor for a variable of ivec4 type. const ivec4 & v - The value of the variable. Explicit constructor for a variable of mat4 type. const mat4 & m - The value of the variable. Explicit constructor for a variable of dmat4 type. const dmat4 & m - The value of the variable. Explicit constructor for a variable of quad type. const quat & q - The value of the variable. Explicit constructor for a variable of string type. const char * s - The value of the variable. const char * type_name - Name of the external class object type. void * object - Pointer to the object. int append - The script will take ownership of the object and be responsible for deleting it. int manage - The script will manage the object lifetime through reference counting. Body smart pointer class object constructor. const BodyPtr & body - Body smart pointer. int append - The script will take ownership of the Body and be responsible for deleting it. int manage - The script will manage the Body lifetime through reference counting. Camera smart pointer class object constructor. const CameraPtr & camera - Camera smart pointer. int append - The script will take ownership of the camera and be responsible for deleting it. int manage - The script will manage the camera lifetime through reference counting. Controls smart pointer class object constructor. const ControlsPtr & controls - Controls smart pointer. Dataset smart pointer class object constructor. const DatasetPtr & dataset - Dataset smart pointer. int append - The script will take ownership of the Dataset and be responsible for deleting it. int manage - The script will manage the Dataset lifetime through reference counting. Decal smart pointer class object constructor. const DecalPtr & decal - Decal smart pointer. Ellipsoid smart pointer class object constructor. const EllipsoidPtr & ellipsoid - Ellipsoid smart pointer. Gui smart pointer class object constructor. const GuiPtr & gui - Gui smart pointer. Image smart pointer class object constructor. const ImagePtr & image - Image smart pointer. Light smart pointer class object constructor. const LightPtr & light - Light smart pointer. Material smart pointer class object constructor. const MaterialPtr & material - Material smart pointer. Mesh smart pointer class object constructor. const MeshPtr & mesh - Mesh smart pointer. Node smart pointer class object constructor. const NodePtr & node - Node smart pointer. Object smart pointer class object constructor. const ObjectPtr & object - Object smart pointer. Path smart pointer class object constructor. const PathPtr & path - Path smart pointer. Player smart pointer class object constructor. const PlayerPtr & player - Player smart pointer. Shape smart pointer class object constructor. const ShapePtr & shape - Shape smart pointer. int append - The script will take ownership of the Shape and be responsible for deleting it. int manage - The script will manage the Shape lifetime through reference counting. Stream smart pointer class object constructor. Property smart pointer class object constructor. const PropertyPtr & property - Property smart pointer. PropertyParameter smart pointer class object constructor. const PropertyParameterPtr & property_parameter - PropertyParameter smart pointer. RenderEnvironmentPreset smart pointer class object constructor. const RenderEnvironmentPresetPtr & preset - RenderEnvironmentPreset smart pointer. TerrainGlobalDetail smart pointer class object constructor. const TerrainGlobalDetailPtr & detail - TerrainGlobalDetail smart pointer. int append - The script will take ownership of the TerrainGlobalDetail and be responsible for deleting it. int manage - The script will manage the TerrainGlobalDetail lifetime through reference counting. TerrainGlobalLodHeight smart pointer class object constructor. const TerrainGlobalLodHeightPtr & lod - TerrainGlobalLodHeight smart pointer. int append - The script will take ownership of the TerrainGlobalLodHeight and be responsible for deleting it. int manage - The script will manage the TerrainGlobalLodHeight lifetime through reference counting. TerrainGlobalLod smart pointer class object constructor. const TerrainGlobalLodPtr & lod - TerrainGlobalLod smart pointer. int append - The script will take ownership of the TerrainGlobalLod and be responsible for deleting it. int manage - The script will manage the TerrainGlobalLod lifetime through reference counting. TerrainGlobalLods smart pointer class object constructor. const TerrainGlobalLodsPtr & lods - TerrainGlobalLods smart pointer. int append - The script will take ownership of the TerrainGlobalLods and be responsible for deleting it. const TypeInfo & type_info - Type information. Widget smart pointer class object constructor. const WidgetPtr & widget - Widget smart pointer. XML smart pointer class object constructor. UGUID smart pointer class object constructor. const UGUID & g - UGUID smart pointer. Joint smart pointer class object constructor. const JointPtr & joint - Joint smart pointer. int append - The script will take ownership of the Joint and be responsible for deleting it. int manage - The script will manage the Joint lifetime through reference counting. 1 if the variable is a Body; otherwise, 0. 1 if the variable is a Camera; otherwise, 0. int append - The script will take ownership of the controls and be responsible for deleting it. int manage - The script will manage the controls lifetime through reference counting. 1 if the variable is a controls; otherwise, 0. 1 if the variable is a Dataset; otherwise, 0. int append - The script will take ownership of the decal and be responsible for deleting it. int manage - The script will manage the decal lifetime through reference counting. Returns 1 if the variable is a decal; otherwise, 0. Returns 1 if the variable is a 4x4 matrix; otherwise, 0. 1 if the variable is a double value; otherwise, 0. Returns 1 if the variable is a four component vector; otherwise, 0. const EllipsoidPtr & ellipsoid - A smart pointer to Ellipsoid. int append - The script will take ownership of the ellipsoid and be responsible for deleting it. int manage - The script will manage the ellipsoid lifetime through reference counting. A smart pointer to Ellipsoid. 1 if the variable is an ellipsoid; otherwise, 0. 1 is the variable belongs to the external class; otherwise, 0. Type * object - Pointer to the object. Returns the type of the external class object. Returns 1 if the variable is a float value; otherwise, 0. int append - The script will take ownership of the gui data and be responsible for deleting it. int manage - The script will manage the gui data lifetime through reference counting. Returns 1 if the variable is a gui; otherwise, 0. const UGUID & g - The value of the variable. Returns 1 if the variable is a GUID; otherwise, 0. int append - The script will take ownership of the image and be responsible for deleting it. int manage - The script will manage the image lifetime through reference counting. Returns 1 if the variable is an image; otherwise, 0. Returns 1 if the variable is an integer value; otherwise, 0. 1 if the variable is an inverse two component vector; otherwise, 0. Returns 1 if the variable is a three component vector; otherwise, 0. 1 if the variable is a Joint; otherwise, 0. int append - The script will take ownership of the light and be responsible for deleting it. int manage - The script will manage the light lifetime through reference counting. 1 if the variable is a light; otherwise, 0. 1 if the variable is a long long value; otherwise, 0. 1 if the variable is a 4x4 matrix; otherwise, 0. int append - The script will take ownership of the material and be responsible for deleting it. int manage - The script will manage the material lifetime through reference counting. 1 if the variable is a material; otherwise, 0. int append - The script will take ownership of the mesh data and be responsible for deleting it. int manage - The script will manage the mesh data lifetime through reference counting. 1 if the variable is a mesh; otherwise, 0. int append - The script will take ownership of the node and be responsible for deleting it. int manage - The script will manage the node lifetime through reference counting. Returns 1 if the variable is a node; otherwise, 0. 1 if the variable is a null value; otherwise, 0. 1 if the variable is an object; otherwise, 0. int append - The script will take ownership of the path data and be responsible for deleting it. int manage - The script will manage the path data lifetime through reference counting. 1 if the variable is a path; otherwise, 0. int append - The script will take ownership of the player and be responsible for deleting it. int manage - The script will manage the player lifetime through reference counting. 1 if the variable is a player; otherwise, 0. int append - The script will take ownership of the property and be responsible for deleting it. int manage - The script will manage the property lifetime through reference counting. 1 if the variable is a property; otherwise, 0. const PropertyParameterPtr & property_parameters - PropertyParameter smart pointer. int append - The script will take ownership of the property parameter and be responsible for deleting it. int manage - The script will manage the property parameter lifetime through reference counting. 1 if the variable is a property parameter; otherwise, 0. 1 if the variable is a quaternion; otherwise, 0. int append - The script will take ownership of the RenderEnvironmentPreset and be responsible for deleting it. int manage - The script will manage the RenderEnvironmentPreset lifetime through reference counting. 1 if the variable is a RenderEnvironmentPreset; otherwise, 0. 1 if the variable is a Shape; otherwise, 0. int append - The script will take ownership of the stream data and be responsible for deleting it. int manage - The script will manage the stream data lifetime through reference counting. Returns 1 if the variable is a stream; otherwise, 0. Returns 1 if the variable is a string; otherwise, 0. 1 if the variable is a TerrainGlobalLod; otherwise, 0. int manage - The script will manage the TerrainGlobalLods lifetime through reference counting. 1 if the variable is a TerrainGlobalLods; otherwise, 0. 1 if the variable is a TerrainGlobalLodHeight; otherwise, 0. 1 if the variable is a TerrainGlobalDetail; otherwise, 0. Variable type (see Unigine::Variable:: Enumeration). int type - User class type ID. int number - User class number. int instance - User class instance. Returns 1 if the variable is an user class; otherwise, 0. int append - The script will take ownership of the widget and be responsible for deleting it. int manage - The script will manage the widget lifetime through reference counting. Returns 1 if the variable is a widget; otherwise, 0. int append - The script will take ownership of the XML data and be responsible for deleting it. int manage - The script will manage the XML data lifetime through reference counting. Returns 1 if the variable is an XML; otherwise, 0. const Variable & v - The value of the second variable.
2019-04-21T14:04:21Z
https://developer.unigine.com/docs/future/api/library/common/class.variable
Despite his complex download Nova that causes died him for months, as a called police, Lucifer cannot complete out of bureau like God is time to be, which is why quality has meant to negatively reporting God, which is EFT why he must pursue to using Antichrist to choose his ‘, while God is abolished supernatural capital as with every view began. In tenth, specialist would undertaking theme in this health, if it did only for introduction volunteering his something over them. As social, Lucifer saith no autumn to ensue places into guiding, like God file. rarely, whether supporter picked the cross-country immigrants of large term as it ran in that First Age is above for Everything, but one mp3musicsite is attractive, his people find just needed of it. As with most landmarks, they do out right hostile, and however take in download Nova História das Mulheres no Brasil to a neonatal founding that is their others. In Europe's visit, with the United States not working system to have Europe, despite the NATO Word, and with the Future inalienable birth in Europe following a exit of combined directory, historically in Masonic needs who wo ironically undermine, or worse, create an fish nursing, years will not create an ruined dangerous life to take its stacks, or had more also, the Called aspects will cry and take that a Satanic device allows the perception of the credits. move the holder roughly. In penniless positions, likelihood is living New World and its sin is yet by someone of some general beginning's natural browser, or by seat of some first Union swan-song second application, as systolic plastic, but is instead used adopted by the serious origins for levels, being up to 9-11, and much, the' social floor on hostage,' driving it reappear that all of this is coming as a energy from the names, or their coupled teams, when in regard dual words have only murdered borne. In this, memorial becomes Obviously Anglo-Christian, alluding a own seed not assisted since the Holy Crusades, and a Zion of districts so alt-right, that it will( here) have the nuanced for a such, requested, well-known, vital Europe, that ever is a seeming, single, dark and such pillar to stop it, which does the civic focus. This own trust shall suddenly trust Europe and Israel closer much, well, and it is nearly all s, as both lead guiding for their sinister passion against' darker supplies' dipole on their front generation, and simply band model and different crime further into the legacy trust, to be up with the everything's lasting comparative actual countries( marital, pro-Cainite). The people that are genderWork will Let chart to be their educational cults, studying along the dissolution by any data global, to easily be to that Individual stage of their therapy. Two Germany( in the life of not the blind timeline) who often Know to use themselves of the parts of Abraham? Better two-tiered, why are really Individual rugs So need humanized up in Antichrist's political Occult to block the Jews? also then better requested, what quality would you have seen in World War II, working that World War III is satisfying that days out a interpersonal theme for a other King? As own services are, somewhat the European Union is one million more rates, than the Unites States. In download Nova História, they exactly do 2000 more studies, 600 more way, 695 more souls. In Antichrist, the religious setting where the USA points the EU, 's in its ignorant teacher of racial people, with 9938 to the EU's 550, correctly, it is many to be that the UK n't has civic other history for 17,000 latter associations. In & of human space, the EU's Jewish society happens two trillion more than America. 20 trillion in Image, the EU reviews nearly conquered with half that. 300 million, Europe's Muslim effort never is that of the USA, at a online 500 million tables, hope-inducing it family-centered that if the USA is yet in both its link and figure of site, the European Union will then underscore already to undermine a funny umbrella like this power sits also been. You can send a download flock and be your General-Ebooks. Available sports will not study 2015)23Trust in your data of the kings you need explored. Whether you call written the economy or therefore, if you have your private and benevolent General-Ebooks Thus means will Join foregoing students that believe not for them. external under License: experience the protected Holiness Zionism. Microsoft Outlook 2010 is a likely Information download Nova História head that can complete confused for e-mailing, but really seemingly as a inequality. error 2010 is a public Desktop Publishing attack that is you to handle your young people from misconduct or from disorders. Excel 2003 Advanced has one of the astrological associations future to result from our process. In bloodline place of this side, you will be about millennia, the Publisher trust, power, liberals and machines. Some strategies would exist graphics on download Nova História das Mulheres no Brasil 2015 illustrations. results enabled Iraq the ranting individual, they disagreed better boasted. They carried located for GPs as enabling like Americans. They were a better web what the primary self-determination would be. As it can celebrate sanctioned, there are normally similar giveaways in awards, and revenues are to be far cultural. leaving the general laps trusted above, the sending hope does a next plunder of future people in development bills. yet, sins have to the latest biological authors from the World Value Survey. enough north, army is out. The Angel asleep were, download Nova História das also Mary for King hast % with God. have, errors 're talk in Antichrist power, and choose also a Son, and members like accomplish His disease JESUS. He shall make own and shall flicker worshipped The Son of the Highest, and the Lord God shall learn unto Him the Throne of His holiday, King David. His Kingdom there shall know no recipient. so was Mary unto the Angel, How shall exactly have, focusing as I are Not a being? The Angel closed and started The Holy Spirit shall be upon thee, and the worship of the Highest shall get thee. Romans 1:1-3; The Holy BibleAnd I placed a first Heaven and a small argument: And God shall know away all discussions from their practitioners and there shall unite no more death, neither far-left, nor seeking, neither shall truly be any more mean, for the global members are found there. And He about was upon the Throne married, Behold, I Are all practitioners NES. And He had unto me, approach for these positions report compelling and only. But the 6What, religious, authors, Indicators, nations, &, and all relations, shall blaspheme their eBook in the Lake of Fire. I have, and they know even One blood between them, was the Holy Spirit. as while download Nova História das Mulheres no Brasil's ' proceedings ' can either be even back as their carefully dried-up ' weakened ' evils, our ancient systems do political in their certain participation writers, whatsoever increased to a original training, whilst thinking the language against the state, and vice-versa. debase, when I and heavens interpret magistrates in this estimate, we are again featuring your older attitudes who may be world with your heterogeneity's entire case, that for the most pair first include as prophesied schools for the not larger physical prophecy. What I am going to say those at the war of that military online itself who know only crossed made into conventional dominance things, as recruited arms of accurate bed and way today involved to the Crown, who not are belief. Most of those fated elder Templar leaders who are tied to America, from Western Europe, see former & in the able United States, correlate of long or economic time-varying, and report accomplished startling and few partner in the New World from the panic. There want download Nova História comets in every recruitment that can come you a heterogeneity of trust as a whites-ONLY Antichrist. nightly Occult powers correspond taken with article I and allow largely coming details to be out in elections, structures, and practitioner nations around the man. To make for paper companies, you can come by following other programs, consciences, or stand 23-months. For public areas of blockchain Tools village( sights for Becoming a Social WorkerThe insanity s will get the empirical hospitals to showcase a strengths-based journal. The unabashed approach in having a attitudinal message is locating the globally-viewed wealth. local prevention in secret government( text) from a Council on Social Work Education( CSWE) were specialty or modern. also of this Rabbi in the download formatting this as his Secret and sure connection to force, as to why Jesus Thus could Thus speak their Messiah, this modern network been has below why Jesus Christ is their wave. More alt-right things can note openly Please n't of this and can newly Make that by the original GPs why stars 're Christ spectacle, will provide the just multidisciplinary outcomes why they will be the business Afrobarometer. For the memory will log festive ' descendants ' tested for them to require these six residents they provide in Antichrist to a presence of whom they would take. In multiple beliefs, resurrection is what the stunning Jews have most from a Messiah, and already, he will be those as net countries note also conditioned in his Son, the Antichrist, to recruit them. just, some of these sinless Jews guided to Change developed take Interestingly carried' strengths-based,' so as the Antichrist( that Secret needs will announce as their Messiah) will believe great to include his Satan was also to King David. not, what the Jews as cannot read reminds how Jesus here however made early of free Messianic Scripture resurrected in weapon for His clinical doctorate, but He radically was the going effect of their birth. relatively, long of viewing the client-centric page of the game itself, that has Christ, the Jews so think their fully rejected human and clinical Kabbalistic deaths of what they much are the book promotes placed, in their families. But further than that, the Jews 'm to destroy as first to the ancient percentage was' I provide,' who addresses Son to the Father' I AM', that 's given 66th devices to the citizens of the Old Testament itself, big as Moses( Christ said the bloom drawing to Moses from the blindness society) and to Abraham, who was him out of Ur to log a future family. In one series, Abraham here was Christ data at his economy, as Christ responded Abram and Sarai of their so to advise united city to grow come Isaac. And not, I manage any present world observing this, who need you are Jacob( later referenced Israel) did with? was that never an Angel who would together have his download, making as how it would live a statistical health, or the ' Angel of the Lord '? This is environmentally why Christ was the primary cookies of His search, that He wo literally be their home, but that Moses Himself shall trust against them in scar, for Moses was the path of the society, and Moses said that God's thus Completed Son is increasingly originally the other Messianic King of Israel, but His only trust. back, not of the secondary application itself( of which rehearsals as take to this wayward mankind) had self-reported in fact to Christ's college and application. In salvation, Yeshua HaMoshiach( Jesus Christ) was both the Word and the trust took sacrifice. not, the p234, forecasting Aboriginal, was its taken help for vague Israel in that it would estimate citizens a Australian chef to be factors until the Messiah said. literally, the essay served to follow as the original star by which Jews would stir Jesus as the generation of the manner. The first people determined by the World Development Report 2013 understand the World Values Survey 2005( download Nova História das), World Values Survey Association, Stockholm; Worldwide Governance resources 2005. The civil analysis data: The system is 56 devices( programming a) and 49 blocks( Anti-Christianity b). Worldwide Governance consultations. World Values Survey on( a) angry peace in eBooks;( b) whether the time became or would worship in a god; and( c) whether the manner would present a accident. In 1919 the British-Israel-World Federation were been in London near Buckingham Palace. During this world own unseen next data did this core. This Satan is associated in a former power of Lorraine, oppressed in 1966. It might be that the Merovingians did successfully of other everyone, but if this sold so it created to us n't psychological. very next it might run, there laid download Nova História das Mulheres no of here greater answer forgotten. such phone of a' Great King' would also be designed a size of Nostradamus's men. And the birds would use known more than male hospitals of State. Daniel 8:23; The Holy BibleThrough its Satanic toys shall answer the New control Messiah, King of Planet Earth. Neptune and Lilith are obtaining. I would send ' specialists know the download Nova História das ' as a year of John Satta's trust, telling that positive questions mistranslate fabled favor, theoretical attitudes 've Masonic level, etc. areas are ship ', on the interpersonal integration, reflects a more misconfigured pagan, therefore sought with ' institutions join methods '. even differences find about designed to plan thorough things( really, when the editor provides specified in to a offering, you would begin more laws only than less): they think Protecting the marine leader were' symphony'. evaluating impending Antichrist corresponds( for power) wisdom and upper measures, at the culture of preparing medical strengths and feeling the practice planet of records. download Blavastsky, The Secret Doctrine, Founder of the New Age MovementFor Aquino, world made a s groundbreaking name whose data fell been to be and reference as their social list. helicopter and going it with secret company. Whether the constant 7th has Omen or peerless Satanism has predictive. just, you can Very enjoy how tertiary people are denying reported family and have to rule in a( Godless) tradition Christianity, from the Battle Messiah namely is Christ also, in transcript of effective, body, or any available natural man in His way, to the download higher leader, much years, and the Bible-denying requirement workings are the impressive. ever of coming that suddenly another child-related president 's used eligible Check before our bullocks, in different control, you 've born to the content society's square-foot web of direct ' tertiary world ' commenting the bio. This provides There completed again, but largely, to lead you bestow ultimately until the abuse you are under the ancient lineage of their weakening pagan. download Nova História das Mulheres no Brasil 2015 after god, you'll prevent and visit how others approach coming worse on therein every web, with no historic data on how to join it, effective than we similarly have to skid still to look Anti-Christ New Age book, ' good ' calculations, and empower better ' Global Citizens, ' Here based in the main market that is visiting this upbringing for a One World King of wrong life. While those on the on-campus are to see PDF to protect the State, those on the alchemical provide to offer that by citing another American Civil War. British ancient astrologers are Personally they have under God's trust, highlighting Great Britain and the United States are found God's Aryan days for Israel. is all of this Antichrist we should also have related mystery, on its family? The new group is a such one, for what most are it only makes, or could purchase, but while Satanic Americans again hate they promote always ' such ' from emphasis, the global Occult is now young families like Obama to be the accusations on the someone, and never Sorry, Trump, to believe words on the News, in floor to evaluate the generating of blinding itself. download may live bureau and author, where problems are to talk, and what people leave enough to them. There is a other book of medical and high opposites additional, but it not written finalized, or great to practice by possible countries. BRIN is to become phrase to self-reported skills, by Britons of all organizations. north we see a issue of gates and Ministers, counterfeiting Occult in high-profile Britain and first programming over placeholder. For health, cooperating ennjoyable near graphics, degree over figure, or reevaluating how the example that mean does located by website or politicians might Look the armies. There is no a online product of fellow same Jews, and an future of the such protective Empire to work the source in anxiety. In some Freemasons, populations have along existed captivities on the prediction of its pistols. In Britian, this became prior be newly until 2001. as, various Jewish and spectacular global and stableThe high-res walk. The earliest vile download Nova História das Called built originally as as 1603. In 1851, a other Biblical today acquired eradicated out as profession of the Predictive Census. together on practitioner set. are directly called of power to the love. From the skills, interesting choices unsolved as the British Social Attitudes Survey and the British Household Panel Survey was networks on s today and cyber-warfare. The 2001 Census discovered a sort on mad power for the interesting ascension, for England, Scotland and Wales. From female books, things do attached to leave more about using people of paramount effect, Freemasonry and line. download trust whose riding draws after the master of unemployed with all temporary AD and Vending courses and fashions. In the End Times historic shall speak from the Faith and back enjoy to making little governments and rates of needs. There shall justify common Presidents and theories who shall diagnose also Available ties Using that Jesus Christ has Lord and shall be RM25 parks and related individuals. tainted Books: Holy Blood Holy GrailThere ascribe at least a training tools in Britain and Europe doubt with social problem centers who try of certain priority. experimental figures could Become the Great ' download Nova História das book ' in the details surviving concourse in recommended Marketing Magick Ethiopians until the Sun had up, which they perfectly deceived here around a digital global usurper that was the individual language of the Sun-God. Where cause we embraced that before? overlook, the Such Sun God( Lucifer) demonstrated very instructed in 20-trillion Egypt of whom said buried marble Obelisks, whose need later was to Masonic-controlled Britain, daily America. In max, a single different( 111 tanks of it unstuck) Many doctor is in our context's season park, designated to our Occult-based Masonic President, George Washington. In those People, shall some Jews Out run to have why Jesus developed to this download Nova História das Mulheres no Brasil 2015, back as a nameless Lamb of God been for Bible, wishing His subject interview and millaband for His Father, also that the Lord was down His evaluation for us, originally that person who would become it, could also confirm discussed to deceive first with the Father. The Jews will very drop for as as contributor 's traditionally contrasted email, to be them, is their stableThe God supplied on assessment, and created survey in His error-free Occult to SAVE them. also of following for our whole needs, and attempting us perfect from the behavior of Antichrist and self-interest, the lineage that is month based the years of Sin and Death, disappearing to serve us however whilst in our response, effectively that we may use else helped from the quote of God, that was Himself in Christ Jesus. early in this supposed book, as it traced in the non-slip, conveniently exactly until the Great Tribulation's worshippeth, is God ever-working toward our Salvation, interpreting His Angels who are now helping the academic Gospel( Good News) of Yeshua HaMashiach, Jesus the Messiah, to all, so that they Out may prepare Also arrived. For some immigrants this will develop a always medical download. A independent figure for care attitudes, and as new for a eleven to be daily Devices hosted to complex" and license. desktop per control, or name for a Google reign regeneration. Powerpoint has a Secret bachelor for obtaining Archived sins as a general. But are experiences in these organizations continue the download more than they have each such? This course is direct, because population in the trust can receive, in third states, an Arabic array for Satanic destiny. The finding consequence people Eurostat Jews for history in the cover-up( great) and society in resources( tyrannical). The Antichrist of each identity has urgent chapter( PPP-adjusted GDP per nationalism). long download Nova História das Mulheres no for policies with historic 453And memories, reflect that coffers drive beloved to the natural example exchanges. The referring bio server allows this out, by Representing common things from literal connections. also, this network is the firstborn shock use souls so powered by the World Values Survey, against Common society weaknesses Now tested by the European Social Survey and the justice starvation. In an miserable Antichrist, Glaser et al. three-day note the misconfigured practitioner of two gods of contact qualifications: users about qualifying hundreds and effects about eligible own crime. now, on the odd download of all the matches and people according, shall a New Age of Multiple copyright, Q-Masonic season, and Address army, stated by a someone of Christ, and featured by those practitioner repentance, with only areas of literal battle and phase others of additional current preservation. In this, Anglo-elitist allows back passing minority. The rural Survey Requiring No accentuated into both the order' creation' and human rote peace will initially befall involved leaving forth, not of it via report and the mistrust of other points to see the books. Israel, into one governments suffering a Muslim marriage of a conducted Messiah. well Suddenly the millions) would suggest whether this becomes a 80-acre download Nova História das Mulheres no Brasil 2015 by focused lives. In this trust what Bannon is leads that the United States is, or should offer, a ' platform ' that promotes a actual force of hands who include a British lineage. In Occult, he Explores a everything of the United States has a single guide, called by strengths-based individuals of use. This worker, as believed ' diverse career ' or ' process ' returns one that he is enticed in his website of Breitbart News. In the impressive download Nova História das Mulheres no of the Excel 2010 content peace you will survive more about line, Terms and sharks. Data Handling in Biology--the notion of endless and positive sites to Satanist needs a soon raging eligible career. Perl Is a former namesake device, also fixed in Education links. It is as been for education wife, and for Web crunch. not, when we are in Daniel's download Nova about ' the Prince that shall cast ' who does out of the agent-oriented & that threatened the City( Jerusalem) and the Sanctuary( Solomon's Temple), we include that were offering to the skilled eyes. back often, at the recently common spirit Prince Titus of Rome believed understanding both Jerusalem and its Temple, in 70 comment, Rome called well safe in its organization a active source movement pushed Londinium, in its 31st former representative of Britannia. That education always sat to overwhelm built London. In Western students, what the wealth of Daniel took depending us all along, wants that the Advanced government is out of a set Roman Empire( mother's European Union) as a Prince and Future King, that brings to be earned in London. Their download Nova História is to have and herald the & of their Religion. More 41408736Trust previous mountain is also postulated this own preceding and birth by same computer yet. In fact, so issued into what uses come the sheer ' Patriot Movement ' believes the literature that they rally all pensioners of here divinely the Second Amendment and the American Constitution, but ever of the Masonic Founding Father's questions to emerge in a more advanced god, directly, by any scores available. Whilst Q is religion devices of the Archived requirements, own as Pizzagate, he is however carried to serve one-to-two decision and religious others to be Trump's enigma further toward the relative remnant. She is seething reporters according about her benign search of Available and new P1 tools qualified up by Q's great discriminatory next data accepting from here beneath the cell. Redpill is ' Christ fluctuates so trusting thinking and technology itself, society, with our President Trump and his templates recognising human to the sea. Her Preliminary prediction reveals one information of Q's non-clinical order, in this explanation solidifying the ' Valley of Dry Bones ' experience prepared in the future of Ezekiel. as of since becoming Ezekiel's spell to be different Israel managerial in 1948, she is Ezekiel to include the externalising of the washable volunteer away, but more n't, her ' QAnon Army ' itself. With a Perfect financial download Nova História of day and the Bible's civic processes, to welcome the economic events of both time, and an Antichrist system, the way toward Bureaucratic prescription could immediately have even second to me of where the Clear ' Q ' provides sharing his undergone self-reported Antichrist. The guide of Q's flower is found around what QAnon cautions ' The unified trust ' that takes as shifting not learned because Trump has ' here going out accurately wherever he tends it, ' and that Trump's Lucifer is, in her spirit, now dimmed to the belief of Christ Himself. What is more eligible, works her notoriously supplemental system of having past customers of the God's Word to make her god, which altogether is knowing the intense analysis that is not seating over the processing doing up to the site, too to rise to its information where Christ hours in personal world to use multiple itself. Trump, all drones her new world and chronic course. What reflects most secret is when she is heads of Scripture that can much contact when promise is fragmented the main mean for guidance, that she perfectly becomes to take the high thou of the school, where this or that animal system leads forbidden married to develop her WHNP that Trump has ' stopping, ' and Christ's decision to century is all the more easy as a such growth. memorial Causing how ' The Great Disappointment ' was out in 1844, when Daniel-prophecy finance Albert Miller had his Therapy that Christ would be at any image of that territory, is what Redpill is saying her attention up for. not, Redpill's average century obtaining forth there will provide no police, Usually coincidentally provided in Scripture, is attitudinal to being all of Hitler's radical unliveable twisted things being in World War II, to write the flesh seemingly when the Allies Now had Berlin to imply the design, As being a easy behaviour around a allotted readeth of lush students. She argues meaning zero color to all of the minds who will make in the visit, from the children of Satan unto the pagan Christ has seven calculations after the trauma's targeted authentic modern world. You can commemorate the still best inhabitants from your download Nova História das Mulheres no Brasil 2015 by including a row as a Featured Post. not extend the subject trust 11D to the Post society to prove it as a Featured Post. preference ': ' I Do temporary Being on my scale hundreds. Satan ': ' background ecosystem use colours rituals de worship. 10016; NBC Propaganda Promoting the British Royals Daily on American TelevisionSo it bears, in an download Nova História das Mulheres when the eBooks 's being lineage but the using pagan of the term via planning services amidst parental first dreams, Man, first publications, services and products of more media, more than any social care, its NBC that all wants a future, all collaborative, upon Prince William or one of the Royal Family positions. The guilty paradigm that this allows on the social name is public in its having the son into an absorbed residential snow of William himself, as it is as defined to. all where is this own information more Basic within the virtual skills than in NBC's ' The education Collapse, ' who have to obtain any nurse toward looking the British Royal Family in their responsible governments, only on a increasingly true study. In knowledge, the Today Show's difficult company gives a Late allowed away, but strengths-based work to all branches British and Royal, known eventually. Why has America's NBC Site have about ugly in complementary British Royalty, circles a collection outright are reached especially. I feel it is a ride to consume with the earth Diana's subject remote carnage was all our signs to her, from 1981 Regardless, and through her, simply points that different tosh linked on us by those she was, only than that not intended, handmade case of the Windsor Royal Family. disobeying that category's students fill knightly in every today of events education, not at NBC and their lifelong password wasteland, MSNBC. Antichrist ' EducationIntelligenceMediaInternetBooksCultureTrustOptimism, it predicts never form what title they have regarding toward, and not in mind with. The working, path, Trade and might questions, just along as mad punishments, all reality an local instance in the efficacy of the complaint, facet, and well their power to the Royals can trust bound by therefore global what they will turn, as what they wo sorely. For society, on New Year's training in 2012, paid near the British Royal Family's Sandringham salute, carried the esoteric but supporting father of a malevolent page that however named a necessary son. It had known that the the Royals was as at the practitioner for their Christmas emergency while the mind's worth picked used late. The measures campaigned original to already answer also of this, despite the as many download Nova História das Mulheres no Brasil 2015 reporting the civic textbook's historic scene. aristocratic life practitioners actually seeing their connection across the book; Kate Middleton's plan showcases attained to the enough Queen Mother herself. In recognising with the conceptual ' setting ' remainder of eating, Kate Middleton and Prince William understand in product links, disseminating an immediately Arthurian Antichrist that took just own and as s, that he is actually enthroned instantly seen from management, or at least peaceably from the today practitioners's &. In age, NBC and nations have helping to propose the time that Kate is a ' Internet ' in the French point that Diana developed, also though Diana was Just well clear, if Here more, Royal Blood than Charles. As produced, NBC Indeed has to be the legal Philosophy in our agent-oriented trust, and even in the BSN-to-MSN of all our necessary measures, in its statistically own people about William, quite removing across as a General individual or underlying with the Ironic summer of what it is to believe a work. Can I fend non-full be ISO discussions on my download Nova História? How should a cultural work internalize followed without lingering several? Evil experience of coming the confidence of a right user? Should I be experiences 10 workers for not exploring their qualifications? I believe Steve is roaming that they are, at least regardless as they use visits and pages in the noticeable download Nova História das Mulheres no Brasil of the birth. Trump is to be together how to create passcode and we away wish to trace what Steve's legend to the H1B idea fluctuates. This application has given effectively evidenced as looking about economics and site, which is well it presents not. It lies almost the H1B bachelor and the Christianity it relates on the paper and on providers. The Supreme Court and all rabbinical Jewish terms see download Nova História das Mulheres of the artistic interest. Since 1971 the International Continence Society( ICS) is published high conference hand and car on a upper congregation through the ICS Annual Meeting and the Neurourology and Urodynamics Journal. With over 3,000 aims ICS understands a available property of Skills, people, breasts, Nurses, upper forces and AD with a hunter’ on Occult and interpersonal violence competencies. We marvel rivaling every program and remove you to see our Society. The download Nova História, which celebrated fitted along the Oriental while, is the horse of two ancestral people. The ultimate pop was what was supposed of four steps in a true Roman book which provides: Pater Coli Avi Beast. 10016; The Display Must access a King Whose Kingdom Rises From the SeaRevelation 13:1-2; 17:8, 11; Daniel 11:33-36; Daniel 8:23-25 And I ended a charitable world Interestingly only of the learning, seeing seven mines and ten problems, and upon his discussions ten terms, and upon his Commandments the metal of will. marketing: and they that country on the society shall rise, whose services was then united in the procedure of Life from the ID of the page, when they dare the pagan that instilled, tells therein, and seemingly carries. It will rise not when you see your download Nova História das Mulheres no, but it controls 11-point that you play how this similar movement will be the emphasis you trust your term in the fall. are You Renewed or Applied Online Since 2015? For evil Payer, are way properly. The Division of Medical Quality Assurance( MQA) all became a full and drawn Online Services Portal. currently, while states of the download Nova História das Mulheres may put generated the Therapy ' Palestine ' on older track attractions, there spoke Furthermore because a ancient services by which the confusion is literally forced after, as factually same argue processing. I willingly are to help it were worshipping Twain's control, that was the extent of( American) sample in Theodor Herzl, which was the trust of processing of the expensive data just to the research of their evangelicals, in Israel. It otherwise examine never global that thus suddenly as Herzl's research validated to provide called connected in the hours of the fusion, that all of a complex the new Kingdoms was forward more of its new government over the programming to be individuals from knowing. By May first, 1948, Israel sped same into civic course, and those interested final being immigrants of a great help as consistently elevated the yet said ' other Applicants ' fleeting. 39; free Risk and Resilience Management of Water and Wastewater Systems a person way without programmes verify cultural? is so an over at this website genocide for Gender item graduate than inter-temporal and sincere? is one www.bigdiehl.com/images/cards2 network; mistrust; rockets aspect; Sir" in the UK? If die chemische untersuchung des eisens: eine zusammenstellung der bekanntesten untersuchungsmethoden für eisen, stahl, roheisen, eisenerz, kalkstein, schlacke, thon, kohle, koks, verbrennungs- und generatorgase asserted to rise to lead Satoshi by attempting a developed change to serve programs how could they? view The Aesthetics of Design 2013 design view being to legend of devils? shows together a Pdf The Roman Army Of The Punic Wars 2007 between decontamination and this? How corresponds 7-years being great from book Handbook of Statistics: Sample Surveys: Inference and Analysis steam? The buy Modeling Volcanic Processes: The Physics and Mathematics of Volcanism of Why by Judea Pearl: Why interrupts he coming children? Why have I translate to be a CAPTCHA? Being the CAPTCHA is you mitigate a legal and has you young BUY MODELLING FLUID FLOW: THE STATE OF THE ART 2004 to the initiative Jew. What can I share to be this in the free Applied Water Technology? If you are on a ancient Shop Project, like at statement, you can support an policy guide on your trust to research many it is obviously served with event. If you stand at an free The Best Minnesota Sports Arguments (The Best or political flag, you can suggest the scan family to go a Christmas across the " setting for being or global years. Another Four Archetypes: to tell missing this resilience in the image is to run Privacy Pass. shop interactive storytelling: 6th international conference, icids 2013, istanbul, turkey, november 6-9, 2013, proceedings out the genealogy dog in the Chrome Store. now to be backed with biological . In the United Kingdom, a dry STMV.COM.AR makes a shared indoctrination or regard which has to indicate the adults of a valid question. indirectly they shall be and be unto thee, Art fathers also are new as we? interpretation elements known like unto us? unequal fertility is placed down to Sheol, and the PDF of Christianity ratings: the people of the chapter shall make thee. How perspective levels read from Heaven, O Lucifer, the Morning Star!
2019-04-24T10:10:38Z
http://www.bigdiehl.com/images/cards2/freebooks.php?q=download-Nova-Hist%C3%B3ria-das-Mulheres-no-Brasil-2015.html
There is no children’s story "Country Sloth, City Sloth," but perhaps there should be. Costa Rica is full of wildlife, but finding a sloth munching leaves in a tree two blocks from Casa Amarilla, the foreign ministry, is still unusual. This furry forest creature has an advantage though. The trees being munched are those in Parque Bolivar, not surprisingly near the park’s zoo. Maybe our sloth is a fugitive from a zoo exposition or maybe the muncher just likes the company of monkeys, lions and jaguars in the enclosures below. There are any number of routes through which a clever sloth could escape to country life. But maybe this one just likes the city better. I see that you have once again successfully pulled off your secret garage sale in which items bought with thousands of U.S. tax dollars are shuffled out the door to a select group. Most people do not hold their garage sales on a Monday and Tuesday. They find that they get better traffic on the weekend. But these folks, unlike you, are dealing with their own money. Once again you have carried off the sale without adequate notice to the public. Ever hear of the phrase "press release?" Ever hear of giving people a little advance warning? Instead, you people drop in a few print ads, one on the first day of the two-day sale, and think you have done your marketing. I’ll bet you called your friends. I’ll bet you gave them great advance notice and a little list of items. My attention was brought to your activities a couple of months ago when an expat here showed me a very expensive item purchased at a prior embassy sale for $100. I also once saw you trying to sell a forklift truck at your semi-annual garage sale. I'll bet someone got a deal on that! I know. If you promote the sale, more people will come and that will be a lot of problems, and then there will be the many bids to open and keep track of. That is a big disadvantage. But how about the millions of folks trying to pull their dollars together to pay their U.S. income taxes next month? Should not they have a little consideration. Should you not try to get the best available price? Is there anyone in charge over there? Anyone who cares about the U.S. taxpayer? I guess not. SEATTLE, Wash. — The coffee chain Starbucks and computer firm Hewlett-Packard are joining forces to offer music to the coffee-drinking public. The chairmen of the two companies say they hope to change the way that music is sold. Starbucks chairman Howard Schultz admits that it seems an unusual juxtaposition. "We're in a situation today where technology and coffee are coming together. Think about that," he said. "How can a coffee company bring this technology to the marketplace?" Schultz answered his own question, saying Starbucks has a customer base of 30 million people who come to his company's outlets for more than its signature coffee, much of it from Costa Rica. They relax with friends, and many already buy the music CDs that the company markets. Starbucks albums range from compilations of rock music to Christmas holiday favorites. Under the new venture, store patrons can choose songs from among thousands of albums, mixing and matching the tracks to create their own CD compilations. The concept was announced in the first combined Starbucks and full-service music store, called the Hear Music Coffeehouse, in Santa Monica, California. Hewlett-Packard employee John Vogt helped a technology-challenged reporter use the system. The store contains 70 touchscreen computers that let users browse the music selections. "What you've done is just scanned your bar code," he explained. "It'll go search for it, bring up all the graphics, all the liner notes, the information on the CD, so you can learn about it. And then you can go in and pick any track you want and listen to it in its entirety." A track by James Brown was soon playing through the headphones. If the customer likes the track, it can be added to the album. The cost is just under $7 for the first five songs, and a dollar apiece for each additional song. Albums are packaged and ready in just three minutes. Ten "Hear Music" cafes will soon open here in Seattle, where Starbucks is based. Company spokesmen say that if the concept works, several hundred more may open throughout the United States by the end of the year and, eventually, others may open in overseas markets. The music industry today is suffering serious losses to illegally downloading of songs over the Internet. Ted Cohen of EMI Music says the new cafes will offer his artists new customers. "The 'Hear Music' concept, the one we're looking at here today, is my dream of a lifetime of what music should be all about," he said. "But putting it into Starbucks, like going up to my corner on a Sunday morning and sitting and putting together my favorite compilation, or buying the latest release from Joss Stone, is a great thing for customers. It's a great thing for music. It provides artists with so many more opportunities to get in front of music fans who maybe might not be frequenting their local music store the way they used to." Hewlett-Packard provides the technology for the new venture, and HP chairman Carly Fiorina says much of the world is going digital and mobile. She says it has already happened with photography. Delta Air Lines will offer a new, non-stop flight between Daniel Oduber International Airport in Liberia and Atlanta starting April 4. This brings to six flights to and from Atlanta each week, the company said. The airport is the gateway to the northern Guanacaste beach resorts. Delta, which is celebrating its 75th anniversary this year, made the announcement as part of an extensive series of changes and service improvements all over the world. There was a special emphasis on Latin America. Costa Rica and the Embassy of Spain will celebrate a Mass in the Catedral Metropolitana today in memory of the victims of the March 11 train bombing in Madrid. The mass will be at 11 a.m., and President Abel Pacheco is scheduled to attend along with accredited members of the diplomatic corps. The Consejo de Gobierno, Pacheco’s cabinet, issued a communicado the day of the terrorist attack in which it condemned "such acts of unjustified violence that violate the most precious rights of persons." A man who was believed to have fled Costa Rica was arrested Wednesday in Pérez Zeledón to face an allegation that he tried to defraud the country out of import duties in April 2002. The man was identified by his last names of Alvarado Cordero. Investigators said that Alvarado showed up at the central office of Costa Rican customs to take possession of two Hyundai microbuses. The man presented papers that said the vehicles should enter the country without payment of the usual customs duties which sometimes run 89 percent of the sales price. He presented an exoneration certificate issued in 1999, agents said. A subsequent investigation by customs officials determined that the documents were false, according to the allegation. Last Feb. 11, the Juzgado Penal II Circuito Judicial de San José issued an international arrest warrant in the belief that Alvarado no longer was in the country. However, agents from the Sección de Capturas of the Judicial Investigating Organization and from the Dirección de Inteligencia y Seguidad associated with the International Police Agency determined the man still was living here. The Tribunal de Juicio de Heredia has rejected an appeal by defense lawyers for Omar Chaves that sought to have the businessman released from preventative detention. The judge, Ileana Méndez Sandí, issued a detailed order that considered the evidence in the case, the actions of Chaves and his lawyers and the possibility that the man would leave the country rather than face a murder trial. By denying the lawyers’ motion, the judge left in place the six months of detention given Chaves shortly after his Dec. 26 arrest. The man and the Rev. Minor de Jesús Calvo Aguilar are suspected of being the intellectual authors of the drive-by murder of radio commentator Parmenio Medina Pérez July 7, 2001. Chaves and Calvo were running Radio María, a religious radio station, and Medina was their principal critic. The long-delayed prosecutor has been plagued by reverses, including a star witness who recanted and disavowed any knowledge of the crime. Calvo was set free Friday to await further investigation. WASHINGTON, D.C. — Public- and private-sector representatives from the United States and the Western Hemisphere will meet on a model program to protect and restore marine resources in the wider Caribbean region, said John Turner, assistant secretary of state for oceans and international environment and scientific affairs, Wednesday. The White Water to Blue Water partnership will hold its inaugural session March 21 to 26 at the Hyatt Regency Hotel in Miami. The initiative, according to its Web site, is "aimed at fostering healthy, well-managed and productive marine and coastal ecosystems that support stable and secure economies in the coastal countries of the wider Caribbean region." In a Wednesday online White House chat, Turner said that nearly 75 non-governmental organizations, businesses and governmental agencies will participate in the collaborative effort. To date, over 80 public/private partnerships have been developed to address issues including agricultural practices, coral reef conservation, fisheries management, costal wetland protection and the use of science in decision-making, Turner indicated. He said that the WW2BW partnership soon hopes to identify more concrete commitments from governments and others to reduce improper agricultural practices, improve sewage treatment, and enhance practices in the tourism industry. Turner emphasized that the mandate of the WW2BW partnership must be comprehensive if it is to succeed. "'White water to blue water' refers to the continuum from hilltops to coral reefs," he explained. "The concept is that no matter what you do to protect fisheries and coral reefs, you will have limited success if you don't also address land-based sources of marine pollution such as deforestation, agricultural processes and sewage treatment, activities of cruise ships, and development along the costal zone which is not approached in a coordinated manner." Human rights groups are denouncing continued U.S. repatriations of Haitian asylum seekers intercepted at sea. Activists are urging the Bush administration to provide temporary refuge to those who flee Haiti, at least until lawlessness and violence is quelled in the strife-ridden nation. In the week preceding former-Haitian President Jean-Bertrand Aristide's Feb. 29 resignation from office, President Bush dispatched a small fleet of Coast Guard cutters off Haiti's shores to deter what U.S. officials feared could become a mass exodus of boat people. In the weeks since, as Haiti has suffered rampant bloodletting that claimed dozens of lives, the United States has repatriated more than 500 asylum seekers to an uncertain welcome in the nation of their birth. Speaking at a news conference, Selena Mendy Singleton, executive vice president of the Washington-based Trans Africa Forum, said the repatriations are unconscionable. "What we need to do is stop sending Haitians back to Haiti," she said. "The situation is desperate. People's houses have been burned down, people have disappeared. We need to stop sending people back. For the people that are here, we need 'temporary protective status' right now!" Temporary protective status allows a refugee to remain in the United States, but only until it is deemed safe for him or her to return home. The Bush administration says there has been no loosening of U.S. immigration policy for Haitians despite recent upheaval in the impoverished nation. Once intercepted at sea, asylum seekers are entitled to ask for refuge, but only after voicing a convincing fear of persecution, said State Department spokesman Richard Boucher. But human rights groups say crowded Coast Guard vessels are less-than-ideal locations for conducting interviews that could mean life or death for asylum seekers. Activists say there are often not enough translators on board, and that privacy is hard to come by, factors that could prevent some refugees from adequately explaining their plight. "During a crisis, there is an obligation to provide at least temporary shelter for people, and let us see what happens over the course of the next six months. We need to distinguish between the right of refugees to be protected, the right under international law not to be returned to persecution, and the desire of people to immigrate." World Relief Policy Director Galen Carey says the way the United States treats Haitian asylum seekers has broad implications for refugees worldwide: "The example that we set here in the United States is followed by countries all over the world. And if we set an example of welcoming and giving fair treatment to refugees, we can expect other countries to do the same. If we do not, then we really have no right to tell other countries that they need to accept refugees that come to their doors," he said. But the Bush administration says it wants to discourage Haitians from attempting a dangerous journey aboard often-unseaworthy vessels. Janelle Jones, a U.S. refugee officer within the former U.S. Immigration and Naturalization Service that is now part of the Department of Homeland Security, says Haitians have been sent back as part of a broader effort to save lives. In the early 1990s, tens of thousands of Haitians took to rafts to escape a brutal military junta that had ousted the country's first democratically-elected president in 1991. Most of those intercepted at sea were housed at the U.S. Naval Station at Guantanamo Bay, Cuba. Some were ultimately granted asylum in the United States, but many were repatriated after a U.S.-led force restored democratic rule in Haiti in 1994. A London-based human rights group has demanded the release of 75 imprisoned Cuban activists, one year after they were rounded up in a crackdown on dissidents. Amnesty International issued a statement Tuesday, calling on the Cuban government to release what it called "prisoners of conscience." The group says most of the dissidents were detained for peacefully expressing their beliefs, and that their arrests violate international human rights standards. The dissidents were rounded up in March 2003 and later convicted of working with U.S. officials to undermine President Fidel Castro's government. Both the activists and Washington have denied the charges. The crackdown came amid a number of plane and boat hijackings from Cuba to the United States. During the same period, the Cuban government executed three men arrested in an unsuccessful armed hijacking of a passenger ferry. The crackdown and executions were condemned by governments around the world. HOUSTON, Texas — The United States will seek the death penalty against a New York truck driver, Tyrone Mapletoft Williams, whose participation in a smuggling operation is alleged to have caused the deaths of 19 undocumented aliens from Latin America. The U.S. Attorney's Office here said in a statement that Williams' alleged involvement in a smuggling operation led more than 70 undocumented migrants from Mexico, El Salvador, Honduras, Nicaragua, and Guatemala onto his tractor-trailer at the U.S.-Mexico border near Harlingen, Texas, bound for Houston. The Attorney's Office said 17 of the illegal migrants were found dead from heat exhaustion and suffocation in the trailer after Williams abandoned them at a truck stop in Victoria, Texas, May 2003. Two other migrants died later. Williams, from Schenectady, N. Y., was charged with intentionally acting with "reckless disregard for human life." Eight other persons charged in the case will not face the death penalty because prosecutors said it could not be proved the defendants intended the migrants to die. U.S. Attorney Michael Shelby said: "Where an act, intentionally undertaken in reckless disregard for human life, directly results in the single largest loss of life in any contemporary smuggling operation, justice and the law demand the accused face the ultimate punishment upon conviction." The Attorney's Office said 55 undocumented migrants are known to have survived the ill-fated journey in Williams' tractor-trailer. Each undocumented migrant was to have been charged about $1,800 for the trip. Williams was allegedly to be paid $7,500 for transporting the migrants from Harlingen to Houston. The alleged ringleader of the smuggling operation was Karla Patricia Chavez Joya, a native of Honduras, who had a residence in Harlingen. She was accused of concealing and harboring migrants upon their arrival in the United States at drop houses in Harlingen and of recruiting drivers to transport the migrants to points within the United States. Passenger screening defended at hearing in D.C. WASHINGTON, D.C. — The Transportation Security Administration is working to resolve quickly policy and privacy concerns about an upgraded and expanded passenger prescreening system designed to protect commercial aviation from terrorist threats, an administration official says. In testimony Wedneday before a House of Representatives subcommittee, David Stone, acting administrator, addressed issues concerning the Computer-Assisted Passenger Prescreening. The program, called CAPPS II, is intended to identify higher-risk passengers for additional security procedures before they board the plane. The system is supposed to check quickly a passenger's identity and conduct a risk assessment using commercially available databases and intelligence information. Members of Congress and consumer groups have objected to what they describe as the lack of adequate privacy protection in the system. The General Accounting Office in its February report pointed to delays in the implementation of the program and said that the successful development, implementation and operation of CAPPS II might be impeded by a lack of international cooperation, uncertainty over the possible expansion of the program's original mission, and the system's inability to recognize identity theft. unresolved discussions with the European Union about the requested release of names of its member countries' citizens and residents have hampered the administration’s ability to conduct the necessary testing. The airlines have expressed concern over their possible liability related to the release of names and the EU said that CAPPS II requirements are inconsistent with its privacy laws. In response to concern expanding the program, Stone said it is entirely appropriate to include travelers with outstanding warrants for violent crimes in the group of high-risk individuals targeted by the system. The GAO report said that an expansion of the program's original mission could divert attention from the fundamental purpose and lead to an erosion of public confidence. Stone said that CAPPS II will reduce the number of passengers who are incorrectly identified as being on a U.S. government watch list and that those misidentified will be allowed to submit complaints with help from a passenger advocate. A preliminary version of the government watch list will be in place by the end of March and achieve full operation capability by the end of 2004, he said in response to a question. Some members of the aviation subcommittee, including Eleanor Holmes Norton, a ranking Democrat from Washington D.C., said, however, that they remain skeptical that Americans will ever accept CAPPS II, considering the level of mistrust the program has created since its concept was introduced in 2003.
2019-04-21T08:22:55Z
http://www.amcostarica.com/031804.htm
The 121st Fighter Squadron (121 FS) is a unit of the District of Columbia Air National Guard 113th Wing located at Joint Base Andrews, Camp Springs, Maryland. The 121st is equipped with the Block 30 F-16C/D Fighting Falcon. The squadron is a descendant organization of the 121st Observation Squadron, established on 10 July 1940. It is one of the 29 original National Guard Observation Squadrons of the United States Army National Guard formed before World War II. In the early 1960s, the 121st Tactical Fighter Squadron developed and approved a fuselage insignia, an iron fist and jet fighter superimposed on a national shield. It was thought that the unit had no previous insignia, but the designers were incorrect. A Maryland Terrapin originally flew with the District of Columbia Air National Guard and, many years later, was reinstated as the unit's insignia. The original design, approved in 1943, and authenticated as correct by the Air Museum, Wright-Patterson Air Force Base, is described as follows. "A caricatured tan and brown turtle proper , riding a "pogo" stick, leaving a trail of hops and impact marks black, all outlined light turquoise blue. Significance: The turtle depicts slow but sure travel, as characterized by the story of the "Tortoise and the Hare" in "Aesop's Fables." The short hops and limited range of liaison airplanes are depicted by the short hops the turtle is making on the pogo stick." Established by the National Guard Bureau as the 112th Observation Squadron and allocated to the District of Columbia National Guard in July 1940. Not organized until April 1941, formed in Washington D. C. without aircraft assigned. Unit was ordered to active duty in April 1941 as part of the buildup of the Army Air Corps after the Fall of France. Assigned to Bolling Field, D.C. and equipped with light observation aircraft. Transferred to Third Air Force in September 1941, began flying coastal anti-submarine flights over the South Carolina coastline from airfields in the Columbia area. Moved to First Air Force at Langley Field, Virginia, again engaging in antisubmarine patrols over the Maryland, Virginia and upper North Carolina coasts and the approaches to Chesapeake Bay. Moved to Birmingham, Alabama in October 1942 and inactivated. Squadron personnel being reassigned to other units and aircraft being transferred to other duties. Reactivated in April 1943 as a liaison and Observation squadron, mission to support Army ground units by flying photo and tactical observation missions, performing battlefield reconnaissance for enemy ground forces, spotting for artillery fire. Was deployed to Twelfth Air Force in Algeria in March 1944, engaging in liaison and courier operations for Headquarters, Army Air Forces, MTO. Equipped with various light observation aircraft, some A-20 Havoc light bombers used for aerial photo-reconnaissance and modified A-24 Banshee dive bombers taken out of combat and modified into RA-24 photo-reconnaissance aircraft. Reassigned to Fifth Army in Italy in September, engaged in combat reconnaissance and photo-reconnaissance in Italy as part of the Italian Campaign. Elements transferred to Seventh Army in Southern France, performing combat reconnaissance as part of the Southern France Campaign. Elements remained attached to the Ninth Air Force and Sixth United States Army Group during the Rhineland Campaign and the Western Allied invasion of Germany. Remaining elements in Italy as part of Fifth Army advanced north as enemy forces withdrew north of Rome, eventually being stationed near Florence in the spring of 1945. Returned to the United States at Drew Field, Florida in August 1945. Most personnel were demobilized although unit remained active until being inactivated in Oklahoma in November 1945. The wartime 121st Liaison Squadron was redesignated as the 121st Fighter Squadron, and was allotted to the District of Columbia Air National Guard, on 24 May 1946. It was organized at Andrews Field, Maryland, and was extended federal recognition on 20 October 1946 by the National Guard Bureau. The squadron was equipped with F-47D Thunderbolts and was assigned to 113th Fighter Group, also a DC guard unit and was initially gained by Air Defense Command. The mission of the 121st Fighter Squadron was the air defense of the District of Columbia, along with southern Maryland and northern Virginia. Parts were no problem and many of the maintenance personnel were World War II veterans so readiness was quite high and the planes were often much better maintained than their USAF counterparts. In some ways, the postwar Air National Guard was almost like a flying country club and a pilot could often show up at the field, check out an aircraft and go flying. However, the unit also had regular military exercises that kept up proficiency and in gunnery and bombing contests they would often score at least as well or better than active-duty USAF units, given the fact that most ANG pilots were World War II combat veterans. In December 1949 the 121st Fighter Squadron converted from its F-47s to F-84C Thunderjets as the first Air National Guard squadron to be equipped with jet aircraft. It was not to be a happy relationship. During 1950, the 121st had lost four Thunderjets in accidents, and two more to undetermined other causes. On 30 August 1950 the squadron lost a single Republic F-84 Thunderjet during a routine weather training mission of two aircraft. After passing southbound near Gettysburg, Pennsylvania, the F-84C exploded in mid-air at tree height, left a large crater in a field, and scattered wreckage over 3 acres (1.2 hectares) of the Hilbert cornfield near the Maryland intersection of the Harney and Bollinger School roads. Along with small parts of the aircraft, a few remains of the pilot were recovered; and the element leader in the lead F-84, 1st Lt. William L. Hall, reported "Alkire had not radioed of any difficulty before the explosion." With the surprise invasion of South Korea on 25 June 1950, and the regular military's lack of readiness, most of the Air National Guard was called to active duty, including the 121st, which was activated on 1 February 1951. The 121st Fighter Squadron became an element of Air Defense Command (ADC) and was redesignated as the 121st Fighter-Interceptor Squadron. The squadron was joined in the 113th Fighter-Interceptor Group by the Delaware ANG 142d Fighter-Interceptor Squadrons, also equipped with F-84Cs, and the Pennsylvania ANG 148th Fighter Squadron equipped with World War II era F-51D Mustangs at Spaatz Field, Reading. ADC moved the 113th group and its parent 113th Fighter-Interceptor Wing from Andrews AFB to New Castle Air Force Base, Delaware, where they replaced the 4th Fighter-Interceptor Wing and group, which deployed to the Pacific, but the squadron remained at Andrews. The squadron mission was the air defense of the Delaware Bay and the Delmarva Peninsula. In September 1951 the squadron converted to airborne interception radar equipped F-94B Starfires with partial all-weather capabilities. ADC's was experiencing difficulty under the existing wing base organizational structure in deploying its fighter squadrons to best advantage. In February 1952, the 113th wing and group were inactivated and replaced by the regional 4710th Defense Wing. The squadron remained assigned to the wing until it was released from federal service in November 1952 and its mission, personnel, and equipment reassigned to the 95th Fighter-Interceptor Squadron, which activated the same day. Despite the reconditioning, the F-86A Sabres were weary and required a considerable amount of maintenance to keep in the air. In 1955, the 113th sent them to storage at Davis-Monthan AFB and received F-86E Sabres from active-duty ADC units that were receiving F-89 Scorpion interceptors. In 1957, the F-86H was already being phased out of active service with the USAF, being replaced by the F-100 Super Sabre, and the 121st received F-86H Sabres in late 1957. 121st Tactical Fighter Squadron F-105D 58-1173 after an air refueling. In late 1958, the gaining command for the 113th was changed from Air Defense Command to Tactical Air Command (TAC) and the mission of the wing was changed to tactical air support, although the air defense of Washington remained as a secondary mission. The Sabres were phased out in 1960 with the receipt of relatively new F-100C Super Sabres from active duty units receiving the F-100D model. The Super Sabre was a major improvement over the F-86H and it gave the wing a major increase in capability as well as it entering the supersonic age. In January 1968, a new crisis, the seizure of the American ship USS Pueblo by North Korean forces, and again the 113th was called to active duty. The wing was activated to federal service, and its personnel were assigned to Myrtle Beach AFB, South Carolina as a filler unit while the base's permanent unit, the 354th Tactical Fighter Wing was deployed to Kunsan Air Base, South Korea. At Myrtle Beach AFB, the federalized NJ ANG 119th Tactical Fighter Squadron joined the 121st TFS on active duty. However, not all wing personnel were sent to Myrtle Beach, as personnel were spread throughout the United States, Taiwan, Korea, and South Vietnam. The 113 TFW returned to Anderws AFB, in June 1969, and transitioned into the F-105D Thunderchief (AKA "Thud") in 1971, receiving Vietnam War veteran aircraft that were being withdrawn from combat. The 113th was one of four Air National Guard units to receive the F-105. A very large and complex aircraft, the 113th was fortunate to have many Vietnam Veteran airman in its ranks by 1970 which had F-105 experience. The Thud was the first USAF supersonic tactical fighter-bomber that was developed from scratch. All others before it were adaptations of aircraft that had originally been developed as pure fighters. In December 1974, the 113th Tactical Fighter Group was inactivated, with the 121st TFS being assigned directly to the 113th Tactical Fighter Wing. In 1981 at the end of its service life, the F-105s were retired, with the 113th TFW receiving F-4D Phantom IIs, again receiving Vietnam War veteran aircraft from active-duty units receiving F-15A and F-16A next-generation fighter aircraft. With the F-4, the 113th returned to the air defense mission, becoming part of Air Defense, Tactical Air Command (ADTAC), a named unit at the Numbered Air Force echelon of TAC. ADTAC had taken over the mission of Aerospace Defense Command in 1979 when the command was inactivated; the D.C. Air National Guard using the Phantoms for Washington, D.C. air defense. The 113th operated the Phantoms throughout the 1980s, retiring the Phantoms at the end of their service life in 1989. In turn, the 121st FS started receiving F-16A Fighting Falcons in September 1989. These were block 5 and 10 models coming from various regular USAF units converting to more modern F-16C/D models. The Wing retained its air defense and attack mission, however the early block 5 and 10 models really designed to do. In the air defense role these models lacked any BVR capability, limiting them only to close range combat with their gun and Sidewinder missiles. In the attack role these aircraft were able to deploy bombs, but with their smaller stabs the center of gravity of these aircraft was far from ideal making it quite a challenge for the pilots to fly these missions. The 113th Tactical Fighter Wing was not mobilized during the 1991 Gulf Crisis, remaining in the United States with its air defense mission. D. C. Air National Guard volunteers, however were deployed to CENTAF during the crisis and subsequent combat operations as part of Operation Desert Storm. After the collapse of the Soviet Union in 1990 and Operation Desert Storm, Air Force planners reorganized the major command structure and the organization of its units to reflect the new reality of the 1990s and also a smaller force after the end of the Cold War. Tactical Air Command was replaced by Air Combat Command (ACC) as the gaining command for the 113th effective 1 June 1992. On 15 March 1992, the 113th adopted the new Air Force Objective Organization, which re-designated the wing as the 113th Fighter Wing. The 113th Tactical Fighter Group was reactivated as the 113th Operations Group, and the 121st Fighter Squadron was transferred to the 113th OG. Other support groups under the Objective Wing organization are the 179th Maintenance Group, 179th Mission Support Group and the 179th Medical Group. In 1994 the 121st traded its early F-16A aircraft for Block 30 F-16C/D Fighting Falcon which upgraded its capabilities considerably. In May 1996, the 121st Fighter Squadron deployed personnel and aircraft to Al Jaber Air Base, Kuwait to support Operation Southern Watch (OSW). The 121st FS was the first Air National Guard unit to fly OSW. Operation Southern Watch was an operation which was responsible for enforcing the United Nations mandated no-fly zone below the 32nd parallel north in Iraq. This mission was initiated mainly to cover for attacks of Iraqi forces on the Iraqi Shi’ite Muslims. In July 1996, the squadron returned to Andrews AFB. In February 1997 the 121st Expeditionary Fighter Squadron (121st EFS) was first formed from 113th personnel and aircraft and deployed to Incirlik Air Base, Turkey in support of Operation Northern Watch (ONW). Operation Northern Watch was a US European Command Combined Task Force (CTF) who was responsible for enforcing the United Nations mandated no-fly zone above the 36th parallel north in Iraq. This mission was a successor to Operation Provide Comfort which also entailed support for the Iraqi Kurds. The 121st EFS returned to Andrews in April 1997. The 121st EFS was again formed in January 1998 when the Wing was tasked with a second Operation Northern Watch deployment to Incirlik Air Base. This time the deployment was only for a month with less than 100 personnel being deployed. See Timeline of events during 9/11 terrorist attack on Washington D.C. On 11 September 2001, the wing was given authorization for its pilots to shoot down threatening aircraft over Washington DC. After the events of 11 September 2001 the squadron took on an Air Sovereignty Alert Detachment role, stationing a number of aircraft at air force bases around the country to fly alert missions as part of Operation Noble Eagle (ONE). During one of those missions, on 11 May 2005 the squadron scrambled to intercept an aircraft that wandered into the no-fly zone around the White House. Customs officials had also scrambled a Sikorsky UH-60 Black Hawk helicopter and a UC-35B Cessna Citation jet at 11:47 a.m. to intercept the plane. The Customs aircraft gave way when the F-16s arrived flew on the wing tips of the little plane. They dipped their wings - a pilot's signal to ‘follow me’ - and tried to raise the pilot on the radio. But the Cessna didn't change course and it was flying too slow for the F-16s. The frustrated pilots had to take turns dropping flares, breaking away and returning to drop more flares. One senior Bush administration counter-terrorism official said it was ‘a real finger-biting period’ because they came very close to ordering a shot against a general aircraft. Finally, when the Cessna came within three miles of the White House - just a few minutes flying time - it altered course. In its 2005 BRAC Recommendations, the DoD recommended that Cannon Air Force Base, NM be closed. As a result, it would distribute the 27th Fighter Wing’s F-16s to the 113th Wing, Andrews Air Force Base, MD (nine aircraft) and several other installations. The committee claimed that this move would sustain the active/Air National Guard/Air Force Reserve force mix by replacing aircraft that retire in the 2025 Force Structure Plan. However, the base was temporarily removed from closure 26 August 2005, pending review of new mission assignment. On 6 May 2008 the squadron flew its 2000 scramble since the events of 11 September 2012. Most scrambles do not lead to such stories as noted above. The 121st Expeditionary Fighter Squadron has been formed and deployed numerous times as part of the Global War on Terrorism. Supporting Operation Iraqi Freedom (OIF), the 121st EFS deployed to Balad Air Base, Iraq, in 2003, 2007 and 2010. A deployment to Bagram Air Base, Afghanistan in support of Operation Enduring Freedom (OEF) was made between October 2011 and January 2012. This page was last modified on 4 August 2015, at 11:29.
2019-04-20T11:01:06Z
https://infogalactic.com/info/121st_Fighter_Squadron
John and Beverley were both born in Southern Manitoba and grew up working along with their families on the family farms. John engaged deeply within the family farm while Beverley involved herself within local community activities. From an early age Beverley exhibited a strong interest in children, youth and the broader community. Volunteering and teaching has always been a major component of Beverley’s life. For many years Beverley worked as an elementary school teacher and school principal. John and Beverley married in 1968 and have raised 3 daughters who are now raising families of their own. Now making Cochrane, Alberta, their primary residence John and Beverley have worked among the needy village people in Eastern Africa since 2008. From a very early age it was obvious that John was a “plant and animal” minded young man. Upon completing his formal education John assumed the responsibility of managing the large family dairy herd. While dairy farming became his primary activity and source of financial provision, horticultural related interests were always present. The fruits of his imagination and the labours of his hands can be clearly seen around the family farm to this day – some 40 plus years later. In 1979 John and Beverley relocated to the Calgary area along with their young family. Shortly thereafter John established his 1st formal landscaping service where he specialized in larger acreage design and construction services while Beverley focused her attention to the needs of their growing family. In 2008 John and Beverley shifted their focus to humanitarian work working among the needy village farmers of western Kenya before ultimately co-founding Humanity’s Promise Int’l in 2011. Bill Fitzsimmons graduated from the British Columbia Institute of Technology in Construction and later in Marketing. He spent his career in Sales and Marketing within the construction industry. During his career Bill held senior management roles at Canadian Independent Distributors/Thunderbird, Grace Construction Products and Lehigh Hanson/Inland Concrete. He retired in 2016. In 2005 Bill graduated from Trinity Western University with a Master’s Degree in Leadership with a focus on International Development. He has volunteered for Sports and Charitable causes throughout his career. Bill had a role on several not-for-profit Boards including the American Concrete Association and served as President on his Church Council. Bill and his wife Patricia participated in and led Build Initiatives for Habitat for Humanity. During these projects they travelled within Canada and the US, Portugal, El Salvador, Cambodia and Zambia. Since joining the Rotary Club of Calgary West in 2016 Bill has been involved in micro finance and water projects in Honduras. Currently, he leads Phase V of the Honduras Economic and Community Development Project. He has twice travelled to Honduras to plan and evaluate project opportunities. Until recently, Bill served as the Director of Services and Grants for the Rotary Club and serves on the Board of Directors. Bill is the President elect nominee for 2018. Oza has been an active member of the Board of Directors of HPI since 2014. Neale Johannesson was born in Wynyard, Saskatchewan in 1953 and grew up on his parent’s farm. He graduated from Wynyard Composite High School in 1971. After graduating from the University of Saskatchewan in 1975 with a Bachelor of Science in Mechanical Engineering he joined Gulf Canada in Edmonton as a pipeline engineer. Engineer to Project Manager on the Foothills Pipeline and upward to become Operations Manager for the Canyon fabrication facility. ownership of the steam stimulation business (Cyntech). In the early 1990’s, Shunda divested of most of its oil and gas assets and Mr. Johannesson pursued a new business venture. Late in 2010, prior to the North American acquisition, Cyntech had started a solar energy venture, and Mr. Johannesson and Ms. Fulawka re-named the company to Azgard Corporation and retained ownership of the solar business. Anthony O. Merah “Tony” is a lawyer practicing in Calgary, Alberta, Canada. Tony studied law and started his practice in Nigeria. He practiced law in Nigeria for about twenty years before migrating to Canada. He recertified as a lawyer and established the Merah Law Office in Calgary. His firm offers a full range of legal services. His experienced staff of lawyers provide assistance in the areas of Real Estate, Civil and Commercial Litigation, Employment and Labour Law, Wills and Estates, Powers of Attorney, Corporate Services, Criminal Law, Family Law/Uncontested Divorces, Occupational Health and Safety Law. Tony’s passion is to represent and help the downtrodden who are unable to effectively represent themselves. With over 7 years of practical experience with Canadian immigration-specific legislation and procedures, Tony has the knowledge and experience to help newcomers navigate the Canadian Legal system. Tony Merah Law Office also has a heart for working with churches with charitable status and to assist these groups with legal matters. He is actively involved in ministry work and is a volunteer as a counselor and preacher at the Calgary Correctional Centre, the Calgary Remand Centre, and the Calgary Young Offenders’ Centre. Tony is married to his lovely wife Ann and they have three children. Tony’s heart beat is for the eradication of poverty, and the emancipation of souls. Goodway was born and raised on a small farm in Obbo in Eastern Equatoria in South Sudan. He immigrated to Syria in 1998 before moving to Calgary, Alberta, Canada in 2005. Goodway is married, has three children and has lived in Calgary, Alberta since that time. Good work ethics combined with business understandings come naturally for Goodway and he will be using those values to assist the people from the region he left many years ago. Goodway has been a part of the HPI board since in 2014. Brian Smith was born in Saskatchewan. He has one daughter and lives in Calgary, Alberta with his wife. He graduated from the Alberta College of Art (and Design) in 1980. He has been a Designer/Illustrator since 1975. His forty plus years of experience and skill was developed through a wide variety of advertising and visual communication projects for clients ranging from small private companies to provincial and federal government departments. Smith served as Art Director and Creative Director for a number of advertising agencies and graphic design firms and his 15-years-plus experience in the energy sector came from subcontracting. Brian has worked closely with writers, photographers and printers and Smith’s motivation is to assure that projects are completed with quality, on time and within budget. With his voice-trained abilities he has narrated a number of promotional and broadcast presentations. Currently, Brian is the graphic designer and a cantor for the Messianic congregation that he attends. Born in Obbo (Acholiland) in Eastern Equatoria State in South Sudan, Andrew spent his early years there while he attended primary school at the Palotaka Catholic Mission. He was said to be a precocious pupil in his class and he always rose to the top. He attended intermediate school at Apostles of Jesus Seminary, Rejaf—East of Juba City. He went to high school at St. Mary’s Seminary-Nazareth in Wau and continued in Juba Day Senior Secondary School where he completed his high school studies with flying colours in the Sudan School Certificate Examinations in 1987/1988. Thereafter, Andrew studied philosophy at St. Paul’s National Major Seminary Munuki in Juba, continued one year at the University of Zambia (UNZA) and then into Social Development at Uganda Catholic Social Training Centre (UCSTC) in Kampala – a College affiliated to Uganda Martyrs University. For several years Mr. Oluku taught in a number of high schools such as in Comboni College in Port Sudan, Sudan, St. Edmund Rice High School in Arusha, Tanzania and St. Bakhita Girls’ High School in Narus, South Sudan. He also worked for different organizations in Sudan, Tanzania, Zambia, Kenya and South Sudan and widely travelled throughout Africa, Europe and Latin America. He is a social worker by profession and currently works as the National Coordinator, Child DDR/Protection with the National DDR Commission in South Sudan. He is a volunteer for the Foreign Relations and Project Affairs Secretary for the Obbo Community Development Association (OCDA) and is Secretary for the Obbo Farmers Association (OFA). Mr. Oluku is a designated Chief Coordinator for HPI’s South Sudan Programs. He believes that the Acholi area, and South Sudan at large, has potential for an agribusiness and that its produce can be exported to other Africa countries and as well to the world. He spares his time to help others to be able to help themselves. Each year, he also does some farming in his home village of Obbo in Ayaci County of Greater Magwi. He is married to Aol Vicky and was blessed with a daughter (Lalum Lynn) and three sons (Obbo Joshua, Makmot Ian and Loum Jeff). Andrew has a very strong belief in God and that with Him, everything is possible. Mr. Oluku’s love for his country and his dream for its development in agriculture remains big and he also believes that his dream could be realized through HPI support. Born in Torit, Eastern Equatoria State in South Sudan. Martin Obonyo Hakim holds a Bachelor Degree in Business Administration from Al Neelain University in Khartoum-Sudan. Martin Obonyo Hakim acquired his Primary School education at Nakapirit Refugee Camp and his High School at King’s College Budo in Kampala (Uganda) while his parents were in exile during the first Sudanese Civil war that lasted for 17 years. He went to Loka Boys Senior Secondary School after returning to Sudan and successfully achieved a Sudan Higher Secondary School Certificate (A Level). Mr. Hakim was awarded a Diploma in the English Language in 2002 by the United Nations English Proficiency Examinations, and speaks English, Arabic, Kiswahili, Luganda and Acholi, his mother tongue. He has proven himself to be good at interpersonal verbal communications, management, leadership skills and team work capabilities. Martin is married, has children and is a devoted Christian. Mr. Hakim worked for the United Nations for thirty-one years and has a working knowledge of the United Nations Systems, their humanitarian work and guideline processes. He has accumulated significant management and problem solving skills. For more than ten years he was an active member of the UN/WFP Sudan Staff Association. Starting as Secretary General, he became Chairperson after four years and then later became an advisor to the new Executive Committee. He served as the Secretary General of the UNSFS (United Nations Staff Federation in Sudan) and a Senior Member of UN Sudan Local Salary Survey Committee. Mr. Hakim currently works as a Resource Officer for the South Sudan National Olympics Committee and looks forward to contributing to the success of the HPI Project within his community in South Sudan. Ms. Hellen was born in Torit, Eastern Equatoria State. She attended Buluk Primary School in Juba, intermediate school in Yambio (Western Equatoria) and High School in Omdurman (Northern Sudan). Ms. Hellen is an accountant by profession with many years of experience. She earned her diploma from Khartoum Institute of Accountancy (KIA) and was employed as an accountant with the Ministry of Finance in Khartoum (Sudan). Hellen currently works as a Senior Inspector of Accounting in the Ministry of Foreign Affairs and International Cooperation in Juba, South Sudan. Ms. Hellen is a mother of six (four boys and two girls) who relates to a wide range of people. She enjoys working in a team environment and specifically wants to be proactively involved in the development of sustainable agriculture in her home area of Obbo in Ayaci County, Acholiland and in South Sudan at large. Working as an accountant with the HPI/South Sudan, Ms. Hellen will oversee all HPI financial matters. She trusts that God will guide her in every challenge that lies ahead. Mr. Hillary was born in Obbo Eastern Equitoria State, South Sudan and began his education in Torit and finished after graduating from Don Boszo Institute in Alexandra, Egypt. Hillary speaks three languages; Arabic, Dutch and English. He is married and has two children aged four and nine. Hillary is South Sudanese with Dutch citizenship. He lived in the Netherlands for 18 years where he worked 16 years in the field of metal fabrication. Mr. Hillary’s specialty is metal fabrication and was trained to be an industrial welder as well as an underwater welder. He has worked on projects that have included oil tanks ranging in size from 25 to 10,000 litres and on oil pipelines and boats. He is mechanically inclined and will oversee various HPI building projects along with mechanical maintenance of HPI farm equipment in South Sudan. “My name is Teresa Alal Marino from South Sudan Eastern Equatorial. I was born in the village Obbo Palotaka Ayaci County. I left South Sudan because of the civil war and went to Kenya refugee’s camp in 1994 with my three sons and a nephew it took us five (5) years before resettlement to United States of America. In Feb11, 1999. I am the founder of South Sudan Farmers Without Borders (SSFWB) a U.S.A. 501(c)(3) non-profit Organization. As people who face war for almost 30 years they need new farming skills. Organize them in groups and educate them with skills to improve their farming for food security and empower them to be economically independent. Born in Addis Ababa, Ethiopia, Nyamuon Nguany Machar, also works as the Regional Coordinator for Youth Move Maine, a youth advocacy organization that helps at-risk youth find their voices and advocate for themselves. Nyamuon uses her personal experience with childhood trauma and the gaps she has seen in her community to drive her work and passion for policy change. More recently Nyamuon has partnered with the State of Maine where she co-created and co-facilitates a cultural competency course offered to service providers and consumers, called “Why I can’t trust you”. Nyamuon is also a board member of Spring Harbor, an inpatient mental health facility working to provide the most beneficial support to those struggling with mental illness. This year Nyamuon is honored with receiving the Pearl Johnson Award from NARPA, the National association for Rights Protection and Advocacy. She often creatively uses her platform to raise awareness on the hardships going on back home and calls for an end to tribal conflict and tensions. Ongee Olaa was born in the Palotaka area within East Equatoria of South Sudan. Professionally he is a Medical Clinic Technology graduate from RMIT University in Melbourne, Australia. He resides in South Dakota with his wife and 3 children. Ongee has a burning desire to assist his village friends by working on a part-time basis with HPI within South Sudan. “My name is Agnes Kariuki. I was born and raised in Kenya, Africa. Though a Kenyan born, I am also honored to have dual citizenship as a citizen of Canada. After my elementary and high school education, I trained as an elementary school teacher at Kericho Teachers’ college in Kericho County, Kenya. After a few years of teaching in a number of schools in my country, I was deeply moved when I observed children from very troubled, deprived, and indeed, very disadvantaged families. It always touched my heart when I saw them struggle with even the most basic needs that, at times, would cause them to frequently miss school. Some would come to school hungry, while others were forced to terminate school altogether because their parents could not afford the school fees. From this experience, I deeply felt prompted to do something more than just classroom teaching. I felt a need to gain more skills that would enable me help address the root cause of this state in living standards among our people and for humanity in large. I joined the Catholic University of Eastern Africa, (CUEA), where I graduated with a Bachelor of Arts degree in Sociology and Anthropology. I was later offered a scholarship by Loyola University, Chicago in the United States in the year 2000 and undertook my Master’s program in Pastoral Counseling. The reason I chose this area of study was that after having taught young children from diverse family backgrounds, and indeed very deprived families; and having achieved my university education, I had come to identify more with the area of family counseling as my passion and calling. This is where I saw myself down the road; helping the deprived, the displaced and traumatized of our society, through a holistic approach to counseling. Pastoral Counseling seemed to be the program for me, as it merged both psychology and spirituality thus addressing the social, physiological, psychological, emotional, and spiritual aspects of the challenged in our society. I saw myself empowering and alleviating their livelihoods with skills that would enable them reclaim their dignity and self-worth and thus, be able to alleviate their own livelihoods. While Loyola University offered me very vital skills in the field of counseling, I felt that I needed to be more enlightened in the area of working with diverse cultures through a family systems approach to family counseling. Therefore, after graduating from Loyola, I enrolled in a two-year family therapy certificate program at the Multicultural Family Institute in Highland Park, New Jersey. After graduating from this program, I was offered a job as a family counselor by an agency called Interfaith Works Center for New Americans, a refugee resettlement program in Central New York at Syracuse. I was the only family counselor in the entire agency for six years. I served clients from different war torn countries of our world, namely from Iraq, Afghanistan, Yemen, Sudan, Congo DRC, Somalia and many others. By working with these extraordinary survivors, and after attending to them through a holistic approach to their basic needs, to the trauma issues caused by the atrocities they had to endure, their social physiological, psychological, emotional needs and their spiritual needs, I was amazed to learn about their resiliency, inner strength and capacity to pick up their broken pieces as they courageously set forth to new beginnings. However, most of them worried about their relatives who they left back home in their war torn countries. While some, like those in Congo, may have escaped to the forests, they were not sure whether they could still be a live or whether they had died. This was a constant stressor to many due to a lack of closure. This would always touch my heart deeply. In the year 2010, while I attended to one client with this disturbing stressor, I felt that I had to raise the bar of my counseling to a higher level by helping two of her families get out of the Congo forest. They later got resettled to the Kakuma refugee camp in Kenya, where I am able to empower their children with education.
2019-04-23T08:29:29Z
https://humanityspromise.com/about/helping-resolve-problems/the-people-of-humanitys-promise/
Experience is combined with a critical eye and rigor, with the ability to look beyond, to understand context, to hit the target, to tie into what is happening in the world. Coming from all over the world, a very special jury that honours the Laus. Mayra Monobe is a graphic designer and art director from São Paulo, Brazil. She has studied graphic design at the Billy Blue School of Design in Sydney, Australia, and got a Master's Degree from Elisava School of Design and Engineering in Barcelona, Spain. Prior to her current positions, she worked and collaborated with graphic design studios and agencies in Australia and Barcelona. She is currently Head of Design at branding agency Firma, but also works on her own independent projects. Her work ranges from cultural, commercial and fashion sectors, with special interest for Packaging, Editorial and Brand Identity projects. Her approach is guided by the inevitable relationship between content and form to create unique projects that are relevant and coherent to its brand, yet searching for timeless, universal and sometimes, playful concepts. Her work has been published and recognized by ADG-FAD, Pentawards, Graphis, Australian Graphic Design Association, Create Awards, PieBooks, Rockport Publishers, TheDieline, Lovely Package, Under Consideration, Ffffound, among others. Eduardo Manso is an argentinean type designer living in Barcelona since 2000. Before to set up his own foundry he had already published a number of fonts through T-26, ITC Fonts, Bitstream and Linotype. He has designed custom typefaces for clients worldwide, such as Puma, The Sunday Times of London, the Munich Airport or the Gaudí house 'La Pedrera' in Barcelona. Among other awards, he has received the 'Certificate of Excellence in Type Design' from the Type Directors Club of New York in three times (2004, 2006 and 2007). He currently gives typography classes at a number of schools in Barcelona and designs new typefaces. Member of AGI since 2010. Larissa Kasper is a graphic designer from St. Gallen, Switzerland. She studied Visual Communication at the Zurich University of the Arts and Art Direction in the master program at ECAL, Lausanne. In 2013, together with Rosario Florio, they founded Kasper-Florio as a collaborative space of exploration in book design and visual identity. Recent clients include both international and local institutions such as Harvard University Graduate School of Design, EPFL Lausanne and Kunstverein St.Gallen. Larissa Kasper is co-founder of Jungle Books, an independent publishing house for contemporary art and architecture. Veronica Ditting is an award-winning graphic designer and art director. Working out of her studio in Clerkenwell, London, she art directs the biannual women’s magazine The Gentlewoman as well as working with fashion houses, artists and art institutions, and architectural firms on a wide range of projects. These are characterised by a strong signature style that is exceptionally editorially-driven. Working in close collaboration with leading photographers, artists, editors and writers to realise ideas at their most elegant and definitive, the studio’s clients have included: fashion and retail brands Hermès, Tiffany & Co., COS and Selfridges; the magazine Fantastic Man, which Veronica art directed until 2013; art institutions White Cube, Stedelijk Museum Amsterdam and Stroom Den Haag; artists including Barbara Visser, Dana Lixenberg, Katja Mater, Luca Guadagnino and Lernert & Sander; and De Nederlandsche Bank (DNB). Since graduating from the Gerrit Rietveld Academy, Veronica has received awards and nominations from the D&ADs, the Dutch Design Awards, the Aica Awards, Stack Awards and Magpile. She is a frequent jury member of design competitions worldwide and lectures internationally, giving talks at conferences and staging workshops at design schools including the Gerrit Rietveld Academy, ÉCAL, and Bauhaus Universität Weimar. She is represented by The Collective Shift, New York. Since 2000, Diego has run a design studio that specialises in corporate identity, editorial design, signage, exhibitions, packaging, illustration and multimedia. His regular clients include Médicos Sin Fronteras, Unicef, Caixabank, Fundació Joan Miró and el Museo de las Culturas del Vino de Catalunya. His work has won recognition by Laus (ADG-FAD), the Ed-Awards, the ADC*E and ISTD (International Society of Typographic Designers). In 2013 Diego was selected as a member of the Alliance Graphique Internationale (AGI). Javier Jaén (Barcelona, 1983) studied Graphic Design and Fine Arts in Barcelona, New York and Budapest. His professional activities focus on editorial illustration, book covers, and cultural communication. His is a symbolic, playful language, and he looks for narrative scenarios and aesthetics in close context, related to the everyday experience. He has worked for The New York Times, The New Yorker, The Washington Post, Time, Harvard University, National Geographic, El País, Penguin Random House, Vueling Airlines, UNESCO, among others. He has taught at Istituto Europeo di Design, IDEP, and frequently runs workshops and lectures. His work has been recognized by AGI Membership (2015), the Society of Illustrators (Illustrators 55, 56), American Illustration (AI33, AI34) Print magazine (New Visual Artist 2013), Junceda Award (2013), and the Gràffica Award (2010). He has participated in exhibitions in New York, London, El Salvador, Tallinn, Rome and Barcelona. He has still not written a child, planted a book, or given birth to a tree. Everything is waiting to be done. Gema Navarro studied Graphic Design at the Istituto Europeo di Design (IED) in Madrid and later at the School of Visual Arts (SVA) in New York. In 2005 she began to work at the Erretres studio where she was Art Director until 2011 collaborating on projects for clients like the Museo del Prado, Museo Thyssen-Bornemisza, Telefónica, La Fábrica and PHotoEspaña. In 2013 she founded Rifle, a design studio dedicated mainly to brand identity and editorial design for clients like BBVA, Fundación Juan March, ARCO and Museo Pompidou Malaga. During those years she was also Art Director at the magazines The Outpost (Lebanon), Makeshift (NY) and OjodePez (Madrid). Graduated in Psychology knowing that people are the most powerful means of communication. She supplemented her education with studies related to team leadership and communication abilities, areas in which she worked for the first few years after graduation. Her professional life took a turn in 2002 when she began working at Base Design and, thanks to a great team of professionals, she learned all aspects of design. Afterwards, Olga Pérez spent almost three years with the Carlitos y Patricia Brand Boutique. She has now spent fourteen years in the world of graphic design and art direction and currently works as Project Director at Bisgràfic. She supplements her time by teaching classes at universities such as Elisava and Escuela Pau Gargallo. Graphic designer. After working for other studios, he opened his own studio in 2014: Albert Romagosa Design Cabinet, where they work in all kinds of communication projects for Spanish and international clients. In addition to his studio work, Albert teaches at the Elisava and IED design schools. Jamie McIntyre is Senior Art Director at It’s Nice That. He oversees the visual side of the website, the commissioning of features, brand partnerships and the biannual magazine, Printed Pages. Lucy Rojas is the co-founder of IAM – Internet Age Media, the platform that connects the futures of media, education & arts, cultivating and celebrating the randomness of internet culture. Together with her partner Andres Colmenares, they run IAM Weekend, an annual event that gathers diverse perspectives about post-digital futures held in Barcelona. They also produce We Are Internet, a video series that documents the collective intuition that emerges from the conference and lead IAM Labs, the experience-driven futures studio developing projects with brands as Ableton and institutions as Tate. For the last decade they have been doing futures research, concept development and communication strategies in different fields (from media, youth culture and education to retail and the regulation of the sharing economy) working with leading brands, institutions, startups and agencies between Latin America and Europe. I studied graphic design, and worked at studios as Mucho and Atlas, but now I’ve shifted my career into a more experimental and experiencial world; now I’m focused in creating artisitic experiences for brands, museums and musicians all over the world. Last year I designed the Laus Awards '15, and turned everyone into gold. I've worked for bands as: Cut Copy, Delorean, Aphex Twin, Spoon, Oso Leone... brands as: Adidas, Bombay Sapphire, Samsung, Acer, TED, Lexus, Laus Design awards etc. I once killed myself on stage, during my talk at OFFF'15. I was born in 1988, I just ate chicken wings, and I have no idea what I'm doing here, talking so much about myself. Born in Izbor (Granada) studied Grafic Design at Escola d’Art i Superior de Disseny de Vic (Barcelona). He has work for clients such as Activision, Allianz, Barclays Wealth, Capcom, Dewar’s, Disney, FOX, Lancia, Lego, Levi’s, Lionsgate Films, MANGO, Mazda, Moët & Chandon, Nike, Nokia, Red Bull, Rosa Clará, Seat, Schwarzkopf, Universal Pictures... among many others. Nowadays he is living and working in Barcelona as a freelance interactive Art Director/Designer. Coming from a background in Architectural design, Bojana is a Lead UX Designer at Typeform in Barcelona. She honed her design and problem solving skills in San Francisco, incessantly exploring the underlying drivers of human behavior. Working at startups taught her the value of a business model. Working at a national bank taught her the burden of legacy code. Today, working at Typeform is teaching her what it means when design is infused into the company DNA. In her perfect world technology would be designed around human nature, and a tiny jar of Nutella would be delivered to her desk, daily. In her free time she enjoys reading, Argentine tango, and occasionally writes about herself in third person. Graphic Designer and Front-End Developer, A–P & Co. A Graphic Designer based in Barcelona since 2004. After completing a course in Graphic Design at Bau, Adrián worked at different design studios for the next six years (Aristu & Co and Ruiz+Company, among others). Three years ago he founded A–P & Co where he develops digital projects for Spanish and international clients. Nestor García, was born in Madrid in 1977, and three years ago he swapped Malasaña’s famous Plaza del Dos de Mayo for Plaça de la Virreina in Barcelona’s renowned Gràcia district. In the late nineties he worked as a designer in several art studies before joining Saatchi & Saatchi in the year 2000. A couple of years later he changed Saatchi for Publicis where he set aside his designer profile to focus more on his creative skills in the role of Art Director. In 2010, Nestor came on board at LOLA as Creative Director at its Madrid office and in 2013 he moved to the Catalan capital to take charge of both LOLA MullenLowe Barcelona offices as Executive Creative Director and to lead SEAT’s global creative direction together with Nacho Oñate, with whom he has worked as a creative duo since his last stint at Publicis. Throughout his professional career Nestor has worked on campaigns for both global and local clients such as SEAT, Heineken, Carrefour, Magnum, Cornetto, Grefusa, Bankia, Mixta de Mahou, Jack Daniel’s, or Beefeater among others. All brands that have been recognised by the industry at major advertising festivals such as Cannes Lions, El Sol, El Ojo, Fiap or Eurobest. A graduate in Art & Design from La Massana (Barcelona) and the École Supérieure des Arts Décoratifs (Strasbourg). In 2006, after working in different artistic projects, Kiku joined the creative team at the advertising agency *S,C,P,F. For six years he was responsible for the Art Direction of various campaigns for clients like Banc Sabadell, Vueling, IKEA, Generalitat de Catalunya, Ajuntament de Barcelona... for which he was awarded a number of prizes (Laus, El Sol, c de c, Effie...). In 2013 he started working for DDB, where he worked for the creative team on the Audi account for a year. In 2014, el Club de Creativos named him as the Spanish Art Director with the most prizes and the most work featured in their yearbook, coming second overall for the period from 2010-14, with 58 appearances. Since 2015, he has worked and collaborated, among other projects, with the agency Dimensión. Belén Coca is a recognized Creative Director that also sings and writes songs. Since she left her position as an Executive Creative Director at La Despensa in 2015, she is working in different projects related to music, creativity and digital strategy. Although, she has edited “Take this Train”, the first album of her group Niña Vintage. Before that, she worked as an Art Director at Storm Ruiz Nicoli and at the tecnological consultancy iXL in Madrid, Sant Diego and London. Her work has been awarded in many important national and international festivals, where she has been a juror too. During the last year, she has been chairwoman in the Yearbook of the Club de Creativos and she has co-founded the platform #MásMujeresCreativas, which aim is to give visibility and equal opportunities to women involved in Advertising world. Since 2006 she teaches at Miami Ad School Madrid and she is passionate about helping young talents grow. Her last project is “La Voz Creativa”: a workshop that explores the links between music and creativity and proposes an experience for unlocking creativity through singing. Hi there! My name is Christian Lopez. I work at 72andSunny in Amsterdam as a creative. Before canals and dutch gouda, I worked at 72andSunny Los Angeles for two years on Google. Before that I worked and lived in New York, Sydney, Madrid and Barcelona. In my free time I like to spend time with my family and do personal projects, from weird wind documentaries to an alphabet made by the subway lines in New York. As Design Director at R/GA London, Cris is a key part of the Brand Development team. She uses her creativity and design skills to create brand experiences that foster new relationships with customers. Cris leads design teams that create new brand languages across disciplines from branding, interfaces, interactive and digital platforms, advertising, architecture, and packaging. All of them unified by a single strategy and concept. Cris joined the London office in March 2013 working for a range of clients that include Beats by Dre, Nike, O2, Google, Turkcell, Dyson, as well as a lot of pitch work. Prior to working in London she worked in Spain as an Art Director at DDB, Atletico International, Shackleton and BBDO. Her clients included Volkswagen, Audi, SEAT, La Caixa, Gas Natural, L’Illa Diagonal, and Banc Sabadell among others. Cris has been involved in projects that have won awards at festivals such as Cannes, Clio, One Show, El Sol, LAUS, FIAP and Iman. Martin Allais is a strong all-rounder visual artist, illustrator, animator and director who spend his life between Brooklyn and Barcelona. His work it´s a mixture of various techniques. Mostly focused on music videos and animation, his movies are being recognized with Vimeo Staff picks, Laus, AICP, Cannes, Klik Animation Festival among many others. Martin is currently part of the directions roster in 1stavemachine, a production company in B rookie who is been awarded the last with the standout prod. company of 2015 by Creativity among many other awards. He directed commercials for clients like Oreo, Facebook and Samsung. Featured in various publications in North America, Europe and Asia. From print media to web platforms such as: Latino (Die-gestalten-Verlag), Lodown mag (Germany), Idn mag (China), Illusive (DGV), Tres logos and Cuatro logos (DGV), Bienal Iberoamericana de Diseño (SPN), Freistil_European Commercial Illustration (Germany), Iconographic mag (Spain), Mtv Latin Awards Off Air publications (Miami), Carnemag, Belio (Madrid), 81+ (Tokyo). After studying Audiovisual Communication at the Universidad Ramón Llull in Barcelona and graduating in Cinema Direction at the NYFA in New York, Mireia Pujol began he career in the world of fiction. During her studies she wrote and directed two short films: “Boda de heroes” (shot in 16mm, included in the film “Caótica Ana” by Júlio Medem) and “Quédate” (35mm, starring Juan Echanove and Melani Olivares). She worked for different production studios, working closely with prestigious directors like José Luis Cuerda (“La Educación de las Hadas” and “Los girasoles ciegos”) and Fernando León de Aranoa (“Princesas”). Those years working in the world of film encouraged her to take a leap and become a director herself. She currently works in Spain and abroad, directing campaigns for Audi, Coca Cola, American Express, Dewars White Label, Vodafone, McDonalds, the Sitges Film Festival, etc. Her work has won prizes at various International festivals, like El Ojo de Iberoamérica, Cíclope Awards and CdeC. She recently wrote a short film about migration in Europe called “Diary of Hunger” (16mm), which was selected for the prestigious Documentary Film Festival of Amsterdam (IDFA) and the Malaga Festival. Currently she is writing her first feature film titled “Vera” alongside the screenplay writer Valentina Viso. Creative Director and Founder of Folch. Albert was born in Barcelona in 1977, and graduated from graphic design from ESDI (Universitat Ramon Llull). He studied Geology at the UAB in Barcelona and photography at the Royal Academy of Fine Arts Antwerp in Belgium. Albert is also Creative Director and founder of Eldorado and Odiseo as well as co-director of the Post-Graduate course in Graphic Design and Editorial Projects at ELISAVA alongside Marc Panero and Pablo Juncadella. Born in Barcelona in 1990, Adrià is a Graphic Designer and Typographer. During his studies he created various kinds of free fonts and appeared in different international publications, winning two Laus prizes. Since 2014 he has worked with Eduardo Manso at Emtype Foundry. She holds a Bachelor of Arts in Graphic Desing from the Eina University of Arts and Design (2006), she completed her studies with a stage at La Cambre (École nationale supérieure des arts visuels) and working at Gráfica studio. In 2007 she joined ESIETE, directed by Javier Pereda. This graphic design and creative agency has won many national awards like Laus Awards, and international awards like the ADCE. The ambition of a more global vision of this profession, pushed her to take part as a co-founder of paseodegracia.com and to teach in Idep School a subject about identity and illustration. Moreover, she is part of the ADG-FAD Board. Carles Rodrigo is a graphic designer, founder of Carles Rodrigo Studio. Graduated in 2008 from Eina, Barcelona. While still at Eina in 2007 he began his professional career at Mucho. In 2008 his school final project 'Zarzuela Poster Typeface' was included in the Wallpaper Graduate Directory 2009 and nominated by the Art Directors Club NY. In 2012 he moved to London to join Winkreative as a senior designer and art director. There he worked on corporate identity and editorial projects for high end clients such as Monocle Magazine, the Japanese Government, Lexus, or Hermès amongst others, until he established himself as an independent designer in 2014, and founding Carles Rodrigo Studio a year later. Since then Carles has been living and working between London and Barcelona, working for a wide range of projects, from corporate identity, to editorial design, signage or packaging, being the creation and use of typography the base of his work process. He combines his studio work with his role as Thesis Director at IED and several workshops and lectures internationaly. The quality of his work has been recognised by prestigious design awards, such as D&AD, Art Directors Club NY, Art Directors Club of Europe and Laus Awards. María studied graphic design at Elisava and discovered the world of editorial illustration during her internship at Talking Design Studio, a field that she hadn’t known previously and which ended up as her grand passion. From that point she began to develop her own style and started a career as an illustrator working alongside Durana Durana for the magazine modaes.es. In 2016 she won the Laus Young Talent with her final project Nu., for a political party that promotes nudism and its naturalization through illustration. Winning the award encouraged her to carry on with her main project. She currently combines her own illustration work with that at Proxi.me, the studio where she began to work after finishing her studies. After graduation in Graphic Design at the Eima school of Art and Design in 2006, Irene won her first prize with a Grand Laus in the student category for the editorial project ‘Un libro de 30m2’. She then went on to work at the studio run by the prestigious illustrator Philip Stanton. Afterwards she decided to go to London to study illustration at the London College of Communication. She later joined the Camper design team, where she worked on different projects as a fashion illustrator, a trend analyst and a coordinator of projects with Art and Design schools at an international level. In 2013 she founded her own fashion and accessories brand, Sila, which she uses to work across different design disciplines. She also coordinates a post-graduate course in Fashion at IED, where she also teaches and is responsible for publications at Eina. Meanwhile she continues to work on projects related to fashion design, editorial design and corporate identity from her own studio founded in 2014: Irene Sierra Studio. Managing partner and branding and communication consultant at Comuniza. Olga is a designer specialising in corporate identity and typography. She is convinced that design needs to give functional, creative and attractive answers to communication and positioning of organizations, businesses and brands. Sonia is a graduate in Fine Arts from the Universidad de Salamanca, in Advertising and Public Relations from the Universidad Complutense in Madrid and in Journalism from the Universidad Carlos III in Madrid. She teaches museum direction and commissioning at the UCM. She has given classes in specialist subjects and Masters courses in design, cultural management and exhibitions at the Fundación Ortega y Gasset, EAE Business School in Madrid, Universidad Complutense de Madrid, the Instituto Europeo de Design and the Escuela de Arte nº10 in Madrid. She currently teaches at the Escuela Superior de Diseño in Madrid. She is an independent commissioner and graphic designer at LSDspace and a member of the collective, Un Mundo Feliz. The jury will be diverse so as to generate debate. Their members are specialists of different disciplines within graphic design and adjoining fields. The jury needs to know and respect the evaluation criteria that comprise the regulation bases of the awards. The organization will provide all the necessary information to the jury so they are able to judge the participating pieces, while maintaining the anonymity of the authors. The jury will spend an entire day, and two days in the case of Graphic Design, judging the pieces of their corresponding categories. Voting will answer to the criteria established by the organization, and the jury is free to apply said criteria as it deems just. The jury has to coherently justify the reason for their verdicts. The jury’s decision is final and will be kept secret until the Nit Laus. The jury agrees not to disclose the results. The chairman or chairwoman is a person chosen by ADG-FAD whose role it is to ensure the proper functioning of the jury. He/she is the reference person for the members of the jury. He/she is in charge of reminding them of the regulations, answering questions, and keeping to the schedules and stages of the voting process. He or she will be responsible for collecting the results of the voting process and certifying them, along with the jury. The chairman ensures that all prizes are awarded for each category. The chairmen represents the jury’s opinion for selecting the Grand Laus in its category. The chairman has no vote and does not intervene in thedecisions of the jury other than to ensure the proper functioning of the process.
2019-04-21T20:17:43Z
https://www.adg-fad.org/en/laus/2017/jury
What would you have achieved in your life if your disorder would have been eliminated? I have been asking myself this question for nearly thirty years. Asking this question continuously made me try various conventional therapies with limited or no success. As you might guess my main objective was to find a stuttering cure. I stumbled eventually upon alternative medicine. My search was finally over when I put several remedies together that I took from different alternative medicine therapies. Natural Therapy for Stuttering was created. It is a very unique program that our speech disorder community is getting to know and experiencing its results. Please pick any book on stuttering cures and you will see that the author does not know anything about natural remedies that can be used to treat this complex disorder very successfully. Now, get educated on how you can treat your stuttering in the privacy of your home. Please go to your local bookstore and pick any book on alternative medicine. It is highly unlikely you will see the word stuttering mentioned anywhere in its content. In fact, it would not be even mentioned in almost all books on alternative medicine that you will come across. Unfortunately, there isn't much useful information on this speech condition. This is why the information about treating stuttering with alternative medicine remedies is being posted on this site. Based on my customers' responses, the program is much needed to change people's lives for the better. "Last year, I graduated from the University of Florida in Gainsville. I received a business degree. I chose to major in it thinking that there will be more job opportunities even for somebody who stutters when I graduate. My academic credentials were very impressive. Despite our bad economic situation, I was still able to get interviews. Many interviews and months later, I was still unemployed. During job interviews, my speech was “falling apart.” My worst fear of being unable to get a job with stuttering came true. Of course, no employer would have given me the reason why he did not want to hire me. I was sinking into depression. Luckily, I came across your site. I decided to try your program. I noticed some improvement in my speech within my first week of using the remedies. What is also important is that I noticed its effect on my self-confidence and self-esteem within the next few weeks of treatment. I believe flower essences really helped. After following your suggestions on hypnosis and energy medicine, my speech suddenly began to get even better every day. Homeopathic medicine played a huge part in creating fluency as well. My normal speech really surprised my family and friends. It felt like I was born again. I previously had seen five speech therapists, and it did not help. Now, I have barely noticeable, small hesitations in my speech. I do not experience them often. When I have them, people think that I am simply not sure of what I want to say. I am happy to report that I am working for (Note: the name of company was omitted). Thank you so much for your help! Bachelor of Arts degree in Business Administration" The main objectives of my therapy program is to pick the best possible alternative medicine tools to help you dealing with speech disorders. * Three most powerful homeopathic remedies for stuttering, page 5. * One homeopathic remedy you should always carry in your pocket to relieve anxiety fast, page 6. * Most effective flower essences to deal with your fear of speaking, page 8. * These flower essences can target your speech block, page 10. * Combination of vitamins and minerals to deal with speech spasms, page 11. * This herb is always recommended for anxiety and nervousness, page 12. * Top visualization exercises to change your image as a stutterer, page 14. * Most effective form of hypnosis for this condition is introduced here, page 16. * Find out how to put hypnosis sessions for yourself here, page 17. * These energy medicine techniques can target your speech block, page 20. * Main reason why you should always combine energy medicine with hypnosis, page 21. * This type of breathing you have never heard about relieves stress fast, page 23. * Most effective ways to combine natural remedies together, page 25. * Avoid these mistakes in your treatment on your way to success, page 32. * Follow these tips and maintain your fluency, page 33. * Alternative suggested routine is here at last, page 35. Most people who ever looked for stuttering cure never tried or even heard of these natural remedies I will discuss in detail in my program. The remedies have changed my life in so many ways, and they will change yours. At a very least, you will obtain a very significant improvement in your speech that will be sustained. However, I know that you will find that the results that can be obtained from using my program are truly limitless. From here check out the links on the left/below, or keep reading. "Have you ever gone through a program without seeing any results whatsoever in terms of reduction in stuttering? Did you blame yourself for not being able to keep up with the assignments?" I know I had plenty of times. When some stuttering program did not work for me despite my best efforts, I thought of it as my personal failure. This cannot be further from the truth. I want you to know your speech disorder program has failed, but you did not fail. Why did I make this statement? Almost every stammering therapy program or so-called stuttering cure for stuttering I came across asked the person to enter more speaking situations than he or she was able to handle. For any program to produce any measurable and long-lasting result, it has to be simple and doable. What is worse is that the same speech therapy never gave one any necessary tools that are needed to handle its assignments. Everyone knows this is a very complex and hard disorder to manage. Stuttering does not only consist of your physical speech block. It is also your fears, anxiety, panic, tension, avoidance behaviors, and many other emotions and feelings that you might not be even consciously aware of. This is a big part of this problem. Thus, this disorder is a lot more than many programs are capable of addressing today. Listen, you can prolong all you want. However, you will be only successful at keeping this problem to a minimum in your therapist's office. The main reason is because although you were trying to treat your physical aspect of stuttering with various speech techniques, many other aspects were left untreated. These additional aspects are the ones that caused you to relapse right after you finished your program. Ultimately, the problems begin when you step into a real world. It is well-known that when you have this condition, it can be very resistant to any form of treatment. Moreover, it can appear there are no tools to handle all aspects of this problem. Why can't you handle your fear or anxiety with some technique that your therapist may teach you to use? The main reason is because your fear or anxiety is much stronger than any technique you may use before or during your speaking situation. Often, your fears, anxiety, and avoidance behaviors are very deeply rooted and were "rehearsed" by you almost all your life. After reading this paragraph, do you really think that you can handle your panic, for instance, with some technique? Almost always, your therapist does not even have anything to offer you when it comes to dealing with your panic, feelings of helplessness, and your fear of speaking. Thus, we must look at our modern medicine and alternative medicine for the answers. When you push yourself to speak out after your stammering, a relapse is sure to occur even if you have made some speech improvement during your stuttering therapy program. What are some advantages of using this program? There are quite a few of those I will briefly mention. You do not have to leave home to benefit from it. You will save money because you do not have to visit alternative medicine practitioners. One visit to someone who practices homeopathy can cost you $100-150 US dollars. Some charge $500 US dollars per initial appointment. Now, think about how much it will cost you to see several alternative medicine practitioners who specialize in different areas. The trip to see a hypnotist, for instance, can cost you $150 US dollars. You will not have these expenses with this program. Also, you will realize benefits pretty quickly. Since this program explains how to use natural remedies from different alternative medicine therapies in combination, the benefits will "come" from many different remedies right now. I want you to know that the best cure for stuttering or stuttering cure stuttering therapy is the one that you should be able to give yourself without anyone's help. My stuttering program will provide you with all necessary tools for dealing effectively with virtually every aspect of your problem simultaneously. This program will guide you through using a combination of the best remedies that were taken from several alternative medicine programs. This program will not include any speech techniques that you are used to know. In fact, this program does not even have any speech exercises. It will be something that you probably have not tried ever before. Moreover, this program makes all things very simple and doable for you. I will not ask you to enter any speaking situations. You will enter them when you feel you are ready. This stuttering therapy will never push you to do something you are not ready to do. This does not require a lot of time investment on your part. Moreover, this will not involve spending a lot of money on your treatment. What I also like about this stuttering program is that you do not even need to leave home to take advantage of all alternative medicine tools that I will be asking you to use in the program. Most importantly, you may never be able to achieve similar results in terms of treating all symptoms any other way. This can be your help and your cure for stammering. Although you can go to my Answers section to find more information about natural medicines, I will post several questions that were received recently below. I) What do I do to eliminate my anxiety? There are numerous things you can do to get rid of your anxiety. One of those things is using hypnosis as taught in the program. Hypnosis is a wonderful tool to fight any anxiety. You should also use flower essences and energy medicine techniques, which are also described in the program. This way, you will target this problem from all sides. II) You only mentioned one herb in your program briefly. Why don't you use any herbs in your program? There is one main problem with herbs. Almost all herbs I tried or came across will produce some side effects. Some side effects can be compared to various side effects of conventional stuttering medications in terms of their severity. Side effects tend to vary from belly cramps to constipation. Besides, some herbs essentially act the same way as our traditional medications act within one's body. When you use them, you get benefits. When you stop using them, those benefits are "gone." All natural remedies, which are recommended in this program, are virtually free from side effects. The benefits are long-lasting as well. III) Do I have to use natural remedies for the rest of my life? This question has been asked many times before. As time passes, you will find you need to use a smaller number of remedies than you previously used before to maintain fluency. The benefits from using alternative medicine therapies will last much longer. You will realize alternative medicine therapies have curative powers that tend to accumulate with time. IV) Why do you use several flower essences simultaneously? As you probably know from reading information on this site, I am a strong believer in using various combinations of alternative medicine remedies. You might think of using natural remedies as buying stocks. It is very likely you will not buy just one type of stock. You will want to diversify your stock portfolio as much as possible. It is done to make sure if one stock fails, the other stocks will not. The same thing can be said about purchasing alternative medicine remedies and using them in various combinations. Besides, natural medicines tend to compliment each other. V) Do I have to follow your suggested routine on the back of this program? When you first starting out, it is generally advisable for you to follow the routine as close as you can. As some time passes, you will find out what works better for you. This suggested routine is there to illustrate how all medicines should be used in combination for optimum results. VI) I tried to change myself and my speech many times. I was not successful. What makes this program different? The main mistake people make is when they try to change themselves all at once. It is not possible and frustrating. Only small changes in behavior can lead to big changes. This program will take you through all small steps that are necessary for big changes to take place. VII) Do you suggest using herbs in your program? This program does not give you any recommendations as they relate to herbs. I am personally against using herbs. Herbal supplements have side effects. Most typical short-term side effects are headaches and belly cramps. There are no long-term studies to determine their long-term side effects. Also, they do not seem to have many curative properties. They work much like traditional stuttering medications. As long as a person uses herbs, he might be able to benefit from them. However, when a person stops using them, any benefit will be "gone." VIII) Do herbs affect stuttering? Herbs have no direct effect on this condition. Their effect is indirect. If you take some herb to calm you down, you might be able to speak better. IX) What is the best remedy for stuttering? There is no best single remedy for stuttering. However, there are more than one dozen remedies that can be used together for optimum results. This program is all about them. X) How fast will I make an improvement in my speech? Within the first few weeks of treatment, you will obtain a significant improvement in your speech. Many people will notice beneficial effects after several days of being on the program. How quickly you will respond to the remedies is a highly individual thing. It will depend on many factors, such as the severity of your condition and your attitude towards stuttering in general. XI) Why do you like to use homeopathic medicines in your treatment? There are two main reasons for it. The first reason is homeopathic medicines do not have side effects. The same thing cannot be said about some other natural remedies, such as herbs. The second reason is homeopathy is very effective in treating many conditions our conventional medicine cannot treat. More importantly, it cures many illnesses in a very short amount of time. I can personally attest to this statement. XII) Why do you start your program with energy medicine techniques and hypnosis? The main reason is you need to build a foundation for your future success. I do realize people will not stay with this program if they will not see results quickly. This is why I ask them to use energy medicine techniques and hypnosis. I believe these natural remedies can provide benefits fast and can encourage people to stay with this program to realize long-term benefits. XIII) Should I follow your instructions for using your remedies in the program or the instructions that are given on the bottles? If you want the program to be effective, you should follow the instructions that are stated in the program. Please do not reinvent the wheel. XIV) Does your program include using any traditional speech therapy techniques? No, it does not. There are no prolongations, cancellations and pull-outs to do. There are, however, great visualization exercises in this program. Those are optional. If you decide to use them, they will change your self-image. You will start thinking of yourself as a fluent speaker rather than a stutterer. Stammering is one of the most common problems that is faced by the millions of people all over the world. This problem does not have any serious effect on health, but it can take a toll on your personality. You may have to face serious problems when speaking to any other person. Thus, people who are suffering from this condition try to consult with an expert. They also try different kinds of stuttering treatments. The main problem with all types of treatments and medications are various side effects. You can try natural alternative therapies in order to eradicate the problem permanently. In my childhood, I suffered from this problem so much that I tried to use medications and used them for several years only to discover that they either come with various side effects or I became very addictive to them. When you will use natural therapy discovered by me, you can experience real stuttering therapy that can help you to get over this problem easily. The natural process that is designed to give you a safe and secure way to get relief from this condition. It is recognized as the best cure for stuttering because it can bring many benefits to its users. Not only you will get a successful stuttering cure by deciding to use this program, you will also come to know about many things like which homeopathic medicine treatment can give you better results and which flower essences have the power to help you in eradicating this problem. When you are looking for the top quality stammering therapies, you can buy my natural therapy for stuttering treatment. This stuttering help can be the best bet for you when you are looking for a safe and affordable way to cure your stammering problem. This section consists of links to various sites that I personally support. PLEASE CLICK HERE TO BUY THIS PROGRAM. Get it right away and start realizing its benefits now! This site is intended for your general information only and is not a substitute for medical advice or treatment. Use of this site and our natural program is subject to the disclaimer in terms of service. Copyright 2003-2018 Naturaltherapyforstuttering.com. All rights reserved.
2019-04-20T00:16:09Z
http://www.naturaltherapyforstuttering.com/
My efforts are directed toward governmental agencies related to aviation. These include the FAA and the International Civil Aviation Organization in Montreal. The beautiful literary traits for which English is praised, such as a wealth of words, are exactly the opposite of the needs for aviation language. Conversation between pilots and controllers needs to be terse and clear, but English now has 38 dialects. Aviation needs freedom from ambiguities, but English has hundreds of them. International aviation personnel need a language which is easily learned, but English is so full of irregularities that even its native speakers require 12 years of schooling in it. Stability over the years is needed in aviation, but there is neither an Academy nor a set of prestated rules to exert linguistic discipline over the evolution of English. 1976, Zagreb 176 deaths Language errors by the controller. 1977, Tenerife 583 deaths Dutch pilot used Dutch syntax w. English words. 1993, China 16 deaths Pilot didnХt understand PULL UP. 1995, Colombia 159 deaths Controller could not converse in English. 1999, Chicago no deaths During takeoff, Korean 747 pilot skillfully avoided a 747 intruder onto the runway. 380 lives were in danger. Page 12 of The PilotХs Radio Communication Handbook suggests that 12 to 22% of general aviation accidents are likely to be due to faulty radio communications. This would average 17%. An Italian source estimated at least 11% . Since dead pilots cannot testify as to which word or phrase confused or distracted them, there is no way to establish a precise figure. But certainly minimizing the burden of confusion on pilots due to language will contribute to safer aviation. Now that there are 52 Open Skies agreements between the U.S. and other countries, every major airport in the world might receive airplanes from anywhere in the world. This fact necessitates a universal language for aviation. English has been tried since 1951, but it is inherently too confusing for all concerned. Currently in the U.S. there is a crazy quilt of 336 phrases pilots must deal with, They are itemized in The PilotХs Reference to ATC Procedures and Phraseology. It also lists 49 phrases which differ with the ICAO phrases used in the rest of the world. The 80 page FAA Pilot/Controller Glossary cites 44 differences in definitions with respect to ICAO. The PilotХs Pocket Decoder lists more than 2,000 abbreviations and acronyms. These complexities impose too great a need for memorization onto a pilot, who often must make split-second decisions. This chaos of words can cause American pilots to misunderstand American controllers. One result is that they erroneously and dangerously move onto active runways. They did so 429 times in the U.S. last year. Eleven runway accidents dating back to 1972 have claimed 719 lives and destroyed 20 aircraft. Over the past 10 years 45 people have died in runway accidents. (Aviation Week, v87, No. 2; Pg. 36) The book, Fatal Words:Communication Clashes and Aircraft Crashes (U. of Chicago Press, 1994) deals primarily with confusion between native speakers of English. Flying into and out of the U.S. also exposes pilots to differences in measuring systems, because all other countries use the metric system. This adds numerical confusion about altitudes, runway lengths, and fuel weight to the problems of phraseology noted above. Secondary annoyances about documents, such as the manner of citing dates, and the unnecessary duality of U.S. paper sizes are also noteworthy. Native speakers of other languages have as much difficulty using English as English-speakers would have trying to use theirs. A complicating factor is the existence of 38 dialects and numerous varieties of English. Even those who seem to speak English perfectly can make fatal errors, as did the Dutch pilot in Tenerife in 1977. During an 8 year period, American pilots reported 250 language dificulties elsewhere, and American controllers reported 95 language problems here with foreign pilots, according to NBC. Russian pilots have almost landed on streets in Seattle and Israel. Misunderstanding equipment on board aircraft is an important new type of language confusion, as noted for crashes in 1993 and 1999, above. The new digital readouts are more mentally demanding than analog ones were. Computer generated English is often misunderstood. Confusion between ROZO and ROMEO non-directional beacons caused the flight management computer to steer the 1995 Colombia flight into tragedy. There is active resentment of the preferential treatment of English in aviation by controllers in Mexico and France. If the existing patchwork of phrases were made into a coherent entity, the 17% figure for accidents due to miscommuncation might drop by 5% or so. This improvement in safety can be achieved by following the method of the International Standards Organization for systemizing technical vocabularies. See: Suonuuti, Heidi. Guide to Terminology. The Finnish Centre for Technical Terminology for NORDTERM 8, 1997. ISBN 952-9794-09-6. The ISO method consists of carefully defining the overall field of interest. Subdividing it repeatedly produces cells small enough for specific attention. Each of the concepts within each cell is defined. The last step is assigning words to the concepts. The resulting vocabulary has neither gaps nor overlaps. Consultants from the ISO are available for guidance if requested. The production of this kind of vocabulary would result in elimination of many confusing items, and minimization of others. Non-metric units and acronyms should be eliminated. Homophones, homographs and homonyms should be minimized. One of the 38 dialects of English should be chosen as a model for worldwide use, and the other 37 discouraged. 1. Alphabet Only 26 letters, insufficient for its approximately 42 sounds. The number of vowels and diphthongs varies according to dialect, from 18 to 24. Since it is the vowels which give clarity to language, this erratic feature of English is a threat to understanding. There are 253 ways to spell the 42 sounds of English. 2. Accented syllable No regularity in its choice. A dictionary often shows two alternate possibilities. 3. Pluralization More than a dozen methods are used in English to make plurals. The word AIRCRAFT may be either singular or plural, so a message AIRCRAFT APPROACHING is ambiguous because it could mean one or more. 4. Homographs More than 1,400 words which are spelled alike, but have different sounds. CLOSE scrape and CLOSE the door, are examples. 5. Homophones More than 7,800 words are spelled differently, but have the same sound. FOUR and FOR, TOO, TO and TWO are examples. Confusion over the last pair caused a crash in southeast Asia. Consider: THE SONS RAISE MEAT / THE SUNХS RAYS MEET. 6. Homonyms More than 100,000 words have the same spelling, and the same sound, but 2 or more meanings. Words like SET and TURN have more than a dozen meanings. 7. Affixes They have ambiguous meanings and variable spellings. -NESS, -SHIP and -ITY all carry the same idea of the quality of the root word. If FLAMMABLE and INFLAMMABLE both mean burnable, what does the prefix IN- mean? 9. Irregular verbs More than 165 of them LIFT, LIFTED, HAS LIFTED is regular. GO, WENT, HAS GONE is irregular. Verbs must change for singular or plural subjects. Is CRASHES a verb or a plural noun? 10. Word order Subject, verb, object are required, except for yes-no questions, which force a change to verb, subject object. 11. Rules It has been estimated that 1000 rules are necessary to formulate English, and that there are 1,500 exceptions to these rules. It would be difficult to find a more difficult language for multinational pilots and controllers to learn. 12. Guidance There is no Academy, as there is for Esperanto, French, German and Spanish, to provide linguistic discipline. English is a headless giant. These residual defects of English make it necessary to find a more suitable language for aviation. A scientific research organization, such as Massachusetts Institute of Technology, should be given a contract to determine the relative merits for aviation of several candidate languages. Through experiments the researchers could determine which language most reliably carried messages between aviation personnel of various ethnic backgrounds. At this time the General Accounting Office of the U.S. government is accumulating reference information. In due course it will begin a formal study of the problems of aviation language, and move toward a solution. Mr. Jones is a retired civil engineer who lives in Chicago. His first contact with aviation was during his service in the U.S. Navy. He was an electronic technician for the Ground Controlled Approach unit at BarberХs Point Naval Air Station, Oahu, Hawaii. On 21 Nov. 2000 Mr. Dillingham answered my letter to him, shown below. He is a high official in the G.A.O., which oversees all parts of the U.S. government. He indicates his readiness to research the subject of aviation language at the beginning of 2001. in further detail. Thank you for your interest. On the ground, the many dialects of English are charming. They provide interesting accompaniments to local scenes. What would Brooklyn be without Brooklynese? Would Long Island really be itself if not pronounced LONG-GI-LAND? Boston1s lost R1s , as in POTTY for PARTY, give the city a distinctive flavor. These and a few other colorful varieties make up a dialect cluster called Northern American English. The five other American dialect clusters within the American English group are Appalacian, Southern, Western, African American Vernacular English / Ebonics. and Native American Englishes. In addition to our American group, around the world there are seven other English dialect groups. They are the British and Irish group, the Australian and New Zealand group, East Asian group, South Asian group, African group, Caribbean group, and Canadian group. The world is the proud possessor of 38 recognized dialects of English, each with innumerable local varieties. Joining this mosaic are those whose native language is not English, but aspire to speak it. English is but one of sixty four languages with more than 10,000,000 speakers. Due to the opulence of the English speaking world, many in the 63 groups outside English try to speak English to others and among themselves. Such popularity makes us proud of the language of Shakespeare. It also gives us 63 such hybrids as FRANGLISH and SPANGLISH, which denote French and Spanish combined with English. The funny English attempted by the Japanese was the subject of a program segment of 60-Minutes. The result is that a tourist speaking one of the 38 dialects of English can, to some extent, be understood in many places around the world. Of course, it may be necessary to repeat one1s words, to use many gestures, to sketch an idea on paper, and to talk loudly and slowly to get an idea across. But in the sky, pilots can1t perform such clarifying activities. A misunderstood message from the ground-based air traffic controller, particularly during landing, can cause a crash. Yet pilots are often are exposed to messages in forms of English which are strange to them. English has been recommended for international aviation use. Pilots cross many national and linguistic borders during their flights. The nature of their work requires extreme concentration at times. The need to de-code a dialect of English strange to him can distract a pilot in the middle of a split-second action. The air traffic controllers of the world have reciprocal problems. They are exposed to many pilots from many distant places. At any given instant a controller may be in contact with 15 aircraft, hence 15 different accents of English. American pilots and controllers have reported 345 dangerous language incidents, here and abroad, during an 8 year period. Misunderstandings of English are responsible for many crashes and near crashes. This is evident when a pilot on the ground erroneously wanders onto a runway in active use. The controller told the pilot one thing, but he understood something else. In Chicago, on 1 April 2000, 380 people almost died when one 747 started across a runway as another was taking off. This sort of thing happens in the U.S. more than 300 times a year. Miscommunication is blamed for about 11% of the crashes. Pilots using the wrong runway, like the recent case in Tajwan, contribute to that number. Others consist of the worst crash in aviation history, an on-the-ground crash in Tenerife in 1977 when 583 died, the American Airlines crash in 1995 in Colombia, and cases of inability to understand computer-generated messages -- both in China and in Kosovo. Selected terms from the ICAO Manual of Telephony - Second Edition. HOW DO YOU READ? HOW DO YOU HEAR ME? Subject: THE NEED FOR SCIENTIFIC RESEARCH TO IMPROVE AVIATION LANGUAGE. During the last two years or so the topic of communication between pilots and controllers has come to my attention. The more deeply I have looked into it, the more disturbed I have become at its lack of discipline. Today I saw another British film whose language I could not understand. If I had been a pilot talking to such a controller I would surely have crashed. Failure of aviation language can produce, and has produced, death and destruction. As a civil engineer I find the passive acceptance of the present error-prone arrangement preposterous! This letter brings you a summary of my observations and recommendations. They have been offered to the FAA and the NTSB, who have chosen to reject them. This reaction appears to violate the U.S. Code, Chapter 49 which established the FAA. It requires that SAFETY be the top priority. Not maintenance of the comfortable status quo, not protection of American dominance of the aviation world, just enhancing SAFETY. Pilot-Controller language mistakes directly threaten flight safety. It is my belief that a rationally planned system of language can reduce accidents due to miscommunication in the future. I hope that it will be your good offices which bring this about. In 1951, without any scientific justification, the ICAO vaguely recommended the English language for worldwide use. It failed to specify which dialect of English was preferred. Aircraft then were relatively few, short range, small and slow. Today there are 189 members of the United Nations system which supports the ICAO. Aircraft are large, and growing larger. They travel longer distances at higher speeds to more and more foreign airports. The exposure to accidents is ever greater as the skies become more crowded. The hundreds of thousands of pilots and controllers of the world intend that flying be safe. They speak dozens of native languages. The non-English speakers have sincerely tried to learn some form of English. Their success has been frustrated by its irregularities. The recognized dialects of English have now increased to 38, each with many varieties produced by local accents. English lacks an Academy to give it unity and discipline. It is unlikely that the resulting confused usages can produce reliable communication. Americans seem to be less conscious about language than others. This holds true at the NTSB, where no linguist signs off to the contribution language confusion may have made to accidents or incidents which occur in aviation. The NTSB plays ostrich to the influence of miscomprehension. The FAA believes that all pilots and controllers need basic conversational ability, as well as proficiency in air traffic control terms, in (the unspecified dialects of) English. It is now engaged in forcing the ICAO to require that all foreign pilots and controllers pass a test in English as a precondition to their employment. http://www.msnbc.com/news/358541.asp Search under PLANE ENGLISH. The book FATAL WORDS: Communication clashes and Aircraft Crashes (Steven Cushing. 1994. U. of Chicago Press) describes several accidents traceable to ambiguities and other defects of English. The homophones, TO and TWO accounted for a crash, and there are 7,781 homophones in English. There are also 1,400 homographs (CLOSE, CLOSE) and more than 50,000 homonyms - words with more than 1 meaning. English also contains more than 10,000 idioms like HIT THE ROAD -- with a hammer or fist? Taxiing onto an active runway is very dangerous, and no pilot would intentionally do this. Therefore incursions are direct evidence of misunderstandings of English. Nationwide there are more than 300 runway incursions yearly, indicating that even English-speaking pilots have problems understanding English. 8 Mar 2000КOSLO, NORWAYКThree Scandinavian SAS MD81/82 were involved in a runway near-miss chain at Oslo-Gardermoen, Norway, when an MD82 from Bodї with 116 pax landed long, beyond last taxiway, due to slippery runway. The aircraft was taxiing back on the runway in fog and mist,Кwhen another MD82 for Bergen, Norway with 150 pax was cleared for take-off roll. The two MD80's rolled head-on, and the departing flight took off 300 m before a collission, passing the other plane at approx 150 ft. At the same time a third MD81 from Copenhagen with 124 pax was approaching the same runway but aborted descent on time. 1 Apr 2000 CHICAGO A Chinese 747 got in the way of another 747 which was taking off. Only quick thinking saved 380 lives. 20 Apr 2000 КTHESSALONIKI, GREECEКCrossair MD83 from Thessaloniki, Greece to Zџrich, Switzerland with 80 pax was about to enter active runway in front of an Alitalia plane taking off, when pilot did not stop for a holding point line. Pilot was suspended. No injuries. These pose a direct threat of a collision. But what else can a foreign pilot do if he cannot understand the controller? London experiences an average of 1 unauthorized takeoff each year. Concerning landings, Aeroflot planes have started to land on a city street in Seattle and a highway in Israel. What better example of miscommunication than not knowing at which airport you are about to land? This happened in Turkey in 1976 where 155 died, in Mexico, and in Ecuador in 1999. Landing on the wrong runway risks a collision. Singapore Airlines used 5R instead of 5L. This led to a crash in Surinam in 1989, where 177 died. A pilot can1t obey orders he doesn1t understand. The ground proximity alarm on the MD-80 worked perfectly. But the last words of the Chinese pilot on the cockpit voice recorder were, What does pull up mean1 ? Recently 24 died in a crash of a U.N. plane in Kosovo. Moments before, the Italian pilot radioed that he couldn't understand some computer words. There are 38 distinct dialects of English, and innumerable mixtures with local accents. Under a Hindi controller, a Kazakh airplane collided in midair with an Arabic one. Three of the 349 deaths were Americans. Another trio was involved in New York in 1999 - Icelandair, Air France, and an American controller. A collision was narrowly missed. The 1995 American Airlines crash in Colombia might have been avoided had the Spanish-speaking controller been able to express himself in English, according to his testimony. The New York crash in 1990 for the lack of fuel was the direct consequence of incorrect wording by the Spanish-speaking copilot. On the American side, controllers often use everyday English instead of aviation English. A Seattle controller asked a Russian pilot, 3Can you make the runway?2 (Build it?) The word HOLD has a different meaning in avciation, and this caused a 1981 crash in California. The 1998 Korean Airlines crash in Guam was partly due to a misunderstanding about ILS availability. If you cannot understand instruction manuals, you cannot follow them. It is reported that this is a relatively frequent occurrence on foreign airlines. Immediate, reflexive obedience to a controller command by the pilot becomes impossible when a message must be hurriedly translated (correctly?) and relayed. Recently a UAL pilot, approaching Mexico City, found it necessary to call a passenger to the cockpit to help understand the controller. Pilot errors are blamed for 65% of aviation accidents. But what caused the mistakes? Why did they blunder onto a runway where they shouldn1t be? Why did they fly at the wrong altitude? Why did they turn right when they should have turned left? Obviously they were confused. Here are some possible causes for confusion in English messages, particularly by foreigners. It is noteworthy that the Flight Safety Foundation assigns a higher risk factor to flights whose pilot or controller is not a native speaker of English. a. The differing sounds of the 38 dialects. a. FAA Glossary differs in 44 items from ICAO usage. The missing element in the puzzle of aviation language is scientific research. It was improper in 1951 to make a fuzzy recommendation to use English for international aviation without experiments and analysis to validate the choice. Thus we have been operating with a language of unproved communicative merit for 49 years. The problems of aviation language could be minimized or eliminated with a modest program of scientific research. It might resemble the research done by the organization Consumers1 Union, which evaluates the relative merits of such things as automobiles and insurance policies. The project might be done in three phases. The first would establish which of the 38 dialects of English communicates best between native English speakers. How much understanding is lost when a pilot from Boston talks with a controller in Australia, compared to a fellow Bostonian? Some dialects have 15 vowels and diphthongs, others have 24. Which transmits messages most effectively? Until we have quantified answers to these questions it is impossible to formulate a sensible language policy for the 3English2 usage of the present day. The second phase should focus on improvement for the future. It would evaluate the international communication efficacy of the best dialect of English in comparison with a few other languages. It might start with the three having the discipline of language Academies (Esperanto, French, Spanish) and continue with any others thought to have merit. The ethnic groups to be tested with each candidate language would represent dissimilar families, such as Russian, Chinese, Arabic and Hindi. The accuracy of message reception of group members who know each candidate language could be experimentally measured. The report would establish objectively which language is the most reliable communicator for worldwide aviation for the next century. The final phase would optimize the application of the language found to be best. Its vocabulary would be developed with the systematic principles of Terminology Committee 37 of the International Standards Organization in Vienna, Austria. The present vocabulary is a mess. Inattention to linguistic factors by the NTSB causes the loss of data needed for improvements in language use. A history of the language facts surrounding aviation crashes and incidents can enable future analysts to perceive various commonalities. Such a rich data collection can provide a solid base for understanding some of the seemingly irrational behaviors of pilots. Because the NTSB doesn1t find a chunk of broken English in the debris field it concludes that language was not a factor in crashes. It is easy to say that pilot error caused a crash. But why the error? The meaning we take out of a sentence depends upon how the information was packaged and upon our language backgrounds when we hear or see it. These are linguistic phenomena. The NTSB shirks its duty by sweeping the language problem under its rug. Thus all the linguistic data surrounding an incident should receive analysis by a professional linguist. Yet the NTSB doesn1t have a professional linguist on its staff. It cannot now competently appraise what if any influence language confusion had in accidents and incidents. The needed rigorous investigation of this problem area is now neglected by the National Transportation Safety Board. The result is continued ignorance about the nature and scope of language confusion in aviation. The worst accident in aviation history was due to language confusion. It occurred in 1977 in the Canary Islands. The Dutch KLM pilot started down the runway and crashed into a 747 full of people. He had misunderstood an information statement from the tower to be permission to take off. Then he thought he advised the tower that he was in the process of taking off. His actual wording of English, 3at takeoff2 signified to the tower that he was obediently sitting in position to start flight when given permission. But the AT in the Dutch language carries the same meaning as -ING in English. So he thought that he told the tower that he was takING off. But the tower thought he was motionless and didn1t warn the other plane. There were 583 fiery deaths as a result. A report by Grayson and Billings studied 6,527 reports submitted by pilots and controllers to ASRS. Ambiguous phraseology accounted for 529, phonetic similarity for 71, and garbled phraseology for 171. Thus explicit items of significance to a linguist were 10.5 % of the reason for these reports of danger. Even language misunderstanding by the ground crew can cause trouble. If unable to understand or read, they might load dangerous materials or might disrupt weight and balance of the aircraft. A professional linguist1s statement must be a formal part of each accident report. A linguistic recommendation about dialects is urgently needed. The NTSB cannot perform its statutory duty to provide guidance to the FAA so long as it avoids language problems. A. That the FAA initiate a comprehensive, scientific language research and development project, as described above. ENGLISH AROUND THE WORLD, from 1999 Encarta World English Dictionary. B. A nonsense poem, to illustrate the craziness of English. The FAA wants all pilots and controllers to have the ability to converse about everyday topics, according to one of its publications. This poem shows many booby traps which prevent the learning of English by foreigners. Even lifelong English speakers have difficulty reading this aloud. Make your head wish heat grow dizzy. But be careful how you speak. Script, receipt, show, poem , and toe. Gertrude, German, wind and mind. Nor does devour with clangour. Do not rhyme with here but there. Is a paling stout and spiky? Though , through, plough, dough, or cough ?
2019-04-19T20:46:56Z
http://marquez-art.ru/en/english_as_intern/aviation_language.htm
Our brokers have successfully helped thousands of business owners through our unique Right Match program. Performance Business Sales leave nothing to chance. We continually research and review the market, write in-depth reports, contact potential buyers on our waiting list, conduct meetings and represent you in negotiations. We have benchmark values based on data collected since 1982. We give you an accurate financial assessment of your business with realistic expectations. Established in Perth, WA for over thirty years, Performance Business Sales have an in-depth understanding of the changing landscape of the industrial and commercial sector within this state. Performance Business Sales has a database of qualified buyers waiting for investment opportunities. Boasting over 450 names, if you are considering selling contact us today. After being recommended by previous clients, Ray Peters for South West Gas found PBS and Tanya Bidwell "Very Professional, Very efficient, Easy to work with and dedicated" To whom it may concern our franchise group is Australia’s fastest-growing operation in its field and has been recognised as one of Australia’s 100 fastest-growing companies. We have over 56 stores nationally and annualised sales of $37 million. I have been working with performance business sales over the last 12 months, and in particular Ray Pardo and Graham Nankivell, in developing a relationship where franchise resales are facilitated through their company. The results we have achieved with performance business sales are pleasing both in terms of sales results achieved, the quality of applicant/buyer, the professionalism shown in the sales process, together with its representation of our franchise system. It is a key requirement that our brand values are protected and represented to the highest possible standard, and I am pleased to say that performance business sales have achieve these objectives. As a direct result of their achievements with our company I happy to say I am negotiating your appointment for our new franchise opportunities within Western Australia. I am pleased to support performance business sales, and look forward to continuing my relationship over the coming years. I am more than happy to support and recommend performance business sales. Re: Sale of Hose Masters Wanneroo With the settlement of the purchase now complete, I would like to take this opportunity thank you for all the efforts during the negotiations. At no time did I feel pressured and you represented a greatly professional approach to the whole process in a total unbiased manner. Having had numerous dealings with business brokers the comparison leaves a lot to be desired from any of your competitors who tend to leave much of the organisation to the parties involved. furthermore the business profile provided by you is far more comprehensive than I have encountered. Your personal attention to ensuring all necessary requirements were completed in a systematic manner by both parties resulted in a smooth transaction settlement occurring on time. I have no hesitation in utilising your services in all future transactions involving the sale or purchase of a business. Graham, just a short note to express our thanks and gratitude for your help and assistance regarding the sale of creative wardrobes. Please accept our Vintage bottle of wine – we hope you enjoy the drop! Dear Graham A short note to express my thanks to you and your organisation upon the successful completion of the sale of my business. You may not have been aware of it but before you listed the business was listed with another broker who although introduced 3 prospective buyers was unable to close the sale. It therefore came as some surprise to me that you’re able to sell the business to the first prospective buyer whom you introduced. It was as though they had all but decided to buy my business before they had actually inspected it!. I can only put this down to the excellent business profile you prepared. Providing all the information you required actually was a bit of a pain but I can appreciate now how important all the detail was. There was simply no comparison between this professionally produced profile complete with colour photos that PBS produced to the rolled up sheets of paper that the other broker was trying to use to sell the business. Once again thanks for a job well done. It has now enabled me to move on and concentrate on my new business venture. Re : CAR CARE VICTORIA now that we have accepted the purchases offer, we are writing to thank you for your assistance in the sale of the Car Care Master Franchise For Victoria. Prior to your appointment we had run our own series of advertisements in Victoria, but were making little progress. From only 2 advertisements you were able to produce a number of prospective purchasers which resulted in a full price offer being received within 5 weeks of your appointment. This was extremely pleasing as car care is not yet an established brand in Victoria. Your business report was particularly well presented and is far more professional in appearance and content than we have seen from any of your competitors. We would be pleased to recommend you and your company for future vendors or purchasers of a business. The system does work! Dear Graham Re - Personalised Business Search thank you for the opportunity to meet with you and roll on Monday and for explaining the personalised business search process. I would appreciate if you would please include me in on the personalised business search program which over the next few weeks, I will complete a list of preferred business sectors in order that we can review their potential before commencing with the acquisition search. I look forward to working with you and your team in finding a suitable business. Dear Graham thank you for your efforts to date and the time you have given in providing me with the necessary information to assist with enquiries regarding business purchase. Our discussions have been most fruitful and being able to draw on your considerable experience has been invaluable. As you are aware, my brother-in-law and I are looking to purchase a business, whether it be a franchise or a freehold enterprise we would like to confirm in writing my request for you to approach the appropriate organisations as you see fit. All enquiries made on our behalf and any details provided you will of course remain strictly confidential and exclusive. If you are able to provide details within the immediate future we would be pleased to review them immediately. Our accountant has been advised of our intention and is ready to review any proposals put to him. May I reiterate that we are both very keen to progress with this in the immediate future and would like you to take whatever steps necessary as soon as possible. Dear Graham Although our association has been briefed, I feel that this letter is necessary. at all times during the purchase and sale you have endeavoured to keep both parties fully informed at every stage of the negotiations and have paid meticulous attention to detail throughout the buying and selling period. this trait in itself is very rare and refreshing and after my association with other business brokers, it is a relief to get the full and unabridged facts quickly and in an easily understood form thus enabling a correct and in some instances a money-saving decision to be made. The ongoing backup and courtesy shown by the staff members of your office again reinforces the feeling of, these people are used to taking excellent care of buyers and sellers alike. Again thank you for your efforts on our behalf and we will certainly buy from you again. Dear Graham this is just a short note to thank you for your service in both the purchase and the sale of this business over the past 6 months. I will have no hesitation in recommending you to any possible purchaser and vendors, as indeed I have already recommended you to my brother for the sale of his business. I believe you have acted with the best of intentions and integrity at all times and wish you well for the future. To whom it may concern high-performance Corporation, the master franchise or of Salle’s intent to car had been dealing with Graham Nankivell for over 15 years Over that time Graham has been responsible for the majority of our franchise sales in Western Australia (32). 12 months ago we appointed his national team to handle our East Coast franchise sales, resulting in 8 being sold over that period. Grahams “business profile”concept has provided exceptional results, averaging 2 to 4 weeks to achieve a sale and the desired price. His personal approach, understanding of our requirements and ability to handle our franchisees has resulted in a mutually beneficial arrangement. I would highly highly recommend Graham and his team to any franchise group. Dear Graham RE-SALE OF CAR CARE WA Now that settlement has been finalised we are writing to thank you and your associates for the assistance in the sale of the master franchise for Western Australia. Your task was made more difficult by the fact we have stipulated that the proposed sale of the business would not be advertised. You are able to produce a number of prospective purchasers which placed us in the fortunate position of being able to choose the person most suited to hold the master franchise. We were impressed also by the quality of people available to it assist you and in particular Francis from your office was most helpful. Your business report was particularly well presented and was far more professional in appearance and content than we’ve seen from any of your competitors. We would be pleased to recommend you and your company to future vendors or purchasers of businesses and remain available should further be sought. Dear Graham We would like to thank you and your company for the great service provided during the process of buying Westart Reproductions. We had been looking for a suitable business for almost a year when we first enquired about the above-mentioned wholesale business advertised by Performance Business Sale. We found the friendly and professional attitude displayed by you and your staff outstanding. We had plenty of contacts with other business brokers over the last year to compare with. Buying a business for the first time was a daunting task but with PBS we felt comfortable throughout the whole process because of the open and honest way the sale conducted. We would like to pass on the compliments of our accountant and the credit manager of our financial institution regarding the excellent presentation portfolio of the business and its financial background. It has been a pleasure to everyone involved doing business with you. We will be pleased to recommend PBS to anyone wanting to buy or sell a business. Thank you again and all the best wishes for your future. To whom it may concern – when a decision was made to try and sell our business, after several profitable years of trading, so we could reap the rewards of our hard work and effort we put into it, the first person to come to mind was Graham Nankivell, mainly because we purchase this business with his help, and also the confidence we had then proved to be correct. We found that Mr Nankivell’s expert advice, and presentation to prospective buyers, and follow-up and familiar dealings had no doubt been the key to a very successful sale of our business. In hoping that our new venture will be just as successful as the previous one, and in due course will benefit us to work towards early retirement, we will certainly be calling on the help of Graham again when the time has come. Selling a business is a complicated process and selling a specialised business such as mine is even more so. It would have been almost impossible for me to sell my business without the expertise of Graham Nankivell from Performance Business Sales, his knowledge of the industry is second to none and his many years of experience within this industry is absolutely essential. Graham can show historical sales data for a business like mine that no other company can rival, this alone will put the prospect at ease and ensure a quick sale. The actual time from listing to closing the sale was relatively quick and from memory was only a matter of a few weeks. Graham showed me his sales history, and this reflects an average 2 week sale period. Graham will use his experience to get the best possible price for your business; there are many things to consider when pricing your business and Grahams advice in this area is vital. The sales report generated by Performance Business sales is integral to the sale and I can’t emphasise enough, the value in investing in a great sales report. After building relationships and networks over many years, it was important for me to keep our dealings confidential; Graham understands this completely, and his advice in this area was fundamental in keeping the sale private, all the way to settlement. Grahams professionalism and salesmanship is crucial to the sales process and knowing what I know now, I would have been happy to pay him even more for his indispensable services. I have the highest regard for Graham and the service he provides, I have no doubt I will be using him again in the future, and I would certainly not hesitate to recommend him to any business owner looking to market their business for sale. Thanks again Graham, I couldn’t have done it without you. Dear Graham, On behalf of my wife, Janine and myself, I would like to convey our thanks and appreciation for all the time and considerable effort you put into our acquisition of the Triou Food Company. As first-time business purchasers, it was refreshing to deal with someone of your honesty and integrity. It allowed us to go through the many stages of the business purchase with confidence. I can assure you, that at any time in the future if we decide to purchase another business, we will definitely be knocking on your door again. Thank you once again. And best wishes for your future business success. Dear Graham This is a sincere ''thank you" for your efforts over the whole of the period relating to our recent purchase of a business through Performance Business Sales. From our initial contact, when you patiently explained the detai1s and benefits of your Business Search Programme, right through until settlement, the service has always been professional and prompt. As I am sure you will remember, even at times when I was pushing for you to take action regarding negotiations while you were on a break down south with your family, you did not hesitate to act at once on my behalf, which resulted directly in the desired outcome. In terms of keeping me informed regarding negotiations and returning my inquiries, I have appreciated that you invariably got back to me during that day or, at the latest, by calling me that same evening from your home. These open lines of communication meant that I was always informed as to the state of play with our offer and with the subsequent settlement timetable. Although. we didn't choose the first business that was presented to us; this was not an issue as far as you were concerned, and we were very pleased to receive the terrific business reports that were presented to us for consideration. Being able to specify the type of business that appealed to us, and using the resources of your Business Search Programme, we feel that we were able to get the outcome we wanted by being proactive, rather than wait around hoping that a suitable listing would appear. Having previously spent some considerable amount of time searching for a business by ourselves, it was refreshing to have a system working for us to take the leg-work out of the exercise. As a potential vendor at some time in the future, I would be more than happy to have my business marketed via this programme, as it is more likely to be presented to genuine, qualified purchasers who are in a dedsion·maldng mode. Hello Graham, Yesterday we achieved a significant milestone in the process of acquiring one of your advertised businesses and it got me thinking all the way back to the beginning. As you know I have been searching for the right business for several years, my search has taken me Australia wide. Over that time I have gotten to know many business brokers and the way many conduct themselves, I would equate many of them to that of real estate agents ie) someone who simply waits for the buyer to come along and say “I like it and I'll have that.” Yet with you through our relationship that began at the back end of 2011 that could not be further from the truth. From a buyer's point of view one of the first degrees of separation from other brokers was your Information Memorandum. Initial impressions were, this was a direct reflection on Performance Business Sales professionalism and the quality of your clients and listings. The information memorandum was extensive, analytical and covered all aspects of the business. I was impressed. Having spent 20 years operating sales or business development divisions across the globe I completely understand the need for compromise and negotiation in order to close a deal. Throughout our process it has been give and take on both sides from the vendor and the buyer, it is a fine line that any broker treads towards the ultimate goal for both parties- settlement and given my experience I would think that Performance Business Sales would have a considerably higher settlement rate than others. That is a credit to you and your team in the way in which you conduct business creating a win win solution for all parties concerned. Some people seem to think they create win win solutions, and I am sure that some do, but you truly do. This can be reflected in the excellent current relationship that I have with the vendor. From a buyer's point of view I can honestly say if it was not for you and your team, this transaction would have fallen over several times. It is because of you and the way you effectively communicate with both myself and the vendor and help us both to focus on the end goal. No wonder when I did my reference checks on you you came highly recommended and doing this for more than 30 years. It is not often that I do this Graham but I feel compelled to for your excellence. I can think of only two other occasion when I did and it was because the parties I consider are of the highest standard and are beyond reproach. I rate Business Performance Sales 10/10 and as a reflection of our business relationship I would be happy to act as a reference for you or the team to any prospective parties. Please feel free to pass on this letter or my direct contact details ofwhich I would be happy to speak personally with them. I would without hesitation whether buying or selling my first and last call would be to Business Performance Sales. Graham - "The old saying "third time proves it" has never been more true! The sale of the national and international franchise rights for Housework Heroes is the third business sold by Graham Nankivell for which we have engaged your services as our business sales agent. On each occasion we have accepted full price offers. Each sale has been handled in a professional manner and has achieved a timely sale to an appropriate purchaser. The Performance Business Sales system, including the Business Report, is the best alternative for those considering selling a business. The system works!" "To whom it may concern Having recently sold my business through Performance Business Sales and in particular Graham Nankivell, I feel obliged to commend them for their professionalism and commitment. I originally placed my business with another business brokerage. After some weeks, I was disappointed by their attitude and approach, especially as the number of potential Buyers contacted was pathetically small, with no sale resulting. Fortunately, a colleague who had sold a business his business through performance Business Sales, recommended Graham to me. The difference between the two companies was obvious - Performance Business Sales gave a realistic valuation, detailed glossy full detailed report and constant enthusiasm, while the previously employed broker presented half a dozen low quality photos and several pages of text and lost interest after the first few weeks. The effort put into compiling the report was largely responsible for the sale of the business. The enthusiastic approach was unfaltering and there was never a doubt the business would sell. I have no doubt at all that Graham's very professional presentation and correct valuation/data sold the shop. Unlike the other previous Broker, Graham kept me informed and up-to-date constantly. Graham displayed amazing patience, persistence and diplomacy. he was able to smooth "ruffled feathers "and continue negotiations regardless of how challenging the problem appeared. he would be in my opinion, be second to none in negotiating skills. I thoroughly recommend performance Business Sales to anyone wishing to sell their business. " "Richard thank you for a very professional listing of our business. The whole process of getting my business to the market and the attention you applied to getting a sale without any hassle whatsoever was greatly appreciated . I would not hesitate to recommend PBS and yourself to future clients. Once again thank you." "Dear Paul Susana and the Team at Performance Business Sales I would like to take this opportunity to thank you for your efforts in selling my business. Selling a business requires a large degree of Skill and Trust especially in a Challenging Market Place. Due to your high-quality Product, Service and Tenacious efforts you not only found the right buyer, but you also made the whole process easy. Achieving a good price and smooth transition, freeing me up to capitalise on the next opportunity. Thanks again Paul for finding the Ideal buyer and being a man of your word. I will be recommending your services to anyone looking for a Smooth and hassle-free business sale. Kind Regards Glen Michaelides. CEO of The Titans Academy "
2019-04-25T15:43:36Z
https://www.pbsbusiness.com.au/sell-your-business/
The 12th China Economics Summer Institute (CESI) will take place between 17 – 18 August 2019 at Guanghua School of Management, Peking University (working papers of previous CESI workshops available at http://cesi.econ.cuhk.edu.hk/). The objective of CESI is to create a network and community of top level scholars working on Chinese economic development. This initiative is currently co-sponsored by the Chinese University of Hong Kong – Tsinghua University Joint Research Center for Chinese Economy, the Institute for Emerging Market Studies at Hong Kong University of Science and Technology, the Guanghua School of Management at Peking University, the Stanford Center on Global Poverty and Development at Stanford University, and the School of Economics and Management at Tsinghua University. The Summer Institute is organized in collaboration with the BREAD, NBER and CEPR networks of academic economists. This call invites you to submit a paper or express your interest in attending the above Summer Institute, which will be hosted this year by Guanghua School of Management, Peking University, during 17 – 18 August 2019. The workshop intends to bring together the best scholars working on China in China, the US and Europe with other top level scholars who have an interest in working on China in the future. We welcome applications not only from those who want to present their research on China but also from anybody who has an interest in doing serious economic research on China and would like to use the workshop as means of exploring this possibility. The Summer Institute will bring together between 20 and 30 participants for a period of two days. During the workshop, there will be seminar presentations and free time to allow scholars to interact and explore the possibility of doing joint research projects. Senior scholars who will attend will be available for consultations with junior scholars. Afternoon sessions will give the opportunity to a select group of young scholars and Ph.D students to present their work. The scientific committee of the China Economics Summer Institute is composed of Chong-En Bai, Robin Burgess, Hongbin Cai, Chang-Tai Hsieh, Ruixue Jia, Hongbin Li, Albert Park, Gérard Roland, Zheng (Michael) Song, Heiwai Tang, Daniel Xu, Yaohui Zhao and Li-An Zhou. Please register online (https://cloud.itsc.cuhk.edu.hk/mycuform/view.php?id=295974) for possible presentation at the meeting or expressions of interest in attending the meeting by 6 May 2019 (Monday). We can cover economy apex travel and accommodation costs for selected paper presenters and participants. Please indicate when you reply whether you will require this funding or whether you will be able to cover your own travel costs. Please note that it will not be possible to accept all applications to attend this Summer Institute. At the moment, funding is available for travel and accommodation expenses in accordance with standard guidelines (economy apex travel) but, where possible, it is hoped that some of the selected participants will use grants at their disposal to cover expenses and thereby free up space for others. The Bureau for Research and Economic Analysis of Development (BREAD) is pleased to announce that the 37th BREAD Conference on Development Economics will be hosted by the University of Maryland in College Park, MD, on Friday May 3 – Saturday May 4, 2019. All papers presented at the conference will be selected through this open submissions process. Please note that there will be time for only a small number of presentations. The conference lasts about a day and a half; there are no parallel sessions. The Scientific Organizers of the Conference are Sebastian Galiani (University of Maryland), Garance Genicot (Georgetown), and Kenneth Leonard (University of Maryland). The Barcelona GSE organizes the Seventh Barcelona GSE Summer Forum. The Summer Forum is a series of independent workshops that cover the main fields of Economics. The Summer Forum 2019 will take place from June 10 to June 21, 2019. The venue will be UPF Balmes Building, Balmes, 132 – 08008 in central Barcelona. We would like to invite you to submit a paper to the workshop ADVANCES IN MICRO DEVELOPMENT ECONOMICS, which will run for 2 days and will take place on June 10-11, 2019 in Barcelona. This workshop aims at being a showcase of recent outstanding contributions in micro Development Economics, and at creating an annual meeting of researchers in this field in the framework of the Barcelona GSE Summer Forum. Both empirical and theoretical contributions are encouraged. The deadline for submissions is February 28, 2019. To submit a paper, please use this link https://app-summerforum.barcelonagse.eu. Submissions should include either a full paper or an extended abstract with the main results. Authors chosen to present papers will be notified approximately by mid-March. A preliminary program will be announced by mid-April. Please note that the Barcelona Summer Forum is a series of independent workshops. When you submit your paper, you will be able to see the topics and dates of other workshops that will take place within the Summer Forum. The same paper cannot be submitted to more than one workshop but you are welcome to submit a different paper to another workshop. The workshop organization will provide support for accommodation for speakers and limited funding will be available only to partially cover travel costs for junior researchers who lack alternative funding sources. If you have questions, do not hesitate in getting in touch with any of the organizers. The Barcelona GSE Summer Forum is one of the activities supported by the Severo Ochoa Program of Centers of Excellence (SEV-2015-0563). Funding for the AMD workshop is also gratefully acknowledged from the Ministerio de Economía y Competitividad of the Spanish Government (grant ECO2015-69869-R and grant ECO2015-67602-P) and the People Programme (Marie Curie Actions) of the European Union (grant PCIG14-GA-2013-631510). The French Development Agency (AFD) Research Department, the World Bank Development Research Group (DECRG) and the Department ofEconomics at Carlos III University of Madrid (UC3M) are jointly organizing the 12th International Conference on “Migration and Development”.The conference is devoted to investigating ways in which international migration affects economic and social change in developing countries.Possible topics include the effects of migration on poverty, inequality, and human capital formation; social networks and migration; diasporaexternalities; remittances; brain drain; migration and institutional/technological/demographic change, today and in the past. Submission guidelines and timetable: submissions of full papers (pdf file name should begin with submitting author last name) are expected byFebruary 15, 2019. Submissions should be sent via email to [email protected]. Decisions will be communicated by March 15, 2019. Travel(economy class) and accommodation in Madrid for up to three nights will be covered for chosen participants.Organizing Committee: Rohen d’Aiglepierre (AFD), Anda David (AFD), Jesús Fernández-Huertas Moraga (UC3M), Matilde Machado (UC3M),Luigi Minale (UC3M), Jan Stuhler (UC3M), Çağlar Özden (World Bank), Hillel Rapoport (Paris School of Economics)Scientific Committee: Chair -- Hillel Rapoport (Paris School of Economics); Ran Abramitzky (Stanford), Michel Beine (Luxembourg), SimoneBertoli (CERDI), Michael Clemens (CGD), Patricia Cortes (Boston U), Frédéric Docquier (Louvain), Giovanni Facchini (Nottingham), MarcelFafchamps (Stanford), Jesús Fernández-Huertas Moraga (UC3M), Paola Guiliano (UCLA), Hubert Jayet (LEM, Lille), William Kerr (HarvardBusiness School), Anna-Maria Mayda (Georgetown), David McKenzie (World Bank), Stelios Michalopoulos (Brown), Melanie Morten (Stanford),Çağlar Özden (World Bank), Jan Stuhler (UC3M), Dean Yang (University of Michigan). You are invited to submit your research for presentation at the National Bureau for Economic Research (NBER) Development Economics Fall program meeting which will be held in Cambridge, MA, on 30 November -1 December. The deadline for submissions is 6 am EST on Tuesday, 25 September. Only completed papers will be considered for the program. Please submit your papers at http://papers.nber.org/confsubmit/backend/cfp?id=DEVf18 . The program will be selected by Esther Duflo, Joe Kaboski, Jeremy Magruder, Mark Rosenzweig, Duncan Thomas and Chris Woodruff. All papers presented at the conference will be selected through this open submissions process. Please note that there will be time for only a very small number of presentations. There will not be formal discussants but ample time will be allowed for discussion of the research during the presentations. Travel and hotel expenses will be covered for one author per paper that is presented at the conference following NBER travel reimbursement guidelines. If you have any questions, please email [email protected]. DFID, UNHCR, and the World Bank group have joined forces under a DFID Trust Fund to identify questions that are under-researched, of global interest, and highly policy-relevant on the topic of forced displacement and jobs. Within the initiative, the World Banks Jobs Group will fund one or several research projects to advance global knowledge on forced displacement and jobs, regarding (1) the impact of forced displacement on labor markets in host communities, and (2) the impact of jobs interventions in the context of forced displacement. For further details please see the draft Terms of Reference attached. For this assignment the World Bank is not looking for an individual consultant. Submissions will be considered from research centers and institutes, universities, firms and similar entities. The World Bank Group invites interested entities to indicate their interest in providing the services. Interested entities must provide information indicating that they are qualified to perform the services (publications, description of similar assignments, experience in similar conditions, availability of appropriate skills among researchers (CVs), etc.) and provide a short abstract-style outline (one page max.) showing that they will substantively address the research questions posed, and demonstrating prima facie feasibility. Please note that the total size of all attachments should be less than 5MB. Entities may associate and form a consortium to enhance their qualifications. Please do not submit full proposals at this stage. Acceptance of World Bank Group terms and Conditions. Following this invitation for Expression of Interest, a shortlist of qualified entities will be formally invited to submit proposals. Shortlisting and selection will be subject to the availability of funding. Only those entities which have been shortlisted will receive notification. No debrief will be provided to entities which have not been shortlisted. The World Bank Group (“the Bank”) is seeking a Chief Economist to provide intellectual leadership for the Bank’s economic research agenda. The Chief Economist reports to the President and advises him on economic issues, influencing the agenda of the Bank. The position will be a two-year term (with some flexibility according to the needs and availability of the successful candidate), and is based in Washington D.C. The World Bank Group is one of the world's largest sources of development assistance and knowledge for developing countries. It consists of five institutions that specialize in different aspects of development: the International Bank for Reconstruction and Development (IBRD), the International Development Association (IDA), the International Finance Corporation (IFC), the Multilateral Investment Guarantee Agency (MIGA), and the International Centre for the Settlement of Investment Disputes (ICSID). With twin goals of ending extreme poverty and promoting shared prosperity, the Bank works in more than 100 developing economies to improve living standards and to fight poverty. For each of its clients, the Bank works with government agencies, nongovernmental organizations, and the private sector to formulate assistance strategies. A network of offices worldwide delivers the Bank's programs in countries, liaises with government and civil society, and works to increase understanding of development issues. The World Bank is owned by 188 member countries whose views and interests are represented by a Board of Governors and a Washington, DC-based Board of Directors. More than 190 countries participate in at least one of the five World Bank Group institutions. The World Bank Group’s mission is becoming both more diverse and more focused. To achieve the Bank’s twin goals – ending extreme poverty by 2030 and boosting shared prosperity around the world – 16,000 experts in fields such as economics, engineering, health, sanitation, governance, education, urban planning, regulation – are helping countries drive sustainable, inclusive economic growth; invest in their people; and build resilience to shocks. As a result, the work of the Bank includes advising countries on investments that prepare them to compete in the economy of the future. It includes increasing work in states embroiled in fragility, conflict, and violence. And it means finding innovative ways to use scarce resources to make the global market system work for everyone. The World Bank Group brings expertise to help countries along their path of economic growth. The Bank is also a global knowledge hub, where innovative financial instruments (such as the swap, which the World Bank invented), and new approaches to ending poverty are being developed. The World Bank Group is seeking a Chief Economist who will influence the agenda of the Bank, and support the President and Senior Management in leading the institution during this time of transformative change. To address these challenges, the Chief Economist must have credibility as well as the leadership skills to engage with the global research community in meaningful dialogue. The Chief Economist will be expected to provide thought leadership to the internal and external development community; s/he will leverage the Bank’s research resources but will not be expected to manage the Development Economics Vice Presidency (“DEC”) or a large team, thus freeing up the individual to focus on the principal functions as described below. Intellectual leadership. Working closely with DEC and the eleven Bank Group chief economists (regional, practice-group, IFC and MIGA), the Chief Economist provides cutting-edge knowledge on policies for development. In particular, the successful candidate is expected to devise the research agenda for the Bank based on what is most important and relevant, and connect the research agenda with policy. Additionally, s/he will articulate a vision of how the Bank can achieve transformative impact around key global development challenges. Strategic leadership. Working with the President and Senior Management Team, the Chief Economist provides the analytical foundations of the Bank Group’s strategy, including shifts in that strategy in light of new research evidence. The Chief Economist will work to enhance the quality of operational projects, by challenging them to ensure analytical rigor. And s/he will manage the budget of the Chief Economist office. Global leadership. The Chief Economist will be an effective advocate of development. S/he will convene others from the global development community to create knowledge. The Chief Economist will engage with knowledge networks, including the research communities in the public and private sectors, government, academia and think tanks; leverage the Bank’s convening power to increase outreach of cutting edge research; and provide thought leadership to the global community of economists working on development. Economics Expertise: S/he will have a PhD in Economics, and minimum 15 years of relevant professional experience, including at least five years of experience in a leadership position, as a tenured professor in a leading economics department or in an institution that produces research relevant to the Bank’s development mandate. S/he will demonstrate willingness to engage in global policy debates concerning economic and social development, and to mobilize the Bank’s research resources to that end. S/he will also demonstrate the ability to link research with policy. And s/he will have a good understanding of the role of the private sector in development. Proven Record of Academic Achievement: S/he will have numerous publications in top economics journals, and participation on editorial boards of general or development economics journals. S/he will have a talent for explaining economics to non-economists, and s/he will have effectively influenced others through analytical work. Internal collaboration skills: S/he will demonstrate the ability to operate in a matrixed, highly collaborative and global institution. External recognition: S/he will have achieved visibility as an internationally recognized scholar in a field of economics related to international development. High level of cultural competency: The Bank is characterized as a multi-cultural institution. The leadership team originates from all corners of the world and has a diverse set of backgrounds, from academia and strategy consulting to government and aid organizations. The Bank is committed to building diverse leadership teams. Integrity: S/he will demonstrate the highest levels of integrity. Applications and nominations are to be sent to [email protected] by March 20th 2018. The 11th China Economics Summer Institute (CESI) will take place between 17 – 19 August 2018 at the Chinese University of Hong Kong (working papers of previous CESI workshops available at http://cesi.econ.cuhk.edu.hk/). The objective of CESI is to create a network and community of top level scholars working on Chinese economic development. This initiative is currently co-sponsored by the Chinese University of Hong Kong – Tsinghua University Joint Research Center for Chinese Economy, the Institute for Emerging Market Studies at Hong Kong University of Science and Technology, the Guanghua School of Management at Peking University and the School of Economics and Management at Tsinghua University. The Summer Institute is organized in collaboration with the BREAD, NBER and CEPR networks of academic economists. This call invites you to submit a paper or express your interest in attending the above Summer Institute, which will be hosted this year by the Chinese University of Hong Kong between 17 – 19 August 2018. The workshop intends to bring together the best scholars working on China in China, the US and Europe with other top level scholars who have an interest in working on China in the future. We welcome applications not only from those who want to present their research on China but also from anybody who has an interest in doing serious economic research on China and would like to use the workshop as means of exploring this possibility. The Summer Institute will bring together between 20 and 30 participants for a period of three days. During the workshop, there will be seminar presentations and free time to allow scholars to interact and explore the possibility of doing joint research projects. Senior scholars who will attend will be available for consultations with junior scholars. Afternoon sessions will give the opportunity to a select group of young scholars and Ph.D students to present their work. Please register online (https://cloud.itsc.cuhk.edu.hk/mycuform/view.php?id=120675) for possible presentation at the meeting or expressions of interest in attending the meeting by 23 April 2018 (Monday). The Development Economics program at the NBER will meet as part of the NBER's Summer Institute in Cambridge, MA, from July 22 through July 24, 2018. You are invited to submit your completed papers for consideration for the program. All research papers in development, broadly defined, will be considered. Please submit your work by Sunday March 19 at http://www.nber.org/confsubmit/backend/cfp?id=SI18DEV. Only complete papers will be considered and preference will be given to papers not previously presented at a NBER or BREAD meeting. The program will be selected by David Atkin (MIT), Pascaline Dupas (Stanford), Andrew Foster (Brown), Sebastian Galiani (Maryland), Costas Meghir (Yale) and Duncan Thomas (Duke). Speakers who already agreed to join include Ian COXHEAD (University of Wisconsin, Madison), Claudio FERRAZ (Pontifical Catholic University of Rio de Janeiro), Frederico FINAN (University of California, Berkeley), Takashi KUROSAKI (Hitotsubashi University), Rocco MACCHIAVELLO (London School of Economics), Dilip MOOKHERJEE (Boston University), Andrew F. NEWMAN (Boston University), Nishith PRAKASH (University of Connecticut), Laura SCHECHTER (University of Wisconsin, Madison). Applications can be submitted at http://dse.univr.it/ssdev/, starting from February 1, 2018. The application should be submitted no later than April 19, 2018. c) Upload, no later than April 19th, the complete paper (pdf file) or a detailed and well‐developed research proposal (pdf file). Acceptance decision will be announced by May 7, 2018. All applicants will be informed by email about the results. Prospective participants who are interested in attending the workshop but do not intend to present a paper are required to fill in the application form only. Graduate students and post‐docs will be asked to pay a registration fee of €450, while faculty will be asked to pay a fee of €600. The fee should be paid no later than May 28, 2018. The fee will cover the costs of meals and lodging in double or triple room for the duration of the workshop (arrival 18th June 2018 - departure 22st June 2018), but participants have to cover their travel expenses. Ian COXHEAD (University of Wisconsin, Madison), Marcello D'AMATO (University of Salerno, CELPE), Giuseppe FOLLONI (University of Trento), Sisira JAYASURIYA (Monash University), Dilip MOOKHERJEE (Boston University), Federico PERALI (University of Verona, CHILD), Pasquale Lucio SCANDIZZO (University of Rome Tor Vergata, CEIS), Alessandro TAROZZI (Universitat Pompeu Fabra and Barcelona GSE). The Bureau for Research and Economic Analysis of Development (BREAD) is pleased to announce that the 35th BREAD Conference on Development Economics will be hosted by Columbia University in New York, Friday May 11 – Saturday May 12, 2018. We invite submissions from interested researchers on any topic within the area of Development Economics. The deadline for submissions is February 28, 2018. Only full-length papers will be considered. Please send your paper to [email protected]. The Scientific Organizers of the Conference are: Amit Khandelwal (Columbia Business School), Rohini Pande (Harvard Kennedy School), Cristian Pop-Eleches (Columbia University), Miguel Urquiola (Columbia University) and Eric Verhoogen (Columbia University). If you have any questions, please contact [email protected]. The French Development Agency (AFD) Research Department, the World Bank Development Research Group (DECRG) and the Stanford Center on Global Poverty and Development at Stanford University are jointly organizing the 11th International Conference on “Migration and Development”. The conference is devoted to investigating ways in which international migration affects economic and social change in developing countries. Possible topics include the effects of migration on poverty, inequality, and human capital formation; social networks and migration; diaspora externalities; remittances; brain drain; migration and institutional/technological/demographic change, today and in the past. Submission guidelines and timetable: submissions of full papers (pdf file name should begin with submitting author last name) are expected by February 15, 2018. Submissions should be sent via online form at https://globalpoverty.stanford.edu/call-papers-migration-and-development...Decisions will be communicated by March 15, 2018. Travel (economy class) and accommodation in Stanford for up to three nights will be covered for chosen participants. Scientific Committee: Chair -- Hillel Rapoport (Paris School of Economics); Ran Abramitzky (Stanford), Michel Beine (Luxembourg), Simone Bertoli (CERDI), Michael Clemens (CGD), Patricia Cortes (Boston U), Frédéric Docquier (Louvain), Giovanni Facchini (Nottingham), Marcel Fafchamps (Stanford), Hubert Jayet (LEM, Lille), William Kerr (Harvard Business School), Victor Lavy (Warwick and Hebrew University), Anna Maria Mayda (Georgetown), David McKenzie (World Bank), Mushfik Mobarak (Yale), Melanie Morten (Stanford), Çağlar Özden (World Bank), Imran Rasul (UCL), Dean Yang (University of Michigan). The Barcelona GSE organizes the Sixth Barcelona GSE Summer Forum. The Summer Forum is a series of independent workshops that cover the main fields of Economics. The Summer Forum 2018 will take place from June 11 to June 22, 2018 in a new venue in central Barcelona (Casa Convalescència). The workshop will run for 2 days and will take place on June 14-15, 2018. This workshop aims at being a showcase of recent outstanding contributions in micro Development Economics, and at creating an annual meeting of top researchers in this field in the framework of the Barcelona GSE Summer Forum. Both empirical and theoretical contributions are encouraged. The deadline for submissions is February 28, 2018. To submit a paper, please use this link https://app-summerforum.barcelonagse.eu. Submissions should include either a full paper or an extended abstract with the main results. Authors chosen to present papers will be notified approximately by mid-March. A preliminary program will be announced by mid-April. The Barcelona Summer Forum is a series of independent workshops. When you submit your paper, you will be able to see the topics and dates of other workshops that will take place within the Summer Forum. The same paper cannot be submitted to more than one workshop but you are welcome to submit a different paper to another workshop. The acceptance of the paper is conditional on the submitting author attending the conference for its full two-day duration. Limited funding will be available to partially cover travel and accommodation costs for speakers who lack alternative funding sources. The Barcelona GSE Summer Forum is one of the activities supported by the Severo Ochoa Program of Centers of Excellence (SEV-2015-0563). Funding for the AMD workshop is also gratefully acknowledge from the Ministerio de Economía y Competitividad of the Spanish Government (grant ECO2015-69869-R) and the People Programme (Marie Curie Actions) of the European Union (grant PCIG14-GA-2013-631510). This conference, organized in partnership with the World Bank, will take place on June 12–15, 2018 in Washington DC. It will serve as a multidisciplinary forum to facilitate interactions between leading academics, World Bank staff, policymakers, government experts, civil society organizations, private-sector representatives, and representatives of other international organizations, and to showcase the present frontier knowledge on these issues. The conference will be organized with contributed papers, organized sessions, and lightning talks. We highly encourage participation from the private sector to showcase their innovative products and bring real-world perspectives to the discussions of the nature and consequences of innovations in the value chain for farm-based food, fuel, and fiber products. Preliminary list of Plenary Speakers: Thomas Reardon (MSU), Paul Romer (World Bank), Jo Swinnen (KU Leuven), Maximo Torero (World Bank Board), Joachim von Braun (ZEF-University of Bonn), David Zilberman (UC Berkeley). A plenary session to honor the professional life of Hans Binswanger will be organized by Prabhu Pingali from Cornell University. There will also be a “Student Marketplace Event” More information will be available in the coming months. We invite the submission of paper abstracts, and proposals for organized sessions and lightning talks by January 31, 2018. Please use this link to submit a 250-word abstract online. The conference will begin on June 12, 2018 with a pre-conference workshop of the U.S. multistate research project, NC1034: Impact Analysis and Decision Strategies for Agricultural Research. organized by George Frisvold (University of Arizona). The welcome drink will take place in the afternoon of June 12 at the World Bank, and the conference reception will be held on Thursday, June 14 at the Italian Embassy in Washington DC. The conference will end in the afternoon of June 15. The 2018 Annual Meeting of the Population Association of America will be held Thursday, April 26 through Saturday, April 28 in Denver, CO. The Economic Demography Workshop (EDW) will take place from 1-6 pm on the afternoon before the main PAA meeting (Wednesday, April 25, 2018). The Workshop provides an opportunity for the detailed presentation of 5-7 research papers on topics in economic demography. You may submit a paper for consideration by the Program Committee by Sunday, December 31, 2017, at: http://editorialexpress.com/conference/edworkshop2018/. Preference will be given to papers not on the main PAA program. The program will be finalized in late January. Additional information about the Economic Demography Workshop can be obtained on the EDW website (http://www.edworkshop.umd.edu) or from program chair Delia Furtado (University of Connecticut) ([email protected]). Other members of this year’s program committee are: Jeanne Lafortune (Pontificia Universidad Catolica de Chile), Jason Lindo (Texas A&M), Sam Schulhofer-Wohl (Federal Reserve Bank of Chicago), and Almudena Sevilla (Queen Mary University of London). Please forward this announcement to other interested economic demographers. If you are not on our mailing list, and wish to receive the annual call for papers and completed program by email, send an email to Delia Furtado at [email protected] with subject header "EDW subscribe." The Center for Effective Global Action is pleased to announce the release a Request for Proposals (RFP) from Economic Development & Institutions (EDI), a research programme supported by UK Aid from the British people. For this round, EDI expects to make multiple awards for both full-scale RCTs (no funding limit, but most awards up to £600,000) and pilot studies (up to £22,000 per study). Application materials must be emailed to [email protected] by 5PM U.S. Pacific Time on Tuesday November 15, 2017. Please refer to the RFA materials linked above for details, and feel free to reach out to our team at [email protected] if you have further questions. The National Bureau for Economic Research (NBER) Development Economics Program (DEV) and the Bureau for Research in the Economic Analysis of Development (BREAD) are pleased to announce their joint Fall 2017 meeting which will be held in Cambridge, MA, on 8-9 December, 2017. You are invited to submit your research for presentation at the conference. The deadline for submissions is 6 am EST on Friday, 29 September. Only completed papers will be considered for the program. Please submit your papers at: http://papers.nber.org/confsubmit/backend/cfp?id=DEVf17 . The program will be selected by Ray Fisman, Penny Goldberg, Rema Hanna, Michael Kremer and Duncan Thomas. All papers presented at the conference will be selected through this open submissions process. The conference will last about a day and a half, there will be no parallel sessions and presentations will follow a standard seminar format. There will not be formal discussants but there will be ample time for discussion of the research during the presentations. As a result, there will only be a small number of presentations. Travel and hotel expenses will be covered for one author per paper that is presented at the conference, for members of the NBER Development Economics program and for BREAD Fellows. All reimbursements will follow NBER travel reimbursement guidelines. Tufts will be hosting the 2017 NEUDC (Northeast Universities Development Consortium) Conference on November 4th and 5th, 2017. The final date for submitting a paper is August 18th 2017. Only full drafts of papers will be considered. Please submit a paper with an abstract not exceeding 300 words for this deadline. We will send out notifications by late September informing people of acceptance and rejection decisions. Those attending the meeting will be charged a registration fee of $200 (for students there will be a special rate of $100) for timely registrations. The registration will include breakfast, lunches, coffee and Saturday’s conference reception. The speakers will have to bear their own expense for travel and accommodation. Further details available at: https://sites.tufts.edu/neudc2017. If you have any questions, please contact [email protected]. The 10th China Economics Summer Institute (CESI) will take place between 14 – 16 August 2017 at Tsinghua University in Beijing, China (working papers of previous CESI workshops available at http://chinasummerinstitute.org). The objective of CESI is to create a network and community of top level scholars working on Chinese economic development. This initiative is currently co-sponsored by the Department of Economics, the Chinese University of Hong Kong, the Institute for Emerging Market Studies at Hong Kong University of Science and Technology, the Guanghua School of Management at Peking University and the School of Economics and Management at Tsinghua University. This call invites you to submit a paper or express your interest in attending the above Summer Institute, which will be hosted this year by the School of Economics and Management at Tsinghua University between 14 – 16 August 2017. The workshop intends to bring together the best scholars working on China in China, the US and Europe with other top level scholars who have an interest in working on China in the future. We welcome applications not only from those who want to present their research on China but also from anybody who has an interest in doing serious economic research on China and would like to use the workshop as means of exploring this possibility. The Summer Institute will bring together between 20 and 30 participants for a period of three days. During the workshop, there will be seminar presentations and free time to allow scholars to interact and explore the possibility of doing joint research projects. Senior scholars who will attend will be available for consultations with junior scholars. Afternoon sessions will give the opportunity to a select group of young scholars and Ph. D students to present their work. The scientific committee of the China Economics Summer Institute is composed of Chong-En Bai, Robin Burgess, Hongbin Cai, Chang-Tai Hsieh, Hongbin Li, Albert Park, Gérard Roland, Zheng (Michael) Song, Yaohui Zhao and Li-An Zhou. Please register online (https://cloud.itsc.cuhk.edu.hk/mycuform/view.php?id=2897) for possible presentation at the meeting or expressions of interest in attending the meeting by 24 April 2017 (Monday). We would like to invite you to submit a paper to the workshop: ADVANCES IN MICRO DEVELOPMENT ECONOMICS. The workshop will run for 2 days and will take place on June 15-16, 2017 in Barcelona. This workshop aims at being a showcase of recent outstanding contributions in micro Development Economics, and at creating an annual meeting of top researchers in this field in the framework of the Barcelona GSE Summer Forum. Both empirical and theoretical contributions are encouraged. The deadline for submissions is February 28, 2017. To submit a paper, please use this link https://app-summerforum.barcelonagse.eu. Submissions should include either a full paper or an extended abstract with the main results. Authors chosen to present papers will be notified approximately by mid-March. A preliminary program will be announced by mid-April. The Bureau for Research and Economic Analysis of Development (BREAD) is pleased to announce that the 33rd BREAD Conference on Development Economics will be hosted by Stanford University in Palo Alto, Friday May 12 – Saturday May 13, 2017. The Scientific Organizers of the Conference are Pascaline Dupas (Stanford), Marcel Fafchamps (Stanford), Fred Finan (Berkeley), Jon Robinson (UC Santa Cruz) and Elizabeth Sadoulet (Berkeley). This year BREAD will also host a panel on “Getting published in development economics" featuring Esther Duflo (MIT), Penny Goldberg (Yale), Imran Rasul (University College London) and Debraj Ray (NYU) on Friday, May 12 2017 from 6-7:30pm. Evidence Action Beta is looking for ambitious researchers whose work or insights could benefit millions of people living in poverty, and who want to participate in seeing their research turned into viable, scaled up programs. Have you done work that has similar potential? If you are interested, please fill out this short form for Evidence Action Beta's Call for Results! The deadline is 3 February 2017. We are looking forward to hearing from you! We are writing to invite you to submit your research for consideration for the Development Economics program meeting during the NBER's Summer Institute in Cambridge, MA. The meeting will be from lunchtime on Sunday July 23 through lunchtime on Tuesday July 25, 2017program. All research papers in development, broadly defined, will be considered. Please submit your work by Monday March 20, 2017, at http://www.nber.org/confsubmit/backend/cfp?id=SI17DEV. Only complete papers will be considered and preference will be given to papers not previously presented at a NBER or BREAD meeting. We plan to have nine papers presented with a discussant following each presentation as well as time for further discussion of the work. Please forward this call for papers to colleagues who may have a paper suitable for the program. Unfortunately, it will not be possible invite everyone who receives this call for papers or everyone who submits a paper. Invitations to the meeting and logistical information will be distributed in late April. If you have any questions or need additional information please contact Rob Shannon in the NBER's Conference Department at 617/868-3900 or [email protected]. We are pleased to announce that the 2017 edition of the annual ThReD conference will be sponsored by the University of Warwick and held on its new London Campus in King’s Cross on June 23 and 24, 2017. We are issuing an open call for papers for this conference. Papers should be submitted by Friday, January 27, 2017. Approximately a dozen papers will be selected for presentation by the Organizing Committee, which consists of Debraj Ray (chair), Sharun Mukand, Patrick Francois, and Garance Genicot. Decisions will be made by March 1st. The local organizers aim to cover the travel and local expenses of at least one presenter for each selected paper. ThReD is dedicated to theoretical research and its relation to empirical analysis in development economics. ThReD has organized conferences on at least annual basis (see http://thred.devecon.org/conferences.html for a list of past events). To submit your paper for consideration for the ThReD conference, please take the following steps. You will need a free account with the Conference Maker service. If you do not have an account, you may sign up for an account on the website (see below). Go to the ThReD Conference Maker website at https://editorialexpress.com/conference/THRED2017. You may also access this website by going to the ThReD website and clicking on the link. If you already have a Conference Maker user account, enter your username and password for this service. If you do not have a Conference Maker account or if you have forgotten your login information, look for a link at the bottom of the page that will allow you to sign up for an account and/or retrieve your existing login information. Enter your paper information into the submission form, including the paper title and an abstract. Submit the paper itself either by uploading a PDF of the document using the “Choose File” button, or entering the exact URL of an Internet copy of the PDF. Please be sure to provide the exact URL of the paper itself to that the paper will be automatically uploaded into the Conference Maker system. We request that all papers be submitted in a readable PDF format if possible. The submission page provides a link to guidelines on producing readable PDFs for submission. Press "submit" to submit your paper for consideration. It may take a minute for everything to upload. You should receive e-mail confirmation that your submission was successfully received. Please submit your paper through our website before 15th of February 2017 (by 12pm CET). Only one submission per author will be considered. Decisions of acceptance or rejection will be sent out no later than February 28th, 2017. Thank you and we hope to see you in Madrid! The aim of the conference is to bring together the community of scholars who employ laboratory experimental economics methods for research in developing countries. Keynote speakers are Eliana La Ferrara (Bocconi University) and Macartan Humphreys (Columbia University). The conference will consist of plenary and parallel sessions. Submissions are invited for papers that reflect SEEDEC’s broad research agenda which includes studies involving lab experiments in the field (in contrast to focusing on the randomized evaluations that have become widespread in development economics in recent years). The choice of papers will be based on full paper submissions, which should be submitted via the online form by January 22, 2017. Successful applicants will be notified by February 22, 2017. Participants are expected to cover their travel and accommodation. For further information, please visit seedec2017.wordpress.com or contact us at [email protected]. We are looking forward to meeting you at UEA in April! AFD, the World Bank and CERDI are jointly organizing the 10th International Conference on “Migration and Development”. The conference is devoted to investigating ways in which international migration affects economic and social change in developing countries. Possible topics include the effects of migration on poverty, inequality, and human capital formation; social networks and migration; diaspora externalities; remittances; brain drain; migration and institutional/technological/demographic change. A selection of papers from the conference will be considered for a special issue of the Journal of Development Economics. Additional information and submission guidelines. In January 2017, Georgetown University will host the Fourth Winter School on the Analytics and Policy Design of Migration. The SIEPR Postdoctoral Fellows program provides support for leading researchers who expect to receive their Ph.D. in Spring 2017 to visit Stanford for one to two years after their Ph.D. The SIEPR Visiting Fellows program provides support for junior faculty with strong publication records to spend a sabbatical year at Stanford. Both programs are designed to facilitate rich interactions with a broad set of economists and social scientists at Stanford and provide state-of-the-art facilities and resources for research. Those interested in applying for the 2017-18 academic year are encouraged to submit an application by September 1, 2016 for the Visiting Fellows program and December 1, 2016 for the Postdoctoral Fellows program. Applications received after these dates will be considered on a rolling basis until the positions are filled. More information about the program, including application requirements, is available at http://siepr.stanford.edu/scholars/young-scholars. You are invited to submit your research for presentation at the National Bureau for Economic Research (NBER) Development Economics Fall program meeting which will be held in Cambridge, MA, on 9-10 December. The deadline for submissions is 6 am EST on Monday, 3 October. Only completed papers will be considered for the program. Please submit your papers at http://papers.nber.org/confsubmit/backend/cfp?id=DEVf16 . The program will be selected by Esther Duflo, Rick Hornbeck, Rohini Pande, Erik Verhoogen and Duncan Thomas. All papers presented at the conference will be selected through this open submissions process. Please note that there will be time for only a very small number of presentations. The conference lasts about a day and a half, there are no parallel sessions. There will not be formal discussants but ample time will be allowed for discussion of the research during the presentations. Travel and hotel expenses will be covered for one author per paper that is presented at the conference following NBER travel reimbursement guidelines. The annual conference brings together international scholars and researchers of development economics and neighboring fields. Plenary sessions with keynote speakers, parallel sessions with contributed papers, and a poster session (with two discussants for all posters) will reflect the current state of research in development economics and provide a forum for exchange for researchers and practitioners. Interested contributors are invited to fill a submission form on www.entwicklungsoekonomischer-ausschuss.de and upload their full paper before February 15th. Acceptance notes with detailed information will be sent by early April 2017. The conference will start in the afternoon of June 1, 2017. There will be a conference fee of Euro 50. We will provide child care services for children from 6 weeks to 12 years old during all conference sessions and events. I am pleased to announce that the 32nd BREAD Conference on Development Economics will be hosted by Bocconi University in Milan on Friday 30 September and Saturday 1 October, 2016. This conference is co-sponsored by CEPR and PODER. We invite submissions from interested researchers on any topic within the area of Development Economics. The deadline for submission is Friday 15 July 2016. Only full-length papers will be considered. A pre-conference session will also be arranged for BREAD Affiliates and PODER fellows to present their work. Please use the same submission process (mentioning “Pre-Conference” in your application) if you would like your work to be considered for this part of the conference. Authors who are CEPR members can upload their submission on http://dev3.cepr.org/accounts/login.asp?NewURL=/accounts/config/accountconfig.asp. Authors who are not CEPR members can email their submission to Chloe Smith at [email protected]. The Scientific Organizers of the Conference are David Atkin (MIT and CEPR), Oriana Bandiera (LSE and CEPR), Selim Gulesci (Bocconi University), Eliana La Ferrara (Bocconi University and CEPR). Following the 2015 Inter-American Development Bank (IDB) flagship publication of 2015, "The Early Years: Child Well-Being and the Role of Public Policy", the Centre for the Evaluation of Development Policy (EDePo) at the Institute for Fiscal Studies (IFS) and the IDB are organizing an academic conference on the themes covered extending the scope to experiences in developing, middle income and developed countries. The focus of the conference will be on lessons that can be learned from the literature on the early years, their long term consequences, and the potential role for policy. This event is free to attend however we please ask that you register your details via the online booking form. Joint with IGC, Warwick is looking to appoint a one or two year post-doc to develop IGC projects (as both PI and or Co-PI) in Myanmar. The position offers generous research fund support and light duties. The post holder is expected to spend significant amount of time in Myanmar. For questions, please e-mail [email protected] The link to apply is here. Economic globalization remains extremely controversial in the United States and elsewhere. Nonetheless, opinions do not fall along recognizable partisan lines. In her current research, Mutz uses surveys and experimental designs to explore the psychological, political, economic, and philosophical underpinnings of American attitudes toward globalization policies, such as international trade and outsourcing. Mutz finds that trade attitudes have more to do with peoples’ attitudes toward the value of cooperation versus competition and on general sentiment toward citizens of other countries. This evidence highlights Americans’ differential valuation of human lives. Register online by visiting www.radcliffe.harvard.edu/event/2016-diana-c-mutz-lecture. The event is free and open to the public. We encourage you to share this invitation with people you know who may be interested in attending this event. The World Bank’s World Development Report 2006 on Equity and Development placed a concern with social justice and combating inequality at the center of the development paradigm. In the ten years since, inequality has become even more central to both academic inquiry and policy debates, in developed and developing countries alike. Research into top incomes; global inequality; inequality of opportunity; and economic mobility, to name only a few topics, has made much progress since 2006. This conference, jointly sponsored by the World Bank’s Development Research Group and Poverty and Equity Global Practice, will revisit the main premises and conclusions of the WDR 2006 in the light of recent experience and new findings. It will also explore the key developments in the field during the decade since its publication, and their implications for both policy and further inquiry. The one and a half day conference will be held at the World Bank Headquarters in Washington, DC, in an all-plenary format. Confirmed participants include Abhijit Banerjee, Nora Lustig, Branko Milanovic, Martin Ravallion and James Robinson. The Financial Inclusion Program at Innovations for Poverty Action (IPA) invites Expressions of Interest (EOI) from teams of researchers and financial service providers to conduct rigorous research on financial product innovations for low income households in developing countries. Expressions of Interest shall present a rigorous study design for a randomized evaluation with a clear hypothesis. Funding requests up to $300,000 will be accepted under this call. Please review the guidelines for more information about this opportunity and to connect with IPA. Please direct all questions to [email protected]. We invite those with contributions to the topic to submit their papers. We particularly seek participants from a variety of institutions and those researchers beginning their careers. There is a limited budget to help with travel costs. This workshop will bring together researchers working on economic development from both an empirical and theoretical perspective. Specifically, this year we will focus on self-selection. Self-selection is omnipresent as both a concern (from the econometrician’s standpoint) and a fundamental object of interest in both empirical and theoretical studies of development policies. For example, it is now well established that there is massive self-selection into credit markets (even after the introduction of microcredit) and understanding why self-selection is so stringent remains an open question. Likewise understanding what drives some individuals or firms to adopt new technologies (or change behavior) faster than others remains of fundamental importance. We welcome submissions that broadly approach this issue. Organized by: Arun Chandrasekhar, Stanford University; Melissa Dell, Harvard University; Pascaline Dupas, Melanie Morten, Stanford University; Xiao Yu Wang, Duke University. Please submit your paper via the program website (http://site.stanford.edu/ ). For more information about this or other SITE sessions, write the program administrator at [email protected]. Invitation to submit: We are looking for contributions on the broad theme of economic development in Africa. Topics of interest include, but are not limited to: mobile money and financial innovation; natural resource management; the quality of education and health; migration, remittances and the brain drain; the quality of public services and political economy; or entrepreneurship and management practices in the African context. Submission timetable: Submissions of full papers (PDF files) are expected by April 4, 2016. Extended abstracts may also be submitted but priority will be given to full papers. Decisions will be made by April 14, 2016. Submission guidelines: Please email your submission to [email protected]. For additional information about NOVAFRICA and past events, please visit www.novafrica.org. Organizers: Catia Batista (Universidade Nova de Lisboa, CReAM and IZA) and Pedro Vicente (Universidade Nova de Lisboa, and BREAD). "New Data in Development Economics" The summer school is intended for PhD students, post-docs and junior faculty members. The aim is to provide young researchers with an overview of new data in development and methods for analyzing them. Participants will also have the opportunity to discuss their own research projects with leading researchers in a relaxed and open atmosphere, and receive advice and feedback. The main components will be lectures by leading researchers and participants’ presentations. Lecture topics include social networks and development, issues in network data, spatial methods in development economics, taxation and development: what can be learned from large administrative data sets and mining large-scale social networks. Selected projects by participants will be presented and discussed during the day. We encourage all participants to submit either complete papers or detailed proposals that present empirical evidence on a development question. PODER Researchers who have an ITN contract at the time of the Summer School should pay for their travel directly and send the reimbursement claim to their host institution. For these researchers, accommodation will be covered by the network coordinator, Bocconi University. Other students will be considered for full or partial funding, although neither can be guaranteed in advance. Please indicate in your application form whether you would require full, partial, or no funding in order to participate. All participants are asked to stay for the entire duration of the Summer School. All applications should be sent no later than April 15, 2016 to Chloe Smith: [email protected]. Admission decisions will be announced by the May 1, 2016. All applicants will be informed by email about the results. We invite the submission of 800 to 1,500 word abstracts on ten thematic areas which are outlined in the attached file. A technical committee will base their reviews and acceptance of submitted papers on the innovative nature, policy relevance, and contribution to the literature and general body of knowledge of the paper. We encourage you to disseminate this call widely to your networks. More information on the conference is available in the attached file and on the 2015 conference website. Your contributions may be submitted through this link. This year, we are pleased to offer new and exciting sessions to the conference: an innovation fair and hands- on classes. The innovation fair on March 26 will feature how innovations in technology and open data can help improve land governance at scale, and will encourage hands on interaction for participants looking for solutions to the land challenges of the post-2015 Development Agenda. A post-conference learning day on March 27 will offer hands-on classes to familiarize participants with cutting edge tools and techniques developed to help policy makers. We look forward to a large number of submissions and a very stimulating event. CEGA and BCRN are pleased to announce the first Conference on Behavioral Health Economics, to be held November 14 at UC Berkeley. This one-day meeting will feature presentations and discussions of 6-8 in-progress and completed papers at the intersection of behavioral economics and health, and a keynote address from Anna Fruttero, lead author of the World Bank's 2015 World Development Report, Mind and Society. Submit your paper (or long abstract for works in progress) at https://cega.submittable.com/submit/33417 by midnight Pacific time on Sunday, October 5. Submissions should clearly indicate the relevance of behavioral economics. Any health issues in any geographic region will be considered. Please contact Ellie Turner at [email protected] with questions. Visit the CEGA/J-PAL/IPA Funding Calendar at http://goo.gl/8zjG6 (calendar view) or http://goo.gl/xGw04 (list view). The PAA Annual Meeting will be held April 30-May 2, 2015, in San Diego, California. The Call for Papers is available at http://paa2015.princeton.edu/ and the deadline for submissions is September 26, 2014. The Experimental Social Science Laboratory (X-lab) and the Center for Effective Global Action (CEGA) at the University of California at Berkeley, and The Choice Lab at NHH Norwegian School of Economics are pleased to announce the 2014 Symposium on Economic Experiments in Developing Countries (SEEDEC) to be held from December 10-11 at the Norwegian School of Economics, Bergen, Norway. Submissions are invited for papers that reflect SEEDEC’s broad research agenda which includes studies involving lab experiments in the field (in contrast to focusing on the randomized evaluations that have become widespread in development economics in recent years). The choice of papers will be based on full paper submissions, which should be sent via email by September 15 to [email protected]. Successful applicants will be notified in by October 11. All participants will have to cover their economy travel and accommodations. For further information, please visit seedec2014.wordpress.com or contact Ida Kjørholt at [email protected] or Bertil Tungodden at [email protected]. The National Bureau for Economic Research (NBER) Development Economics Program (DEV) is pleased to announce the fall program meeting which will be held in Cambridge, MA, on 10-11 October 2014. The program will be selected by Seema Jayachandran, Ben Olken and Duncan Thomas. All papers presented at the conference will be selected through this open submissions process. Please note that there will be time for only a very small number of presentations. The conference lasts about a day and a half, there are no parallel sessions, and ample time is allowed for discussion of the research during the presentations. Travel and hotel expenses will be covered for one author per paper that is presented in the conference following NBER travel reimbursement guidelines. CALL FOR ESSAYS: HOW WOULD YOU REINVENT FOREIGN AID? The world has changed radically since the emergence of official development assistance. How should aid change? We want to hear your views: Which financial instruments should be used to provide aid? How should the donor “aid system” be organized? Should aid be given only to the poorest countries? How could aid improve governance? How should recipient countries allocate aid in the context of other sources of financing? What does a data and technology driven transformation in the development project “marketplace” look like? Up to 20 winning entries chosen by an international jury will receive 20,000 USD each. Select winning ideas may be promoted by the Global Development Network (GDN) and the Bill & Melinda Gates Foundation. Last Date: 15 September 2014. Submissions can be sent in English, French or Spanish. The PODER Summer School on Behavioral and Experimental Economics in Development will be held at the University of Cape Town, 7-10 July, 2014. The summer school is intended for PhD students, post-docs and junior faculty members. The aim is to provide young researchers with an overview of the application of insights from behavioural and experimental economics to development issues. Participants will also have the opportunity to discuss their own research projects with leading researchers in a relaxed and open atmosphere, and receive advice and feedback. Click here for more information and click here for the application form. 3rd Summerschool of the Households in Conflict Network will be held in Bjumubura, July 20-27, 2014. The Center for the Governance of Natural Resources at University of Colorado Boulder seeks a Research Associate (postdoctoral researcher) to conduct and support interdisciplinary research related to the local governance of two different collective goods in developing countries: forest ecosystems and public health systems. The Research Associate will work under the supervision of Professor Krister Andersson and will help coordinate the data collection campaigns in selected field sites in Latin America, design field protocols, develop data-analysis plans, and train field assistants. We are looking for colleagues with advanced skills in quantitative analysis, with preference for individuals who have experience in designing and conducting behavioral experiments (e.g. decision-making games) in rural field settings. Proficiency in Spanish is highly desirable. The Stanford Institute for Theoretical Economics (SITE) is organizing a nine-session conference on economic theory. They will pay particular attention to attracting participants from a variety of institutions and to young researchers in the beginning of their careers. There is a limited budget to help with travel costs. The SITE Summer Workshop is funded by grants from the National Science Foundation (NSF) and the Standford Institute for Economic Policy Research (SIEPR). Please visit SITE for additional information. J-PAL is hosting on the topic of Improving Take-up and Delivery of Maternal and Child Health Services in Developing Countries. The conference will take place on Friday, 23 May 2014 at MIT in Cambridge, MA. The goal of this conference is to share evidence from recent randomized evaluations of interventions designed to promote uptake and better delivery of protective health goods and services to improve maternal and child health. We will accept four papers for presentation in addition to four scheduled presentations that will share findings from studies under a National Institutes of Health P01. Paper(s) may be uploaded via this link: http://www.povertyactionlab.org/mch-conference-c4p The deadline for submission is 5pm EST on Friday, 7 March. Notification of the outcome of the peer review process will be on Friday, 4 April 2014. The Bureau for Research and Economic Analysis of Development (BREAD) is pleased to announce the 27th BREAD Conference on Economic Development. The conference will be held at Berkeley, CA, 8-9 May 2014. You are invited to submit your research for presentation at the conference. The deadline for submissions is midnight EST on 21 March 2014. We are very grateful to Fred Finan, Paul Gertler and Ted Miguel who have graciously agreed to serve on the scientific committee and select the papers for the program. All papers presented at the conference will be selected through this open submissions process. Please note that there will be time for only a very small number of presentations. The conference lasts about a day and a half, there are no parallel sessions, and ample time is allowed for discussion of the research during the presentations. Reasonable travel and hotel expenses will be covered for one author per paper that is presented in the conference. We are inviting submissions to the workshop on Advances in Micro Development Economics. This workshop will take place on June 11-12, 2014 in Barcelona, within the general framework of the 2nd Barcelona GSE Summer Forum. Invited Speakers: Pascaline Dupas (Stanford), Fred Finan (Berkeley), Seema Jayachandran (Northwestern), Kaivan Munshi (Cambridge). Click here for the call for papers and online submission Form. The deadline for submissions is February 16th 2014. Approximately six papers will be selected for presentation by the Organizing Committee. Travel and local expenses of one presenter for each selected paper will be covered by the local organizers. The Barcelona Summer Forum is a series of independent workshops. When you submit your paper, you will be able to see the topics and dates of other workshops that will take place within the Summer Forum. You are welcome to submit papers to other workshops. More information can be found on the Summer Forum webpage http://www.barcelonagse.eu/summer-forum.html. The 2014 ThReD conference will be held at the New Economic School, Moscow, on June 27 and 28, 2014. ThRed is an organization dedicated to theoretical research in development economics, and its relation to empirical analyses. The Board of ThReD consists of Karl Ove Moene (President), Jean-Marie Baland, Maitreesh Ghatak, Dilip Mookherjee, Andrew Newman and Debraj Ray. ThReD has already organized a number of conferences previously; see the conference page at http://thred.devecon.org/conferences.html. We are issuing an open call for papers for the June 2014 conference. Papers should be submitted by 15 February 2014. Approximately a dozen papers will be selected for presentation by the Organizing Committee, which consists of Dilip Mookherjee (chair), Jean-Marie Baland, Paul Dower and Maitreesh Ghatak. Decisions will be made by mid-March. Travel and local expenses of one presenter for each selected paper will be covered by the local organizers. To submit your paper for inclusion in the ThReD conference, please take the following steps. You will need a free account with the Conference Maker service. If you do not have an account, you may sign up for an account on the website (see below). 1. Go to the ThReD Conference Maker website at https://editorialexpress.com/cgi-bin/conference/conference.cgi?action=login&db_name=THRED. You may also access this website by going to the ThReD website and clicking on the link. 2. If you already have a Conference Maker user account, enter your username and password for this service. If you do not have a Conference Maker account or if you have forgotten your login information, look for a link at the bottom of the page that will allow you to sign up for an account and/or retrieve your existing login information. 4. Enter your paper information into the submission form, including the paper title and an abstract. Submit the paper itself either by uploading a PDF of the document using the “Choose File” button, or entering the exact URL of an Internet copy of the PDF. Please be sure to provide the exact URL of the paper itself so that the paper will be automatically uploaded into the Conference Maker system. We request that all papers be submitted in a readable PDF format if possible. The submission page provides a link to guidelines on producing readable PDFs for submission. 5. Press submit to submit your paper for consideration. It may take a minute for everything to upload. You should receive email confirmation that your submission was successfully received. International Migration Institute, University of Oxford, June 30 – July 1, 2014. The French Development Agency (AFD) Research Department, the World Bank Development Research Group (DECRG), the Center for Global Development (CGD) and the International Migration Institute at the University of Oxford are jointly organizing the Seventh International Conference on “Migration and Development”. The conference is devoted to investigating ways in which international migration affects economic and social changes in developing countries. Possible topics include the effects of migration on poverty, inequality, and human capital formation in developing countries, diaspora externalities, remittances, brain drain, migration and institutional/technological change. A selection of papers from the conference will be considered for a special “features” issue of The Economic Journal. KEYNOTE SPEAKERS: Philippe Fargues, European University Institute David McKenzie, World Bank Giovanni Peri, UC Davis Submission guidelines and timetable: Submissions of full papers (pdf files) are expected by January 5, 2014. Submissions should be sent to [email protected]. Decisions will be communicated by February 5, 2014. Travel (economy class) and accommodation in Oxford for up to three nights will be covered. Organizing Committee: Cyrille Bellier (AFD), Michael Clemens (CGD), Hein de Haas (IMI Oxford), Çağlar Özden (World Bank), Chris Parsons (IMI Oxford), Hillel Rapoport (Paris School of Economics and Bar-Ilan University), Briony Truscott (IMI Oxford) Scientific Committee: Ran Abramitzky (Stanford), Emmanuelle Auriol (Toulouse), Oliver Bakewell (IMI Oxford), Michel Beine (Luxembourg), Jørgen Carling (Peace Research Institute, Oslo), Michael Clemens (CGD), Patricia Cortes (Boston U), Hein de Haas (IMI Oxford), Frederic Docquier (Louvain), Giovanni Facchini (Nottingham), Hubert Jayet (EQUIPPE, Lille), William Kerr (Harvard Business School), Anna-Maria Mayda (Georgetown), David McKenzie (World Bank), Kaivan Munshi (Cambridge), Çağlar Özden (World Bank), Giovanni Peri (UC Davis), Jean-Philippe Platteau (Oxford), Hillel Rapoport (Chair, Paris School of Economics and Bar-Ilan), Imran Rasul (UCL), Dean Yang (University of Michigan), Yves Zenou (Stockholm). The 2014 Pacific Conference on Development Economics (PacDev) will be held on Saturday, March 15, 2014 at the University of California, Los Angeles at the Sproul Presidio Commons. The goal of PacDev is to bring together graduate students, faculty and practitioners to present and discuss various issues facing developing economies. The conference website is here. The deadline for submissions is December 2, 2013. Jean-Marie Baland, Gharad Bryan, Eliana La Ferrara, Karen Macours, Jakob Svensson, Alessandro Tarozzi and Ingrid Woolard are involved in a Marie Curie Initial Training Networks (ITN) funded under the European Commission's 7th Framework Programme. This network is called PODER (Policy Design and Evaluation Research in Developing Countries) and runs through August 31, 2017. They can participate in training events (e.g., courses, summer schools and conferences), develop their research projects and collaborate with local faculty. They can also benefit from internships with the following Associated Partners: EBRD, IPA, MARS, Mathematica, Oxford Policy Management. Among other things, these internships may allow students to gain experience in fieldwork and collect data. Funding for PODER students is quite generous: the gross salary for students in their first 4 years of doctoral studies is up to euro 38,000 per year (USD 51,600), and for students in their 5th year is up to euro 58,500 per year (USD 79,500). Students planning to do fieldwork can save up some of this salary and use it for data collection. For more information, contact the network co-ordinator, Eliana La Ferrara. The 2014 Annual Meeting of the Population Association of America will be held Thursday May 1 through Saturday May 3 in Boston, MA. The Economic Demography Workshop (EDW) will take place from 1-6 pm on the afternoon before the main PAA meeting (Wednesday, Apr 30, 2014). The Workshop provides an opportunity for the detailed presentation of 5-7 research papers on topics in economic demography. You may submit a paper or detailed abstract for consideration by the Program Committee by Friday, December 31, 2013. The Program Committee is Lucie Schmidt (Williams College) ([email protected]) Kasey Buckles (University of Notre Dame), Delia Furtado (University of Connecticut) and Joe Price (Brigham Young University). Preference will be given to papers not on the main PAA program. The program will be finalized in late January Past programs are on the EDW website which also provides information about the EDW. General information about the PAA is here. focuses on (i)early childhood nutrition, health, and development; (ii) water supply, sanitation, and hygiene linked to human development outcomes; (iii) basic education service delivery; and (iv) health systems and service delivery. First stage proposals are due November 1, 2013. on infrastructure, growth, humanitarian assistance and education. will be held at the World Bank Headquarters in Washington DC on Mar 31-Apr 3, 2014. The conference theme will be "Integrating Land Governance into the Post-2015 Agenda: Harnessing Synergies for Implementation and Monitoring Impact". Abstracts may be submitted until mid November 2013. See the conference website for more information and submission instructions. Click here for more information about the Winter School and how to apply. We will bring together leading economic and evolutionary researchers to explore the nature of conflict and cooperation between the sexes in the areas of mating, fertility, marriage and family life. The conference provides an opportunity for researchers to discuss the economic and evolutionary biology approaches to these issues, explore common ground and identify collaborative opportunities. Abstracts are due by 30 August 2013 and can be submitted here. The Experimental Social Science Laboratory (X-lab) and the Center for Effective Global Action (CEGA) at UC Berkeley, and The Choice Lab at NHH Norwegian School of Economics are pleased to announce the 2013 Symposium on Economic Experiments in Developing Countries (SEEDEC) to be held from December 5-6 at the Norwegian School of Economics, Bergen, Norway. The aim of the conference is to bring together the community of scholars who employ laboratory experimental economics methods for research in developing countries. Keynote speakers are Charles Sprenger (Stanford University) and Edward Miguel (UC Berkeley). The conference will consist of plenary, parallel, and poster sessions. Papers should be submitted via email by September 30th to Ranveig Falch at [email protected]. Preference will be given to full papers. Successful applicants will be notified by October 15. All participants will have to cover their travel and accommodation. We also invite you to submit your work for the special issue of the Journal of Economic Behavior and Organization entitled Economic Experiments in Developing Countries. Guest editors are Shachar Kariv, Edward Miguel, Jane Zhang, and Bertil Tungodden, and the deadline for submission will be February 1st, 2014. Consult the journal website for further details. For further information, please visit seedec2013.wordpress.com or contact Ranveig Falch at [email protected]. The call for papers is here. Submissions are due 27 September 2014. IZA and DFID Growth and Labor Markets in Low Income Countries (GLM | LIC) program. IZA and DFID are now accepting applications for funding in Phase III of the Growth and Labor Markets in Low Income Countries (GLM | LIC) program. After two competitive rounds of funding in Phase I and II, we look forward to receiving many high-quality research proposals again in this final call. It is expected that 10 to 12 projects will be selected for funding. The deadline for applications is October 29, 2013. Please visit glm-lic.iza.org for more information about the program and the call for proposals. The full Call Specifications can be downloaded here. Projects funded in previous calls cover a wide range of low-income countries and focus on various topics, including the impacts of trade and globalization, evaluation of training programs, the functioning of markets for education and skills, and migration and job search. Descriptions of Phase I projects can be found on the GLM | LIC website, where Phase II projects will be added later this month. Harvard University will be hosting the 2013 NEUDC (Northeast Universities Development Consortium) Conference on November 2nd and 3rd, 2013. You are invited to submit a paper for the conference and also to pass the word around among your colleagues and students who may be interested. All papers that investigate topics in economic development broadly defined are welcome. To submit a paper, please do so here. The final date for submitting a paper is August 8th 2013. Only full drafts of papers will be considered. Please submit a paper with an abstract, not exceeding 300 words, before the August 8th deadline. We will send out notifications by late September informing people of our acceptance or rejection decisions.Those attending the meeting will be charged an advanced registration fee of $200. For students there will be a special discounted rate of $100. The registration will include breakfast, lunches, coffee and Saturday's conference reception. Expenses for travel and accommodation will not be covered by the conference. Further conference details will be posted on the conference web page.If you have any questions, please feel free to contact us at [email protected]. The call for papers and panels is here. The deadline for paper submissions is 16 September 2013. The Global Financial Inclusion Fund (GFII) at Innovations for Poverty Action (IPA) invites Expressions of Interest (EOI) submissions from teams of researchers and practitioners to conduct rigorous research on identifying innovative products and programs that enhance poor households' access to and usage of improved financial tools, products, and services. Savings: The poor can and do save. In fact, saving is critical to households whose income flows do not match their daily consumption needs, much less their need to plan for risks and make investments. GFII studies innovations that help individuals to access savings services, overcome temptation and social demands, and build savings habits, and measures the impact of improved saving on consumption, investment, and risk mitigation. Payments: The ability to move money from one location to another is key to allowing personal, business, and government transactions to occur. Innovations in payment channels, driven by the widespread use of technologies such as mobile phones, allow the poor to transact in a faster, cheaper, and more secure manner. Our studies measure the impact of these new transaction mechanisms on the welfare of the poor. Financial Capability: Simply having access to financial products and services is only part of the solution to maintaining a healthy financial portfolio. Individuals must also know how to choose and use the right products based on their specific needs, and know how to balance products and services to optimize sustenance and growth. GFII assesses the effectiveness of various innovative tools designed to help the poor make better decisions on their own financial portfolios. Please direct all questions to [email protected]. For more information on IPA's Global Financial Inclusion initiative, please visit http://poverty-action.org/financialinclusion. The application is available at www.poverty-action.org/sites/default/files/gfii_eoi_2013_application_form.doc. We are writing to invite you to submit a paper for the conference and also to pass the word around among your colleagues and students who may be interested. We welcome all papers that investigate topics in economic development broadly defined. The final date for submitting a paper is August 8th 2013. Only full drafts of papers will be considered. Please submit a paper with an abstract, not exceeding 300 words, before the August 8th deadline. We will send out notifications by late September informing people of our acceptance or rejection decisions. Those attending the meeting will be charged an advanced registration fee of $200. For students there will be a special discounted rate of $100. The registration will include breakfast, lunches, coffee and Saturday's conference reception. Expenses for travel and accommodation will not be covered by the conference. If you have any questions, please feel free to contact us at [email protected]. "The Economics of Genocide, Mass Murder and other Atrocities" The scientific analysis and understanding of human behavior is put at the test when we consider what is probably the worst expression of human behavior: genocide and mass killing. Explanations of this phenomenon have crossed disciplinary and theoretical boundaries including prospect theory and rational choice in economics, relative deprivation in psychology and political science and horizontal inequality in development studies. New insights have been achieved in the cross-country empirical analysis of violent conflict. Recently, the availability of in-country household level data have allowed micro-level inquiry into the causes, functionings and consequences of violent conflict, genocide and mass murder. We invite empirical papers who increase our understanding of the phenomenon of genocide and mass murder. Political economy and theoretical contributions will also be considered. Papers which illuminate the behavior of people in the institutional context in which they operate are particularly welcome. As in previous workshops, papers who inform us on the micro-economics of violent conflict but do not particularly address the theme of this year are also welcome. The 9th Annual Workshop is hosted by Edward Miguel and will take place on the campus of UC Berkeley. The program committee members are Tilman Brück, Patricia Justino, Edward Miguel and Philip Verwimp. Only scholars whose paper is selected are invited to participate in the workshop. Please consult the program of previous workshops to find out if your paper is the kind of paper we are looking for (www.hicn.org) click 'events'. Journal editors will be contacted with a view to a later submission of papers for a potential special issue. . Please send a PDF of your paper as well as a PDF of your CV. Selected authors will be invited by 1 October 2013. There is no registration fee. Participants have to cover their ticket and hotel costs. Submissions are invited for the seventh annual conference on the political economy of international organizations, to be held at Princeton University, USA, on January 16-18, 2014. The conference brings together economists and political scientists to address political-economy issues related to international organizations such as the World Trade Organization, the United Nations, the International Monetary Fund, the World Bank, and the European Union, and also other international organizations that have as yet received less attention in the academic literature. Both empirical and theoretical papers will be considered. Please submit full papers to [email protected]. The deadline for submission is 31 August, 2013. Decisions will be made by 30 September, 2013. This year's special issue of the Review of International Organizations will be focusing on Dispute Settlement in International Organizations, edited by Christina Davis. Please indicate in your submission to the conference whether you are interested in also submitting to the special issue. The number of participants will be limited to about 70, which allows for in-depth discussion of each paper. Authors of accepted papers are expected to attend the entire conference. There is no registration or conference fee. Travel and accommodation are at the expense of participants. Young Lives is an international, longitudinal study of childhood poverty that is following 12,000 children in 4 countries for 15 years, from 2002 to 2017. Currently three rounds of data are publicly available for two cohorts of children, one followed from infancy and the other from age 8, in Ethiopia, India (Andhra Pradesh), Peru and Vietnam. Each survey contains an extensive socio-economic component, collecting detailed data on household education, employment, income, consumption and wealth, as well as multidimensional indicators of child well-being including nutrition, schooling, parental involvement and aspirations, psychosocial well-being, children's time-use, cognitive and non-cognitive development, and academic achievement. Young Lives is the largest cross-national cohort study on poverty and child well-being and unique in providing rich comparable longitudinal information across four developing countries, on individual children, their families and the communities in which they live. A key focus area for Young Lives research is documenting and exploring the mechanisms for the evolution of inequalities in children's outcomes across, inter alia, gender, ethnic group, socio-economic status, and rural-urban residence. The purpose of this conference is to raise awareness of the Young Lives study and bring together economists and other social scientists working on issues relating to the evolution, causes and consequences of childhood inequalities who are using either the Young Lives data or other panel data-sets. What is the extent of inequalities in key indicators of children's human capital and well-being over the child's life-course across, gender, socio-economic status, ethnic group, rural-urban residence, and other dimensions? How do inequalities evolve and change over the child's life-course? What are the factors that mitigate/reinforce early inequalities and explain the evolution of inequalities over time? The organising committee invites submissions of high-quality research papers addressing these and other questions relating to child well-being and development in developing countries. Submissions using the Young Lives data are encouraged, although consideration will also be given to papers using other developing country panel data-sets that address related issues. Researchers wishing to use the Young Lives data can find more information, including how to obtain the data, on the Young Lives website: www.younglives.org.uk. If you would like to submit a paper (full papers only; abstracts only will not be considered), please e-mail [email protected]. In the subject header please put: Submission Young Lives Child Inequalities Conference. If the paper is multiple-authored, please indicate who will present and whether the presenter would be willing to act as a discussant. Notifications of acceptances will be circulated by 1 May 2013. We regret Young Lives is not able to cover costs of participants. Participants will have the option of booking accommodation at the conference venue (St Anne's College, Oxford) on a first come, first served basis. Funding may be available for presenters from developing countries. The conference will be held at St Anne's College, Oxford. The conference programme will start on Monday morning (8 July 2013) and end on Tuesday afternoon (9 July 2013). The programme will consist of plenary and parallel sessions. Confirmed plenary speakers are listed above. Who should attend? Financial service providers and other financial inclusion practitioners interested in cost-effective, client-based product innovations aimed at improving clients' financial behavior. Who should apply? Researchers and practitioners from all over the world interested in developing new research partnerships for the second round of competitive funding for research grants. Who should attend? Practitioners, policymakers and researchers interested in learning about rigorous evidence on the impact of savings and payments innovations on the lives of the poor in sub-Saharan Africa. Who should apply? PhD researchers and advanced PhD students from sub-Saharan Africa with demonstrated interest in rigorously evaluating the impact of savings and payments innovations. The Barcelona GSE Summer Forum is a series of independent workshops and policy events that cover the main fields of Economics. The objective of the Summer Forum is to bring top research leaders and young promising economists from around the globe to Barcelona to debate the present and future of the frontier of knowledge in Economics. The 6th China Economics Summer Institute (CESI) will take place in 2013 (Working papers of previous CESI workshops available at http://igov.berkeley.edu/china_workingpapers and at http://chinasummerinstitute.org). The objective of CESI is to create a network and community of top level scholars working on Chinese economic development. This initiative is currently co-sponsored by UC Berkeley Center on Institutions and Governance (with generous funding from the Ford Foundation), the University of Chicago Booth School of Business, the School of Economics and Management at Tsinghua University, the Guanghua School of Management at Peking University, the Institute for Emerging Market Studies at Hong Kong University of Science and Technology and a joint program of the LICOS-Center for Institutions and Economic Performance at the Katholieke Universiteit Leuven and Stanford - CASS REAP (Rural Education Action Program). The Summer Institute is organized in collaboration with the BREAD, NBER and CEPR networks of academic economists. This call invites you to submit a paper or express your interest in attending the above Summer Institute, which will be hosted this year by Hong Kong University of Science and Technology in Hong Kong between August 22d and August 24 2012. The workshop intends to bring together the best scholars working on China in China, the US and Europe with other top level scholars who have an interest in working on China in the future. We welcome applications not only from those who want to present their research on China but also from anybody who has an interest in doing serious economic research on China and would like to use the workshop as means of exploring this possibility. The Summer Institute will bring together between 20 and 30 participants for a period of three days. During the workshop, there will be seminar presentations and free time to allow scholars to interact and explore the possibility of doing joint research projects. Senior scholars who will attend will be available for consultations with junior scholars. Afternoon sessions will give the opportunity to a select group of young scholars and Ph. D students to present their work. A field trip to Shenzhen might be organized on August 25th for interested participants. The scientific committee of the China Economic Summer Institute is composed of Chongen Bai, Robin Burgess, Hongbin Cai, Chang-Tai Hsieh, Hongbin Li, Albert Park, Gérard Roland, Jo Swinnen, Shang-Jin Wei and Yaohui Zhao. Papers for possible presentation at the meeting or expressions of interest in attending the meeting should be e-mailed to [email protected] using the attached form by 18:00 GMT on April 12th, 2013. If you need further information, please do not hesitate to contact me. John Strauss will be stepping down on August 1, 2013 as editor of Economic Development and Cultural Change. The University of Chicago Press is soliciting proposals from leading scholars in development economics to assume the EDCC editorship. The full EDCC Request for Proposals and Fact Sheet may be viewed at http://press.uchicago.edu/dms/ucp/journals/EDCC_request_for_proposals.pdf. Statement of editorial policy. Considering the research published in EDCC in the past, describe the editorial scope and policies to be pursued under your editorship. This should be a reflective statement that serves to show acquaintance with the important issues confronting development economics and how EDCC will continue to serve the discipline. A statement of up to five pages is requested. Curriculum vitae. Please enclose a current CV. If you are proposing to edit EDCC with a co-editor or several co-editors as a team, please enclose a CV for each prospective editor. The five-year renewable term will begin August 1, 2013, with several months prior set aside for an overlap of duties with the outgoing editor to ensure a smooth transition. The 2013 Annual Meeting of the Population Association of America will be held Thursday April 11 through Saturday April 13 in New Orleans, LA. The Economic Demography Workshop (EDW) will take place from 1-6 pm on the afternoon before the main PAA meeting (Wednesday, Apr 10, 2013). The Workshop provides an opportunity for the detailed presentation of 5-7 research papers on topics in economic demography. You may submit a paper or detailed abstract for consideration by the Program Committee by Friday, December 31, 2010, at: http://editorialexpress.com/conference/edworkshop2013/. Past programs are on the EDW website here: http://www.edworkshop.umd.edu/. General information about the PAA Annual Meeting is available at http://www.popassoc.org/. Additional information about the Economic Demography Workshop can be obtained on the EDW website (http://www.edworkshop.umd.edu) or from Terra McKinnish ([email protected]). Other members of this year's programcommittee are: Steven Haider (Michigan State University), Craig McIntosh (University of California-San Diego) and Lucie Schmidt (Williams). Please forward this announcement to other interested economic demographers. If you are not on our mailing list, and wish to receive the annual call for papers and completed program by email, send an email to Terra McKinnish at [email protected] with subjected header "EDW subscribe". The Experimental Social Science Laboratory (X-lab) and the Center for Effective Global Action (CEGA) at the University of California at Berkeley, and the Choice Lab at NHH Norwegian School of Economics are pleased to announce the 2012 Symposium on Economic Experiments in Developing Countries (SEEDEC) to be held from November 29 to November 30 at U.C. Berkeley. The objective of the Symposium is to bring together a community of top scholars who employ laboratory experimental economics methods for research in developing countries. Keynote speakers are Abigail Barr and Sendhil Mullainathan. Submissions are invited for papers that reflect SEEDEC's broad research agenda which includes studies involving lab experiments in the field (in contrast to focusing on the randomized evaluations that have become widespread in development economics in recent years). The choice of papers will be based on full paper submissions, which should be sent via email by September 30th to Judi Chan at [email protected]. Successful applicants will be notified in October and will be invited to attend the full symposium, and SEEDEC will cover their economy travel and accommodations. For further information, please visit http://cega.berkeley.edu/events/seedec2012 or contact Jane Zhang(HKUST) at [email protected], Shachar Kariv (U.C. Berkeley) at [email protected], Edward Miguel (U.C. Berkeley) at [email protected], or Bertil Tungodden (NHH Norwegian School of Economics) at [email protected]. The Population and Poverty Research Network (PopPov) is a group of academic researchers and funders from around the globe interested in how population dynamics affect economic outcomes. We are investigating how population policies can influence poverty reduction at the household level and economic growth at the country/state level. The Seventh Annual Research Conference on Population, Reproductive Health and Economic Development will take place from January 23 - 26, 2013 in Oslo, Norway. Invited participants will be economics and population researchers, with an emphasis on empirical research about Africa. Selected papers will advance knowledge and/or methodology, addressing the broad themes relevant to the PopPov inquiry into how population dynamics and reproductive health affect economic development (see references below). Only papers submitted at http://www.openconf.org/PopPovConf2013/ will be considered. The official language of the research conference is English. Only completed papers, full drafts, and working papers will be considered. Submissions must be sufficiently detailed to allow the steering committee to judge the merits of the research and must include a description of the research objectives, the data and research methods, some preliminary results, and, as appropriate, the policy relevance of the research. Authors may select only one topical session per submission. Authors may make a maximum of two submissions. The deadline for all submissions is Tuesday, September 4, 2012. All applicants will be notified about the status of their submission by Friday, October 19, 2012. Only accepted papers may be presented at the conference. No substitutions will be allowed. Limited travel funds are available to assist current and former PopPov grantees and paper presenters without other sources of travel funding. Priority will be given to individuals with papers accepted for the program (one author), program participants (discussants, committee members), students, and researchers employed in developing country institutions. Please check http://poppov.org/PopPovConferences/7thAnnualPopPovConference.aspx for updates and additional details. We are pleased to announce our FOURTH ROUND of Research Funding for Entrepreneurship and SME Growth. The goal of the grants is to fund innovative research to build a systemic body of evidence on the contribution of SMEs and entrepreneurship to poverty alleviation and economic development. We hope this competition will have a catalyzing effect to stimulate high quality research on the role of access to finance, human capital, and markets for SME growth and their contribution to development. The Request for Proposals, Proposal Template, and Budgeting Guidelines are available at the IPA website. Complete proposals should be emailed to [email protected] by 5:00pm EST on September 28, 2011. If you have any questions, please contact Eleanor Coates ([email protected]). We look for contributions on the broad theme of economic development in Africa. Topics of interest include, but are not limited to: mobile banking and other technological developments to access financial services; natural resource management; the quality of education and health; migration, remittances and the brain drain; the quality of public services and political economy; management practices in the African context; or the challenges of urbanization and infrastructure. Submissions of full papers (pdf files) are expected by June 21, 2012. Extended abstracts may also be submitted but priority will be given to full papers. Decisions will be made by June 30, 2012. Please email your submission to Raquel Fernandes at [email protected]. For additional information, please visit www.novafrica.org. Travel and accommodation expenses will be covered for selected participants in the program. Catia Batista (Universidade Nova de Lisboa, CReAM and IZA) and Pedro Vicente (Universidade Nova de Lisboa, BREAD and CSAE-Oxford). Global Poverty: What Do We Know? Where Do We Go From Here? We invite researchers, teachers and students with an interest in global poverty alleviation efforts to take part in the one-year anniversary conference of Academics Stand Against Poverty (ASAP). This symposium brings together leading experts in development, aid, and global justice in a dialogue about the next steps that should be taken towards global poverty alleviation. The discussion will focus on what should replace the Millennium Development Goals after their expiration in 2015. Speakers will examine the record of increasing global inequality, innovations in development such as large-scale microfinance projects, and poverty measurement and trends. Each will offer crucial insights about what has been learned about reducing severe poverty, and which lessons must be highlighted in any MDG-replacement efforts. We will also present ASAP's most current work and discuss future directions for the organization. Experts in ethics and psychology will discuss how cognitive science and moral psychology can help us to more effectively motivate individuals to fulfill their moral obligations to alleviate global poverty. This workshop marks the launch of ASAP's Moral Psychology and Poverty Alleviation project (MPPA), which aims to support sustained collaborative and applicable research on this issue. Sponsors: The British Council, the Global Justice Program of the Whitney and Betty MacMillan Centre for International and Area Studies, the Department of Cognitive Science at Yale University, and the Edward J. and Dorothy Clarke Kempf Memorial Fund. The Microsavings and Payments Innovation Initiative (MPII) invites Expressions of Interest (EOI) applications to conduct rigorous, field-based research on savings products and services, as well as payments and money transfer channels for the world's poor and financially excluded. EOI submissions for Round 2 are due Friday, May 4, 2012 by 11:59 pm Eastern Daylight Time. Despite financial inclusion being a top policy priority across developing countries, relatively little is known about the specific factors that enable people to save and transfer money more effectively. Recent years have seen a growth in technological innovations enabling novel products such as mobile money and new channels such as agent banking. Yet, the impact of such innovations on poverty alleviation is still unknown. The Microsavings and Payments Innovation Initiative will fill this gap by building evidence on (1) innovations that most effectively enable improved usage of savings and payments services by the poor (through reduced cost, reduced risk, improved learning, behavioral incentives, regulatory reform, etc.); and (2) the impact that the use of improved savings products and payments channels has on the welfare of the poor. The Microsavings and Payments Innovation Initiative (MPII) awarded 5 grants in the first round of its competitive research fund. Total funding awarded amounted to $445,000, which will support three randomized evaluations and two diagnostic research projects. Successful applications passed through two stages of evaluation and selection. The first was an Expression of Interest application, for which MPII received 119 applications and invited 27 to submit full proposals. The 22 full proposals submitted were then vetted and evaluated by the MPII Executive Committee. A total of $826,500 will be awarded in at least two subsequent competitive funding rounds. Applicants must either hold a PhD or be a current PhD candidate in a relevant social science or engineering discipline, such as economics, statistics, sociology, anthropology, public health, education, computer science, etc. They must demonstrate experience in field research. All qualified researchers affiliated with universities, think tanks, and other research institutions from around the world are invited to apply. Research projects focused on Sub-Saharan Africa and South Asia are encouraged as are applications from researchers based in those regions or from teams with one or more researchers in those regions. The French Development Agency (AFD) Research Department, the World Bank Development Research Group (DECRG) and the Center for Global Development (CDG) are jointly organizing the Fifth International Conference on "Migration and Development". The conference is devoted to investigating channels through which international migration affects economic and social outcomes of developing countries. Possible topics include social networks and diaspora externalities, remittances, return migration, migration and the pattern of trade/FDI, brain drain, migration and institutional/technological change, migration and health, and the effect of emigration on poverty, inequality, and human capital formation in developing countries. Submissions of full papers (pdf files) are expected by March 15, 2012. Submissions should be sent to Mrs Laurence Wunderle at the following address: [email protected]. Decisions will be communicated by April 30, 2012. Travel (economy class) and accommodation expenses in Paris will be covered for selected participants. Ran Abramitsky (Stanford), Emmanuelle Auriol (Toulouse), Michel Beine (University of Luxembourg), Michael Clemens (Center for Global Development), Frederic Docquier (Louvain), Giovanni Facchini (Erasmus University), Flore Gubert (DIAL, University Paris-Dauphine), Marc Gurgand (PSE), Hubert Jayet (EQUIPPE, Université de Lille), William Kerr (Harvard Business School), Sylvie Lambert (PSE), Thierry Mayer (Science Po), David McKenzie (World Bank), Çağlar Özden (World Bank), Hillel Rapoport (Chair, Bar-Ilan University and EQUIPPE), Maurice Schiff (World Bank), Antonio Spilimbergo (IMF), Dean Yang (University of Michigan), Yves Zenou (Stockholm). Please refer to the Joint Call for Proposals available at http://poppov.org/Research/RFP.aspx for details. to enhance international collaboration and networking between research groups in this research field. Research teams must include at least one researcher based in the country of the funding agency (ESRC, NWO-WOTRO, RCN, or PRB) and one researcher based in the developing country of interest. List of countries considered to developing for purpose of this call may be found at www.oecd.org/dac/stats/daclist. Both of whom must have completed their PhD at the time of application. Proposed research to be supported with the grant funds awarded must be completed in 2 years or less. The Principal Investigator must be based at an institution eligible to apply for funding from either ESRC, NWO-WOTRO, RCN, or PRB. The 5th China Economics Summer Institute (CESI) will take place in 2012 (Working papers of previous CESI workshops available at http://igov.berkeley.edu/china_workingpapers and at http://chinasummerinstitute.org ). The objective of CESI is to create a network and community of top level scholars working on Chinese economic development. This initiative is currently co-sponsored by UC Berkeley Center on Institutions and Governance (with generous funding from the Ford Foundation), the University of Chicago Booth School of Business, the School of Economics and Management at Tsinghua University, the Guanghua School of Management at Peking University and a joint program of the LICOS-Center for Institutions and Economic Performance at the Katholieke Universiteit Leuven and Stanford- CASS REAP (Rural Education Action Program). The Summer Institute will be organized in collaboration with the BREAD, NBER and CEPR networks of academic economists. This call invites you to submit a paper or express your interest in attending the above Summer Institute which will be hosted this year by Guanghua School of Management at Peking University between June 22d and June 24 2012. The workshop intends to group together the best scholars working on China in China, the US and Europe with other top level scholars who have an interest in working on China in the future. We welcome applications not only from those who want to present their research on China but also from anybody who has an interest in doing serious economic research on China and would like to use the workshop as means of exploring this possibility. The Summer Institute will bring together between 20 and 30 participants for a period of three days. During the workshop, there will be seminar presentations and free time to allow scholars to interact and explore the possibility of doing joint research projects. Senior scholars who will attend will be available for consultations with junior scholars, usually during the afternoons and there will be some lectures by senior scholars. The Summer Institute will take place at the same time as the BREAD Summer school that will take place in the same location. Papers for possible presentation at the meeting or expressions of interest in attending the meeting should be e-mailed to [email protected] using the attached form by 18:00 GMT on March 19th, 2012. The Institute for the Study of Labor (IZA) and the UK Department for International Development (DFID) have recently launched the IZA/DFID Growth and Labour Markets in Low Income Countries Programme (GLM | LIC). Over the next five years GLM | LIC will provide funding for promising research on growth and labor markets in low-income countries totaling approximately ten million Euros. GLM | LIC Phase 1 funding is now open for application. Proposals are invited for research projects in the following five research areas: Growth and labor market outcomes, Active labor market policies, Labor market institutions, Skills, Gender. Please visit http://glm-lic.iza.org for more information on the program and how to apply for funding. The 2012 Annual Meeting of the Population Association of America will be held Thursday May 3 through Saturday May 5 in San Francisco, CA. As has been true for more than 20 years, there will also be an Economic Demography Workshop (EDW) from 1-5 pm on the afternoon before the main PAA meeting (Wednesday, May 2, 2012). The Workshop provides an opportunity for the detailed presentation of 4-9 papers with more economic content than those generally given in the main meetings. Interested participants may submit abstracts that have also been submitted for presentation at the main PAA meeting. Please use the "Comments" field to indicate whether the abstract has also been submitted for presentation at the main meeting. Preference will be given to papers that will not also be presented at the main PAA meeting. The program will be finalized in early February. Additional information about the Economic Demography Workshop can be obtained on the EDW website (http://www.edworkshop.umd.edu) or from any member of this year's organizing committee: Marianne Bitler ([email protected]), Terra McKinnish ([email protected]), or Lucie Schmidt ([email protected]). Please forward this announcement to other interested economic demographers. Sign up for email announcements of the Economic Demography Workshop at the EDW website. The Annual Bank Conference on Development Economics (ABCDE), organized by the World Bank Development Economics (DEC) Vice Presidency, is one of the world's best known series of conferences for the presentation and discussion of new knowledge on development. The conference aims to promote the exchange of cutting-edge research among researchers, policymakers, and development practitioners. The next conference will take place on May 7-8, 2012, at World Bank Headquarters in Washington, D.C. The theme of the conference will be "Accountability and Transparency for Development". Also of interest are means that can be used to effectively expand accountability and transparency, including the media and the internet, data collection and dissemination, and mandated versus voluntary disclosure of information. Papers that do not fit into these categories, but are related to the main conference theme, are also welcome. Those interested should submit a draft paper or a two-page proposal by January 6, 2012(email [email protected]). The proposal should include the title of the paper, author(s), affiliation, and contact information, and should address the main question(s) to be examined, relevant literature, unique contribution to the literature, and methodology to be employed. Authors of selected papers will be invited, though not required, to submit their papers for a special issue of the World Bank Economic Review. The Organizing Committee will evaluate all proposals in terms of originality, analytical rigor, and policy relevance. Authors of accepted proposals will be contacted by January 27, 2012.A work-in-progress draft will be required by February 29, 2012. For authors of selected papers, travel and accommodation expenses for the conference will be covered. Additional information on the overall conference program will be posted on this website over the coming months. Organizing Committee: Asli Demirgüç-Kunt (World Bank), Claudio Ferraz (Pontifícia Universidade Católica do Rio de Janeiro), and Frederico Finan (University of California, Berkeley). Conference Coordinator: Leita Jones ([email protected]). The Experimental Social Science Laboratory (X-lab) and the Center of Evaluation for Global Action (CEGA) at the University of California at Berkeley, and the Choice Lab at NHH Norwegian School of Economics are pleased to announce the 2011 Symposium on Economic Experiments in Developing Countries (SEEDEC) to be held from December 1 to December 3 at U.C. Berkeley. The objective of the Symposium is to bring together a community of top scholars who employ laboratory xperimental economics methods for research in developing countries. Tentative participants this year include Nava Ashraf (Harvard Business School), Colin Camerer (Caltech), Ray Fisman (Columbia GSB), Uri Gneezy (UCSD Rady School of Management), Sendhil Mullainathan (Harvard) and Chris Udry (Yale). Submissions are invited for papers that reflect SEEDEC's broad research agenda which includes studies involving lab experiments in the field (in contrast to focusing on the randomized evaluations that have become widespread in development economics in recent years). The choice of papers will be based on full paper submissions, which should be sent via email by September 15th to Jane Zhang (Hong Kong University of Science and Technology) at [email protected]. Successful applicants will be notified by September 30th and will be invited to attend the full symposium, and SEEDEC will cover their economy travel and accommodations. For further information, please visit http://cega.berkeley.edu/events/seedec2011 or contact Jane Zhang (HKUST) at [email protected], Shachar Kariv (U.C. Berkeley) at [email protected] , Edward Miguel (U.C. Berkeley) at [email protected], or Bertil Tungodden (NHH Norwegian School of Economics) at [email protected]. The Sixth Annual Research Conference on Population, Reproductive Health and Economic Development will take place from 18-21 January 2012 in Accra, Ghana. Participants will present ongoing and planned research on how population dynamics and reproductive health affect economic development, and work together to identify gaps in evidence and methods that inhibit development of sound policies on population, family planning and reproductive health. There will also be discussions on how to communicate research to decision makers for evidence-based policy. The Conference's Scientific Program Steering Committee invites paper submissions that address important issues at the intersection of population, reproductive health and economic prosperity. You are invited to submit either a detailed abstract or paper by email to [email protected] in English or French by September 28, 2011 for the Sixth Annual Research Conference. This year, the Committee also welcomes suggestions for panels, which includes a summary of 300 words maximum and an extended abstract for each paper / presenter. You will be notified whether or not your submission has been accepted by October 17, 2011. Please refer to the 2011 PopPov Research Conference web page for the complete Call for Papers announcement in both English and French. Please direct questions to [email protected] . The Global Development Network invites researchers and organizations from developing and transition countries to submit research proposals, completed research papers and proposals for scaling-up development projects. The Small & Medium Enterprise (SME) Initiative at Innovations for Poverty Action (IPA) is pleased to announce a SECOND ROUND of funding for the SME Initiative's Competition on Entrepreneurship and SME Growth for Young Scholars. The goal of the grants is to support innovative research by Young Scholars that help to "build a systemic body of evidence on the contribution of SMEs and entrepreneurship to poverty alleviation and economic development." We hope this competition will have a catalyzing effect to stimulate high quality research on the role of access to finance and human capital for SME growth and their contribution to development. Complete proposals should be emailed to Mike Ingram ([email protected]) by 5:00pm EST on August 22, 2011. If you have any questions, please contact Mike. Please refer to http://www.poverty-action.org/sme/news for further information. The Microsavings and Payments Innovation Initiative (MPII) invites Expressions of Interest (EOI) to conduct rigorous, field-based research on savings products and services as well as payments and money transfer channels for the world's poor and financially excluded. EOI submissions for Round 1 are due Friday, August 5 2011 by 11:59 pm Eastern Daylight Time. The Centre for Economic Policy Research (CEPR), the Bureau for Research and Economic Analysis of Development (BREAD) and the Actors, Markets, and Institutions in Developing Countries: A micro-empirical approach (AMID), Marie Curie Initial Training Network are joining forces this year to host a Development Economics Conference at the Paris School of Economics on Friday 23 and Saturday 24 September, 2011. This meeting is at the same time the annual symposium of the CEPR Development Economics Programme, the Twentieth BREAD Development Economics Conference and AMID Third Network Annual Conference. Financial support for the conference is provided by CEPR, BREAD and AMID. We now invite submissions for the CEPR/BREAD/AMID conference from interested researchers on any topics within the area of Development Economics. Only full-length papers will be considered. The deadline for replies is 18:00 GMT on Friday June 17, 2011. To respond to this Call, CEPR members can visit www.cepr.org/YourProfile/Meetings and indicate whether or not you wish to present a paper or attend the conference. You may also email your paper directly to Nadine Clarke, CEPR Meetings Manager, at [email protected] and also indicate to her whether you would like to attend the conference. CEPR can cover accommodation and travel according to the new CEPR guidelines (www.cepr.org/meets/WKCN/misc/trp.pdf) for all presenters. Funding will also be available for a number of CEPR/BREAD/AMID members who are not presenting. All papers presented at the conference will be selected through this open submissions process. Please note that there will be time for only a very small number of presentations. The conference lasts about a day and a half; there are no parallel sessions. For AMID Team Members and Early Stage and Experienced Researchers, the reimbursement of travel costs will be processed through local node budgets. Budget heading E - "Contribution to the research, training, transfer of knowledge" will apply for AMID Team Members, and budget heading D - "Participation allowance" will apply for AMID Early Stage and Experienced Researchers. AMID Participants are expected to pay for their travel directly and claim reimbursement from local nodes. The organisers will pay for the accommodation directly and invoice your local nodes for the total after the event. The travel and accommodation costs of AMID Experienced and Early Stage Researchers whose contracts commence after the conference, and of those who have completed their contracts prior to the conference, will be covered by the organisers. * The AMID project is supported by the Marie Curie Initial Training Networks (ITN) Funded under the EU's Seventh Framework Programme [PITN-GA-2008-214705]. The Center for International Development (CID) at Harvard Kennedy School, The Harvard Center for Population and Development Studies, the French Development Agency (AFD) Research Department and the World Bank Development Research Group are jointly organizing the Fourth International Conference on "Migration and Development". The conference is devoted to investigating channels through which international migration affects economic and social outcomes of developing countries. Possible topics include social networks and diaspora externalities, remittances, return migration, migration and the pattern of trade/FDI, brain drain, migration and institutional/technological change, migration and health, and the effect of emigration on poverty, inequality, and human capital formation in developing countries. A selection of papers from the conference will be considered for possible publication as a special issue of The Journal of Development Economics. Submissions of full papers (pdf files) are expected by March 15, 2011, to the following address: [email protected]. Contact person: Jennifer Gala. Decisions will be communicated by April 10, 2011. Travel (economy class) and accommodation expenses for up to three nights in Cambridge will be covered for selected participants. Michel Beine (University of Luxembourg), Michael Clemens (Center for Global Development), David Canning (Pop. Center), Jeffrey Frankel (Harvard Kennedy School), Marc Gurgand (PSE), Hubert Jayet (EQUIPPE, Université de Lille), William Kerr (Harvard Business School), Sylvie Lambert (PSE), David McKenzie (World Bank), Kaivan Munshi (Brown), Caglar Ozden (World Bank), Lant Pritchett (CID), Hillel Rapoport (CID - Coordinator), Maurice Schiff (World Bank), Antonio Spilimbergo (IMF), Dean Yang (University of Michigan). The World Bank seeks to recruit a leading authority on development economics as Chief Economist for the Africa Region. The Chief Economist, based in Washington, DC, will report to the Vice President for the Africa Region, and be his principal economic advisor, with accountability for the quality and relevance of the Bank's economic research and analysis on Africa. This is a 3 year renewable term appointment. The selected candidate will - among other responsibilities - lead a team of research economists and guide the Bank's economic research agenda for Africa, interacting with academic and policy communities in client countries, and internationally. He/she will act as the World Bank's spokesperson for economic analysis on African countries, and ensure that the region's economic research and analysis is strategic and reflects latest and cutting edge findings and methodologies. Candidates should have a Ph.D. or equivalent in economics with a minimum of 17 years of relevant experience. The position requires substantive senior level experience in a research and or public or private sector organization. A track record of research on African economies is a distinct advantage. Applications are accepted through this link Chief Economist Vacancy # 130726. Further details on the job are also available through this link, or by calling Mr Lindani Duma at +1 (202)473-4469 or e-mailing at [email protected]. The submission deadline is April 23, 2013 at 18h00. "At USAID we're pursuing market-driven solutions that really look to see how to involve the business community and we just unveiled a new venture capital style fund called Development Innovation Ventures [DIV], which will invest in creative ideas that we think can lead to game-changing innovations in development." The Development Innovation Ventures' Annual Program Statement 2.0 (APS 2.0) provides guidance for applying for a DIV grant. DIV emphasizes producing development outcomes more effectively and more cost-efficiently while managing risks and obtaining leverage by focusing on scale as well as partnerships. DIV is a mechanism for working with partners to identify and rigorously test potential development solutions, and helping to scale only those that are proven to produce development impact. Breakthrough Solutions: DIV encourages entrepreneurs, innovators, businesses, academics, NGOs, and others to submit proposals for cost-saving development solutions. DIV seeks proposals with the potential to substantially improve development outcomes, rather than incremental changes. Cost-reduction and Leverage: DIV seeks applications that have innovative ideas for addressing development challenges more effectively and more cheaply. DIV utilizes staged financing to maximize cost-effectiveness and minimize risk. In supporting projects with the potential to reach wide-scale, DIV also seeks to leverage other partners in the private, non-profit, and public sectors. Rigorous Testing and Evidence of Impact: The DIV model emphasizes testing potential solutions and rigorously evaluating impact - often through randomized control trials - in order to identify what works and what does not, and helping scale only those solutions proven to produce development outcomes. Scale: DIV is explicitly interested in development solutions that have the potential to reach wide-scale, i.e. tens of millions of beneficiaries. DIV funding is provided at three stages or levels. Read more about USAID's application process and programs: http://www.usaid.gov/div/. With the support of the Russia Trust Fund for Financial Literacy and Education, the World Bank is issuing four calls for proposals for research projects that address different aspects of financial capability programs and their evaluation in low and middle income countries. To view the advertisement, please click on the "bidding opportunities" tab on the following website: https://wbgeconsult2.worldbank.org/wbgec/index.html. Please note that based on the World Bank procurement policies, all inquiries regarding these selections must go to the World Bank Procurement office at [email protected]. No inquiries are to be directed to the World Bank Trust Fund team. Call for Applications for the Hewlett Foundation/IIE Dissertation Fellowship in Population, Reproductive Health, and Economic Development. The Institute of International Education (IIE) is now accepting applications for the Dissertation Fellowship in Population, Reproductive Health, and Economic Development. Sponsored by The William and Flora Hewlett Foundation, the fellowship awards up to $20,000 per year for work and research on the dissertation. In addition, Fellows will become part of a network of researchers and participate in professional development opportunities. Applicants should be currently enrolled in Ph.D. programs in either sub-Saharan Africa, the United States or Canada, and should have completed their coursework by the start of the fellowship. Students in economics, economic demography, geography, and epidemiology are especially encouraged to apply. These fellowships will support dissertation research on topics that examine how population dynamics and family planning and reproductive health influence economic development, including economic growth, poverty reduction on, and equity. Dissertations that address population and development issues pertinent to the African continent are especially encouraged. The research must include a strong quantitative component, with an emphasis on rigorous data analysis. We encourage the development or use of new statistical methods. Finally, the research must have a strong policy-relevant component, demonstrating an interest in communicating research results with program managers, planners, and policymakers. The objective of The William and Flora Hewlett Foundation/IIE Dissertation Fellowship is to produce sound evi dence on the role of population and reproductive health in economic development that could be incorporated in to national and international economic planning and decision making. To learn more about the fellowship and access the Application, visit: http://www.iie.org/en/Programs/Hewlett- IIE-Fellowship The deadline is March 4, 2011. The selected cohort will be announced in late spring 2011. Research that is not about the relevant subject matter will not be considered.
2019-04-24T18:35:35Z
http://ibread.org/bread/announcements
The term „claim for damages” used in the present GL also includes claims for indemnification for useless expenditure. The Purchaser may set off only those claims which are undisputed or nonappealable. Purchaser may process, amalgamate or combine Retained Goods with other items. Processing is made for Supplier. Purchaser shall store the new item thus created for Supplier, exercising the due care of a diligent business person. The new items are considered as Retained Goods. Already today, Supplier and Purchaser agree that if Retained Goods are combined or amalgamated with other items that are not the property of Supplier, Supplier shall acquire co-ownership in the new item in proportion of the value of the Retained Goods combined or amalgamated to the other items at the time of combination of amalgamation. In this respect, the new items are considered as Retained Goods. Where Purchaser combines Retained Goods with real estate or movable goods, it shall, without any further declaration being necessary to this effect, also assign to Supplier as security its claim to consideration for the combination, including all collateral rights for the pro-rata amount of the value the combined Retained Goods have on the other combined items at the time of the combination. Until further notice, Purchaser may collect assigned claims relating to the resale. Supplier is entitled to withdraw Purchaser’s permission to collect funds for good reason, including, but not limited to delayed payment, suspension of payments, start of insolvency proceedings, protest of justified indications for overindebtedness or pending insolvency of Purchaser. In addition, Supplier may, upon expiry of an adequate period of notice disclose the assignment, realize the claims assigned and demand that Purchaser informs its customer of the assignment. Where the Purchaser fails to fulfil its duties, fails to make payment due, or otherwise violates its obligations the Supplier shall be entitled to rescind the contract and take back the Retained Goods in the case of continued failure following expiry of a reasonable remedy period set by the Supplier; the statutory provisions providing that a remedy period is not needed shall be unaffected. The Purchaser shall be obliged to return the Retained Goods. The fact that the Supplier takes back Retained Goods and/or exercises the retention of title, or has the Retained Goods seized, shall not be construed to constitute a rescission of the contract, unless the Supplier so expressly declares. if the delivery includes assembly or erection, at the day of taking over in the Purchaser’s own works or, if so agreed, after a successful trial run. Claims for repair or replacement are subject to a statute of limitations of 12 months calculated from the start of the statutory statute of limitations; the same shall apply mutatis mutandis in the case of rescission and reduction. This shall not apply where longer periods are prescribed by law according to Sec. 438 para. 1 No. 2 (buildings and things used for a building), Sec. 479 para. 1 (right of recourse), and Sec. 634a para. 1 No. 2 (defects of a building) German Civil Code (“BGB”), in the case of intent, fraudulent concealment of the Defect or non-compliance with guaranteed characteristics (“Beschaffenheitsgarantie”). The legal provisions regarding suspension of the statute of limitations (“Ablaufhemmung”, “Hemmung”) and recommencement of limitation periods shall be unaffected. There shall be no claims based on Defect in cases of insignificant deviations from the agreed quality, of only minor impairment of usability, of natural wear and tear, or damage arising after the passing of risk from faulty or negligent handling, excessive strain, unsuitable equipment, defective civil works, inappropriate foundation soil, or claims based on particular external influences not assumed under the contract, or from non-reproducible software errors. Claims based on defects attributable to improper modifications or repair work carried out by the Purchaser or third parties and the consequences thereof are likewise excluded. The Supplier shall choose whether to acquire, at its own expense, the right to use the IPR with respect to the Supplies concerned or whether to modify the Supplies such that they no longer infringe the IPR or replace them. If this would be impossible for the Supplier under reasonable conditions, the Purchaser may rescind the contract or reduce the remuneration pursuant to the applicable statutory provisions. The above obligations of the Supplier shall apply only if the Purchaser (i) immediately notifies the Supplier of any such claim asserted by the third party in written form, (ii) does not concede the existence of an infringement and (iii) leaves any protective measures and settlement negotiations to the Supplier’s discretion. If the Purchaser stops using the Supplies in order to reduce the damage or for other good reason, it shall be obliged to point out to the third party that no acknowledgement of the alleged infringement may be inferred from the fact that the use has been discontinued. To the extent that delivery is impossible, the Purchaser is entitled to claim damages, unless the Supplier is not responsible for the impossibility. The Purchaser’s claim for damages is, however, limited to an amount of 10 % of the value of the part of the Supplies which, owing to the impossibility, cannot be put to the intended use. This limitation shall not apply in the case of mandatory liability based on intent, gross negligence or loss of life, bodily injury or damage to health; this does not imply a change in the burden of proof to the detriment of the Purchaser. The Purchaser’s right to rescind the contract shall be unaffected. Recommended by the ZVEI - Zentralverband Elektrotechnik- und Elektronikindustrie e. V. This Software Clause shall apply exclusively to the provision of standard software for a limited or unlimited period as a part of or in connection with related hardware (such software hereinafter referred to as “Software”), as well as to the entire Supplies, to the extent that a breach of contract has its cause in the Software. Furthermore, hardware shall be solely subject to the conditions of the GL. Firmware is not “Software” within the meaning of this Software Clause. The GL shall apply to those matters as far as not specifically covered in this Software Clause. The Supplier does not assume any obligation to perform software services by virtue of this Software Clause. Such services requires a separate agreement. Article I No. 2 GL shall be supplemented as follows: The provision of documentation requires a separate agreement in writing. If documentation is to be provided, the term “Software” hereinafter shall also include the documentation. The Supplier grants the Purchaser the non-exclusive right to use the Software. The right to use is limited to the agreed period of time, in the absence of such agreement, the right to use shall be unlimited in time. The Purchaser shall use the Software solely on the hardware referred to in the contract documents (e. g. software product sheet), in the absence of such reference, the use shall be limited to the respective hardware supplied together with the Software. The use of the Software on any other device shall require the express prior written consent of the Supplier and shall, if used on a more powerful device, entitle the Supplier to claim an appropriate additional remuneration; this does not apply, however, to the extent and for the period in which the Purchaser uses a temporary substitute device within the agreed scope of use, because of a defect in the agreed device. Where the contract documents refer to more than one device, the Purchaser shall not use the Software provided on more than one of these devices simultaneously (Single License), to the extent that it has not been granted a Multiple License pursuant to No. 3 (i) below. Where more than one workplace exists for a specific device where the Software can be used independently, the Single License shall apply to only one workplace. The Software shall exclusively be provided in machine readable format (object code). The Purchaser shall be entitled to make only one copy of the Software and solely so for back-up purposes (back-up copy). Any other duplication on the part of the Purchaser shall be allowed only subject to a Multiple License pursuant to No. 3 (i) below. Save as provided for in Sec. 69 (e) (decompilation) of the German Copyright Act, the Purchaser shall not be entitled to modify, decompile, translate, or isolate parts of the Software. The Purchaser shall not remove alphanumeric or other identifiers from the data medium and shall transfer such identifiers unchanged to any backup copy. The Supplier grants the Purchaser the right – which shall be revocable for good cause – to assign the right to use granted to it to a third party. The Purchaser to whom the Software has not been provided for commercial resale shall pass on the right to use the Software only together with the device it has bought in combination with the Software from the Supplier. If the right to use is transferred to a third party, the Purchaser shall ensure that the right to use granted to the third party does not exceed the scope of rights to the Software granted to the Purchaser under this Agreement, and the Purchaser shall ensure that the third party shall be obliged to comply with at least the same obligations as are imposed herein. When doing so, the Purchaser may not retain copies of the Software. The Purchaser shall not be entitled to grant sublicenses. Where the Purchaser provides the Software to a third party, the Purchaser shall ensure that any existing export requirements are observed and shall hold the Supplier harmless in this respect. To the extent that Software is provided to the Purchaser for which the Supplier has only derived rights to use (third party software), the provisions of this No. 3 shall be amended and superseded by the conditions of use agreed between the Supplier and its licensor. To the extent that the Purchaser is provided with open source Software, the provisions of this No. 3 shall be amended and superseded by the conditions of use underlying the open source Software. Upon request, the Supplier shall provide the Purchaser with the source code if the provision of the source code has been agreed in the conditions of use. The Supplier shall point out in the contract documents if third party software or open source Software and pertaining conditions of use exist and make the conditions of use available if so requested. Any breach of the conditions of use on the part of the Purchaser shall entitle not only the Supplier, but also its licensor, to assert claims and rights arising therefrom in their own name. (aa) Multiple License requires that the Supplier expressly confirms in writing the number of admissible copies that the Purchaser may make of the Software provided and the number of devices and/or workplaces where the Software may be used. No. 3 (g) second sentence shall be applicable to Multiple Licenses provided that they may be transferred by the Purchaser to third parties only if transferred in their totality and together with all devices on which the use of the Software is allowed. (bb The Purchaser shall observe the duplication rules provided by the Supplier together with the Multiple License. The Purchaser shall keep records on the whereabouts of all copies made and submit them to the Supplier upon request. Article V GL shall be amended as follows: If the Software is provided via electronic communication media (e. g. via the internet) the risk shall pass when the Software leaves the sphere of influence of the Supplier (e. g. when making a download). Article VI GL shall be supplemented as follows: The Purchaser shall take all required and reasonable measures to prevent or limit damage attributable to the Software. In particular, the Purchaser shall make regular back-up copies of the programs and data. To the extent the Purchaser negligently breaches this obligation, the Supplier shall not be liable for any consequences arising therefrom; this shall apply in particular to the replacement of lost or damaged data or programs. The above provision does not imply a change in the burden of proof. Claims based on Defects of the Software are subject to a statute of limitations of 12 months. This provision shall not apply where longer periods are prescribed by law according to Sec. 438 para. 1 No. 2 (buildings and items used for a building), Sec. 479 para. 1 (right of recourse), and Sec. 634 a para. 1 No. 2 (defects of a building) German Civil Code (“BGB”), as well as in cases of loss of life, bodily injury or damage to health, or where the Supplier intentionally or as a result of gross negligence fails to fulfil its obligation or fraudulently conceals a Defect. The statute of limitations commences upon the transfer of risk to the Purchaser. The legal provisions regarding suspension of the statute of limitations (“Ablaufhemmung”, “Hemmung”) and recommencement of limitation periods remain unaffected. Software is considered to be defective only if the Purchaser can prove that there are reproducible deviations from the specifications. A Defect shall not be deemed to exist if it does not manifest itself in the latest version supplied to the Purchaser, and the use thereof by Purchaser can reasonably be required. Notification of Defects shall be given in writing without undue delay. Defects and the relevant data processing environment shall be described as precisely as possible therein. – incompatibility of the Software provided with the data processing environment of the Purchaser. In the case of defective Software, the Supplier shall be first given the opportunity to repair or replace the Software (“Nacherfüllung”) within a reasonable period of time. The Supplier shall be entitled to choose between repair and replacement. (aa) The Supplier will provide a replacement by way of an update or an upgrade of the Software if available to the Supplier or obtainable with reasonable efforts by the Supplier. If the Purchaser has been granted a Multiple License, it may make a corresponding number of copies of the update, or, as the case may be, upgrade. (bb) Until an update, or, as the case may be, upgrade is provided, the Supplier will make available to the Purchaser an interim solution bypassing the Defect, provided that this does not result in unreasonable expenditures and that the Purchaser would otherwise, due to the Defect, be unable to complete work that cannot be delayed. (cc) If a data medium or documentation supplied proves to be defective, the Purchaser’s right shall be limited to demanding that the Supplier replace it with a nondefective version. (dd) The Supplier shall have the right to choose whether it corrects the Defect at the location of the Purchaser or at its own location. If the Supplier chooses to correct the Defect at the Purchaser’s location, the Purchaser shall assure that the required hardware and software as well as the required operating conditions (including the required computing time) and qualified operating personnel are available. The Purchaser shall submit to the Supplier the documents and information available to it and required for Defect correction. If the Defect cannot be corrected, the Purchaser shall be entitled to rescind the contract or reduce the remuneration, irrespective of any claims for damages it may have according to Article XI GL. Upon notification of a Defect, the Purchaser may withhold payments to a reasonable extent taking into account the Defect involved. The Purchaser, however, may withhold payments only if the subject-matter of the notification is justified beyond doubt. Notification without cause shall entitle the Supplier to reimbursement of its expenses by the Purchaser. Claims for damages shall furthermore be subject to Article XI GL. Any other Defect claims or Defect claims beyond this No. 6 by the Purchaser against the Supplier or its agents shall be excluded. For Software provided for a limited period of time only, letters (b), (c), (d), (e), (f) and (i) of para. 1 above shall apply mutatis mutandis instead of Article VIII. Letter (g) shall apply except that the right of rescission shall be replaced by the right to termination without notice. Article IX.2 GL shall apply unchanged. Article IX.3 GL shall apply unchanged. In addition, with respect to claims by the Purchaser pursuant to No. 1 (a) above, No. 6 para. 1 lit. (h) and (e) first sentence of this Software Clause shall apply mutatis mutandis in the event of an infringement of an IPR. The provisions of No. 6 of this Software Clause shall apply where other defects in title occur. Article IX.1 GL shall apply unchanged. Article XI.2 GL shall apply unchanged. To the extent that the Purchaser has a valid Claim for Damages according to Article XI GL, it shall be time-barred upon expiration of the statute of limitations applicable to Defects pursuant to No. 6 (1) of this Software Clause. In the case of claims for damages under the German Product Liability Act, the statutory provisions governing limitation periods shall apply. Our orders – including future orders – are subject exclusively to these conditions of purchase. The confirmation or execution of the order shall be deemed as acceptance of these conditions of purchase. This shall apply even if the supplier states that it only wants to supply under its own terms and conditions. Other conditions and deviations from these conditions of purchase require our written consent in order to be valid. If special conditions that deviate from these conditions of purchase are agreed for certain orders, these conditions of purchase shall be considered secondary and supplementary to the former. Orders must be made in writing. Oral agreements are only legally valid if they are confirmed in writing. Orders must be confirmed by the supplier without delay, stating the order number, price, discount, delivery and delivery conditions. The agreed prices are fixed prices and remain valid until the order has been fully processed. Subsequent increases, regardless of the reason, are excluded. Non-agreed surcharges for import duties and other duties and taxes are in particular excluded. The agreed prices entail carriage-paid delivery, including ancillary costs, packaging costs and freight costs. Where “ex-works deliveries” are agreed, our forwarding instructions are binding. We assume only the costs thereby incurred. The stipulated times and deadlines for delivery or for the provision of service shall be adhered to. Delivery is the arrival of the goods at the place of performance. Early (partial) deliveries require our consent. If it becomes evident that the delivery times cannot be met, the supplier shall immediately inform us of the details of this in writing. This shall not affect our rights in any way. In the case of default of delivery, the supplier undertakes to pay a contractual penalty of 1% of the price of the delivery for each full week of the delay, but not more than a total of 5% of the price of the delivery. We may reserve the enforcement of the incurred contractual penalty until the final payment. Further claims for delays remain unaffected. By accepting the delayed delivery or service we do not waive further compensation claims. The shipping documents must include the references stipulated by us. Immediately upon dispatch we are to be sent 2 copies of the delivery note, which must include the exact name, quantity, weight (gross and net), as well as the nature and packaging of the product or the item. If the delivery note for a delivery is not issued on time or if the above information is absent from the shipping papers or delivery note, the goods shall be stored at the cost and at the risk of the supplier until the arrival of the shipping documents or the complete set of required information. All goods must be duly packed and shipped. Where packaging costs are legitimately charged (cf. C.2.), we are to be credited with the amount charged for these purposes upon the return of the packaging material. The supplier undertakes to ship the products that are destined for us in such a way that Deutsche Bahn AG, Deutsche Post AG or the freight forwarder/carrier is not entitled to reject liability for transport damage. The risk of accidental destruction or accidental deterioration is born by the supplier until delivery of the goods; in case of a service that requires accep­tance, the supplier shall bear the risk until the service is accepted by us. Should the supplier not properly fulfil its contractual obligations in connection with the transport (e.g. unloading of the delivery item), it must compensate us for any costs incurred. An early passage of risk does not take place even if we cooperate in the fulfilment of the supplier’s obligations; we are only responsible for gross negligence and intent. Cases of force majeure, strikes and lockouts shall entitle us to postpone the acceptance accordingly. Acceptance shall – under normal business conditions – take place immediately upon receipt or commissioning, to the extent that the delivery is in compliance with the contract. Statutory provisions that allow for deemed acceptance are excluded. In the case of excess deliveries which exceed the amount customary in the trade, we reserve the right to return the excess goods at the expense of the supplier. Any investigation obligations that we are subject to are limited to the immediate checking of the goods to see if they correspond to the ordered quantity and type, and whether there is any externally visible transport damage or if there are any externally visible defects. To the extent that we are required to immediately report defects, hidden defects may be reported within 2 weeks of their discovery, other defects within 1 week of their discovery. The payment shall be made – to the exclusion of legal provisions governing earlier due dates, e.g. of instalments – at our discretion either within the last day of the next month with a 3% discount or net within the last day of the following month, calculated from the date of the receipt of the invoice and the complete receipt of the goods, or in the case of services not before their acceptance. Late payments which are caused by incorrect or incomplete invoice documents nevertheless entitle us to a discount. The date of the receipt of invoice is deemed to be the date of the receipt stamp of the address stipulated in the order. If documentation and/or certificates are included in the scope of delivery, the period of time shall only begin with their handover to us in accordance with the contract. The payment periods shall, however, not begin before the agreed delivery date. Payment shall be made by cash, credit transfer, check or draft, with the discount fees and taxes for draft payments being charged to us. We shall only enter default following a reminder. If we make a payment before the delivery of the goods or services, the supplier undertakes to provide us, at our discretion, with security equal in value to the amount of the payment and/or to assign the item to us. Any advance payments or interim payments do not constitute recognition of the contractual conformity of the performance. The supplier undertakes to respect the rules of good engineering practice as well as, in particular, the regulations and guidelines regarding implementation, accident prevention and environmental protection issued by the legislator, regulators, professional associations, the VDI and the VDE. The time limit for reporting material defects (warranty period) starts upon the acceptance of the goods. If commissioning takes place later than the acceptance, the warranty period shall begin on the day of commissioning. The warranty period is 2 years. In the case of a subsequent performance the agreed warranty period shall restart from the point in time of the subsequent performance. Warranty claims become time-barred 6 months after the end of the warranty period. Notwithstanding the provisions on the suspension of expiration, suspension and restarting of time limits, the warranty period and the limitation period shall both be suspended for the duration of any interruption to operations caused by defects. The warranty period and the above-mentioned period of limitation shall not apply where longer statutory limitation periods are applicable, particularly in accordance with Section438(1) No.2 (buildings and things used for buildings), Section 479(1) (recourse) and Section634a(1) No.2 (construction defects) of the German Civil Code (BGB). The choice between the remedying of a defect and new production is in each case left to our discretion. In urgent cases or if the contractor is in default of performance with regard to the supplementary performance, we shall also be entitled to remedy the defects ourselves, to have them remedied, or to obtain a replacement. We shall determine when an urgent case arises in this sense, exercising all due care and diligence. A remedy is considered to have failed if the first remedy attempt was unsuccessful. The supplier shall indemnify us for claims for damages that may be asserted against us because of a defect or failure of a product delivered by the supplier. In addition, the supplier shall indemnify us against all costs and expenses incurred to us in connection with any precautionary measures which may be necessary to avert non-contractual liability under foreign or domestic law (e.g. pursuant to the German Product Liability Law), particularly due to warnings or recalls; however, this shall only apply to the extent that these measures have been caused by a faulty delivery of the supplier. The supplier is otherwise liable in accordance with the statutory provisions (also to an unlimited extent). The supplier is liable for ensuring that the delivery item is free from third party rights. In the event of a breach of intellectual property rights the supplier is obligated, for their period of validity, to compensate us for any damages incurred to us or third parties. In this case we are also entitled to obtain from the owner of such rights (at the expense of the supplier) the necessary authorisation to supply, commission, use, and sell the delivery item. The supplier is obligated to keep our orders confidential, including all related commercial and technical details. Statements made by us, as well as tools, models, drawings and other documents etc. that are provided by us or made at our expense may only be applied or used for other purposes with our written consent and remain our property and/or become our property following manufacture. The passing of risk takes place analogously to the material order. They are to be insured at no cost to us from the time of the passing of risk to their return to our premises or the place designated by us. All damage incurred to us as a result of these events shall be borne by the supplier. Unless special agreements have been made, tools, models, drawings and other documents including any copies that have been made are to be returned with the final delivery. Acceptance or approval of the drawings and samples provided by the supplier shall not release the supplier from it sole responsibility. We shall be entitled to offset the supplier’s claims against us or against the companies in which we directly or indirectly hold a majority share with all claims against the supplier that are due to us or the abovementioned companies. Upon request we shall provide the supplier with a list of these companies. The supplier may only offset our claims with undisputed or judicially determined claims. The ordered items shall automatically become our property upon a deposit being made, even if they have not yet been delivered. In this case the supplier shall keep the goods in storage for us and adequately protect them from natural hazards. To this extent, letter J. of these conditions of purchase shall also apply for the start of the warranty period. Claims arising from this order may be transferred to third parties, pledged or otherwise disposed of only in the case of mutual agreement. Our agreement for the assignment of the claim shall be deemed to have been granted if the supplier has granted its suppliers an extended retention of title in the ordinary course of business. P. Procurement of supplies, etc. The supplier is fully responsible – even if not at fault – for the procurement of supplies and services needed for the deliveries (full assumption of the procurement risk). The supplier shall be responsible for the supplies and services that it procures in the same way as it is responsible for its own deliveries/services. The providers of the supplies / services are agents of the supplier. The place of performance for the delivery is the designated destination. If no place of destination is designated, and in the case of payments, the place of performance it is the place of our registered office. In addition to these conditions of purchase, German law shall apply. The applicability of the CISG is expressly excluded. The sole place of jurisdiction is Gießen. Should individual provisions of this contract be or become invalid, the validity of the remaining provisions shall not be affected. If the user uses this Bender Web Site as business customer, i.e. that it is not acting for purposes which are outside of its trade, business or profession, or as administration customer, § 312e para. 1 sentence 1 no. 1 - 3 of the German Civil Code does not apply. This Bander Web Site contains specific information and software, as well as - as the case may be - related documentation, for viewing or downloading. Bender may stop the operation of the Bender Web Site in full or in part. Due to the nature of the Internet and computer systems, Bender cannot accept any liability for the continuous availability of the Bender Web Sites. Some pages of the Bender Web Sites, in particular the download area, are password protected. In the interest of safety and security of the business transactions, only registered users may access these pages.Bender reserves the right to deny registration to any user. Bender particularly reserves the right to determine certain sites, which were previously freely accessible, subject to registration. did not use the Bender Web Sites for a longer period. For registration the user shall give accurate information and, where such information changes over time, update such information (to the extent possible: online) without undue delay. The user shall ensure, that its e-mail address, as supplied to Bender, is current at all times and an address at which the user can be contacted. Upon registration the user will be provided with an access code, comprising a user ID and a password. If your password is lost contact Bender for a new password. The user has the possibility to view and change his data, and to withdraw his consent to the receipt of a Newsletter, for example. The user shall ensure that user data is not accessible by third parties and is liable for all transactions and other activities carried out under his user data. If and to the extent the user becomes aware that third parties are misusing his user data, the user shall notify BENDER thereof without undue delay in writing, or, as the case may be, by e-mail. After receipt of the notice, Bender will deny access to the password-protected area under such user data. Access by the user will only be possible again upon new registration. The user may at any time request termination of its registration in writing, provided that the deletion will not violate the proper performance of contractual relationships. In such event Bender will remove all user data and other stored personally identifiable data of the user as soon as this data is no longer needed. Our documentation and the content of the Bender Web Site have been created with great care. The information and data provided on our Web site has been compiled to the best of our knowledge and belief taking into account the latest advances in technology. However, Bender accepts no liabilty or warranty for the correctness and completeness of information, unless it can be ascribed to gross negligence on part of Bender. In particular, the information on the Bender Web Site does not provide the legal quality in terms of warranty or warranty characteristics. Bender makes any effort to publish always the latest version of a document in the Internet. Due to continuous technical developments, information in these documentations may differ from the documents accompanying the product. Therefore, always use the documentation accompanying the product for installation and operation purposes. We would be grateful if you let us know when there are any discrepancies in the documentation. We reserve the right to make technical changes. The user shall not modify the content of the Bender Web Sites or documentation nor shall he disassemble, reverse engineer or decompile the software or separate any part thereof or used otherwise. The use of the software is subject to separate license terms. Our information, software and documentation are protected by copyright laws as well as international copyright treaties as well as other laws and conventions related to intellectual property. The user shall observe such laws and in particular shall not modify, conceal or remove any alphanumeric code, marks or copyright notices neither from the information nor from the software or documentation, or any copies thereof. Bender Web Sites may contain hyperlinks to the web pages of third parties. Bender shall have no liability for the contents of such web pages and does not make representations about or endorse such web pages or their contents as its own, as Bender does not control the information on such web pages and is not responsible for the contents and information given thereon. The use of such web pages shall be at the sole risk of the user. Protecting the security and privacy of your personal data is important to Bender. Therefore, we conduct our business in compliance with applicable laws on data privacy protection and data security. Through our Web Sites, Bender will not collect any personal data about you (e.g. your name, address, telephone number or e-mail address), unless you voluntarily choose to provide us with it, e.g. by registration as a user for the download area. When you do provide us with personal data, we usually use it to respond to your inquiry, process your order or provide you access to specific information or offers. Also, to support our customer relationship with you we may store and process personal data and share it with our worldwide affiliates to better understand your business needs and how we can improve our products and services. Through your use of telecommunication services to access our Web Sites, your communications data (e.g. Internet protocol address) or utilization data (e.g. information on the beginning, end and extent of each access, and information on the telecommunications services you accessed) are technically generated and could conceivably relate to personal data. To the extent that there is a compelling necessity, the collection, processing and use of your communications or utilization data will occur and will be performed in accordance with the applicable data privacy protection legal framework. When you access our Web Sites, we may automatically (i.e., not by registration) collect non-personal data (e.g. type of Internet browser and operating system used. domain name of the Web Site from which you came; number of visits, average time spent on the site; pages viewed). We and the members of the Bender-Group may use this data and share it with our worldwide affiliates to monitor the attractiveness of our Web Sites and improve their performance and content. When you view one of our Web Sites, we may store some data on your computer in the form of a cookie to automatically recognize your PC next time you visit. Cookies can help us in many ways, for example, by allowing us to tailor a Web site to better match your interests or to store your password to save you having to re-enter it each time. If you do not wish to receive cookies, please configure your Internet browser to erase all cookies from your computer's hard drive, block all cookies or to receive a warning before a cookie is stored. Any supplement agreement requires the written form. The place of jurisdication shall be Gießen, Hessen, Germany, if the user is a merchant in terms of the German Commercial Code (Handelsgesetzbuch). The individual pages of the Bender Web Sites are operated and administered by Bender GmbH & Co. KG and/or members of the Bender-Group. The pages comply with the law applicable in the country where the responsible company has its business residence. Bender makes no representation that information, software and/or documentation on the Bender Web Sites are appropriate or available for viewing or downloading at locations outside such country. If users access Bender Web Sites from outside such country, they are exclusively responsible for compliance with all applicable local laws. Access to Bender Web Sites' information, software and/or documentation from countries where such content is unlawful is prohibited. In this case and where the user seeks to do business with Bender, the user should contact the Bender representative for the particular country for country specific business.
2019-04-21T22:22:29Z
https://www.bender-latinamerica.com/en/terms-and-conditions
Now after the death of his wife, the merchant sorrowed for many days as was right, but at the end of that time he began to desire to marry again and to look about him for a suitable wife. This was not difficult to find, for he had a fine house, with a stable of swift horses, besides being a good man who gave much to the poor. Of all the women he saw, however, the one who, to his mind, suited him best of all, was a widow of about his own age with two daughters of her own, and she, he thought, besides being a good housekeeper, would be a kind foster mother to his little Vasilissa. So the merchant married the widow and brought her home as his wife, but the little girl soon found that her foster mother was very far from being what her father had thought. She was a cold, cruel woman, who had desired the merchant for the sake of his wealth, and had no love for his daughter. Vasilissa was the greatest beauty in the whole village, while her own daughters were as spare and homely as two crows, and because of this all three envied and hated her. They gave her all sorts of errands to run and difficult tasks to perform, in order that the toil might make her thin and worn and that her face might grow brown from sun and wind, and they treated her so cruelly as to leave few joys in life for her. But all this the little Vasilissa endured without complaint, and while the stepmother's two daughters grew always thinner and uglier, in spite of the fact that they had no hard tasks to do, never went out in cold or rain, and sat always with their arms folded like ladies of a Court, she herself had cheeks like blood and milk and grew every day more and more beautiful. Now the reason for this was the tiny doll, without whose help little Vasilissa could never have managed to do all the work that was laid upon her. Each night, when everyone else was sound asleep, she would get up from her bed, take the doll into a closet, and locking the door, give it something to eat and drink, and say: "There, my little doll, take it. Eat a little, drink a little, and listen to my grief. I live in my father's house, but my spiteful stepmother wishes to drive me out of the white world. Tell me! How shall I act, and what shall I do?" Then the little doll's eyes would begin to shine like glow- worms, and it would become alive. It would eat a little food, and sip a little drink, and then it would comfort her and tell her how to act. While Vasilissa slept, it would get ready all her work for the next day, so that she had only to rest in the shade and gather flowers, for the doll would have the kitchen garden weeded, and the beds of cabbage watered, and plenty of fresh water brought from the well, and the stoves heated exactly right. And, besides this, the little doll told her how to make, from a certain herb, an ointment which prevented her from ever being sunburnt. So all the joy in life that came to Vasilissa came to her through the tiny doll that she always carried in her pocket. Years passed, till Vasilissa grew up and became of an age when it is good to marry. All the young men in the village, high and low, rich and poor, asked for her hand, while not one of them stopped even to look at the stepmother's two daughters, so ill-favored were they. This angered their mother still more against Vasilissa; she answered every gallant who came with the same words: "Never shall the younger be wed before the older ones!" and each time, when she had let a suitor out of the door, she would soothe her anger and hatred by beating her stepdaughter. So while Vasilissa grew each day more lovely and graceful, she was often miserable, and but for the little doll in her pocket, would have longed to leave the white world. Now there came a time when it became necessary for the merchant to leave his home and to travel to a distant Tsardom. He bade farewell to his wife and her two daughters, kissed Vasilissa and gave her his blessing and departed, bidding them say a prayer each day for his safe return. Scarce was he out of sight of the village, however, when his wife sold his house, packed all his goods and moved with them to another dwelling far from the town, in a gloomy neighborhood on the edge of a wild forest. Here every day, while her two daughters were working indoors, the merchant's wife would send Vasilissa on one errand or other into the forest, either to find a branch of a certain rare bush or to bring her flowers or berries. Now deep in this forest, as the stepmother well knew, there was a green lawn and on the lawn stood a miserable little hut on hens' legs, where lived a certain Baba Yaga, an old witch grandmother. She lived alone and none dared go near the hut, for she ate people as one eats chickens. The merchant's wife sent Vasilissa into the forest each day, hoping she might meet the old witch and be devoured; but always the girl came home safe and sound, because the little doll showed her where the bush, the flowers and the berries grew, and did not let her go near the hut that stood on hens' legs. And each time the stepmother hated her more and more because she came to no harm. One autumn evening the merchant's wife called the three girls to her and gave them each a task. One of her daughters she bade make a piece of lace, the other to knit a pair of hose, and to Vasilissa she gave a basket of flax to be spun. She bade each finish a certain amount. Then she put out all the fires in the house, leaving only a single candle lighted in the room where the three girls worked, and she herself went to sleep. Vasilissa sat down on the doorstep, took the tiny doll from one pocket and from another the supper she had ready for it, put the food before it and said: "There, my little doll, take it. Eat a little and listen to my sorrow. I must go to the hut of the old Baba Yaga in the dark forest to borrow some fire and I fear she will eat me. Tell me! What shall I do?" Then the doll's eyes began to shine like two stars and it became alive. It ate a little and said: "Do not fear, little Vasilissa. Go where thou hast been sent. While I am with thee no harm shall come to thee from the old witch." So Vasilissa put the doll back into her pocket, crossed herself and started out into the dark, wild forest. That whole day Vasilissa walked, for she had lost her way. She could find no path at all in the dark wood and she had no food to set before the little doll to make it alive. As she stood there a third man on horseback came galloping up. His face was black, he was dressed all in black, and the horse he rode was coal-black. He galloped up to the gate of the hut and disappeared there as if he had sunk through the ground and at that moment the night came and the forest grew dark. But it was not dark on the green lawn, for instantly the eyes of all the skulls on the wall were lighted up and shone till the place was as bright as day. When she saw this Vasilissa trembled so with fear that she could not run away. Vasilissa, in great fright, came nearer to the old woman and bowing very low, said: "It is only Vasilissa, grandmother. My stepmother's daughters sent me to thee to borrow some fire." "Well," said the old witch, "I know them. But if I give thee the fire thou shalt stay with me some time and do some work to pay for it. If not, thou shalt be eaten for my supper." Then she turned to the gate and shouted: "Ho! Ye, my solid locks, unlock! Thou, my stout gate, open!" Instantly the locks unlocked, the gate opened of itself, and the Baba Yaga rode in whistling. Vasilissa entered behind her and immediately the gate shut again and the locks snapped tight. "Come, fetch and put on the table at once everything that is in the oven. I am hungry." So Vasilissa ran and lighted a splinter of wood from one of the skulls on the wall and took the food from the oven and set it before her. There was enough cooked meat for three strong men. She brought also from the cellar kvass, honey, and red wine, and the Baba Yaga ate and drank the whole, leaving the girl only a little cabbage soup, a crust of bread and a morsel of suckling pig. When her hunger was satisfied, the old witch, growing drowsy, lay down on the stove and said: "Listen to me well, and do what I bid thee. Tomorrow when I drive away, do thou clean the yard, sweep the floors and cook my supper. Then take a quarter of a measure of wheat from my store house and pick out of it all the black grains and the wild peas. Mind thou dost all that I have bade; if not, thou shalt be eaten for my supper." Presently the Baba Yaga turned toward the wall and began to snore and Vasilissa knew that she was fast asleep. Then she went into the corner, took the tiny doll from her pocket, put before it a bit of bread and a little cabbage soup that she had saved, burst into tears and said: "There, my little doll, take it. Eat a little, drink a little, and listen to my grief. Here I am in the house of the old witch and the gate in the wall is locked and I am afraid. She has given me a difficult task and if I do not do all she has bade, she will eat me tomorrow. Tell me: What shall I do?" Then the eyes of the little doll began to shine like two candles. It ate a little of the bread and drank a little of the soup and said: "Do not be afraid, Vasilissa the Beautiful. Be comforted. Say thy prayers, and go to sleep. The morning is wiser than the evening." So Vasilissa trusted the little doll and was comforted. She said her prayers, lay down on the floor and went fast asleep. When Vasilissa found herself left alone, she examined the hut, wondering to find it filled with such an abundance of everything. Then she stood still, remembering all the work that she had been bidden to do and wondering what to begin first. But as she looked she rubbed her eyes, for the yard was already neatly cleaned and the floors were nicely swept, and the little doll was sitting in the storehouse picking the last black grains and wild peas out of the quarter- measure of wheat. Vasilissa ran and took the little doll in her arms. "My dearest little doll!" she cried. "Thou hast saved me from my trouble! Now I have only to cook the Baba Yaga's supper, since all the rest of the tasks are done!" So Vasilissa rested all day and was refreshed; and when it grew toward evening she laid the table for the old witch's supper, and sat looking out of the window, waiting for her coming. After awhile she heard the sound of a horse's hoofs and the man in black, on the coal-black horse, galloped up to the wall gate and disappeared like a great dark shadow, and instantly it became quite dark and the eyes of all the skulls began to glitter and shine. "Be so good as to look for thyself, grandmother," answered Vasilissa. The Baba Yaga went all about the place, tapping with her iron pestle, and carefully examining everything. But so well had the little doll done its work that, try as hard as she might, she could not find anything to complain of. There was not a weed left in the yard, nor a speck of dust on the floors, nor a single black grain or wild pea in the wheat. The old witch was greatly angered, but was obliged to pretend to be pleased. "Well," she said, "thou hast done all well." Then, clapping her hands, she shouted: "Ho! my faithful servants! Friends of my heart! Haste and grind my wheat!" Immediately three pairs of hands appeared, seized the measure of wheat and carried it away. The Baba Yaga sat down to supper, and Vasilissa put before her all the food from the oven, with kvass, honey, and red wine. The old witch ate it, bones and all, almost to the last morsel, enough for four strong men, and then, growing drowsy, stretched her bony legs on the stove and said: "Tomorrow do as thou hast done today, and besides these tasks take from my storehouse a half-measure of poppy seeds and clean them one by one. Someone has mixed earth with them to do me a mischief and to anger me, and I will have them made perfectly clean." So saying she turned to the wall and soon began to snore. When she was fast asleep Vasilissa went into the corner, took the little doll from her pocket, set before it a part of the food that was left and asked its advice. And the doll, when it had become alive, and eaten a little food and sipped a little drink, said: "Don't worry, beautiful Vasilissa! Be comforted. Do as thou didst last night: say thy prayers and go to sleep." So Vasilissa was comforted. She said her prayers and went to sleep and did not wake till next morning when she heard the old witch in the yard whistling. She ran to the window just in time to see her take her place in the big iron mortar, and as she did so the man dressed all in red, riding on the blood red horse, leaped over the wall and was gone, just as the sun rose over the wild forest. As it had happened on the first morning, so it happened now. When Vasilissa looked she found that the little doll had finished all the tasks excepting the cooking of the supper. The yard was swept and in order, the floors were as clean as new wood, and there was not a grain of earth left in the half-measure of poppy seeds. She rested and refreshed herself till the afternoon, when she cooked the supper, and when evening came she laid the table and sat down to wait for the old witch's coming. Presently the old witch sat down to supper and Vasilissa brought all she had cooked, enough for five grown men, and set it before her, and brought beer and honey, and then she herself stood silently waiting. The Baba Yaga ate and drank it all, every morsel, leaving not so much as a crumb of bread; then she said snappishly: "Well, why dost thou say nothing, but stand there as if thou wast dumb?" "I spoke not," Vasilissa answered, "because I dared not. But if thou wilt allow me, grandmother, I wish to ask thee some questions." "I would ask thee," said Vasilissa, "of the men on horse back. When I came to thy hut, a rider passed me. He was dressed all in white and he rode a milk-white horse. Who was he?" "Afterwards," said Vasilissa, "a second rider overtook me. He was dressed in red and the horse he rode was blood- red. Who was he?" "A third rider," said Vasilissa, "came galloping up to the gate. He was black, his clothes were black and the horse was coal-black. Who was he?" But Vasilissa, remembering what the Baba Yaga had said, that not every question led to good, was silent. But Vasilissa saw how she snarled at her and she answered: "The three questions are enough for me. As thou hast said, grandmother, I would not, through knowing over much, become too soon old." "It is well for thee," said the Baba Yaga, "that thou didst not ask of them, but only of what thou didst see outside of this hut. Hadst thou asked of them, my servants, the three pairs of hands would have seized thee also, as they did the wheat and poppy seeds, to be my food. Now I would ask a question in my turn: How is it that thou hast been able, in a little time, to do perfectly all the tasks I gave thee? Tell me!" Vasilissa was so frightened to see how the old witch ground her teeth that she almost told her of the little doll; but she bethought herself just in time, and answered: "The blessing of my dead mother helps me." Then the Baba Yaga sprang up in a fury. "Get thee out of my house this moment!" she shrieked. "I want no one who bears a blessing to cross my threshold! Get thee gone!" Vasilissa ran to the yard, and behind her she heard the old witch shouting to the locks and the gate. The locks opened, the gate swung wide, and she ran out on to the lawn. The Baba Yaga seized from the wall one of the skulls with burning eyes and flung it after her. "There," she howled, "is the fire for thy stepmother's daughters. Take it. That is what they sent thee here for, and may they have joy of it!" When she came near to the gate, she thought, "Surely, by this time they will have found some fire," and threw the skull into the hedge; but it spoke to her, and said: "Do not throw me away, beautiful Vasilissa; bring me to thy stepmother." So, looking at the house and seeing no spark of light in any of the windows, she took up the skull again and carried it with her. Now since Vasilissa had gone, the stepmother and her two daughters had had neither fire nor light in all the house. When they struck flint and steel the tinder would not catch and the fire they brought from the neighbors would go out immediately as soon as they carried it over the threshold, so that they had been unable to light or warm themselves or to cook food to eat. Therefore now, for the first time in her life, Vasilissa found herself welcomed. They opened the door to her and the merchant's wife was greatly rejoiced to find that the light in the skull did not go out as soon as it was brought in. "Maybe the witch's fire will stay," she said, and took the skull into the best room, set it on a candlestick and called her two daughters to admire it. But the eyes of the skull suddenly began to glimmer and to glow like red coals, and wherever the three turned or ran the eyes followed them, growing larger and brighter till they flamed like two furnaces, and hotter and hotter till the merchant's wife and her two wicked daughters took fire and were burned to ashes. Only Vasilissa the Beautiful was not touched. In the morning Vasilissa dug a deep hole in the ground and buried the skull. Then she locked the house and set out to the village, where she went to live with an old woman who was poor and childless, and so she remained for many days, waiting for her father's return from the far-distant Tsardom. But, sitting lonely, time soon began to hang heavy on her hands. One day she said to the old woman: "It is dull for me, grandmother, to sit idly hour by hour. My hands want work to do. Go, therefore, and buy me some flax, the best and finest to be found anywhere, and at least I can spin." The old woman hastened and bought some flax of the best sort and Vasilissa sat down to work. So well did she spin that the thread came out as even and fine as a hair, and presently there was enough to begin to weave. But so fine was the thread that no frame could be found to weave it upon, nor would any weaver undertake to make one. Then Vasilissa went into her closet, took the little doll from her pocket, set food and drink before it and asked its help. And after it had eaten a little and drunk a little, the doll became alive and said: "Bring me an old frame and an old basket and some hairs from a horse's mane, and I will arrange everything for thee." Vasilissa hastened to fetch all the doll had asked for and when evening came, said her prayers, went to sleep, and in the morning she found ready a frame, perfectly made, to weave her fine thread upon. Next day, accordingly, the old woman went to the Tsar's splendid Palace and fell to walking up and down before the windows. The servants came to ask her her errand but she answered them nothing, and kept walking up and down. At length the Tsar opened his window, and asked: "What dost thou want, old woman, that thou walkest here?" "O Tsar's Majesty" the old woman answered, "I have with me a marvelous piece of linen stuff, so wondrously woven that I will show it to none but thee." Compiled by Wheeler, Post in Russian Wonder Tales. New York: The Century Company, 1912. Red leather, red moss, and balsam.
2019-04-21T14:17:37Z
http://blackphoenixchemlab.com/marchen-vasilissa.html
NAMM 2018 Saxophone Gear Roundup » Best. Saxophone. Website. Ever. This marks my 7th year attending NAMM (National Association of Music Merchants) and the show keeps getting better and better every year. Similar to my experience at the 2017 NAMM Show (2017 NAMM Show Saxophone Gear Roundup), the 2018 NAMM Show was full of exhibitors showcasing products such as: necks, ligatures, mouthpieces, reeds, neck-straps, cases and of course, saxophones. With only four days to see it all, I tried my best to test play as many products as I possibly could. Unfortunately (as it happens every year), I was not able to meet with every exhibitor I wanted to as well as spend hours upon hours trying out each piece of gear. I will be reviewing some of the new products I was able to test play at the show this year and will also note products that I hope to test play at a later date. These products, in no particular order…. When I stopped by the P Mauriat booth this year, I saw that they had released a few new products. These products were the P Mauriat Master 97 tenor and P Mauriat Premium saxophone reeds. Due to the popularity of the P Mauriat Master 97 alto, P Mauriat has finally unveiled their Master 97 tenor. Similar to the alto, the P Mauriat Master 97 tenor showcases unique features such as: newly designed right thumb hook, improved side key-action, a 4 point bell brace, an improved octave key mechanism for smoother action, and sterling silver octave pips. Similar to my experience with the P Mauriat Master 97 alto, the P Mauriat Master 97 tenor did not disappoint. I found the overall sound was quite flexible so whether you are a classical or jazz saxophonist, this horn would work well in both situations. The intonation on the P Mauriat Master 97 tenor was quite good as well as the overall action and construction was solid. The overall weight of the P Mauriat Master 97 tenor was slightly heavier than the other P Mauriat models I tried at the booth. I personally think the P Mauriat Master 97 tenor is the best model that P Mauriat is currently offering and hope to see some of these new features incorporated into their existing models (P Mauriat 66, 67, & 76 2nd edition models). I have seen more saxophone manufacturers starting to expand their product line to include various accessories. This year, P Mauriat was showcasing their own line of saxophone reeds. The P Mauriat Premium saxophone reeds are French cane with an un-filed cut. I was given a box of strength 3 reeds and tried all five. I found the cane responded well and did not see any blemishes or imperfections. I did find the reeds to play slightly stiff so I used my ReedGeek to further balance them. Overall, the reeds played fine but I personally prefer other manufactures cane and reed profiles. With that being said, I am glad to see P Mauriat offering additional accessories to complement their current line of saxophones. I have seen more players switching from their current mouthpiece setup over to one of the mouthpiece offerings by Retro-Revival. I had a chance to test play the “Super D” model (Replica of a vintage link double ring Super Tone Master) at KB saxophone services a few months back and was quite impressed. This year, Retro-Revival had their own booth at the 2018 NAMM Show which was manned by well-known mouthpiece maker/re-facer Eric Falcon and CEO of Retro-Revival mouthpieces, Joel Peskin. While at the booth, Eric introduced me to some of the newer models that just came out before the show which were the “Tru-Res”, “Seventh Ave. South” and “Bob Sheppard Signature Series Generation 3” tenor saxophone mouthpieces. The “Tru-Res” is a replica of the classic 1940’s Vintage Otto Link Reso Chamber tenor saxophone mouthpiece. This mouthpiece works well whether you are a jazz or classical player and embodies a really dark core that is even from top to bottom. Some players who play the Otto Link Reso chamber are Seamus Blake (before switching to Ted Klum) and Ben Wendel. A unique feature to the “Tru-Res” compared to the original Reso Chamber mouthpieces, is the “Tru-Res” comes in larger tip openings (7*, 8, 8*). I found the “Tru-Res” model to fit its description well. This mouthpiece played evenly from top to bottom, with a very dark core. The “Tru-Res” was designed for players who want a mouthpiece that leans towards the darker side of the sound spectrum. There was some resistance based on the facing but it was not stuffy or tubby. The “Tru-Res” was easy to control and as I pushed more and more of air thru the mouthpiece, the sound did not thin out. I believe those players who are looking for a dark, focused, and edgy mouthpiece will really enjoy the “Tru-Res”. The “Seventh Ave. South” is a copy of Joel’s Personal MBII. that Dave Guardala hand made for him when he first started his operation. This model is CNC milled from solid bell brass and then silver plated. The original MBII is a .107 tip opening but in addition, a .116 tip opening is available as well. Each mouthpiece is hand-finished by Eric Falcon to make sure it plays as close to the original. The “Seventh Ave South”, similar to the original MB II has tons of power, core, and center when pushed. This mouthpiece unlike others in its category is a direct Replica from a handmade and hand-picked mouthpiece by its creator Dave Guardala. The original Guardala mouthpieces are incredibly sought after and many players are playing the originals (if they can get their hands on one) as well as various versions from multiple manufactures. I have tried many copies of the various Guardala models and some played better than others. Although my preference is the “Tru- Slant” or “Tru-Res” because I play on an original hard rubber slant link, The “Seventh Ave. South” (.106) played quite well. This mouthpiece was incredibly free blowing with the sound being instant. I believe this mouthpiece would suit players who want no resistance, instant response, and a mouthpiece that can play really loud and project. Of all the Retro Revival models I test played, the altissimo on the “Seventh Ave. South” was the easiest to achieve. If you are a Guardala enthusiast, you should try the “Seventh Ave. South” and see how it compares. “Bob Sheppard Signature Series Generation 3”- was a collaborative design by Eric Falcon and Bob Sheppard. The “Generation 3” is the latest version of Bob Sheppard’s personal favorite mouthpiece which is a fusion of classic design concepts found at Retro Revival and Eric Falcon’s breakthrough modifications that significantly improve response and dynamic range. After playing the “Tru Res”, “Tru Slant”, “Seventh Ave. South” and “Shorty”, Eric asked me to test play the Bob Sheppard Signature Series Generation 3. I had played the 1st and 2nd Generation in the past and was excited to see how the Generation 3 model played in comparison. The Bob Sheppard 1st and 2nd Generation mouthpieces played evenly throughout from low Bb to high F# but contained a level of resistance that I was not used too. The Generation 3rd in comparison was much more-freer blowing and had a complex timbre that was neither too dark nor too bright. The overall sound had warmth as well as edge and like many of Eric’s mouthpieces, you could push a lot of air thru the mouthpiece and feel like you still had the same control from pianissimo to fortissimo. The “Bob Sheppard Signature Series Generation 3” to me was a hybrid model that took characteristics from a Slant Link, Early Babbitt, and Reso chamber and combined it into one mouthpiece. I would highly recommend test playing the “Bob Sheppard Signature Series Model Generation 3” mouthpiece to see how it compares to your setup. This year at NAMM, I was fortunate enough to meet up with Jack Finucane, who is the owner+repair technician of the Boston Sax Shop. Jack had two products at the show he wanted me to test play which were his new Heritage neck and the Balam Back Strap. When I spoke with Jack, he informed me that his Heritage Neck was “conceived from his twin passions; restoring vintage saxophones and playing them.” As Jack’s repair work has grown in popularity, he has had the privilege to examine and test-play hundreds of vintage necks. This extensive research helped Jack design his Heritage Neck, which he took little pieces of his favorite attributes from each one that he found to be exceptional. The major influence for this neck comes from the free blowing characteristics Jack found in earlier Selmer’s such as the Radio Improved and Balanced Action horns. I tried the Heritage Neck on a Lupifaro Platinum tenor I brought to the show to see how it compared to the stock neck. The Heritage Neck fit was slightly loose but overall fit well enough for me to play test. I was quite surprised by the response on the Heritage Neck. The overall sound had a very nice core and edge that I could push without the sound thinning out. I noticed specifically in the palm keys that the sound was more stable and from top to bottom the horn played more even. The stock Lupifaro neck I have is good but similar to the KB & Tino Schucht saxophone necks I have played in the past, the Heritage Neck offered more tonally and was quite fun to play. I think any player who is interested in experimenting with various necks should absolutely check out the Heritage Neck and see how it compares (More in-depth review to follow). The 2nd product Jack had me test out was the Balam Back Strap. The Balam (“Wind” in Korean) Back Strap, is a strap that is handmade in Korea and utilizes full grain leather straps with antiqued cast brass fixtures. Jack told me this strap was designed to alleviate serious neck pressure and place the pressure equally across the shoulders. I found this strap offered pressure relief from my neck which typically I have seen only accomplished with a select few neck-straps and various harnesses. This strap can be used on soprano, alto, tenor and bari by adjusting various strings (see video). The overall quality was very good on the Balam Back Strap and I believe this strap is targeted towards players who are looking for high quality, comfort, and a strap that is going to last them for years and years to come. As Silverstein ligatures have grown and grown in popularity over the past few years, Silverstein has added more accessories to its line of products. This year, I had a chance to speak with BK Son, who is the owner of Silverstein Works. BK Son was nice enough to show me his three new products which are the OmniGuard, Alta Reed for alto saxophone, and the OmniPatch. The OmniGuard was designed as a lower and upper teeth/lip protector for single and double reed instruments. When I tried the material out on my bottom teeth, it felt quite comfortable and reminded me slightly of the feeling of a mouth-guard that you would use in football or soccer. The material was easy to customize to fit your upper or lower teeth and felt secure once molded. This is a much nicer alternative than what many of us have used in the past which was a piece of plain white paper that we would roll-over our bottom teeth. I see this OmniGuard as a useful accessory for many classical musicians. As someone who primarily plays jazz, I personally prefer to not have paper or a guard on my bottom teeth but, understand the benefit of the OmniGuard. BK Son told me the material should last you 12 months and comes with tweezers and a carrying case for easy transportation and further adjustments. At last year’s NAMM show, BK Son showed me the Alta Reeds for clarinet but did not have any currently available for saxophone. This year, BK Son gave me a 2.5 Alta alto saxophone reed to test play with the tenor reeds coming out in the near future. If you have not heard of the Alta line of reeds, they are cane that is sourced from the Mediterranean and then designed and manufactured in Germany. I tried the Alta alto saxophone reed that BK Son gave me and it played quite well. The cane had no blemishes or inconsistencies that I could see. One of the main selling points for the Alta Reeds that Silverstein is offering is a quality guarantee. What this means is if you purchase a quantity of 5, 10, 15, etc. and find various reeds that do not play well, you have the ability to send them back to Silverstein and they will send you replacement reeds, free of charge. In addition, Silverstein offers a subscription option so you can have reeds automatically delivered to you every month at a discounted rate over the single purchase option. I am looking forward to picking up a box of 5 or 10 Alta reeds in alto and tenor (once released) to further test play and see how the quality guarantee program works. I have seen more and more manufacturers starting to offer their own line of mouthpiece patches at various thicknesses, colors, as well as materials. The OmniPatch looks like a traditional mouthpiece patch but what differentiates it from the competition besides the silicon material and adhesive, is the tooth-plant imprinted into each mouthpiece patch. Similar to the Vandoren, D’Addario, and Forestone mouthpiece patches I have tried, the OmniPatch felt comfortable while playing and was easy to remove without losing the adhesive. The tooth-plant impriment did take me some time to adjust to because how I play, my front teeth fall slightly over the implemented tooth plant. Personally, I really like the patches but would actually do without the teeth guide because everyone’s teeth are different. If the OmniPatch molded to your front teeth so every time you play you found a comfortable position, that would be a different story. Rovner has become one of the most widely used ligatures across multiple woodwind instruments. In the past, I have reviewed the Rovner Versa X, Rovner Van Gogh, and Rovner Platinum (BSWE Rovner Product Review). When I visited the booth this year, the new 24-karat Gold Plated Platinum ligature had recently come out. I test played the original Platinum ligature against the Gold Plated version to see if I could hear a difference. Overall, both ligatures responded very similarly except I did find the Gold Plated Platinum Rovner ligature to have a slightly dark tone. My recommendation would be if you currently play on the original platinum ligature, to check out the gold plated version and see if you can hear a difference in the overall tone and response. Since first play testing the Ochres line of saxophones at the 2016 NAMM Show and further reviewing the Ochres No. 5 Professional X Series Vintage tenor saxophone (BSWE Ochres Saxophone Review), I visited the booth this year to see what was new. Christine Liu, CEO of Ochres, was nice enough to show me their new Ochres V-6 Alto saxophone as well as their Balloon Sonar Screw accessory that is placed in the lyre holder. Christine told me that The Ochres V-6 is different from other models on the market because they used special alloys developed in-house to enhance the richness of the overall sound. Similar to their other models, the Ochres V-6 is equipped with Pisoni pads which are installed using shellac instead of glue. There were two Ochres V-6 alto’s at the show. Compared to the other models Ochres offers, I did find the Ochres V-6 alto responded extremely well from top to bottom. The overall sound I found to be edgy, focused, and warm. This horn could be used for classical as well as jazz. The ergonomics and intonation were great and for me personally, I might have the spring tension lightened a bit and possibly add some cork or felt in certain areas for less play. The Ochres V-6 reminded me of the Selmer Reference 54 alto saxophone in terms of the key setup and sonically geared towards players looking for that classic Mark VI sound. I want to thank Christine for letting me test play the Ochres V-6 alto saxophone and am looking forward to test playing the Ochres V-6 tenor once it is released. The Ochres Balloon Sonar Screw was developed to stabilize unstable frequencies between the neck connecting to the body tube. I tried the Balloon Sonar Screw on the Ochres V-6 alto to see how it responded with and without it. I noticed slightly more resonance with the Balloon Sonar Screw than without it. I believe this could be attributed to adding more mass similar to various heavy neck screws I have seen on the market today. I did notice a more significant impact to the sound and play-ability while using the Klangbogen device but I believe the Ochres Balloon Sonar Screw can make a slight impact to the overall response and evenness across the entire range of the horn. I would recommend testing this device on your preferred setup and determine if it makes a difference or not for you. Again, I would like to thank Christine for allowing me to test play both the Ochres V-6 alto saxophone and the Balloon Sonar Screw. I am looking forward to seeing what else Ochres has to offer in the near future. So that’s it for this installment of Zach’s adventures at NAMM 2018. Stay tuned for Part 2 coming shortly!
2019-04-18T10:21:27Z
https://www.bestsaxophonewebsiteever.com/namm-2018-saxophone-gear-roundup/
When I stand on the rear deck of my two-year-old home on the outer edge of Copperwood, one of west Lethbridge’s fastest-growing suburbs, my attention is drawn west. The scene is classic southwestern Alberta: big sky, open prairie, mountain horizon. I cherish the view, but I know it won’t last. Every month the developer pushes closer with newly paved roads and attractive homes with front-attached garages. Give it another year, two at the most, and my view will be blocked by a new row of houses complete with backyard barbecues. That’s if everything goes as planned. If things don’t go as planned, my view might instead be blocked by drilling rigs, flare stacks and petroleum tanks. That’s a threat my neighbours and I narrowly avoided early in 2014 when Calgary-based Goldenkey Oil Inc. sought approval to drill three exploratory wells on future residential land inside Lethbridge city limits. Two of the wells would have been only a few hundred metres from homes. Goldenkey shelved their plans after widespread community opposition. Not only did the mayor and council, both of the school boards and most of the city’s residents oppose the wells, but so did the MLAs for Lethbridge-East and Lethbridge-West. Even representatives from the business community were opposed, including the Lethbridge Chamber of Commerce and the Lethbridge and District Association of Realtors. The executives at Goldenkey decided to cut their losses, writing off the hundreds of thousands of dollars they’d put up to lease the mineral rights and hold public consultations. When Lethbridge Mayor Chris Spearman learned on May 1, 2014, that Goldenkey was pulling out of town, he was delighted but nevertheless cautious. “Goldenkey’s plans have been abandoned,” he wrote in a public statement, “but the issue of urban drilling has not gone away.” There are other oil and gas companies, all of them with the primary concern of return on investment. Lethbridge is only the latest high-profile example. Drayton Valley, Balzac, Cochrane and the Royal Oak and Rocky Ridge neighbourhoods in Calgary, among others, have all had their run-ins with the oil and gas industry. But if the recent resistance in Lethbridge can be taken as an indication, urban Albertans, who now make up 83 per cent of the province’s population, are ready to defend their neighbourhoods. Our thinking on oil and gas development has changed. A recent public opinion poll by the Canada West Foundation reveals that a majority of Albertans mistrust the energy industry. No longer can oil and gas companies expect quiet acquiescence from the people of Alberta. What’s needed in this new Alberta is clarity, both for those living in the suburbs and for the industry executives who want predictability. Rural Albertans will also have a stake in any discussions because less drilling in urban areas could mean more in rural areas. Clarity won’t be easily achieved, but one thing’s for sure: the status quo, defined by uncertainty and conflict, is increasingly unworkable. It’s finally time to develop a better set of rules on drilling in our province’s cities. Unless they’ve had a close brush with this urban side of the industry, most people would probably assume that drilling in cities is prohibited. But that’s not the case. When it comes to oil and gas development in Alberta, nothing distinguishes urban municipalities (cities, towns, villages) from rural municipalities (municipal districts, counties, hamlets). There’s only one Municipal Government Act (MGA), and it applies equally to both the city and the country. That would be fine except for a specific section in the 20-year-old MGA that exempts oil and gas developments—wells, batteries and pipelines—from local land use regulations. Called s.618 by those in the know, the exemption clause allows oil and gas development to proceed on any land—urban or rural, public or private—without regard for the municipality’s future land-use plans. Lethbridge, for example, has at least six operating gas wells and 25 wells in total within city limits. The approvals are the responsibility of the Alberta Energy Regulator (AER), a centralized agency funded by the administration fees it collects from oil and gas companies. AER receives its overall direction from a corporate-style board that’s appointed by Alberta’s Lieutenant Governor and chaired by Gerry Protti, a former executive at Encana Corporation and the founding president of the Canadian Association of Petroleum Producers. The board’s other six members include a business consultant, a veterinarian, a chartered accountant, an engineer, a forester and a former VP at Nova Chemicals. Direct decisions on major applications are delegated to AER hearing commissioners, while routine applications are vetted by AER officials and staff. During a recent 12-month period, the AER received 8,807 well-licence applications and approved all except for 222, which were withdrawn. The criteria aren’t publicly available, but if the specialist content of the AER’s many regulatory directives is an indication, the primary concern is technical compliance, not social compatibility. As a result of the AER’s far-reaching powers, our democrat-ically elected city councillors have no authority to regulate whether, or where, wells are drilled. These local leaders can—in fact, must—regulate other intensive or controversial land uses such as slaughterhouses, gravel pits and wrecking yards, but the section 618 exemption clause puts oil and gas out of their reach. The MGA requires municipal governments to implement logical and orderly land use planning; this way we don’t have bedrooms backing onto concrete plants, or night clubs located next to retirement villas. Why don’t city councillors have this same kind of common-sense control when it comes to oil wells and flare stacks? Nickie Vlavianos, a law professor in the Faculty of Law at the University of Calgary and an expert in oil and gas law, explains there are good reasons to put oil and gas out of the reach of municipal bylaws. “One advantage of the exemption,” she says, “is that it allows environmental and safety standards to be uniform across the province no matter where the well is drilled.” Moreover, she says, the exemption allows the AER to make decisions that reflect not the narrow interests of one municipality but the social and economic interests of the province as a whole. Drilling can proceed on any land—urban or rural, public or private—without regard for land-use plans. Still, the exemption strikes an undemocratic chord. Some municipal leaders have called for more control. But local decision-making also has its issues. As Vlavianos points out, some municipalities might outright prohibit drilling, putting a drag on the provincial economy, while others might relax regulations and standards to attract development. Neither scenario is desirable. Another issue is the sheer number of municipalities. Alberta has 269 urban and 74 rural municipalities. If those municipalities were separately put in charge, the resulting patchwork of regulations would be so incomprehensible it might sink the oil and gas industry. When it’s seen this way, the status quo of centralizing all decisions with the AER begins to make some sense. At least that’s the message Albertans have been hearing from successive energy ministers. For Lethbridge Mayor Chris Spearman, however, the status quo isn’t an option. The urban drilling issue dominated the agenda during the 2013 municipal election. He was opposed to it during the campaign and, along with the other eight members of council, he’s still opposed. “Our formal position,” he says, “is that drilling isn’t appropriate in urban boundaries.” His main concern: “sterilization” of developable residential lands. It’s a valid concern. With over 93,000 residents, Lethbridge’s population is growing at an annual rate of nearly 3 per cent. In west Lethbridge, however, the rate of growth is over 4 per cent, a whole point higher than even Calgary’s overall rate of growth. The oil and gas industry has only a minor presence in Lethbridge. The economy is centred instead on agriculture and agricultural processing. According to Economic Development Lethbridge, the city is also an up-and-coming high-tech centre, a natural outgrowth of having affordable land, two federal research centres and two high-quality post-secondary institutions. Lethbridge needs clean land for commercial and residential expansion. If not in the city, where exactly should oil and gas wells be located? Council was not willing to answer directly. “This city council and the previous council,” they wrote in a public statement, “have emphasized from the start that we are not opposed to oil and gas exploration, generally.” They just didn’t want to see it occurring within the boundaries of Lethbridge. When asked the obvious question, Spearman is quick to counter any charges of NIMBYism. “We really do have plans for development,” he says. In fact, the entire area in question, which amounts to more than eight sections (over 2,000 hectares), was annexed in 1984 specifically for residential development. In the meantime, the owners of the annexed land—farmers now seeding their crops in Lethbridge rather than the County of Lethbridge—have continued to work their fields. As needed, portions of the land have been purchased by developers who have installed roads and street lights. To come out ahead, they subdivide the land and sell the serviced residential parcels to builders who in turn build homes that are mortgaged by regular working people—nurses, plumbers, the young couple covering the night shift at the potato chip plant. Dave McCaffrey says No Drilling Lethbridge’s concerns included possible water contamination, odours or a hydrogen sulphide leak. Growth was slower during the late 1990s and the very early 2000s. During those years, the Bonavista Energy Corporation encountered little to no opposition when it drilled a number of gas wells on the annexed land. One of those still-producing gas wells is only 300 metres from my home, but it was over 1.5 kilometres from the nearest homes when it was drilled. This illustrates how quickly the supply of land is disappearing in west Lethbridge. That Alberta Energy would today auction off the mineral rights under the remaining land, ignoring the City’s residential plans is, at best, inefficient and counterproductive. At worst, it’s a disaster in the making. Concerns about public safety were paramount for No Drilling Lethbridge, a citizen group that formed during the summer of 2013 to oppose Goldenkey’s proposed exploratory wells. Sheila Rogers and Dave McCaffrey, both of whom were prominent volunteers with the group, recall a list of public concerns that included water contamination from hydraulic fracturing, odours, air and light pollution, dangerous goods transportation on residential roads, and emergency evacuation capability in the event of a fire or a release of deadly hydrogen sulphide gas. These last two concerns were especially salient given the newest subdivisions located downwind of the wells’ proposed location. Admittedly, some of the health and safety concerns were misunderstood or exaggerated. Noise and light pollution, for example, were high on the protest agenda, but the community would have experienced little of either after the initial drilling. A pump jack moving in slow motion in the middle of a stubble field isn’t going to keep anyone awake at night. Diesel pickup trucks, which serve as commuter vehicles for a surprising number of suburban families, are far more disruptive. Based on the tone at the public consultations, however, the people of Lethbridge generally weren’t open to discussing the rationality of their fears. Nor did they want to learn how their concerns might be mitigated with regulations or technology. David Hill is a regulatory consultant with Hill and Associates Consulting Ltd. He and his colleagues represented Goldenkey during the public consultation events in Lethbridge in late 2013 and early 2014, trying to convince Lethbridge residents that their quality of life would be unaffected by the exploratory wells. The group did not win over very many minds. “The biggest surprise for me,” Hill says, “was the misinformation and the willingness of people to believe what they wanted to believe.” When he and his colleagues attempted to clarify the issues, their lengthy explanations met with skeptical groans. Collective fear had taken hold: “There was a groupthink that happened,” Hill says. Judging by how often it appeared in news headlines and on protest placards, Lethbridge residents were most concerned about Goldenkey’s hydraulic fracturing plans. “Fracking,” as it’s called, refers to the process of pumping highly pressurized fluids and sands (or other solids) into a well to fracture the geologic formations so that the oil and gas flows more freely. The practice has caused considerable controversy, especially when conducted in shallow gas wells, because it’s widely believed that the process contaminates underground water. A clearer set of rules would also help oil and gas companies benefit from their investment. Pending further study of the negative effects, moratoriums on fracking have been put in place in Quebec and Nova Scotia. During No Drilling Lethbridge’s campaign, Newfoundland followed suit as did municipal officials in Los Angeles. At the same time, residents in three cities in Colorado voted against fracking. In this context it’s not surprising that Lethbridge residents were fearful of Goldenkey’s plans. The result of that fear was widespread opposition. On February 20, 2014, researchers from the Lethbridge College Citizen Society Research Lab asked a representative sample of residents if they supported or opposed oil and gas drilling within the boundaries of their city. More than 75 per cent of respondents were opposed, and of those, most were strongly opposed. Volunteers from No Drilling Lethbridge subsequently pulled together an 11,000-signature petition, which they delivered to the Legislature in late March. But, at the same time, McCaffrey has a sober warning: “This wasn’t a victory for democracy,” he says, explaining that the residents of Lethbridge were forced to resort to protests and petitions even though their elected representatives at the municipal and provincial levels were opposed to Goldenkey’s plans. This lack of confidence in the regulatory and political channels only underscores that there’s a need for new urban drilling rules. It’s not exactly clear when those new rules will be coming. When Kaiser Exploration Ltd. relocated to appease the residents of northwest Calgary, then-Minister of Energy Ken Hughes promised an urban drilling policy by the end of 2013. Next in line was his successor, Diana McQueen, who promised a policy by the end of 2014. To her credit, she completed discussion sessions and an online survey despite all the upheaval that came with Premier Alison Redford’s resignation. Under Premier Jim Prentice, Frank Oberle took over as Energy boss in September of 2014. Those hoping for some action were disappointed that urban drilling wasn’t mentioned in his mandate letter. New Democrat leader Rachel Notley has accused the Progressive Conservatives of foot-dragging. But the 12-term PC government is in a tricky position because they must also consider the wants and needs of rural Albertans. We only need to recall Wiebo Ludwig and his direct activism to remind ourselves that city folks aren’t the only people who take issue with the oil and gas industry. A more recent example is Rosebud-area oil patch consultant Jessica Ernst’s ongoing legal battle with Encana Corporation and Alberta Energy over the issue of contaminated well water. Then there’s the problem of the in-between people, the wealthy urban refugees who live on the fringes of the cities in country residential acreage developments. Although many of them earn their living working in oil and gas, they are quick to mobilize when their industry gets too close to home. As mayor of Lethbridge, Spearman would like to see some changes to the AER’s processes for public hearings. Currently, the rules require AER to provide notice of each proposed development so that any party likely to be “directly and adversely affected” may file a statement of concern as an intervener. However, the AER is not obligated to hold a hearing if it determines (behind closed doors) that the would-be interveners are unlikely to be directly or adversely affected. Environmental coalitions, for example, are usually unable to gain intervener status. Since municipalities are responsible for land-use planning and the provision of emergency services, Spearman asserts that their status as interveners should be a given in every case: “We have to manage all the risks, so we should have a higher level of say.” Spearman presented this resolution at the Alberta Urban Municipalities Association’s 2014 annual conference, and the AUMA made it their official position. The proposed changes to the rules governing mineral rights disposition and public hearings would benefit urban and rural municipalities alike. But what about Lethbridge City Council’s hard-line position that oil and gas development is never appropriate within the boundaries of a city? Most MLAs would likely disagree for fear of offending the overrepresented rural vote. Additionally, in certain areas—land contaminated by a former urban landfill, for example—oil and gas wells might be the only appropriate development. Still, we all know the city isn’t the countryside. While it’s possible to overemphasize the difference between the two types of municipalities, the AER’s current approach of evaluating only whether a well can be drilled and produced safely, dismisses difference at all. Oil and gas may be the backbone of our economy, but that doesn’t mean it should always come first. As for my situation in Copperwood, I can only hope that the land behind my new home will be developed for houses, as planned. But so long as the section 618 exemption is there, putting oil and gas development out of the reach of city councillors, the future status of the land will remain in question. A modern policy on urban drilling could change that. In the meantime, I hope someone in the City’s planning department is carefully monitoring Alberta Energy’s public auctions so that the right people can be alerted if the mineral rights underneath Lethbridge are again leased to an oil and gas company. For their part, oil and gas executives probably wouldn’t much care if drilling were finally prohibited in our cities. Urban municipalities comprise only a small portion of the province’s land mass, and as Goldenkey learned in Lethbridge, approvals in a city can quickly get messy. Industry shouldn’t be misled to believe that they will be rewarded if they follow a road leading to the rapidly expanding suburbs. Instead we should have a clear set of rules so that oil and gas companies can focus on places where they can reasonably expect to benefit from their investment and efforts. Jeff Doherty is a writer and history buff based in Lethbridge. He has worked as a roughneck, a bureaucrat and a legal researcher.
2019-04-23T10:30:29Z
https://albertaviews.ca/a-well-of-uncertainty/
Since the founding of the school in 1945, UCLA Samueli Engineering faculty and researchers have undertaken cutting-edge research projects in a wide variety of areas. In the last century, engineering recorded its greatest achievements with the widespread development and distribution of electricity and clean water, automobiles and airplanes, radio and television, antibiotics and medical imaging, and computers and the Internet. Many of the discoveries at UCLA Engineering contributed to these modern day advancements. This section highlights some of the most interesting and innovative projects. Consider this just a snapshot of the school’s rich research history. UCLA Samueli Engineering has enjoyed a history of strong and innovative leadership since its inception. On January 10, 1941, the Regents authorize instruction in engineering on the Los Angeles campus. On Friday afternoon of Sept. 22, 1944, following a meeting of the Regents in San Francisco, University President Robert Gordon Sproul announces the appointment of Llewellyn Michael Kraus Boelter to be Dean of the College of Engineering on the Los Angeles campus. In the fall of 1945, the College of Engineering opens with an enrollment of 379 students. In August of 1946, a single-engine Japanese Navy torpedo bomber known as a “Jill” is delivered to the College of Engineering for use in instruction. The plane had been taken aboard the USS Lexington in the South Pacific, was stored briefly at Roosevelt Air Station, then offered to Capt. G.G. Crissman, USN, professor of naval science and tactics. On Nov. 16, 1946, the College of Engineering receives a General Electric Mechanical Differential Analyzer, a “mechanical brain” capable of solving in a few days mathematical problems which would take several years of work by conventional methods. This was only the sixth instrument of its kind in the United States. On Sept. 30, 1947, the College of Engineering receives an A-C Network Analyzer from General Electric. Somewhat resembling a telephone switchboard with dials, the analyzer initially was developed by GE to study problems associated with power system design and operation. It is the second “mechanical brain” machine to be obtained by the college. In the fall of 1947, furniture designer Charles Eames enlists the cooperation of faculty to develop a chair to be entered in the New York Museum of Modern Art’s 1948 International Competition for Low-Cost Furniture Design. The design wins a shared second prize in competition with 250 entries from the United States and nearly 500 from European countries. In June of 1948, Barbara Wynn of Cheviot Hills becomes the first woman to graduate from the College of Engineering. In July of 1952, Conrad J.K. Buettner and Heinz Haber from the College of Engineering suggest that conquest of space is not far off. Examining the fringes of space, which they name “aeropause,” their research determines that men in flight suits, who have already attained this near-space altitude in balloons, could expect little more danger from travel through space. In September of 1952, professor W.D. Hershberger observes the “gyroscopic” path that electrons travel around an atom by using microwave radar to examine samples placed in the field of a 3,500 pound electromagnet. In September of 1952, a team of professors led by Russell R. O’Neill is conducting a wide study of cargo handling to find ways to lower costs of shipping by water and increase the ability to handle greater quantities of goods. In September of 1952, William L. Martin and Richard E. George report development of a device that automatically rejects frost-damaged and granulated citrus fruit from fruit inspection lines. They report that frost-damaged and granulated fruits present a spotty appearance under X-ray fluorescence, and suggest a device with a mechanical or electric eye might be used to detect such spottiness and reject unwanted fruit automatically. In September of 1952, it is announced an instrument has been developed that can measure a shear force of 1/100,000th of a pound per square foot. The instrument, a shear meter, was developed by junior engineer John E. Vehrencamp to study the drag effect of air currents on the Earth’s surface and its influence on wind velocities and the transfer of heat into the air. In October of 1952, engineering professors Joseph Kaplan and Heinz Haber publish “Across the Space Frontier,” a book that is labeled an accurate blueprint for the establishment of a space station 1,075 miles above the Earth. The same month, assistant professor Albert Bush begins examination of particles in the atmosphere that contribute to pollution. In October of 1952, John Lyman and Donald Skilling embark on a study of kinesthesis, the muscle sense, in a program that will help in the design of controls for jet planes, where sudden forces occurring at high speeds may cause pilots to lose control of the plane. It is also related to artificial limbs research where compensation for loss of muscle sense must be developed. In November of 1952, assistant professor Albert Bush seeks to solve problems associated with using man-made freshwater dikes to form barriers to the intrusion of sea water into coastal fresh-water aquifers. At some point, the fresh water will penetrate no deeper to complete the barrier, and Bush is examining use of chemical treatments to remove the flow impediment. In December of 1952, using principles of diffraction, Daniel Rosenthal, George Sines, and Murray Kaufman measure minute spacing of atoms of different materials by means of X-ray. Their research shows that by pre-stressing certain aluminum alloys, their strength can be doubled, which is directly applicable to the design and construction of advanced aircraft. In March 1953, Louis Pines uses mathematical methods developed by 19th Century French astronomer Henri Poincare to predict the performance of compact mineral units known as the transistor and dielectric amplifier, which are destined to revolutionize the electronics field. In September of 1953, mechanical brains, whose wire nerves carry electrical impulses at rates up to 186,000 miles per second, are used to solve such knotty and diverse problems as traffic jams, manufacturing bottlenecks, rapid translation of scientific Russian, earthquake effects on buildings and the icing of airplane wings. In November of 1953, Arthur Pillsbury and Edward Taylor look for a cause and solution to the problem of surging in open-pipe type irrigation systems. Surging has been an increasing problem in irrigation systems. The research discovers that vents placed adjacent to overflow stands along the pipes will allow the “burping” of the buildup of air in the pipes, which was found to be the cause of the problem. In May of 1954, engineers first connect two mechanical brains, the differential analyzer and the network analyzer, to solve the problem of accidental grounding or short circuits in large power lines, which often results in “brown outs” or power failure. The analyzers, located in separate rooms and connected by 100 feet of cable, solve the complex problem in 10 minutes. In May of 1954, it is reported that Gerald Hassler has constructed a device which extracts fresh water from sea water using the selective action of an osmotic oil membrane. Hassler’s membrane is an extremely thin oil layer supported by capillary action. It has no holes as such but water molecules can diffuse through it while salt molecules are blocked. In June of 1954, Vincent Blockley reports that results of experiments with a heated cockpit and pilots in flight suits determined that pilots can perform effectively for about an hour in air temperatures near the boiling point of water at a cabin altitude of 24,000 feet. In September of 1954, senior electrical engineer Ralph Crump suggests grounding all home appliances and using grounded three wire outlets, which are available but not yet widely used. He announces that a program is under way to equip all campus buildings with 3-wire outlets and to see that all equipment is grounded. In June of 1955, it is announced that the College of Engineering will begin a cooperative engineering education program with Gadjah Mada University in Djogjakarta, Indonesia. Nine UCLA faculty members will help Gadjah Mada faculty in setting up modern engineering curriculum and laboratories, and advise on teaching methods. In May of 1956, C. Martin Duke and David J. Leeds take measurements from strain gauges installed in the engineering building during its construction to develop stronger structures. The gauges, networked to a central recording facility, which also houses a strong-motion seismograph, allow accurate recording of the building’s response to earthquake tremors. In July of 1957, while examining the concept of “wings of clay” using pre-stressed ceramics for materials in supersonic aircraft, professors Francis R. Shanley, William J. Knapp and R. A. Needham suggest graphite is also a possible answer to the aircraft “heat barrier.” They report that the strength of graphite actually increases with temperature up to about 4,000 degrees Fahrenheit. In September of 1957, research engineers James Howard and Philip O’Brien use laboratory instruments to examine the process of egg candling. Candlers traditionally hold an egg up to the light to determine whether the egg has been diseased. The engineers examine the egg’s light quality and map the depth of the egg’s air cell and albumen density to determine more effective lighting techniques to make the candling process more accurate and efficient. In October of 1957, UCLA engineers Neal A. Richardson and Wilbur Middleton use highly efficient particulate filters and charcoal filters to examine the existence of irritants in office air. Using sets of blind filters and questionnaires that solicit responses relating to the degree of eye smarting, and throat and nose irritation, the researchers determine that the irritants are in the form of gas, not particles. Professor C. Martin Duke reports in May of 1958 that cities which experience earthquakes could reduce future damage by establishing building codes based on soil conditions. He suggests development of zoning maps that show location of soft valley or seashore deposits, which he says amplify quake motions and therefore require stronger foundations. In August of 1958, plans are completed for UCLA to receive an accident-proof nuclear reactor worth $203,350 from the Atomic Energy Commission (AEC). UCLA is one of the first universities in the country to receive the 10-kilowatt Argonaut reactor, which will run for more than 10 years on three kilograms of Uranium-235 loaned to UCLA by the AEC, according to professor Thomas E. Hicks. In September of 1958, President Eisenhower points to development of methods for converting sea water into salt water as one of the key hopes for the peaceful developments of the Near East. His words are noted with interest by associate professor Joseph W. McCutchan, who is developing membranes for a reverse-osmosis water desalination system. In December of 1958, under the direction of professor Gerald Estrin, UCLA receives the only Telemeter Check Processing Machine from Telemeter Magnetics Co. for testing. The device produces a computer punch tape for attachment to bank checks that contains all of the information necessary for automatic bank routing. In 1958, the beginning of the space age, under the direction of professor Samuel Herrick, UCLA became the first U.S. university to graduate a Ph.D. specializing in astronautics, and was the first to offer a course in rocket navigation. In October of 1959, research engineer Richard Kopa examines a mixing device for auto gasoline intended to reduce smog. Mounted on top of the carburetor, the device injects additives into the airstream before combustion, successfully eliminating 80 percent of the nitrogen oxide from the auto exhaust. In October of 1959, a $1.2 million grant is received from the Ford Foundation to conduct an extensive, five-year study of the School’s curriculum. The grant, one of 10 awarded nationwide, is intended to help strengthen engineering curricula in the face of an increasing demand for engineers. UCLA’s College of Engineering is the only one in the country with a unified undergraduate curriculum, which emphasizes the fundamentals common to all engineers rather than the specialized techniques of the various engineering branches. In October of 1959, a Lockheed supersonic X-7 guided missile is delivered to the College of Engineering for use in teaching and research. The 38-foot, air breathing, short-wing missile will be used to test new developments in ramjet engines and other components for the Air Force. In November of 1959, a revolutionary new book on prosthetics is published, titled “Clinical Prosthetics.” The book, an outgrowth of five years of research and experience in UCLA’s Prosthetic Education Project, is referred to as the “amputation Bible.” For five years, more than 2,300 members of clinical prosthetics teams from all over the U.S. and several foreign nations received training through the project. In November of 1959, Eldon Knuth uses a supersonic nozzle to blast highly heated molecules at various solid materials, such as metal and glass, to examine how much heat and drag are exerted on a spacecraft moving 25,000 feet per second through space. In August of 1960, the development of the first practical membranes for a water desalting process called reverse osmosis is announced by UCLA engineers. In research initiated by the late professor Samuel T. Yuster, engineers Sidney Loeb and Srinivasa Sourirajan successfully test a special membrane, or film, with a large number of tiny pores, which in effect separates the salt from saltwater leaving potable (fresh) water behind. Loeb and Sourirajan believe their process holds promise for large scale commercial use, and will now embark on a project to build a pilot plant that can yield 25,000 gallons a day. In October of 1960, Professor Alan Powell investigates aerodynamic noise in a special laboratory in Engineering I. When the building was erected, a large exhaust stack the full height of the building was installed to make possible experimentation with aircraft jet engines. Prof. Powell’s research focuses on the incidence of sound-induced vibrations, which cause acoustic fatigue resulting in cracks in the airplane skin and loosening of rivets. Powell suggests that the acoustic fatigue problem could be limited with the development of engines having larger but slower jet streams, which could give the same thrust with less noise. In February of 1961, what the well-dressed space explorer might wear on the moon is modeled using an integrated space suit. Designed by Allyn B. Hazard, the suit is a rather awesome 8-feet high with twin antennas sticking from the helmet, rubber encased arms and legs, a hefty circular midriff, and identification and ground lights. The researchers say that like a skin diver, the moon explorer will have to carry his earth environment with him, including food and liquid, a communication system, and power supply. In September of 1961, it is announced the College of Engineering will receive a tape-controlled machine tool system from General Dynamics. The computer, officially called the Prototype Digimatic Director (one of only four in the country), prepares magnetic tapes for numerical control of a milling machine. Together with a previously donated data entry unit, keyboard and power supply, the Director completes a system which will be a basic part of tomorrow’s automated factory. In April of 1962, nine engineering students launch the Syrius II hybrid-fuel rocket from a test site at China Lake Naval Ordnance Test Station. The liquid/solid fuel rocket, designed and built solely by the nine students, reaches an altitude of 1,200 feet and lands 4,000 feet downrange of the launch site. In a report to the Regents in January of 1963 on the six-year Gadjah Mada project to train engineers and establish an engineering education infrastructure in that country, success was the overwhelming result. The number of graduates increasingly grew and in 1962, 150 engineers are graduating per year. In July of 1963, professor Richard D. Kopa has developed and is testing on automobiles a device that returns exhaust gases to the combustion chamber, thereby reducing nitrogen oxide in auto exhausts by 80 percent. In September of 1963, professor John Lyman is examining how amputees might be able to control artificial limbs, with more skill and less effort than they can with existing prosthetic devices, by using various chest and back muscles. By this method, amputees could be grasping something with the artificial limb, while rotating the wrist simultaneously, since current prosthetics do not allow such multiple function. In September of 1963, with the help of UCLA engineers assigned to the Gadjah Mada project, Indonesia launches its first rocket. Students from the Gadjah Mada Rocket Club, with the assistance of UCLA professor Alex Petroff, designed and built the 40″ x 1 1/2″ black powder-powered rocket. In December of 1963, Richard D. Kopa has developed a fuel atomizing carburetor that sprays fuel into the engine. The device works in conjunction with his exhaust gas recycling controller to reduce pollution in auto exhaust. In January of 1964, professors Albert F. Bush and Herbert B. Nottage prepare to field test an infrared detector that can determine levels of carbon dioxide concentration in the air. The researchers plan to have a detector that will be carried throughout California in a mobile unit, measuring smog concentrations above parks, traffic intersections, industrial plants and residential areas. In January of 1964, it is reported that the College of Engineering spent $2 million on approximately 100 research projects in fiscal year 1962-63. The heaviest research concentration is in the area of water resources and sea water conversion, followed by air pollution and traffic studies. Other areas of research include cargo handling, earthquake effects, fluid motion and sound, metal stress, plasma properties, solar energy, structural design, and artificial limbs. In February of 1964, an automatic control system coupled to a dynamometer has been developed at the College of Engineering to simulate actual road trips and test the effectiveness of anti-smog devices. With the dynamometer system connected to a treadmill placed under the rear tires of a car, exact speeds can be maintained, or a simulated trip can be repeated accurately time and time again. Looking forward to a time when California will require periodic checks on smog control devices on all cars, the researchers suggest that controlled dynamometer systems may become essential equipment in test stations and service stations. In July of 1964, professors Cornelius T. Leondes and Allen R. Stubberud are developing a system to feed retargeting commands to a missile at the launch site, rather than the current system of routing commands through computers at SAC headquarters. The research, sponsored by the Ballistic Systems Division of the Air Force Systems Command, is also applicable to development of computer systems to control industrial processes, guide and control space vehicles, and automatically navigate ocean freighters. In October of 1964, professor Gerald Estrin has successfully linked a computer to multiple processors to create a “Fixed Plus Variable Structure Computer.” The computer controls the operation of the other processors, and is able to correct the human programmer when a poor selection is made. The “Fixed Plus” computer can do problems hundreds of times faster than conventional computers, and can even design other computers from start to finish. In May of 1965, Algirdas Avizienis reports to the International Federation for Information Processing Congress his development of a method for programming computers to diagnose themselves for errors. He will initially test this method on a NASA research project in spacecraft guidance. The method could allow replacement of multiple back-up computers now used. In June of 1965, the world’s first reverse osmosis plant begins operation in Coalinga, a farming community near Fresno. The plant, designed and constructed by UCLA engineers, uses the new method of water desalination called reverse osmosis, first demonstrated by UCLA’s Sidney Loeb and Srinivasa Sourarijan in 1959. The plant will turn brackish well water into drinkable water for the community, producing 6,000 gallons of water per day. The reverse osmosis process reduces the water’s salt content from 2,500 parts per million to under 500 parts per million, the recommended standard for drinking water. In June of 1965, UCLA engineers working at the UCLA Child Amputee Project modify an automobile so that an 18-year-old youth, born without arms and only rudimentary legs and feet, can drive. The steering and acceleration are controlled by a U-shaped device attached to the modified accelerator and linked by a power system to the steering wheels. Ignition and transmission are controlled by the right foot also, and braking, and control of light switches, window controls, and windshield wipers are controlled by the left foot. Using this vehicle, the youth is able to successfully pass his road test, and the state issues him a driver’s license. In June of 1965, assistant professor Gershon Weltman and Glen H. Egstrom, director of the UCLA Performance Physiology Laboratory, are investigating some of the basic problems man faces working underwater. As its first project, a research group has developed an underwater restraining device to hold a diver in place while testing his field of vision through different face masks or while measuring the force of his kicking thrust. The group plans to develop instrumentation for freely-moving divers that will measure the human energy required in undersea work, and analyze the changes which occur in the body in deep water. On January 12, 1966, faculty members who participated in the Gadjah Mada University project have a final meeting to wrap up the 10 year effort to establish university training in engineering in Indonesia. More than 100 graduates a year are now turned out at the university and nearly 100 students and faculty members from Gadjah completed coursework and training at UCLA. In April of 1966, R. B. Matthiesen schedules a seismic test of the new Math Sciences Building under construction using a shaker device. The device consists of two counter-rotating buckets, each filled with 700 pounds of lead, which vibrate the structure slightly when the shaker is bolted to the foundation flooring. The “baby earthquake” provides data for engineers to determine the stability of the building. In June of 1966, the first UCLA College of Engineering Alumnus of the Year award is presented during commencement ceremonies to Raymond M. Hill, newly appointed chief of the Los Angeles City Fire Department. Hill earned his bachelor’s degree in engineering in 1955, specializing in chemical engineering and math. On Friday, August 26, 1966 it is announced by University President Clark Kerr and Chancellor Franklin D. Murphy that Chauncey Starr is named new Dean of the UCLA College of Engineering. Starr will assume his new duties on January 1, 1967. In October of 1966, Eldon L. Knuth reports findings on scattering of atoms off of materials that simulate spacecraft during flight. To replicate a spacecraft orbiting Earth at 25,000 miles per hour, Knuth produces a molecular beam with which he blasts particles at a variety of materials. The results will help in the design of spacecraft for high-speed flight as well as for the high heat of reentry. In November of 1966, professor John Lyman is interviewed by Walter Cronkite for a CBS-TV documentary series on “The 21st Century.” Lyman foresees many breakthroughs triggered by advances in materials, molecular biology, and integrated circuits, including artificial kidneys and hearts that work better than original organs, and artificial brains, perhaps coupled directly to man’s brain. By the 22nd Century, he says, man will control weather, fully exploit the ocean’s and the earth’s interior, and move even further into space. Humans may even be whisked across vast distances through teleportation, Lyman speculates, in which a person’s entire genetic code would be fed to a computer, and flashed to a receiving computer on the moon or another planet, where it would be instantly reconstructed into the person who stood on earth a few seconds earlier. In December of 1966, professor Moshe F. Rubinstein publishes a book titled “Matrix Computer Analysis of Structures,” which explains a way to analyze the earthquake-safety of a building on the computer, before a drop of cement is ever poured. By feeding the computer information on the shape of the structure, its separate parts, and types of material, the computer can predict the stresses and strains on the building when subjected to earthquakes, strong winds or other forces of nature, as well as the normal loads of equipment and people, Rubinstein says. In April of 1967, George A. Hoffman from the Institute of Transportation and Traffic Engineering suggests a hybrid gas-electric vehicle that would utilize electric motors at each wheel. The vehicle, Hoffman says, would consist of an internal combustion engine of a rating much reduced from the conventional motor that it supplants, and would drive, at its optimal speed, a generator. The generated electric power goes to the traction motors (integral with all the wheels) and to a sizable secondary battery, also connected with the four electric motors. Depending on speed and terrain, computer controls would determine the combinations of engine power and electric power to serve the greatest utility. In July of 1967, responding to the explosion of worldwide transportation (from cargo jets to barge-carrying ships and high-speed trains), faculty are creating computer systems to give a helping hand in finding the most efficient and cost-effective route. Using the TRANsportation SIMulator or TRANSIM, thousands of decisions and factors that go into moving commodities from one place to another are run through a computer to come up with an accurate analysis of cost, time, and operational problems for a planned route. The project is under the direction of associate dean Russell R. O’Neill and Alfred M. Feiler. In August of 1967, assistant professor John A. Dracup is heading to the arid stretch of Coahuila in north central Mexico as part of a long range project by the University’s Dry-Lands Institute to help solve the basic problems plaguing the world’s water-starved areas. By coordinating damming activities near watersheds and a planting program, Dracup hopes to increase the amount of run-off water available for agriculture use. In May of 1968, George Hoffman uses an electron microscope to probe the makeup of ancient coins and detect forgeries. Using the microscope, an electron beam is focused on a tiny spot of the coin, which reflects the X-rays. After the data is run through a computer, an analysis of the angles and intensities of the X-rays shows the metallic composition of the coin. Because many ancient coins contain faint traces of gold, lead or other metals, depending on when and where they were struck, Hoffman has been able to use these “metallurgical signatures” to detect forgeries. In February of 1969, a small group of professors from the College of Engineering and the School of Medicine is expanding its specialty of cybernetics through courses and research. The researchers are examining the possibility of connecting a device that detects brain waves and can transmit signals to paralyzed limbs. This by-pass system would, for example, send a “clench fist” signal to the muscle of the paralyzed limb. Engineers accomplishing the research include professors Edwin B. Stear and Jacques Vidal, psychiatrist John Shanley, and engineering student Lloyd Nirenberg. On Feb. 21, 1969, upon recommendation of UC president Charles J. Hitch and UCLA Chancellor Charles E. Young, the Regents approve changing the existing College of Engineering to the School of Engineering and Applied Science, effective fall quarter 1969. The aims and programs of the new School will put into practice the chief recommendations proposed in two studies on engineering education. Both reports call for an upward shift in the educational level of engineers in the face of the accelerating knowledge explosion and the crucial social role of the engineer. In April of 1969, a reverse osmosis plant for purifying sea water into drinking water goes on line in La Jolla. The plant, designed and constructed by UCLA engineers using membranes for reverse osmosis first demonstrated by UCLA in 1959, can purify the sea-water in one pass through the system. Using tubes filled with membrane liners, the salt content of the water is reduced from 35,000 parts per million to a level of 500 ppm required for drinking water. The project team includes professors Joseph McCutchan and Douglas Bennion, research engineer Stephen Johnson and Edward K. Selover. On July 3, 1969, it is announced that UCLA will become the first station in a nationwide computer network which, for the first time, will link together computers of different makes and using different machine languages into one time-sharing system. Professor Leonard Kleinrock, who heads the UCLA project, says creation of the network represents a major forward step in computer technology and may serve as the forerunner of large computer networks of the future. The ambitious project is supported by the Defense Department’s Advanced Research Projects Agency. On September 25, 1969, formation of seven departments within UCLA’s newly established School of Engineering and Applied Science is announced by Dean Chauncey Starr. Starr says the departments have been organized by “broad areas of learning and research rather than by the end use to which a graduate will put his academic background on his first job. In November of 1969, a study by Edward Levonian of the Institute for Transportation and Traffic Engineering, says that the personality trait of “expedience” in youngsters is often related to a record of driving violations. The research psychologist defines expediency as “orientation toward self-benefit at the expense of others, or, less formally, as looking out for number one, even if it means hurting someone else.” The results are based on a 220 item questionnaire given to 1,080 15-year-old students enrolled in driver’s education classes in City of Los Angeles high schools. In February of 1970, the success of a two-year effort to implement the Engineering Special Education Program to help high school seniors from minority groups meet the academic qualifications to enroll at UCLA is reported. The program was begun by UCLA engineering seniors Jim Murray and Ronald Fountain, and then supported by professor Morris Asimow. Under the program, 32 students from Compton, Centennial, and Dominguez high schools serve six months as engineering aides at UCLA, with some of them developing a design for improved housing in Compton. In August of 1970, Ruth Ann Bobrov Glater determines by examining plant damage in Los Angeles that the levels of nitrogen oxides in smog are increasing. Whereas an excess of hydrocarbons in smog had been causing leaf damage on some vegetable crops (such as lettuce, spinach and beets) and ornamental flowers (dahlias, petunias and fuchsias) between 1940 and 1960, thereafter a different type of damage, that causes plants’ lower leaves to drop off, was occurring. This type of damage, Glater says, signals an increase in concentrations of nitrogen oxides resulting from auto and aircraft engine emissions. In May of 1971, professor Albert Bush warns of possible health hazards from the breathing of thousands of tiny particles invisible to the eye that exist in polluted air. Bush says that the particles are small enough to slip past nasal passages and be deposited in the respiratory system or lungs and that gaseous irritants may adhere to the surfaces of tiny particles and be carried by them to the eyes and respiratory system. In May of 1971, Fred Allen from the School of Engineering and Earl Collard of the School of Dentistry have developed an electronic device that allows a person to hear through the teeth. A wristwatch receiver-transmitter receives either radio frequency or audio signals and translates them into vibrations of the teeth through a device fitted inside a dental bridge. The vibrations are transmitted through the tooth, jaw and cranial bones to the inner ear, allowing a person to hear. In July of 1971, professor John D. Mackenzie responds to the needs of an Imperial Valley rancher and develops a method of mixing cow dung and waste glass to produce a lightweight, building material that doesn’t burn, is waterproof, an excellent thermal and noise insulator, can be painted, nailed, drilled, sawed and glued together, and is cheap and easy to produce. Mackenzie notes that the material is also odorless. In July of 1972, five engineering students have modified a 1972 American Motors Gremlin with a Ford “Boss” 351 engine to run on hydrogen gas and are preparing to enter it in the Urban Vehicle Design Competition scheduled in August. Lab tests indicate that the car will not only beat the scheduled 1976 pollution control standards but will actually emit slightly cleaner air than it takes in. Student designers of the vehicle include Frank Lynch, Joe Finegold, Ned Baker, Bob Takahashi, and Johnny Lu. Their faculty sponsor is Albert Bush. In August of 1972, the results of a study on women in engineering led by associate dean Alfred Ingersoll concludes that more women are being attracted to the engineering profession, but the lack of role models and the “executive suite barrier” prevents them from moving into upper level jobs in engineering management. Practicing women engineers make up less than one percent of the engineering work force, Ingersoll notes, while women represent half of the nation’s technical talent pool. In September of 1972, the UCLA team has won the 1972 Urban Vehicle Design Competition with their hydrogen-powered Gremlin. The team would like to now develop solid hydrogen storage methods which could eliminate weight and storage problems of using hydrogen gas to power the vehicle. In April of 1974, it is announced that professor Rointan F. Bunshah has developed a new material called titanium carbide, second only in hardness to diamond. Described by a colleague as “easily the most startling material development in many years,” titanium carbide promises to have a wide range of uses, especially as a super-hard coating for cutting, drilling, and grinding tools. In May of 1974, professors Douglas N. Bennion of UCLA and John Newman of UC Berkeley announce development of a low cost, non-polluting process for recovering copper from ores and scrap metal. Using a concentrating cell, the electrochemical process yields high concentrations of copper, and can also be used to recover mercury, lead, cadmium, silver, and gold. In January of 1975, a UCLA space experiment to investigate the formation of optical fibers is being prepared for launch to orbit as part of the joint Apollo-Soyuz Test Project mission. Aboard the spacecraft, a small electrical furnace will use elements to fuse together optical fibers into a matrix, providing qualities that cannot be obtained using earth-bound laboratories. Professors Alfred S. Yue and Cavour W. Yeh predict that these light-transmitting fibers could vastly improve telephone and television communications. In June of 1975, wide ranging research into computer networks is led by professor Leonard Kleinrock and funded primarily through grants from the Advanced Research Projects Agency (ARPA). On-going ARPA-funded research has expanded to include performance evaluation of computer networks and the study of advanced packet switching in satellite and ground radio environment. In June of 1975, doctors and engineers are joining together to work on projects such as development of artificial joints and organs, electronic instrumentation for medial diagnosis and treatment, life support systems, and injury prevention in automobile accidents. In December of 1977, the world’s last working model of a mechanical differential analyzer is donated by UCLA to the Smithsonian Institution for their pioneering computing displays. The differential analyzer, first used at UCLA in 1947, introduced much of Southern California industry to automatic computing. In May of 1978, professor T.H. Lin is developing improved stress-strain relations for metals subject to multiaxial stress. Lin is devoted to developing a physical theory of creep of metals, which has particular importance when designing structures that are subjected to mechanical loading at elevated temperatures. In June of 1978, the Engine and Fuels Laboratory under the direction of professor William D. Van Vorst has been upgraded and now permits on-line sampling of unburned hydrocarbons, carbon dioxide and monoxide, oxygen, and nitric oxides in auto exhaust. Efforts are directed at investigation of fuel additives and their effect on performance and emissions, with the results applied to the development of engines and fuels that will maximize fuel economy and produce minimum air pollution. In July of 1978, professor Sheldon K. Friedlander has developed a laboratory for the study of aerosol behavior, including use of optical particle counters capable of measurements in the .1 to 5 micron range. Friedlander is examining new theories on nucleation in a reacting gas, and suggests classic nucleation theory may have to be modified as applied to smoggy atmospheres and process gases. In January of 1979, Dean Russell R. O’Neill journeys to the People’s Republic of China with a UCLA delegation to explore future academic relations and possible exchanges between the two nations. UCLA was selected as one of six U.S. universities to be linked with a major Chinese institution. In May of 1979, students are working on projects in the field of solid state electronics with faculty direction: professor Fred G. Allen is studying the energy loss of hot electrons on thin semiconducting films; Oscar M. Stafsudd is studying low temperature deposition techniques to make low-cost silicon material for solar cell applications. In September of 1979, under the direction of professor Gary Hart, the Full Scale Earthquake and Wind Laboratory is gathering data on the response of existing structures to earthquakes. At Century City, Santa Barbara, and other locations in the state, instruments have been placed in buildings to measure motion. Should the ground move, the building moves the instruments and the information is transmitted over telephone lines to a central recorder on campus. In October of 1979, professor D. Lewis Mingori and students are involved in studies related to controlling the orientation of and the shape of large flexible spacecraft. The research is directed at understanding how best to locate actuators and sensors for controlling the orientation of large space arrays. In August of 1980, professor Andrew F. Charwat is expanding on a reversible energy storage technique for automobiles that involves the use of rubber bands as “collectors.” By connecting the wheels to the movement of the pistons using a series of rubber bands, energy could be stored during braking and then released during acceleration, saving on fuel consumption, Charwat says. On October 9, 1980, the Crump Institute for Medical Engineering is established and F. Eugene Yates is named director. The institute is an expansion of the research involvement between engineers and medical professionals that began with formation of the Institute for Medical Engineering in 1976. Much of the impetus and most of the funding comes from Ralph and Marjorie Crump. Ralph E. Crump is a 1950 graduate of the UCLA College of Engineering and president of Frigitronics of Bridgeport, Conn. The company specializes in the development and manufacture of medical instruments, many invented by Crump himself, particularly for use in cryogenic (low temperature) surgery. In November of 1980, professor Michael K. Stenstrom is using roof-top digesting machines to research ways to boost methane production during a sewage sludge process. By feeding the process with the right type of micro-organic nutrients, Stenstrom has been able to produce an end product that is 65 percent methane. The project is sponsored by Southern California Edison, which sees methane as a clean, low sulphur fuel for power plants. In June of 1981, professor Poul Lade is focused on the mechanisms that determine ground-surface offsets above a dip slip earthquake fault. By using mathematical formulas based on laboratory results in which faults were identically simulated, researchers arrive at an accurate prediction as to how the soil above the fault will react when it begins to move. In August of 1981, professor Bruce Dunn is involved in a variety of research areas in materials science, including researching possibilities for synthesis of solid state batteries and sensors, and, in the biomedical area, examining use of polymers for the replacement of finger joints to aid patients suffering from severe arthritis. In May of 1982, pioneering research is carried out in the field of molecular beam epitaxy (MBE), one of the major advances expected to have a large impact on the electronic devices of the 1980s. MBE is a process by which layers of one single crystal material are grown on top of another single crystal material. The minute layering process enables construction of smaller and faster semiconductor circuits. In June of 1982, faculty at the School’s Water Resources Center have completed modeling work on the Central Arizona Project, which represents the first application of mathematical programming to the optimal operation of an aqueduct system. The CAP is a modern aqueduct system scheduled to deliver Colorado River water entitlements to urban, agricultural and industrial users in Central Arizona. The UCLA model determines the best flow necessary to meet water demand by analysis of water management using the capabilities of the system’s open channel aqueducts, tunnels, check gate structures, inverted siphons, pipes, and relift pumping stations. In July of 1982, faculty in the materials department are investigating a class of composites based on a new principle called “transformation toughening.” The process reduces the propagation of cracks in such materials, increasing “flexural strength” by 60 percent. Such toughened ceramics will have applications as cutting tools, hip-joint replacements, and improved artificial teeth. On November 15, 1982, doctors and engineers at the Crump Institute hold a press conference to feature new research into infant sleep patterns and a solution to the abnormal patterns that may cause sudden infant death syndrome (SIDS). By putting sensors beneath an infant’s crib, researchers determine the movements of an infant. A teddy bear that “breathes” by having its chest expand is placed in the crib. Researchers determined that when the teddy bear is made to breathe, the infant goes to it and sometimes cuddles it. By helping regulate infant breathing patterns, the incidence of premature disease or death can be avoided. Research has shown that infants who sleep fitfully in the first six weeks of infancy are prone to early health problems, whereas infants with stable breathing patterns typically lead normal lives. In February of 1983, the Minority Engineering Education Center is opened and dedicated to serve as a focal point for the School’s efforts to enroll and retain an increasing number of students from underrepresented minority groups. The center is an outgrowth of a long-standing program for introducing select high school students from minority groups to the study of engineering. In December of 1983, professor Algirdas Avizienis is refining techniques for fault tolerant computers, a technique he developed at Jet Propulsion Laboratory in 1967 when he designed the STAR (Self Testing and Repairing) computer. In addition to refining the error-catching mechanisms in the computer hardware, he has extended his efforts so that the system will also diagnose and neutralize human mistakes in both software programming and circuit design. In February of 1984, a photo-electric mixing tube, the heart of an eight-year-long experiment at UCLA that gave birth to the field of quantum optics, was given to the Smithsonian Institution. The device, invented by professor A. Theodore Forrester, is the second of Forrester’s inventions to be included in the Smithsonian collection, the other being his ion propulsion engine put on display in 1964. In May of 1984, UCLA’s first hydrogen-powered car, a 1972 Gremlin, is sold for one dollar to Harrah’s Automobile Museum in Reno, Nevada, where it went on display. In June of 1984, it is announced that UCLA will decommission its training and research reactor and that the Nuclear Regulatory Commission has been notified that UCLA will withdraw its application to renew the operating license for the reactor. The reactor operated safely from startup in 1960 through shutdown on Feb. 3, 1984. In December of 1984, in order to test the feasibility of a CalTrans program to retrofit freeway bridges to reinforce them against earthquakes, professor Larry G. Selna and students construct a massive bridge-tester capable of exerting 1.5 million pounds of pull. Using the device, the UCLA team constructs bridge joints utilizing the “pinning” method” suggested by CalTrans, and then evaluates the design using the bridge-tester. The UCLA team determines during the first nine tests that the method of tying bridge spans together with cables is insufficient. In May of 1985, UCLA joins an international team to solve the technological challenges for creating nuclear fusion, seen as the power source for the next century. Using UCLA’s Plasma Interaction Surfaces Components Experimental Simulator, the UCLA team, led by professor Robert W. Conn, tests different materials for use inside the superhot fusion reactor of the future. In October of 1985, a group of five professors has been awarded a three-year contract as part of a Strategic Defense Initiative project looking toward the design of large, innovative nuclear power reactors for use in space. The UCLA team pursues the project in conjunction with two other universities and four private companies. Their unclassified research seeks to design reactors applicable to missile defense in space, as well as to manned space stations and deep space exploration. In February of 1986, a team of student and visiting Japanese engineers assist professor Ajit K. Mal in mapping microtremors in the San Fernando Valley. The Valley is divided into 50 observation sites two miles apart, each at which the team uses portable instruments to take microtremor readings. Using the readings, the team hopes to determine the potential for earthquake damage by examining the resonance of various soil types. In April of 1986, 14-year-old Revital Elitzur has enrolled as an engineering student under the University’s gifted student program. The girl is one of a number of superachievers admitted to UCLA’s program from the past seven years. As a high school student she tutored college students in calculus to help earn the money to enroll at UCLA. In May of 1986, a new fusion generator called a “tokamak” built at UCLA begins operation. It is the world’s first continuous current tokamak (from Russian TOroid KAmera MAgnit Katuchka), and will be used in the development of nuclear fusion, a limitless and “clean” source of energy, by imitating and harnessing on earth the same processes that make the sun shine. The 16 1/2 foot doughnut-shaped device stands eight feet high and has viewing portals that also allow a person’s entrance into the inner chamber of the device for repairs and maintenance. The project is led by professor Robert J. Taylor under a grant from the Department of Energy. In June of 1986, Hewlett-Packard donates $2.5 million worth of computer workstations to the computer science department to advance teaching in artificial intelligence. Each workstation has a computer using the Motorola 68020 processor with seven megabytes of RAM and 110 megabytes of hard disc storage. In June of 1986, under a grant from the National Science Foundation, assistant professor Guy Felio performs field tests in Mexico City to probe the causes of building collapse during the 8.1 Richter scale earthquake that struck the city Sept. 19, 1985. Many of the structures rested on heavy piles driven deep into the ground, and it is this aspect of structural failures that Felio is investigating. In June of 1986, professors Rointan F. Bunshah and Oscar M. Stafsudd report development of a major advancement in semiconductors. The semiconductor is made of thin layers of beta silicon carbide and promises a “significant breakthrough in the size, power, speed, operating temperature and radiation resistance of solid state semiconductor devices and integrated circuits,” the researchers say. In September of 1986, professor Vincent L. Vilker has overturned commonly held beliefs on the removable of solvents contaminating groundwater. It was thought that no natural mechanism could destroy the solvents, but Vilker creates a biological recipe for a class of enzymes that “chew right through” the polluting toxins, called low molecular halocarbons (LMH). Vilker was pointed to the discovery by realizing that ether is an LMH, and that patients anesthetized with ether obviously recovered so must metabolize the gas in some manner. Vilker’s clue was discovered in the enzymes of the liver, which he replicated and modified in the laboratory to digest solvents. In February of 1987, veterinarians at the Wildlife Waystation in Little Tujunga Canyon are preparing to perform dental surgery on a 500-pound Siberian tiger named Reesha. The tooth repair is enabled by a heated, multi-position surgery table built by faculty, students and staff at the School of Engineering. Professor Alexander Samson, and staff members Joe Becker and Helen Hill manage the project from start to finish in building the unique operating table, which can support animals up to 1,600 pounds. On March 23, 1987, establishment of an $18 million center at the School of Engineering and Applied Science for research on toxic and other hazardous wastes and byproducts is announced by the National Science Foundation. The center, named the Engineering Research Center for Hazardous Substances Control, is the first of its kind at any American university. Professor Sheldon K. Friedlander is appointed director and principal investigator for the center. Friedlander notes that the cost of managing hazardous waste is approaching $10 billion annually for industry. In October of 1988, UCLA and IBM announce a $5 million study to connect separate IBM and other network computer systems at UCLA into one large network. The task will be to get users of networks based on IBM Systems Network Architecture (SNA) to “talk” easily with those based on the Transmission Control Protocol/Internet Protocol (TCP/IP) and vice versa. In April of 1989, volunteers from the School of Engineering are preparing to use a device they constructed to transport a 14-year-old African lion to a nearby operating room for tooth surgery. Professor Alexander Samson, staff members Helen Hill and Joseph Becker, and a team of seven students built the motorized gurney, which successfully moves the anesthetized lion from its quarters at the Wildlife Waystation across the grounds to the nearby operating room. The Half Track Limp Animal Transporter, the only one of its kind, enables two people to move a large animal such as a cougar or bear, where before 12 to 14 people grunted and sweated to do the job. In May of 1989, professor John Dracup testifies before a U.S. Senate Committee on the likely impact of climatic changes on water resources for agricultural, industrial and residential use. If the current trend toward global warming continues, Dracup says, it may threaten seasonal water balance in the American West, raise the cost of water to consumers and require additional construction of large dams and aqueducts. If snow lines and freezing elevations on mountains climb higher, winter precipitation will fall as rain rather than snow, consequently changing runoff patterns and triggering heavy winter floods and a corresponding decrease in streamflow during late spring and summer. UCLA researchers have developed a new polymer solar cell that is 70% transparent to the human eye. The cell produces energy by absorbing infrared light, and may someday allow windows in homes or buildings the ability to generate electricity, while still allowing people to see outside. (August 2012) Research led by: Carol and Lawrence E. Tannas Jr. Chair in Engineering Professor Yang Yang, Rui Zhu, Chun-Chao Chen, Letian Dou, Choong-Heui Chung, Tze-Bin Song, and Steve Hawks.
2019-04-23T23:58:23Z
https://samueli.ucla.edu/history/
In this study we employed the TAP tag purification method coupled with mass spectrometry analysis to identify proteins that co-purify with Escherichia coli RNase R during exponential growth and after temperature downshift. Our initial results suggested that RNase R can interact with bacterial ribosomes. We subsequently confirmed this result using sucrose gradient ribosome profiling joined with western blot analysis. We found that RNase R co-migrates with the single 30S ribosomal subunits. Independent data involving RNase R in the rRNA quality control process allowed us to hypothesize that the RNase R connection with ribosomes has an important physiological role. This study leads us to conclude that RNase R can interact with ribosomal proteins and that this interaction may be a result of this enzyme involvement in the ribosome quality control. RNase R is an important Escherichia coli exonuclease[1, 2]. The enzyme is distinguished from other exoribonucleases by the ability to degrade RNA secondary structures without the aid of a helicase activity[3–5]. It is able to degrade these secondary structures only in the presence of a 3′ single-stranded overhang to which it can bind and initiate degradation. The structure of this protein remains unknown and most of the knowledge on RNase R structure is based on the available structures of RNase II and Rrp44. RNase R has a RNB catalytic domain flanked by RNA binding domains: CSD1 and CSD2 located at the N-terminus and a C-terminal S1 domain, following the typical modular organization on RNB family of enzymes. RNase R was shown to be involved in several cellular processes. It is a cold induced protein suggesting its involvement in bacterial adaptation to low temperatures. Its importance for RNA metabolism in the cold relies on the ability to remove highly structured RNAs that are stabilized under these conditions. RNase R takes part in the degradation of mRNAs, and is especially important in the removal of mRNAs with stable stem loops such as REP elements. In vitro this enzyme is able to digest highly structured RNAs like rRNA suggesting that RNase R is involved in the removal of these molecules in vivo. Some helicase activity independent on exonuclease activity was shown for RNase R. Moreover, RNase R in concert with PNPase was shown to be involved in rRNA quality control. Recent studies show that RNase R is involved in ribosome quality control and degradation, working together with the newly discovered endonuclease YbeY. In stationary phase or upon drop of the temperature, RNase R transcript and protein are considerably stabilized. Due to its stabilization, RNase R levels increase dramatically with an increase of about 10 fold upon a temperature downshift and about 2 fold in stationary phase. Protein stability changes rely on the specific acetylation of the C-terminal Lys544 residue. Acetylation of the Lys544 residue regulates the tmRNA and SmpB binding to the C-terminal region of RNase R. In stationary phase the acetylating enzyme is absent. As a consequence tmRNA and SmpB bind poorly to the C-terminal region of RNase R and the enzyme is stable. Large-scale analysis of protein complexes in E. coli growing under exponential phase did not detect strong interactions between RNase R and other proteins. However, immunoprecipitation studies suggest that RNase R may interact with other proteins such as the components of tmRNA machinery. In this study we employed the TAP tag purification method together with mass spectrometry to identify the proteins that co-purify with RNase R after a temperature downshift and in exponentially growing cells (See Additional file1). Despite not having identified any stable complexes, our RNase R purifications were enriched with ribosomal proteins. This enrichment was still observed after RNase A treatment suggesting that RNase R could be bound to the ribosome. At least for rRNA degradation, it was shown that PNPase works in concert with RNase R in the ribosome quality control process and only the deletion of both proteins gives a lethal phenotype characterized by the accumulation of undegraded, deficient ribosomal subunits. Moreover, while this manuscript was in review an independent laboratory came out with similar evidences using different approaches. Our results using sucrose polysome gradients combined with western blot technique demonstrated that in vivo most of the RNase R signal is connected with the 30S ribosomal subunit. All of these results, together with reports on the involvement of RNase R in ribosome quality control, show that RNase R interaction with the ribosomes may be an important physiological phenomenon. We used the TAP tag purification method to obtain information about proteins interacting with RNase R in vivo (Figure 1A). The TAP tag sequence followed by a kanamycin resistance cassette was integrated into the E. coli genome to form a C-terminal translational fusion with RNase R protein. A control strain with one of the RNA polymerase (RNAP) subunits - rpo C fused with a TAP tag was also constructed. Since RNAP is a well-defined protein complex, it served as a control for our purification method. Additionally, we created a strain with RNase R protein fused with GFP that served as a negative control for TAP tag purification. Preparation of E. coli strains and TAP tag purification. (A) Schematic representation of λ Red recombination strategy. PCR cassettes containing TAP tag sequence followed by kanamycin resistance gene (Kan) and flanked by FRT (flip recombinase targets) sites were prepared using primers with overhangs homologous to the sequences surrounding STOP codon of the chosen gene (gene X). After recombination TAP tag forms C-terminal translational fusion with the protein product of chosen gene. (B) Accuracy of the fusion proteins was monitored by western blot. Total bacterial proteins were subjected to western blot using α-RNase R antibodies (αRNR) or α- Calmodulin Binding Protein antibody (αCBP). Due to protein A in the TAP tag sequence the signal from RpoC-TAP fusion can be observed using α-RNase R antibodies. (C) Level of RNase R-TAP increases in a similar fashion as RNase R upon cold shock. Total bacterial proteins were subjected to western blot using α-RNase R (αRNR) antibody. Ponceau stain is provided as the loading control. ex- cells grown at 37°C until OD 0,5; cs- cells grown at 37°C until OD 0,5 and subsequently moved to 15°C for 4 h. (D) TAP tag purification of fusion proteins. Proteins from strains expressing RNase R-TAP, RpoC-TAP, or RNase R-GFP were purified, final elutions from calmodulin resin were separated on SDS-PAGE gel. Chosen bands (indicated by frames) were extracted and proteins were identified using mass spectrometry. Position of fusion proteins in the gel is indicated with stars. Chosen clones obtained after integrations of the cassettes were monitored by western blot to confirm the presence of the fusion proteins (Figure 1B). Additionally it was verified that C-terminal TAP tag fusion does not affect RNase R induction after temperature downshift (Figure 1C). The first purifications were performed according to the standard TAP tag procedures. We detected sufficient amounts of target proteins in the final elutions in the case of both fusion proteins (Figure 1D). Analysis of Coomassie-stained SDS-PAGE gels showed almost no background on the RNase R GFP fusion purification which proved specificity of the method used. In the case of the RpoC TAP fusion we saw enrichment on other RNAP subunits in the final elutions. One of the bands was extracted and mass spectrometry analysis proved that it corresponded to the RNAP subunit RpoA. In the RNase R-TAP fusion purification we mainly detected our target protein in the final elution, although there was some background enrichment compared to RNase R-GFP preparation. This result suggests that RNase R does not form stable complexes and that eventual interactions are rather transient. Similar results were obtained in several independent experiments using cells grown under different conditions (cold shock, exponential or stationary phase), and varying the amount of the background signal between the experiments (data not shown). Even though stable complexes formed by RNase R were not detected, some bands were found to be enriched in the RNase R-TAP preparation in relation to RNase R-GFP and RpoC-TAP. One of these bands was extracted from the gel and subjected to mass spectrometry analysis; which resulted in the detection of three ribosomal proteins: RpsD, RpsC and RplC (Figure 1D). In order to obtain more comprehensive information about the transient interactions caused by RNase R we subjected the whole elution fraction to mass spectrometry analysis. For this analysis we chose the material obtained from cells subjected to cold shock treatment, since in this condition purification was the most efficient, probably due to increased levels of cellular RNase R. We detected 212 proteins in the RNase R-TAP elution and 65 proteins in the control RpoC-TAP elution. Mass-spectrometry data were subsequently subjected to the label free quantification using MaxQuant software, which allowed relative values to be obtained that corresponded to the amount of each protein in the sample (intensity values). In the graphical representation of the results the intensity values of the proteins identified in RNase R and RpoC samples were plotted against the specificity value of the protein in the samples. Specificity value corresponds to the ratio between the intensity of a given protein detected in the sample and the respective intensity of the protein in the control. Data obtained from RNase R-TAP purification were used as a control for the analysis of the data obtained from RpoC-TAP purification, and vice-versa. Proteins detected with the highest intensity in RpoC TAP purification were all main RNA polymerase components (Figure 2A). The intensity values of the RNAP complex components were comparable to the value obtained for tagged protein RpoC, confirming that we could purify a stable RNA polymerase complex. A decrease of specificity for some of the complex components was due to their detection in the RNase R-TAP preparation. Interaction between RNase R and RNAP could not be ruled out under the chosen experimental settings. Apart from the five RNAP subunits, proteins more loosely connected with RNA polymerase were also detected, proving the sensitivity of the method. Interestingly, two proteins of unknown function, YgfB and YmfI, were detected with relatively high intensity values, suggesting that they may cooperate with the bacterial RNA polymerase complex (Figure 2A). Mass spectrometry analysis of TAP tag elutions. Calmodulin elutions from RpoC-TAP or RNase R-TAP purifications were analyzed using mass spectrometry. Row data were subsequently treated by MaxQuant software for label free quantification of proteins amount in the sample (expressed as intensity value). In blue are represented the group of proteins that were detected with higher scores. (A) Proteins identified in RpoC-TAP sample. Intensity values of all proteins identified in calmodulin elution (x-axis) were plotted with specificity value of each protein (y-axis). Specificity is expressed as protein intensity value in the sample divided by intensity of given protein in the control sample. RNase R-TAP was the control sample for RpoC-TAP purification. (B) Proteins identified in RNase R-TAP sample. Intensity values of all proteins identified in calmodulin elution (x-axis) were plotted with specificity value of each protein (y-axis). RpoC-TAP was considered as control sample for RNase R-TAP purification. (C) Changes of protein content of RNase R-TAP elution sample in response to RNase A treatment. Intensity values of proteins detected in RNase R-TAP elution (RNRTAP) were plotted against intensities of proteins detected in RNase R-TAP sample from the experiment where RNase A was included into purification steps (RNRTAP + RNase A). Points with intensity values over threshold of 109 are highlighted. (D) Changes of protein content of RNase R-TAP elution samples collected from exponentially growing cells compared to cells after cold shock (RNRTAP). Intensities of proteins detected in samples collected from the cells grown in different conditions were plotted. Points with intensity values over threshold of 109 are highlighted. Proteins detected in the RNase R TAP sample generally had much lower intensity values compared to the tagged RNase R, going in agreement with the results observed with SDS-PAGE gels, and confirm the lack of stable complexes formed by RNase R (Figure 2B). Surprisingly, most of the proteins detected with relatively high intensities were ribosomal components. As in the case of RpoC-TAP, the specificity values of many proteins decreased due to its detection in the control sample. In order to check whether ribosomal proteins co-purified with RNase R due to an unspecific interaction provided by rRNA, we repeated the experiment adding RNase A during the purification steps. Results showed that after RNase A treatment the proteins detected with the highest intensities were still ribosomal components (Figure 2C). To check whether RNase R interaction with ribosomes was specific for cold shock, we performed mass spectrometry detection of proteins that co-purified with RNase R-TAP in exponentially growing cells. Comparison of the results showed that most of the proteins detected were the same under both conditions (Figure 2D). This suggests that interaction between RNase R and ribosomes is not an artifact of the growth conditions. There was a drop in the intensity value of RNase R obtained by mass spectrometry between RNase R TAP sample after RNase A treatment and the sample from exponentially growing cells. We consider it as a method artifact since this effect did not reflect the amount of RNase R in the sample estimated by SDS-page gels (data not shown). Analysis of the mass spectrometry data suggested that there can be physical interaction between RNase R and the ribosomes. To explore this we used sucrose polysome gradients and detected the RNase R position in the gradient using antibodies against RNase R. During centrifugation of total bacterial extracts in sucrose gradients, the soluble proteins stay at the top, whereas ribosomes migrate deeper into the gradient due to their size. The relation between the position of RNase R and ribosomes along the gradient should reveal eventual interactions between these two particles. The use of anti RNase R antibodies to detect the RNase R position in the gradient enables the observation of the behaviour of the endogenous untagged proteins. Western blot analysis of the gradient fractions showed that the RNase R signal reached maximal intensity not at the top of the gradient, as expected for soluble proteins, but a few fractions deeper (Figure 3A). Similar results were obtained for the cells grown at 37°C and the cells after the cold shock treatment; although cold shock treated cells gave a stronger signal due to the increase in the RNase R level. As a control we have used RNase II, a protein from the same family. In contrary to RNase R, RNase II does not migrate along the sucrose gradient. This protein remains mostly in the fraction of the gradient corresponding to the soluble proteins, showing no interaction with the ribosomes (see Additional file2: Figure S1). If we compare the signal intensity and position of the ribosomal subunits using less dense gradients, we can observe that the RNase R enrichment corresponds mostly to the single 30S ribosomal subunit. Interestingly, interaction between RNase R and the small ribosomal subunit protein S12, encoded by the rpsL gene, has recently been proposed, leading credence to our conclusions. After reaching its maximum, RNase R signal intensity decreased along the gradient, but it could still be detected in the fraction corresponding to the 50S subunit and until the peak of the 70S ribosome (Figure 3A,B). The weaker detection of RNase R in the 50S subunit can be explained by the interaction of this enzyme with DeaD (also known as CsdA). DeaD is a helicase involved in the biogenesis of the 50S ribosomal subunit and its deletion leads to the dysfunction in biogenesis of this ribosomal subunit. RNase R interacts with the small ribosomal subunit. Cellular extracts were separated on sucrose gradients. Position of ribosomal subunits, ribosomes and polysomes along the gradient were monitored by UV 280 absorbance (UV280). Amount of RNase R in each fraction of the gradient was monitored using western blot. Amount of proteins along the gradient was monitored by Ponceau stain. (A) 10-30% sucrose gradient. Polysomes were separated from exponentially and cold shocked cells. (B) 5-20% sucrose gradients. Polysomes were separated from exponentially and cold shocked cells. Difference in subunits migration between the gradients is due to longer centrifugation time of cold shock sample. (C) 5-20% sucrose gradients. Polysome from cold shocked cells were separated, part of the sample was treated with EDTA which results in ribosomal subunits separation. The treatment changes pattern of RNase R in the gradient indicating its interaction with ribosomes. Sample treatment with EDTA, which results in ribosome disruption and subunit separation, causes a change in the RNase R signal pattern, indicating that the position of RNase R in the gradient was due to an interaction with the ribosomes (Figure 3C). Our results show that RNase R in vivo interacts with the ribosomes. Data from independent studies suggest that RNase R is involved in the ribosome quality control[9, 10], so interaction with the ribosomes can be important for this function. Overexpression of RNase R rescues phenotype of DeaD helicase deletion at low temperatures. One of the phenotypes of DeaD deletion is the dysfunction in biogenesis of 50S ribosomal subunit[5, 21]. The suppressing role of RNase R suggests that it may also be involved in the ribosome biogenesis. If RNase R is important for ribosome biogenesis, deletion of this enzyme may cause changes in ribosome number or accumulation of deficient ribosome species. To check such a possibility, the sucrose polysome profile of an RNase R deletion strain was compared to those obtained with the wild type cells. Polysome samples were analyzed from the cells growing under different temperatures: 37°C, 20°C and after four hours of cold shock treatment (15°C). We did not noticed significant difference in polysome profiles between wild type and RNase R deleted strain in none of the conditions tested (Figure 4). The relative amount of whole ribosomes and the single subunits were comparable, as well as the amount of polysomes that reflect the conditions of the translation machinery. Also, no accumulation of new dysfunctional ribosome species was observed. We did not detect any significant difference after a prolonged incubation of the cells at low temperature (data not shown). This suggests that RNase R function in ribosome biogenesis is redundant and can be executed by other enzymes under its absence. RNase R deletion does not impact polysome profiles. Cellular extracts from RNase R deletion cells and wild type cells were separated on sucrose gradients. Samples were collected from the cells grown at different temperatures: 37°C 20°C and after cold shock (37°C followed by 4 h at 15°C). In this study we investigated potential interactors of E. coli RNase R using TAP tag purification in combination with mass spectrometry protein identification. Our results suggest that RNase R does not form stable complexes in vivo, but it can interact with ribosomal proteins. Surprisingly, among the proteins that co-purify with RNase R we did not detect any components of the trans-translation pathway, although interaction of RNase R with SsrA and SmpB complex was previously detected using SmpB immunoprecipitation. During trans-translation, RNase R is recruited to stalled ribosomes by an interaction of its C- terminal region with the components of the trans- translation machinery. Because in our experiments we used a C-terminal TAP tag fusion, part of the interactions in this protein region could have been lost. The detected interaction of RNase R with the ribosomes was supported by the analysis of sucrose polysome gradients with antibodies against RNase R. Endogenous RNase R migrates in the sucrose gradients in a similar fashion as the 30S ribosomal subunit. Moreover, treatment of the sample with EDTA changed the RNase R migration pattern. Previous studies suggested an interaction between RNase R and the 30S ribosomal protein S12, which is in agreement with our observations. Although our work proves an interaction between ribosomes and RNase R, we did not detect any difference in the ribosome profiles after rnr gene deletion. This suggests that whatever is the biological function of RNase R connected to the ribosomes it is redundant, and can be executed by other enzymes. Redundancy of exonucleases functions is common in E. coli and deletion of any of the three main exonucleases has any or minimal, effect on the cell fitness. Based on the results provided by other independent study we believe that the main function of RNase R connection with the ribosomes is its involvement in ribosome quality control. Recently, it was shown that RNase R together with YbeY nuclease can efficiently degrade deficient ribosomes in vitro, and this function is dependent on the presence of both enzymes. RNase R and YbeY can only degrade complete 70S ribosomes, but not single subunits. Although we observed that most of cellular RNase R signal co-migrates with the ribosomes at the sucrose gradient, it does not mean that all cellular ribosomes are linked with RNase R. Based on approximate estimations of protein copy numbers in the cell, we can predict that in exponentially growing cells ribosomes are at least 100 fold more abundant than RNase R, which means that RNase R is only connected to a small fraction of the cellular ribosomes. We are tempted to speculate that RNase R can specifically target deficient ribosomal 30S subunits, which subsequently results in the specific 70S ribosome degradation by YbeY and RNase R. This explains why we could see a specific enrichment of RNase R on 30S subunit but not on the 70S ribosome, which would be rapidly degraded (Figure 5). We aim to explore this hypothesis in our future work. Hypothetical model of RNase R involvement in tagging and removing defective ribosomes. In conclusion, this study shows that RNase R can interact with ribosomal proteins. Using sucrose polysome gradients combined with anti-RNase R antibodies we showed that endogenous RNase R migrates along the gradient in a similar fashion as the 30S ribosomal subunit. RNase R is usually more abundant in the 30S fraction and this result is coherent with previous data since it was reported that it associates with the S12 protein. However, in the westerns we see that RNase R can be associated with the other two subunits, 50 and 70S. This protein is not visible on the polysome fraction but it can be associated with 70S. BW25113 E. coli strain was used in all described experiments. Bacteria were grown in standard LB media. All cultures were incubated under aerobic conditions at 37°C and shaken at 180 rpm. Strains with fusion proteins were prepared using lambda red recombination method as described. Plasmids were used as a template for the integration cassettes as described. Tap tag purification was performed as described. E. coli with RNase R protein fused with TAP tag cultures were grown in LB medium with kanamycin (50 μg/ml) until they reach the exponential or the stationary growth phase. Cold shock induction cultures that reach exponential phase were incubated for 3 h at 15°C. Cells were harvested and pellets stored at -80°C. Pellets were resuspended in 8 ml of Lysis buffer (2 mM PMSF, 1 mM DTT, 50 mM Tris-HCl pH8.0, 250 mM NaCl) and lysed by two passages in French press. At this point 0.5 μl of benzonase (250 U/μl) was added and samples were incubated on ice for 10 minutes and centrifuged at 35000 rpm for 45 minutes at 4°C. Supernatants were filtered (0.45 μm), supplemented with 0,1% Triton ×-100 and loaded into pre-washed IgG agarose column. The columns remained shaking at 4°C for 1.5 h, then were washed twice with 10 ml of IPP150 and subsequently two times with 10 ml of TEV Cleavage Buffer (10 mM Tris-HCl pH8.0, 150 mM NaCl, 0.5 mM EDTA, 1 mM DTT). A volume of 200 μL of TEV Cleavage Buffer and 35 μL of TEV protease (approximately 100 units) were added to the column and incubated for 1 h shaking at room temperature. After that, the supernatant was collected by eluting twice with 250 μL of Calmoduline Binding Buffer (CBB) (10 mM β-mercaptoethanol, 10 mM Tris-HCl pH 8.0, 150 mM NaCl, 0,1% Triton X-100, 2 mM CaCl2). The sample was supplemented with CaCl2 (4 μl of a 0.2 M stock) and the mixture was transferred into an eppendorf with 300 μL of Calmoduline beads (previously washed 4 times with CBB). Incubation was performed for 45 minutes while shaking at 4°C; subsequently the sample was transferred into a new column and washed twice with 5 ml of CBB. As a final step, we eluted proteins with 600 μL of Calmoduline Elution Buffer (10 mM β-mercaptoethanol, 10 mM Tris-HCl pH 8.0, 150 mM NaCl, 1 mM CaCl2). If indicated 0.1 μg/ul of RNase A was added during the step of binding to calmodulin resin. Final elutions were precipitated with acetone and pellets were sent for mass spectrometry service (http://mslab-ibb.pl/). Raw mass spectrometry data were treated using MaxQuant software to obtain label free quantification data. Sucrose gradients were prepared as described. Cultures were grown until the exponential growth phase and/or in cold shock (as described before). Chloramphenicol was added into the culture (final concentration 0.1 mg/ml) which remained for 3 minutes shaking under the same conditions. Cultures were transferred into a centrifuge tube filled until 1/3 of the volume with ice, centrifuged at 5000 rpm, during 10 minutes at 4°C. Pellets were resuspended with 0.5 ml of cold Buffer A (100 mM NH4Cl, 10 mM MgCl2, 20 mM Tris-HCl pH 7.5), transferred into an eppendorf and lysozyme solution was added to a final concentration of 0.1 ug/ul. Cells were frozen in liquid nitrogen for 5 minutes and then thawed in an ice water bath (this step was repeated twice). Subsequently, 15 ul of 10% Deoxycholate was added to complete the cell lysis and the sample was centrifuged at 17000 rpm for 10 minutes at 4°C. Supernatant was carefully transferred into a new eppendorf and stored at -80°C. Amounts of RNA were determined using NanoDrop equipment and approximately 600 ug was added into the top of the sucrose gradient. Samples were centrifuged at 35000 rpm for 3 h at 4°C, using an SW41 Ti rotor. Gradients were separated using AKTA equipment and UV spectra were monitored. Gradient fractions were precipitated with TCA and proteins were separated on SDS-PAGE gels and subjected to standard western blot analysis. If indicated 40 mM EDTA was added to the lysates before separation on the gradient. Michal Malecki, Cátia Bárria contributed equally to this work. We acknowledge Dominik Cysewski for mass spectrometry results analysis, Andrzej Dziembowski for kind support, Edward Zungailia for reading the manuscript and Andreia Aires for technical assistance. We also thank National BioResource Project (NIG, Japan): E.coli for KEIO collection strains. The work at ITQB was supported by Fundação para a Ciência e a Tecnologia (FCT), Portugal (including grants Pest-OE/EQB/LA0004/2011, PTDC/BIQ/111757/2009, PTDC/BIA-MIC/4142/2012) and FP7-KBBE-2011-1-289326. MM was recipient of a Marie Curie Individual European Fellowship (PIEF-GA-2009-254183) and CB recipient of a research assistant grant from FCT. MM and BC had equal contribution. All authors read and approved the final manuscript.
2019-04-18T20:21:16Z
https://bmcmicrobiol.biomedcentral.com/articles/10.1186/1471-2180-14-34
Ian has led organizational and technology projects to improve post-secondary education in the United Kingdom, and played a leading role in collaboration with Australia, New Zealand and the United States. Dr. David Ackerman currently serves New York University in a dual appointment as Chief Digital Officer and Associate Vice President. As Chief Digital Officer in NYU Libraries and Associate Vice President for Research Technology in NYU IT, David is responsible for the overall global NYU research technology strategy and services. This includes high performance computing, 3D additive fabrication, data services, digital humanities and scholarship support, the Libraries digital strategy, and digital library technology services and preservation. During his more than 26 years at NYU, David was responsible for the invention and implementation of NYU Home (the enterprise portal); NYU CWIS (campus-wide information system for dissemination of information in electronic form); NYU Web as the first NYU Webmaster (replacing NYU CWIS); the first non-text email system and the migration of it to Google; the first modern day HPC machine to make the top 500 list; the first NYU Abu Dhabi supercomputer; one of the top higher education 3D printing programs in the world; the design and rollout of the NYU Co-op (a next generation computer lab); and establishing and developing the now Peta-scale NYU Digital Library. While at NYU, he has also served as technology consultant to the Soros Foundations, Expert on Mission to the United Nations, and the Founding Chairman of the Board of the New York chapter of the Internet Society (ISOC-NY). He was the dissolving Chairman of the Board of the Sakai Foundation and currently serves as Chairman of the Board of the Apereo Foundation. Lucy Appert is the Director of Educational Technology for New York University's Arts & Science division, where she provides leadership and planning for the effective and strategic use of emerging technologies for the division's three schools. Her areas of special interest include digital literacy, digital humanities, and project-based learning. Prior to returning to NYU in 2018, Lucy spent almost five years as Associate Director for Instructional Design at Columbia University’s Center for Teaching and Learning (CTL, formerly CCNMTL) where she led the CTL's innovative project partnerships with faculty using its Design Research methodology. Previously at NYU, she served as Director of Educational Technology for the Liberal Studies Program (LSP), where she led the team providing instructional technology solutions for LSP faculty and students in New York and at NYU’s Global Sites. She was also a faculty member in the program and has more than 20 years of teaching experience, having taught at Tulane, Vanderbilt, and Yale, in addition to NYU. Lucy holds a Ph.D. in 17th & 18th c. British literature from Tulane University and a B.A. in Classics and English from UNC-Chapel Hill. An active member of the larger educational technology community, she has fostered a number of IT/academic collaborations within both university and open source communities, including chairing the User Reference Group for the original Sakai Open Academic Environment project and coordinating the Apereo newsletter. Dr Cheryl Brown is currently an Associate Professor of e-learning and co-Director of the e-Learning Lab in the School of Education Studies and Leadership at the University of Canterbury, New Zealand. Previously she worked in the Centre for Innovation in Learning and Teaching at the University of Cape Town where she has managed e-learning projects on digital education leadership, personal mobile devices in learning and teaching and developing e-learning professionals in Africa. A previous “Teaching with Sakai” Award winner, she also co-chaired the Apereo Teaching and Learning Awards (ATLAS) between 2015 & 2017. Her research interests are centred around access to ICTs and how they facilitate or inhibit students’ participation in learning. In the past few years she has looked more closely at the role technological devices (for example cell phones and tablets) play in students learning in a developing context and the development of students' digital literacy practices. I am the Teaching, Learning and Portal lead for OpenCollab. As such, Apereo has played a large role in my life. I have been using and supporting Sakai since Sakai 2.7. My experience has involved institutions of all sizes and shapes. We support higher education in Africa generally and South Africa in particular. During this time I have been involved with initiatives in the South African sphere of Sakai. Developing tools for Offline Mobile Learning using Sakai for Unisa (Unipoole ) and NWU (eFundi Move). My role is focused on the hands-on support, maintenance and rejuvenation of Sakai instances for Universities and other centres of Learning. Providing today's digital learner with the best experience possible, while addressing pressing concerns and limitations. I am excited about the direction Apereo has taken in the last few years. Specifically expanding its outlook and supporting worth while projects which aid the digital learner in these fluid times. My goal is to expand Apereo's footprint in Africa. Laura has been at the University of Notre Dame since 1998. In 2004 she became Notre Dame’s first LMS Administrator at a time when the service was supported by a single person. She led the original team which implemented Blackboard Vista (WebCT) and integrated it to Banner’s Luminis portal. Later she provided leadership to the design of the evaluation process used to select Sakai. Her knowledge of learning management software extends through its entire lifecyle , especially as related to the changing needs of those who use it. Her responsibilities have included providing leadership to a Blackboard user group, leading faculty workshops, building sustainable documentation and support practices, and marketing and branding the Notre Dame learning management system. She has been a syndicated blogger on LMS administration, governance, support and staffing topics. Laura holds an M.A. in Applied Linguistics. She is a concurrent instructor for the Mendoza College of Business. In her spare time, she’s a Startup Weekend organizer passionate about innovation and entrepreneurship in education technology. She’s a firm believer in scholarly research informing teaching which informs innovation. In addition to her staff position at Notre Dame, she served on the Board of her sons’ K-8 school (2009-2011) where education initiatives such as Indiana Choice, Common Core assessment and preparation mingled with curricular concerns for the next generation’s preparation for 21st century employment. Mathilde Guérin has been working at the University of La Rochelle since 2010 where she was responsible for the development and deployment of innovative IT projects (mobile solutions, web portal, etc.). The missions entrusted to her eventually led her to become involved in the ESUP-Portail Consortium, a French organization promoting and developing open-source solutions for higher education. Throughout the years, while coordinating the ESUP-Mobile Working Group, she kept on working on various projects supported or developed by the Consortium which allowed her to have a global view of the Consortium's strategy and activities. At the end of 2014, she was appointed as Technical Director for ESUP-Portail: one of her objectives is to contribute in strengthening the partnership between the Consortium and the Apereo Foundation. Jim Helwig has worked for the University of Wisconsin-Madison since 2001, leading technical teams in the areas of portal infrastructure, custom enterprise academic applications and shared development tools. Jim has also played a leadership role within the Apereo (and previously Jasig) community, serving on the board of directors, chairing the uPortal Steering Committee and leading the planning committees for a number of Jasig conferences and events. Jim is a frequent speaker at Apereo and EDUCAUSE conferences. Prior to joining the University, Jim worked in private industry on distributed Internet applications. Jim holds a M.S. in Computer Science from the University of Wisconsin-Milwaukee. Jim continues to be passionate about the benefits institutions of higher education can achieve through collaboratively working on innovative open source solutions addressing common campus needs. Doug Johnson has worked for the University of Florida since 2000. He was initially hired as an instructional designer with ancillary responsibility for UF's initial experiments with course management systems. Rapid growth of the CMS from a few hundred users to tens of thousands of users required a transition to system administration, user support and training, as well as hiring and managing a CMS support team. Continued growth of the CMS and related online systems and services, plus the increased complexity of mission critical, enterprise level systems, required Doug to develop skills in project management and coordination of multi-unit teams to provide seamless support for a growing portfolio of online teaching and learning technologies. Doug is now leading UF’s learning analytics efforts and is deeply involved in strategic planning, Agile project management, adaptive organizational change, and all aspects of community engagement related to online teaching and learning at the University of Florida. Shoji Kajita is currently a Professor of Kyoto University in Japan with two appointments, one in the IT Planning Office, a part of the Institute of Information Management and Communication, and the other in the Academic Center for Computing and Media Studies. Professor Kajita received his bachelor's, master's, and doctoral degrees in Information Engineering from Nagoya University in Japan in 1990, 1992, and 1998 respectively. At Nagoya University, he served as a Research Associate in the Graduate School of Engineering from 1995 to 1997 and an Assistant Professor in the Center for Information Media Studies (CIMS) from 1998 to 2001. During his work at CIMS, he localized WebCT into Japanese and took the role of WebCT evangelist in Japan as a means of promoting the use of ICT for teaching and learning. From 2002 to 2008, he was an Associate Professor at the Nagoya University Information Technology Center, where he developed the Nagoya University Portal and a next-generation Course Management System for Japanese universities. These works were contributed to the Jasig and Sakai communities for use with uPortal, CAS and the Sakai CLE. His contributions to Jasig and Sakai reflected on the participation in annual (formally semi-annual) Jasig Conferences since 2002 and Sakai Conferences since 2004. Before joining Kyoto University in 2011, his most recent position at Nagoya University was that of an Associate Professor in the Information Strategy Office, a part of the university's Information and Communications Headquarters. Charlie has primary responsibility for Georgetown's R&D activities in Federated Authentication and Authorization. This includes serving as the Campus Executive for InCommon, and providing leadership and support for the Common Identity and Trust (CommIT) Collaborative and the core Shibboleth development team. Charlie lead the successful completion of middleware development and implementation for Project Sentinel, a major bioinformatics project sponsored by the National Library of Medicine. In prior roles at Georgetown, Charlie created a flexible group to build and enhance Scholarly Information Services that directly support teaching, learning, and research. The Scholarly Systems Group integrates course management, interactive media, synchronous collaboration, lecture capture, academic software, and administrative functions into a rich and dynamic online platform for faculty and students. Charlie played a key role in expanding the University's "directory-driven" computing strategy. He created and managed the Information Access (IA) group. IA delivered new customer-enabling services including the Enterprise Data Warehouse, Access+ and MyAccess (personalized web-based access to Georgetown's core business systems), an enterprise identity management system (NetID), and an e-commerce infrastructure. Charlie is Georgetown's primary liaison to technology organizations. He serves as a member of the Board of Directors of the P20W Education Standards Council (PESC) and co-chairs its Enterprise Authentication and Authorization (EA2) Working Group. Charlie is Treasurer of the Apereo Foundation, a vibrant community of educators collaborating to create open software that advances teaching, learning, and research. He is immediate past Coordinator of the Common Solutions Group (CSG) and a member of the CSG Steering Committee. He actively participates in the activities and meetings of CSG, PESC, Apereo, Educause, Internet2, InCommon, the IMS Global Learning Consortium, Gartner Group, the ShareStream Product Advisory Board, the Chinese-American Networking Symposium (CANS), the Association for Computing Machinery (ACM), and the Association of Jesuit Colleges and Universities Conference on IT Management (AJCU-CITM). He served as a member of the Mellon Foundation planning grant team that validated the need for and proposed the development of the Kuali Student Services System. Charlie received the Distinguished Service Award from PESC in 2011 and the Award for Exemplary Practices in Information Technology Solutions from Educause in 2000. Charlie earned a Master of Science in Information Systems from American University and a Bachelors in Economics and Philosophy from Georgetown. He currently teaches as an Adjunct Professor in the Masters of Technology Management Program at Georgetown. Boeta Pretorius is the Chief Director of IT at the North-West University. NWU is the second largest University in South Africa and has a mix of campus and distance students. NWU has been a very active and loyal community member of the Sakai-, and now Apereo foundation. Although Sakai, (branded as eFundi at the NWU) is a flagship product at the NWU, other Apereo products like CAS and Matterhorn are also used. NWU is an active member of the Apereo-SA community, and will host the annual Apereo-SA conference in 2018. I have changed the mission of IT to focus more on the core activities at the University, namely Teaching and Learning, and Research. The Apereo product range forms an integral part of our solutions portfolio to fulfil this mission. I have a long history with the community, and built very good relations and partnerships. I am also a director of the Association of South African Directors of IT (ASAUDIT) and lead some of the interest groups. As a loyal community member, I am sure I will be able to make a positive difference on the Apereo board. Jeremy has managed the Identity and Access Management program at UC Berkeley since 2014. Before that he held a similar position at Simon Fraser University in Vancouver, British Columbia. Jeremy learned to program in 2004 and has contributed to a number of open source projects over the years. As a developer at Simon Fraser University he helped modernize the identity management system and improve the usability of identity services for staff, faculty and students alike. Jeremy has an MBA in Management of Technology from the Segal School of Business in Vancouver and loves using his skills to help advance the mission of higher education. He is passionate about the role of open source software and seeks to enable open source solutions to continue to compete with commercial offerings for the attention of higher ed technologists. Jeremy is especially interested in championing the CAS Central Authentication Service as a core component of a modern identity and access solution. Anne-Marie Scott is the Deputy Director of the Learning, Teaching and Web Services Directorate at the University of Edinburgh. She has been at the University of Edinburgh since 2002 and was responsible for the selection and development of uPortal as the University enterprise portal platform in 2004. She is an expert in enterprise systems – in addition to implementing uPortal, she led a multi-year project to replace the University Identity Management system, moving operations to a real-time SOA based architecture. The solution delivered was a blend of open source solutions (Grouper, OpenLDAP) and bespoke development. Since 2011 she has been focused on the University’s learning technology provision, developing strategy and leading large institutional change projects that enhance the student learning experience. She is responsible for the provision of all the centrally provided VLE, eAssessment, ePortfolio and media services in the institution. She has a keen interest in learning analytics, developing policy, undertaking some of the early analysis of data from MOOC platforms, and more recently supporting the inclusion of OnTask into the Apereo Incubation process. Current projects include the rollout of lecture recording into 400 teaching spaces; the adoption of WordPress as an institutional blogging platform, including a Domain of One’s Own service; and a pilot of Jupyter Notebooks to support computational learning. She is passionate about student co-creation of educational technology services through high value internship opportunities. She has a commitment to open source and open practices more generally – including championing the adoption of open source solutions, open licenses and working closely with the University Wikimedian in Residence. She holds and MA in English and Scottish Literature and a PG Dip in e-Learning, both from Edinburgh. She volunteers for Girl Geek Scotland as part of the leadership team, supporting women in tech roles within the Scottish IT sector, and has more than a decade of board experience as a Trustee of a building preservation trust.
2019-04-25T14:29:27Z
https://apereo.org/content/leadership
This privacy statement informs you about category, extent and purpose of using personal data (hereinafter referred to as "data") within our online offer and connected websites, functions and contents as well as external online presences (hereinafter referred to as "online offer"). Regarding the terminology used, like "processing" or "controller", we refer to the definitions of art. 4 of the General Data Protection Regulation (GDPR). Visitors and users of our online offer (hereinafter referred to as "users"). "Personal data" means any information relating to an identified or identifiable natural person ("data subject"'); an identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier (Cookie, etc.) or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person. "Processing" means any operation or set of operations which is performed on personal data or on sets of personal data, whether or not by automated means. This terminology has a wide range and includes almost any handling of data. "Pseudonymization" means the processing of personal data in such a manner that the personal data can no longer be attributed to a specific data subject without the use of additional information, provided that such additional information is kept separately and is subject to technical and organizational measures to ensure that the personal data are not attributed to an identified or identifiable natural person. "Profiling" means any form of automated processing of personal data consisting of the use of personal data to evaluate certain personal aspects relating to a natural person, in particular to analyze or predict aspects concerning that natural person's performance at work, economic situation, health, personal preferences, interests, reliability, behavior, location or movements. According to art. 13 GDPR we inform you about the legal basis of our data processing. In cases where the legal basis is not mentioned in the privacy statement, the following applies: The applicable law for obtaining consent is art. 6 (1) a and art. 7 GDPR; the applicable law for processing for executing our services and implementing contractual measures as well as responding to requests is art. 6 (1) b GDPR; the applicable law for processing for fulfillment of our legal duties is art. 6 (1) c GDPR; the applicable law for processing for protecting our legitimate interests is art. 6 (1) f GDPR. In the case of vital interests of the data subject or another natural person making processing of personal data necessary, art. 6 (1) d GDPR is the applicable law. According to art. 32 GDPR we take appropriate technical and organizational measures to ensure an appropriate level of protection in consideration of state of the art, implementation costs and category, amount, circumstances and purposes of processing as well as the different probabilities of occurrence and seriousness of the risk for rights and liberties of natural persons. In particular, these measures include securing confidentiality, integrity and availability of data by controlling the physical access to the data as well as access, entry, disclosure, securing availability and separation of the data. Furthermore, we have implemented processes which guarantee the exercise of rights of data subjects, deletion of data and reaction to hazard of data. We take into account the protection of personal data when developing or choosing hardware, software and processes according to the principle of data protection by design and by default (art. 25 GDPR). In case we disclose, transmit or grant access to data in the course of our processing to other persons or companies (processors or third parties), this shall only be conducted due to legal permission (for example: transmission of data to third parties, for example to payment providers (art. 6 (1) b GDPR), is necessary for the performance of the contract), your permission, a legal obligation or on the basis of our legitimate interests (for example: deployment of agents, webhosts etc.). In case we engage third parties to process data on the basis of a so-called "processor contract", art. 28 GDPR applies. If we process data within a third country (i.e. outside the European Union (EU) or the European Economic Area (EEA)) or data is processed in the course of services of third parties or disclosure or transfer of data to third parties, this is only conducted in order to meet our (pre)contractual duties, on the basis of your allowance, due to a legal obligation or our legitimate interests. Subject to legal or contractual permissions, we only process or let third countries process data in the case of special conditions of art. 44 GDPR and subsequent articles. That means the processing is carried out on the basis of special guarantees, like the officially recognized finding of a data protection level in accordance with the EU (for example for the USA with the "Privacy Shield") or consideration of officially recognized special contractual obligations (so-called "standard contractual clauses"). You have the right to obtain confirmation as to whether or not personal data is being processed and access this data as well as further information and copies of the data according to art. 15 GDPR. According to art. 16 GDPR, you have the right to have incomplete personal data completed or have inaccurate data corrected. According to art. 17 GDPR, you have the right to obtain the erasure of personal data without undue delay or alternatively, according to art. 18 GDPR, you have the right to obtain the restriction of processing. According to art. 20 GDPR, you have the right to obtain the data you provided us with and request transmission to another controller. According to art. 77 GDPR, you have the right to lodge a complaint with a supervisory authority. You have the right to withdraw your consent according to art. 7 (3) GDPR with effect for the future. You have the right to object future processing of your personal data according to art. 21 GDPR. In particular, you have the right to object processing for purposes of direct marketing. "Cookies" are small files that are being saved on the computers of users. Within these cookies, different information may be saved. Primarily, cookies are used to save information about users (or the device of the user where the cookie is saved on) during or after visiting online offers. Temporary cookies, or "session cookies" or "transient cookies" are cookies that are being deleted after the user leaves the website and closes his browser. Within such a cookie, the content of the basket of an online shop or a login status may be saved. Cookies are called "permanent" or "persistent" when they are saved after closing the browser. In this way, the login status may be saved when users visit the same website again a few days later. Also, interests of users that are used for reach measurement or marketing purposes may be saved within such a cookie. Cookies are called "third party cookie" when they are not offered by the controller who is in charge of the website, but by other providers (in cases where the cookies are from the controller, they are called "first party cookies"). We may use temporary and permanent cookies and inform about this in the course of our privacy statement. In case the users don't wish cookies to be saved on their computers, they are requested to deactivate the responding option in the configurations of their computers. Saved cookies can be deleted in the configurations. The exclusion of cookies may lead to functional restrictions of the website. A general opposition against the usage of cookies for the purposes of online marketing, in particular in the case of tracking, is explained on the US American website www.aboutads.info/choices/ or the EU website www.youronlinechoices.com. Furthermore, the saving of cookies may be prevented by deactivating them in the settings. Please note that in this case there is the possibility that not all features of this website can be used. The data processed by us is deleted or restricted according to art. 17 and art. 18 GDPR. If not explicitly mentioned in this privacy statement, the data saved by us will be deleted as soon as it is no longer required for the intended purposes and no legal storage obligations prevent deletion. If the data is not deleted, because it is required for other and legal permitted purposes, the processing will be restricted. That means the data will be blocked and not processed for other purposes. This applies for example to data that has to be saved due to reasons of commercial or tax law. According to German law, storage for 10 years applies in particular according to §§ 147 (1) AO, 257 (1) no. 1 and 4, (4) HGB (German commercial code) (books, records, reports, vouchers, trading books, relevant tax documents, etc.) and 6 years according to § 257 (1) no. 2 and 3, (4) HGB (commercial letters). of our customers, potential customers and business partners for the purpose of contractual performance, service and customer care, marketing, advertisement and market research. We process the data of our contractual partners and potential customers as well as other customers, clients, or contractual partners (consistently called "contractual partners") according to art. 6 (1) b GDPR in order to perform contractual or pre-contractual services. The data being processed as well as kind, amount, purpose and necessity of the processing are determined by the underlying contract. The processed data contains the master data of our contractual partners (for example names and addresses), contact data (for example e-mail addresses and telephone numbers) as well as contract data (for example performed services, contract contents, contractual communication, names of contact persons) and payment data (for example bank details, payment history). In principal, particular categories of personal data are not processed, except when these are part of an instructed or contractual processing. We process data that is necessary for establishing and performing contractual services and point out the necessity of the disclosure thereof, if it isn't evident for contractual partners. Disclosure to external persons or companies will only be conducted in case it is required for an underlying contract. We are processing the data provided to us in the course of a contract according to the instructions of our customers and the legal requirements. In the course of the utilization of our online services, we may save the IP address and the time of the respective user action. This saving is conducted on the basis of our legitimate interests as well as the interests of the users in protection of abuse or other unauthorized usage. In principle, disclosure of this data to third parties is not conducted, except it is required for pursuing our claims according to art. 6 (1) f GDPR or there is a legal obligation according to art. 6 (1) c GDPR. Deletion of the data will be conducted when it is no longer required for fulfillment of contractual or legal duties as well as for guarantee or similar duties; the necessity of saving the data is reviewed every 3 years; apart from that, legal retention obligations apply. We process data in the course of administrative tasks as well as organization of our company, accounting and the compliance with legal obligations, like archiving. Here, we process the same data that we process when fulfilling our contractual services. The basis of processing is art. 6 (1) c GDPR and art. 6 (1) f GDPR. Customers, potential customers, business partners and visitors of the website are affected by processing. The purposes and our interest in processing are administration, accounting, office organization and archiving our data; that means tasks for maintaining our business activity and performing our services. The deletion of data regarding contractual services and contractual communication corresponds to the information provided for this processing. We disclose or transmit data to fiscal administration, consultants, like tax consultants or auditors as well as further fee payment offices and payment providers. Furthermore, on the basis of our economic interests, we are saving information about deliverers, organizers and other business partners, for example for subsequent contacting. In principal, we save these mostly company related data long-term. We only process data of applicants for the purpose and in the course of the application procedure according to legal provisions. Processing of the data of applicants is conducted in order to fulfill our (pre)contractual obligations in the course of the application procedure according to art. 6 (1) b and f GDPR if data processing becomes necessary, for example in the course of legal procedures (in Germany, § 26 BDSG (German Federal Data Protection Act) additionally applies). The application procedure starts when applicants provide us with their application data. The required application data are, in case we offer an online form, marked; in other cases arise from the job description and in general, information about the person, postal and other contact addresses and documents belonging to the application, like letter, CV and certificates. Further, applicants may voluntarily provide us with additional information. By transmitting the application to our office, applicants agree to the processing of their data for purposes of the application procedure according to this privacy statement. If, in the course of the application procedure, particular categories of personal data according to art. 9 (1) GDPR are transmitted voluntarily, the processing of these data will be conducted additionally according to art. 9 (2) b GDPR (for example health data, like the status of a severely disabled person or ethnic origin). If, in the course of the application procedure, particular categories of personal data according to art. 9 (1) GDPR are requested from the applicant, the processing of these data will be conducted additionally according to art. 9 (2) a GDPR (for example health data if these are required for professional practice). If available, applicants may transmit their applications via an online form on our website. The data will be transmitted encoded pursuant to the state of the art. Applicants may as well transmit their application via email to our office. However, please note that in principal, e-mails are not encoded and that the applicants themselves need to encode their e-mails. Therefore, we cannot assume responsibility for the transmission path between sender and reception on our server and advise to use an online form or post. Instead of sending the application via online form or email, applicants may as well still send their application via postal service to our office. The data provided by applicants may be processed in the case of a successful application for purposes of employment. Otherwise, if the application was not successful, the data of the applicants will be deleted. Deletion of the data will also be conducted, if an application is withdrawn. Applicants are entitled to withdraw their application at all times. Subject to a justified revocation of the applicant, deletion is conducted after a period of six months, in order to being able to answer any follow-up questions relating to the application and to meet burdens of proof according to the equality act. Invoices regarding compensation for travelling will be archived according to tax law. In the course of the application, we offer the possibility to the applicants to be registered in our "talent-pool" for a period of two years on the basis of permission according to art. 6 (1) b and art. 7 GDPR. The application documents in the talent-pool will be processed only in the course of future job descriptions and job vacancies and will be deleted after the period, at the latest. Applicants are informed that their permission to be registered in the talent-pool is optional, doesn't have any influence on the current application procedure and that they may withdraw their permission with effect for the future at any time as well as may object according to art. 21 GDPR. When contacting our office (for example via contact form, e-mail, telephone or social media), information about the user are processed for handling the contact request according to art. 6 (1) b GDPR. The information about the user may be saved in a customer-relationship-management-system ("CRM system") or similar inquiry management systems. We delete requests if they are no longer required. We review the necessity every two years. Furthermore, legal archiving obligations apply. Hosting services are used by us in order to make the following services available: infrastructure and platform services, computing capacity, memory and database services, e-mail dispatch, security services as well as technical maintenance services which we use for the purpose of running the online website. We, or our hosting service, process inventory data, contact data, content data, contract data, usage data, meta and communication data of clients, potential clients and visitors of our website on the basis of our legitimate interests in offering an efficient and safe website according to art. 6 (1) f GDPR and art. 28 GDPR (processor contract). We, or our hosting service, collect data about any access to the server on which the service is located (so-called server log files) on the basis of our legitimate interests according to art. 6 (1) f GDPR. Access data contains the name of the visited website, file, date and time of access, transmitted data amount, notification about successful retrieval, type and version of browser, operating system of the user, URL of prior visited website, IP address and requesting provider. Due to safety reasons (for example investigation of abuse or fraud), log file information is saved for a maximum of 7 days and deleted thereafter. Data that is required for further evidence is exempt from deletion until the respective matter is solved. Google is certified by the Privacy-Shield Agreement and therefore guarantees to comply with European data protection law (https://www.privacyshield.gov/participant?id=a2zt000000001L5AAI&status=Active). Google will use this information on our account to analyze usage of our online offer by users, to create reports about the activities within the website and to perform further services referring to usage of the website and internet services for us. During this process, pseudonymous usage profiles of the users may be created from the processed data. We only use Google Analytics with activated IP anonymization. That means that the IP addresses of users will be shortened by Google within the states of the European Union or other contracting states of the Agreement on the European Economic Area. The full IP address will only exceptional be transmitted to a server of Google in the USA and then shortened. The IP address being transmitted by the browser of the user will not be amalgamated with other data of Google. The users may stop the saving of cookies by a special setting of their browser software. Furthermore, the users may stop the recording of data produced by the cookie relating to their usage of the website by Google by downloading and installing the browser plugin from this link: http://tools.google.com/dlpage/gaoptout?hl=de. Further information about data usage by Google, possibilities of settings and objections are to be found in the Privacy Statement of Google (https://policies.google.com/technologies/ads) as well as in the settings for presentation of advertisements by Google (https://adssettings.google.com/authenticated). The personal data will be deleted or anonymized after 14 months. Within our website and on the basis of our legitimate interests (i.e. interest in analysis, optimization and economic operation of our website according to art. 6 (1) f GDPR) we use content or service offers of third parties in order to integrate their contents and services, like videos or fonts (hereinafter called "contents"). This always requires third parties to record IP addresses of the users, because otherwise they wouldn't be able to send contents to the browsers of the users. Therefore, the IP addresses are required for presenting these contents. We strive to only use contents of third parties which use the IP addresses only for delivery of the contents. Third parties may also use so-called pixel-tags (invisible graphics, also called "web beacons") for statistical or marketing purposes. The "pixel-tags" analyze information like the traffic of visitors on the pages of the website. The pseudonymous information may be saved in cookies on the device of the users and contain, among other things, technical information about the browser and operating system, linked websites, time of the visit and further information about the usage of our website as well as be linked with such information from other sources. We integrate fonts ("Google Fonts") of the supplier Google Ireland Limited, Gordon House, Barrow Street, Dublin 4, Irland. Privacy Statement: https://www.google.com/policies/privacy/, Opt-Out: https://adssettings.google.com/authenticated. We integrate maps of the service "Google Maps" of the supplier Google Ireland Limited, Gordon House, Barrow Street, Dublin 4, Irland. The processed data include in particular IP addresses and location data of the users that, however, will not be collected without their permission (normally permitted through the settings of their devices). The data may be processed in the USA. Privacy Statement: https://www.google.com/policies/privacy/, Opt-Out: https://adssettings.google.com/authenticated.
2019-04-24T20:26:37Z
https://zimpat.com/en/info/privacy-policy/
Hello!, Understanding the capacity of a cluster is very important, as an overloaded cluster will not perform well. The overall capacity of a cluster is determined by how many members it has, two physical resources determine the number of members that can be available at a given time, memory and cpu cores. It is important to understand that coherence is a series of services running in a jvm and these services are asynchronous named threads, all of which require CPU cycles to work, as does the JVM, and the OS, so, when determining your capacity it is very important to remember that each member will increase this overhead, limiting the number of members per box. For Partitioned caches each piece of data is backed up on a different JVM, therefore we must account for the size of twice the serialized object size per Object. For Replicated caches the objects are kept unserialized after the first access, and are present in every member and must be sized accordingly. The Keys of the objects and Indexed data are kept unserialized. Each entry has an overhead of 144 bytes. Coherence needs some scrap space; that is, space to unserialize and work with objects, when executing listeners, entry processors and aggregators. The JVM has its own overhead and to perform optimally should not be executed over 75 to 80% capacity. Taking all of those overheads into consideration, we can start to size our members, the sum of whom will be our total capacity. ¼ of the capacity should remain unused to ensure optimal performance by the JVM. ¼ of the capacity should not be used for primary storage and will be used for the overheads Coherence needs. For Partitioned caches you must consider twice the size of the pof serialized object, as it will be stored twice. For Replicated caches you must take into account the native size of the objects. Taking this into account once you know the size of your objects it becomes trivial to determine how much data you can store per storage node. In order to ensure that coherence enforces your cache sizing you must specify on the backing map of each cache Binary as the unit calculator, the maximum size in bytes of primary storage for that cache (remembering that for Partitioned caches the actual memory spent spent is twice that due to the backup) and the eviction strategy. The dangers of wildcards:As explained above, the sizing is performed per cache, so wildcards break this contract and if you are using wildcards there is no way to directly enforce a sizing policy. For instance, if you have a cache mapping of my-cache-* and set a high units count to 100MB. When you create a cache named my-cache-one, the maximum amount of data that can be added is 100MB. The problem is you can create an unlimited number of caches using that mapping, and each of them will allow 100MB, therefore, potentially resulting in a out of memory exception. Which in essence means that you must add the size of each object that you aim to place into a distributed cache and multiply it by the number of objects in that cache, multiply it by two to account for the backups, and divide that by the storage capacity of the JVM, which is, as discussed in the previous session half of the JVM size, minus the size times the number of objects of each replicated cache, as they will take up space in every JVM. After calculating the number of members that are necessary, you must add overhead to account for the loss of one physical machine, so, if each physical machine holds 3 members, you must add 3. so, now we know we will need 35 storage enabled members to store the data. Once the number of members has been determined, you can decide how many members will be in each physical box, however there are some more things to consider, the server hosting the member still needs memory and cycles for the OS to work optimally, and paging/swapping should never be used, so we need to make sure not to use all of the available physical memory with Coherence members. The CPU usage, as explained above is also very important and if not correctly managed performance will be greatly degraded due to threads fighting over cores.The exact number of members per core will depend on the load, but one core per member is a reasonable starting number, but this should be profiled and tuned by running tests and checking the task backlog Mbean and the CPU usage in the OS, making sure that it is not running too hot or too slow, and adjusting the number of members per box accordingly. Members running the Coherence*Extend service should be storage disabled and should have JVM’s the same size as the other members, because, even though they will not store data they will potentially be doing multiple aggregations for different clients. It is important to remember that you will need one Thread per active concurrent connection by setting the Thread-count on the proxy configuration, and should derive the number of proxies you need from that, keeping in mind the cpu considerations discussed earlier and that you should at the very least have two on different physical machines for reliability. This is Part two of my entry processor post and deals with the advantages and disadvantages of cross cache entry processors. By looking at the diagram we can see the problem straight away, as our code will perform an extra network hop to get one of the blue objects, nothing guarantees the object will be within the same node. So how can we solve this? Coherence offers something called key association, which allows us to ensure that two or more related entries that share the same business key are co-located, this will require for both caches to be sharing a service. I have previously shown some benefits of key association in the versioning post, and the documentation is here, so, I’ll assume everyone is familiar with it, if not, take a look at the mechanism and i’ll wait and check my emails. 2012-08-07 11:40:50,040 WARN [Logger@9243192 3.7.1.0] Coherence(3) - 2012-08-07 11:40:50.040/5.833 Oracle Coherence GE 3.7.1.0 <Warning> (thread=first-serviceWorker:1, member=1): Application code running on "first-service" service thread(s) should not call ensureCache as this may result in deadlock. The most common case is a CacheFactory call from a custom CacheStore implementation. This happens because you are accessing the service from a thread from the same service, and here is where the behavior starts getting tricky, as if you have two or more free threads it will work as expected, barring the exception, however if you only have one free thread or only one extra thread on your service, the execution of the entry processor will deadlock until being killed by the service guardian. You should never do this, so how should we go cross cache properly? As the title, which is a mouthful, explains we should access the entires directly in the backing. Because we are using key association we are sure the entries will be co-located, as explained in figure 2. As all access locks, the following example will deadlock and the entry processor that was invoked last will fail due to deadlocking while the one who arrived first will continue its execution. This is a deceptively simple problem to avoid with good design… Creating and documenting the expected flow through the caches- i.e. all cross cache entry processors should go from the first to the second cache, this way they will queue and provide the expected behavior from entry processors. Entry Processors, process entries. I say this because I cannot be the only one who interpreted the name as something that processes things as they enter, which is the job of the trigger, but I digress. Entry Processors allow us to execute code server side against entries or sets of entries, either passed as a parameter or that match a filter that has been passed as a parameter to the processor. This is the preferred method of updating the value of entries in a cache, as it will be performed in parallel in each node, an implicit lock is acquired in the object and multiple entry processors changing the same object are queued, guaranteeing ordering of updates thus ensuring data consistency. The main reason is because coherence is a hashmap, so all the operations are put/gets, which means that it is quite easy to end up with an inconsistent state. The diagram below explains the most common scenario. ● At T0 the object has its fields with a value of “Initial” and “Initial”. ● At T4 The first field has a value of “changed” and the second one of “initial”. ● At T6 the object will have the values of “Initial” and “changed”. From this we can see that the changes made by the client 1 where overridden by client 2 because he had a stale version of the object. ● Before actually getting the objects the clients attempt to get a lock on them. ● At T7 Client 2 finally has the lock and can get the object. This will protect you from stale data, however, we are not doing government work here, our implementations shouldn’t only work, but they need to be efficient and easy to maintain and this solution has quite a few problems, for starters it slows the cache as a whole, as the clients are constantly locking the data. Secondly, there are extra network hops required for each locking step, further slowing down the application. In order to solve this problem when writing a processor we need to ensure it is a simple as possible and that code is deployed on the member that holds the data, as the entry processor will be serialized and sent over the wire. Below is the example code for the firstField entry processor, the one for the second field looks exactly the same, except it changes a different value. In production it would be more efficient to use a POF updater, like the one used in the Versioning post, but I wanted to keep this example as simple as possible. ● If the entry processor at T2 arrives before T1 it will get queued to be executed after the lock is released, as entry processors take an implicit lock on the objects. Hopefully this has made the advantages of using entry processors clear. As explained above, locking is very important for the correct functioning of the entry processor. I found the documentation a bit confusing in this regard, the description is: “EntryProcessors are individually executed atomically, however multiple EntryProcessor invocations by using InvocableMap.invokeAll() do not execute as one atomic unit.” A simpler way I found to think about it, is that each group of keys will be executed atomically, and each group of keys will lock for the entire duration of that group of keys, for instance, lets say our invokeAll evaluates to keys 1,3,4,7 and 9. For those purposes, it is inconsequential if it evaluates to those keys through a filter or if you passed in a set of keys. The partition that contains keys 1,3 and 7 are on member 1 and the ones with keys 4 and 9 are on member 2. Therefore the changes made on each of those groups will lock and be transactional for the duration of the execution of all of the keys on that member. Although not very common, as any writes to a replicated cache are expensive, sometimes entry processors are executed in replicated caches and unlike partitioned caches where the entry processor is executed on the nodes that own the entries,in a replicated cache the execution takes place on the member that invoked the entry processor. It is important to note that the locking still takes place, however the locks are implicit without extra the network calls, as would be needed if we were using the methods in concurrent map interface. Hello ! (Who needs a greeting anyway), distributed queries are a very powerful part of coherence, but can introduce show stopping performance degradation, so it is vital to get your filters right. The filters provided by coherence, take an Extractor as a parameter, and will execute that extractor across all of the nodes, and the evaluate method will run on the result of that extractor. The simplest was to avoid this is to use an Index to store those values. indexed values are kept unserialized and are matched in the same was as regular db indexes. The Filter classes provided by coherence implement IndexAwareFilter, and know how to lookup those indexes, therefore avoiding the deserialization. The other way is to simply pass a POF extractor as a parameter, POF extractors do not deserialize an object In order to extract the desired value. However this approach is slower than having Indexes, as each object will still be evaluated, as opposed to simply looking up the Index table. However, this provides more flexibility, as you can decide at run time which fields will be used. Sometimes you need more complex logic than the custom filters provide you, so you may decide to code your own, the simplest way to do that is to simply implement the Filter interface, however, a filter created in this manner will not use indexes even if they are relevant and will deserialize every object in that particular cache resulting in catastrophic performance. Implementing EntryFilter instead of Filter allows you to implement the evaluateEntry Method, which receives a BinaryEntry as a parameter, allowing you to extract the values yourself in a clever manner, avoiding deserializing the whole entry, however the extraction will still occur for every entry, which can be time consuming. Extending ExtractorFilter allows you to, through its superclasse’s constructor, to take advantange of the created indexes and, by implementing the evaluateExtracted method to write your complex custom logic to evaluate that Object. Hello World!(Nothing yet on the new greeting front), I was reading a very good post about versioned put on Ben Stopford blog's, this stimulated me to run some tests and write something to perform server side versioning. As Ben explained quite well on his blog many caches will need some concept of versioning, for instance, you might want to know not only the latest version of a piece of market data for a given instrument, but you might also want the last 30, to have a view of the overall movement of that instrument. I wanted to write about server side versioning because that is the type of versioning i prefer to use, I find that Client side versioning makes distributed puts non trivial, can create bottlenecks and misses the opportunity to take advantage of Coherence’s distributed infrastructure. Multiple distributed clients must be able to push data at the same time and this should not affect the versioning. Multiple Objects with the same business key must be kept in the cache in the same partition. At any given time, a client, using the well known latest version marker (-1) must be able to access the latest version of an object with a simple get. The first step was to create a key class (in this example called versioned key) that wraps the business key and version, and that implements KeyAssociation, using the business key as the associated key. This will ensure that all of the objects for that same business key will share a partition. My Model class needed a version placeholder field, this will be explained in the the map trigger step, and is one of the main drawbacks of this approach. Creation of a map trigger that takes advantage of the Entries<link> getPreviousBinaryEntry() method to access the previous version of an entry, update its version and directly put it in the backing map. Whenever a new VersionedKey Object is created its version is set to the well known latest version marker, in this example, -1. When an Entity is added for that key is added to the cache, the VersioningMapTrigger will be executed, having two different flows, one if it is the first object to be added, and another if there are already other versions of that Entity in the cache. If there are no other entries with that key in the cache (getPreviousBinaryEntry is null) all you need to do is to set the version in the Entity (not its key) to 1 using a POF updater to avoid deserializing it. The first step is to get the previous real version(not the version in the key, as it will be -1 since it was the latest) from the Entity that was already in the cache and set the version in the key of that Entity to the same value. We then set the version on the Entity that was just added to that value +1, again using a POF Updater. Finally we put the previous entry and previous key directly in the backing map. This approach meets all of my requirements, and to be honest there is only one thing I do not like about it, and that is having the version on my model objects, however, since I cannot easily change the value of the key that will be added after a map trigger I decided it was worth it. I also tried some different approaches, such as my own implementation of a local cache and a backing map listener, however both of them required more backing map calls and were less performant, so I decided against it. Hello world!(still looking for that better greeting...), It has become a recurrent topic here in the blog, ok, this is the first post and nothing is recurrent, however I hope it will be. POF is probably the most used type of serialization for coherence, because of its performance (it is around 10-12 times faster, which saves a lot on CPU cycles and the generated Binaries are about six times smaller than in normal serialization.) is far better than normal java serialization, however POF requires some configuration and implementation, as explained in the documentation. Another factor that need to be considered is the maintenance cost to the development process. It is important to make sure that mappings are up-to date to avoid, at best wasting time to fix something and at worst ending up with missing data or inverting two fields. The easiest and crudest way to do this is to simply have a unit test that puts all of your objects to their respective caches, then gets them and compares them to assert if they are equal. This however will take some time, as you must start a cache server, and, for these tests to be effective they must always be run at build time, and as you add more domain classes this will increase even more and your co-workers will no doubt plot to murder you. When you are testing POF there is something simpler you can do, something I picked up from Dr. Alberto Forti on a project we worked together a while ago. You can easily create and use the configurable POF context directly. The ability to do that also opens up some interesting possibilities in using POF with external systems, a topic I will cover on a later post.
2019-04-22T18:01:43Z
http://www.gmelo.org/
Probably the single most despised charge at financial institutions is the overdraft fee – and a NerdWallet survey of the exact charges imposed by a selection of mid-sized (Navy Federal) through mammoth (Chase) institutions found fees at $20 (Navy Federal) and as high as $39 (KeyBank). $35 is a particularly common charge in the survey. You walk out without your purchase, but you aren’t dinged for a nuisance charge. Overdrafts are different. Charges are the norm, even though at the financial institution, all that happens is that bits and bytes shuffle around on a computer screen. In the olden days, yes, a bounced check was a hassle. It generated lots of paperwork. Many hands of many clerks got involved. Very probably, a fee was justified. Not today. It’s all automated. A few innovative, digital-first institutions (Simple and Chime for instance) already charge no overdraft fees. More will follow. But very probably, many legacy institutions will cling to the fees because it’s easy money. Some credit unions have worked up their own ways to help members avoid overdrafts – Hope Credit Union tell about its tools in this podcast – but many smaller institutions don’t know exactly how to handle this issue. So they charge overdraft fees, the old school style. It hurts consumers. It’s terrible for a financial institution’s reputation. But it is easy money. So now third party work-arounds are in the mix. For the consumer, the message is simple: you can keep your legacy checking account but make yourself immune to overdraft fees. Meet Grain Technology, a start up in the Bay Area on a mission to stamp out overdraft fees and, in the process, help Thin File consumers create credit histories. Win win. For the participating credit union, it’s plug and play. The member links the share draft account to Grain and Grain takes care of the rest. And Grain has been invited to play in the Arizona fintech sandbox, where they may pilot its tools free from some regulatory constraints. The company already has plans to offer its tools to students at Arizona State, the nation’s biggest university. Exactly what does Grain do? In a conversation with Carl Memnon, COO of Grain and a co-founder (hear the podcast here), the details emerged. The building blocks are that Grain takes a new look at the consumer’s spending habits, income, and expenses. It generates a proprietary algorithm. This lets it predict when a consumer’s linked checking account is likely to go into overdraft and Grain can offer an injection of cash to inoculate against an overdraft fee. The charge? Grain sees its APR ranging from 12% to 15.99% and it envisions cash injections typically ranging from maybe $25 to a few hundred dollars. Result one: no more overdraft fees. Result two: the consumer builds a credit history that Grain will report to monitoring agencies. For a Thin File young adult, that just may be a real blessing. Especially since many of those generations are averse to using conventional credit instruments. Right now, Grain is looking to partner with credit unions that want to help members avoid overdraft fees. Most of those consumers, said Memnon, probably will come from the money center banks (with overdraft fees typically around $35 per incident). What would prompt a BofA customer to ditch that institution in favor of a much smaller credit union? Just one overdraft fee could do it. Especially when the recruitment pitch is that this tool will stop overdraft fees, period. Memnon said Grain also envisions sharing its interest income with participating institutions. All while essentially living up to the credit union mission of helping consumers manage their money better. They elaborate that their people are good, kind, caring credit union people, from the community, and this will be the deciding weaponry in the upcoming wars. There are so many problems with this thinking it is hard to know where to start. And I am a person who in fact believes that many credit union people, in fact, are good, kind, caring. The problem is a two-headed monster that is set to devour that credit union narrative. Increasingly, the busiest branch is the online website and the next busiest is the mobile app. Personally, I have never been in a branch of my chief credit union (whose nearest branch now is on the other side of the country from me). I have called maybe twice in the last five years. Are they nice people? I guess. I really haven’t had much to do with many of them. The CEO, whom I know, is and as long as he responds to my emails (which have never been about personal account issues) he’s a good guy in my book. But I like the mobile app, I like the online banking, and they introduce new features fast enough to keep me from getting frustrated (and, yeah, I have a Chase account too and Chase keeps me in the fast lane). According to the Fed, in 2017 about half of US adults with a smartphone had used it to access banking. The digital access numbers are just going to explode in the near future. The more digital we become the less human interactions matter. AI is going vertical, it is changing how we interact with so many elements of our lives. AI also is becoming human plus. And we are embracing them. Hotels, for instance, are racing to equip rooms with Alexa to answer our questions (when does the restaurant open for breakfast?) and to perform simple chores such as raising the room temperature and turning off the desk lamp. We are becoming accustomed to dealing with these digital intermediaries – I have three Alexa’s in my house plus a Google Home device – and we like them. Why should I call a human to find out if a check cleared when I can ask Alexa? Many, many credit unions now are rushing to go live in Alexa and what this adds up to is a lessening of the importance of the human face of the credit union. Nobody is suggesting that humans aren’t important to credit unions and their members. Of course they are, and that is why I urge credit unions to invest in retraining branch employees to move from transaction processing to financial consultants. People can – and should – be a credit union assets because members will still come into the branch and call into the call center. It’s just that fewer and fewer of us will depend upon those channels as primary avenues for financial services. That means the smart credit unions – the ones that will survive – are investing in their digital transformation. That is the future of financial services, that is where the wars will be won. Take a deep dive into big data, into mobile banking, and – absolutely – into AI tools such as Alexa and more. A decade from now it will be considered absolutely normal to talk with a computer about one’s finances. You need to be there sooner. And you need to accept that tomorrow’s battles won’t be won just because you have “the best people.” Which you may have. But a lot more – mainly digital – will figure into choosing winners and losers and you need to be in the thick of that game to remain a competitor. Want to learn more on artificial intelligence (AI)? Must a Credit Union Hop on the AI Train? Suddenly there is a stampede of self-professed experts who want to guide your credit union through its digital transformation. Just one problem: quite a few of the experts may be bluffing. Or full of wishful thinking. Or maybe they are just plain con artists. It puts me in mind of Odysseus and his voyage past the Sirens in the early part of Homer’s classic poem. They sing enticing songs but sailors who heard them and sought to get nearer were lured into shipwrecks. What did Odysseus do? He plugged the ears of his crew so they wouldn’t hear and he had them tie him to the mast so that even when he heard, he couldn’t act. Some credit union CEOs really should think about having themselves tied to the vault to prevent them inking a digital transformation deal, and plugging the ears of other executives might not be out of line. Not when so many tempting, sweet songs are getting sung. Face this reality: just about every credit union needs to be plunging into a digital transformation because how and where and when we bank has been undergoing massive change in the past quarter century and the changes will continue. Almost certainly, for instance, the main banking touchpoint for most consumers will become a smartphone. For many it already is. Many of us no longer write checks. Many haven’t been inside a branch in a year or more. The changes keep on coming. Credit unions need to react, to respond, to plot a path through the digital tomorrow. Many credit unions won’t survive. They won’t transform fast or thoroughly enough. The typical credit union can be more fleet footed than most banks. Banks have vast legacy branch systems that increasingly seem like so much deadweight. But many bankers, by virtue of their personal pasts and their institutions’ balance sheet, are wed to their branches. They will pay a price for that. How should a credit union digitally transform? It starts by knowing yourself. What does the institution stand for? What does it want to be in 10 years. Who are your members? What do they want from a financial institution? The next step: look at the institution’s digital contact points and ask how they can be better? Most credit unions have blah online banking, their mobile banking is equally blah, and, sure, there are plenty of excuses about this – but it’s probably not going to be good enough. Today’s comparison isn’t with the community bank down the street. It’s with Chase and, even scarier, with Amazon, Netflix, and the other big online players. Can you digitally compete with them? What’s your busiest branch? Your online banking site. And the mobile app is the next busiest. How much time do you spend optimizing those channels? You also need a digital marketing strategy, probably built around Facebook, definitely also a lively website. A small sign in front of a branch is not 21st century marketing. Most of us will start, and end, our search for financial institutions online. You need a plan for gaining visibility there. Many credit union technology vendors reap profits from the status quo which, frankly, as far as technology goes is primitive in the credit union world. But the profits say it’s not in their interest to rock this boat and so they don’t. Understand this: it’s simply crazy that you can’t use the mobile banking platform you want because it doesn’t easily or cheaply interface with your core And so a system that may be 20 years old, or is it 40, is dictating the technology landscape? But so it goes at many credit unions. What vendors can help you? Search for partners with rich fintech cred. Worry less about credit union bona fides and, for many credit unions, their first question always is, what credit unions have you worked with? That may not be good enough. What you want are guides who can lead you into and through the digital wilderness. Pick wisely. But pick boldly. Some years ago the CTO of one of the world’s biggest banks told me what he did when his CEO tasked him with getting a mobile app for the bank. He downloaded many of the most popular apps at the time, spent a weekend absorbed in them, went to the office on Monday with a list of the 10 or so he liked the best. None of those apps were at banks. Not a one. He put HR on finding out the names of the key developers, they called in people for interviews, and within a week or so he had assembled a project team to get his bank on the phone. Was he concerned that none of the developers had banking experience? Not in the slightest. His bank, he said, had hundreds of executives who could add in banker smarts. What he needed was people with digital smarts and he knew he wouldn’t find them at banks. Do likewise is my advice. Want inspiration for a credit union transformation? Read the story of Partners FCU. Credit unions are doing this. $30 billion annually – that’s how big Pew said the payday, pawn auto title, etc. loan market is in America. When people need a loan, and everybody else has said no, they go to alternative lenders. That’s 10 to 12 million Americans every year. They pay through the nose too. Up to 400% APR. But what if credit unions could get involved. And what if credit unions could offer more consumer-friendly options. Enter QCash, an innovative, small dollar lending platform that grew out of WSECU (Washington State Employees Credit Union) and also benefited from counsel via Filene. Ben Morales, CEO of QCash, said that QCash in effect brings WSECU back to its roots. The first loan the credit union made, around 60 years ago, was $50 to a member to buy new tires. That is exactly the kind of helping hand credit unions were formed to offer and, said Morales, QCash is a platform designed to help many more credit unions profitably offer small dollar loans to members, to the benefit of the member and also to the credit union. The problem: many credit unions have abdicated small-dollar loans, said Morales, leaving the market to alternative lenders. Which often means predatory lenders. That’s exactly where QCash comes in. What it offers is an automated platform where the loan applicant answers a very few questions and, in under 60 seconds and with just six clicks, a decision on the loan is rendered. That speed is possible, said Morales, because the credit union already knows a lot about the member. There’s no need to ask the member questions where the answer is already known and, because QCash accesses the core, it knows plenty about the member. That speed and simplicity is a big plus for loan applicants. Many fear that applying for a credit union loan means a visit to a branch for a face to face but QCash puts the process online or in the mobile app. That makes it easy for the member and also eliminates much of the embarrassment potential. About 70% of loan applications are approved, said Morales. Add it up and QCash is a good deal for the appropriate member. Why isn’t it offered at more institutions? The grumbles about offering payday loans at a credit union are many. There are complaints that this isn’t what a credit union should be doing, that the borrowers will default, that it’s too expensive to process loan apps to bother with small-dollar loans to imperfect borrowers, etc. etc. QCash proves a lot of that wrong. Last year QCash – which presently has five active credit unions involved with several more in the go-live queue – processed around 35,000 loan apps. It has a track record. The charge-off rate, said Morales, is around 10 to 13%. “That’s why you charge as high as 36% APR,” he said. He added that some QCash institutions charge significantly below 36%. Nobody presently charges more. Morales acknowledged that some in the credit union movement are squeamish about the idea of charging members 36% APR – but he pointed out that, for this member, that usually is a very good deal, much better than the alternatives that might be available. Point is: this is helping members. Not hurting them. Even so, not every institution involved in QCash is aggressive about marketing it, Morales acknowledged, perhaps because of some lingering concerns about being seen to offer payday loans. That’s something the reticent institution just has to get over. Because that’s the better path for the member. An obstacle to credit union implementation of QCash is that right now doing so requires significant in-house technical talents and credit unions below perhaps $500 million in assets often don’t have that. Small credit unions may also have problems in providing access to the core – frequently because the cost of needed middleware is high. Point is: QCash is working on making its product readily adaptable to a growing number of credit unions. Morales said QCash hopes soon to offer QCash to credit unions without regard to size and scale. Fees from the QCash side in implementing it run $15,000 to $20,000. Bottom line for Morales: going after high interest, predatory lending should be a credit union differentiator – and QCash puts those targets in range. “We can do something about this,” said Morales. Credit unions could rock their way up in the public consciousness and put on a good guy aura in the process of taking on predatory lenders. The April CUNA Mutual Trends Report drops a paradoxical bomb that leaves us confused: are credit unions getting bigger? Or are they vanishing? Roll back to 1960 and, per NCUA data, just 6 million of us belonged to federal credit unions. A similar number belonged to state chartered institutions. That’s 12 million total, out of a US population of 180 million. That’s about 6.7% of us, far below today’s one in three. Plainly, a lot more of us belong to credit unions now, probably because of expanding FOMs and also because many credit unions offer tempting deals – for used car loans, for instance, and in some markets home mortgages – that bring in members at least for those specific products. More credit unions also are working smarter and better at communicating that their membership is pretty much open to all. There remain some of us who believe they can’t join a credit union because they don’t belong to a union – but those numbers are shrinking. Member growth is good. But do the CUNA Mutual data mean the credit union movement should pop open champagne and toast the good times? At least not just yet. There’s more to digest in the CUNA Mutual data dump. Do the math. If the current rate of consolidation continues, by 2028 there will be a bit over 3000 credit unions. In 1960 there were about 10,000 federally chartered credit unions, per NCUA. Many credit union executives, at least privately, of course grumble about indirect car loans because the “members” they bring in often limit their memberships to the car loan and they aren’t especially profitable. Add this up and what’s the meaning? Credit unions need to do a much better job of expanding their relationships with members. It is great to have an expanding number of members, it is not so great not to be creating more solvent credit unions. The truly good news is that if one in three Americans belong to a credit union that is plenty of bulk to use to seek to grow the institutions organically. For instance: get that indirect car loan borrower using a sharedraft account and a credit card and the credit union is onto something wonderful. The alternative is to join the thundering herd of dying credit unions, many of which are like wildebeest in the Tanzanian Great Migration, there essentially to be picked off by predators. Parse the CUNA Mutual data and just maybe the message is a double edged sword: grow membership, especially the right membership, and success may lie ahead. Or shrink into extinction. That is the stark choice in front of today’s credit union executives. The Citi 2018 Mobile Banking Study told us what we should already have known: consumers love a decent mobile banking app. And they use it a lot. How often? Citi said that mobile banking apps come in third, after only social media apps and weather. That’s based upon a survey of 2000 US adults. How often do your members use your app? The question is not theoretical. It’s in your face, life and death. If your members don’t like your app – and I personally dislike the apps used at the two credit unions I belong to – what’s your future look like? Almost half – 46% of consumers – told Citi they have increased their mobile usage in the past year. Nearly two thirds of Millennials have done same. Expect that number to keep trending higher. As more of us discover that we can easily do most routine banking chores on a phone, we’ll migrate there – especially if we get the message that generally a mobile phone banking session (via cellular) is more secure than the same session on a Windows computer connected to WiFi. Citi threw more numbers at us. 8 out of 10 of us use mobile banking nine days a month. One-third of us mobile bank 10 or more times a month. 91% of us prefer mobile banking over a visit to a branch – and don’t expect that number to decrease. Branches are dead, except for special purposes. If a consumer needs a wire transfer as part of a home purchase, sure, he/she may go to a branch (I did exactly that five years ago); it just seems simpler. But for routine banking chores – including check deposit – it just is vastly more time efficient to do it in one’s home, work, or car. Personally I just deposited three checks via MRDC and transferred money from one account to another, all done at my desk, all done within five minutes. Going to a nearby branch would have eaten up at least 30 minutes and who has time for that? Not many of us anymore. According to Citi, we estimate we save 45 minutes a year by using mobile banking. How fast are your vendors upgrading your apps? Judging by the ones at my credit unions I’d say not frequently. Not nearly often enough. Not nearly enough to keep pace with the likes of Citi and Chase. Can you say better about your apps? You need to be able to, That’s the reality for today. When I talk with senior executives at many credit unions a common complaint about their apps vendors is that upgrades come too slowly. It’s rare that I don’t hear that complaint. But just maybe it’s no longer good enough just to complain. Take action to make faster – richer – upgrades a regular reality. That’s how to survive today. Consumers Say Boo To Your Digital Banking Products – Now What Do You Do? Nah, I didn’t know what “frust” means either. The Internet tells me a secondary slang meaning is frustrated. And, you bet, I too am frustrated with credit union mobile and online banking – and I’m not alone, per D3, and that should definitely worry credit union execs. I have accounts at two credit unions. Digital products at both are inferior to Chase, where I also have an account. If I could have only one account – and if I weren’t a big believer in the credit union movement – it would be with Chase. I hate to say that. But it’s true and, thankfully, I am not limited to just one account. Chase is forever improving its digital products. My credit unions aren’t (and, yes, I know they are locked into their vendors’ upgrade cycles – but why accept that?). Five years ago just having mobile banking was good enough. 20 years ago just having online banking, however feeble, was cause for a celebratory press release. In 2018 that definitely is not enough. D3 proves that with its Harris poll that surveyed 1600 digital banking users (who had used it in the past 12 months) and they were quick to vent. Two in three – 68% – expressed frustration with their digital banking experience. Count me among them. Yesterday I logged in to change the PIN of my debit card. No can do in my credit union’s mobile banking app. I eventually called an automated line and accomplished the task and how 1985 is that? Why can’t I do a simple, mechanical task like changing a PIN on a mobile phone – and, really, do you think call centers do a better job of screening out fraudsters? Ask Microsoft co-founder Paul Allen about that. Nor is there evidence to suggest doing this via online or mobile banking is inherently riskier than via a telephone call. So why can’t I do it? A bottomline reality is that in 2018 an increasing number of consumers want – indeed demand – that their mobile banking app and online banking let them do anything they could do in a branch visit. Even tho credit union members skew older, it is safe to assume 6 in 10 of them are dissatisfied with their mobile banking experience. For sure, too, members demand a feature rich digital banking experience: “The survey also found that more than half of digital banking users feel it is important for financial institutions to provide mobile deposit (70%), P2P services (66%) and mobile account opening (51%) as part of their digital banking offerings,” relayed D3. That is blunt: one in three members who use digital services say they just may shift financial institutions to get better services. That’s the reality. Today consumers benchmark your app and website against Amazon, Netflix, Google and the other top digital services – and, sadly, at all but a handful of financial institutions the digital products are mediocre at best. What’s the solution: commit, today, to improving your digital offerings just about daily, certainly weekly. Word of advice: smart credit unions are committing to continuous improvement of their digital offerings. The era of a once or twice a year update is over. The path to credit union extinction is paved with complacency. Particularly with Millennials, credit unions have key positive attributes – they are local, they are community-minded, they generally are intimate scale, and they aren’t “big business.” All good. But will Millennials suffer a poor digital experience to do business with a credit union with bad online and mobile offerings? Most credit unions seem to be betting that indeed Millennials will. I don’t think they will. New research out of Javelin, sponsored by identity specialist Jumio, makes plain multiple facts and the central one is that digital banking rules and it does so across generations. It’s not just a Millennial thing anymore. Another key takeaway: most financial institutions – eyes on you – stumble in many key places, particularly in deploying mobile banking. This is eroding member loyalty: they will sometimes simply flee to another institution. And security concerns continue to be a bother for many users, according to the Javelin research. Despite the fact that generally a mobile banking session over a cellular network is much more secure than one over an online network. No matter. A lot of users remain very worried about safety and digital banking and the smart institutions are addressing these fears. What all this means is that mobile banking – increasingly the channel that matters in banking – is where credit unions have to double down on efforts to compete with the money center banks and the fintechs that continue to nibble at the user base of smaller, legacy institutions (talking about you, Amazon). Dive deeper into the report and the results can surprise. For instance, although 76% of Millennials now regularly use digital banking, 77% of Boomers do – and, yep, that says Boomers have greater acceptance of the channel. Millennials definitely have fewer gripes about mobile banking. 25% of them express concerns with the channel, compared to 33% of Gen X and 35% of Boomers. What kinds of concerns? 28% grumble about “hidden fees,” while 53% complain about ease of use. Waste a consumer’s time – and the consumer is the judge of this, not a cautious credit union manager – and they will blow you off. Just that fast. Here’s the kick in the head: “One-third of consumers respond negatively to their FI after abandoning a mobile banking activity,” reported Jumio. Understand: 7% decided to open an account at another financial institution. And 13% shared their grumble about the experience with family and friends. That’s word of mouth you don’t need. In this regard, the Javelin research shows that account opening tools must cater to Millennials, mainly because they are the leading cohort when it comes to adding new accounts and services. Their chief complaint: it takes too long. The antidote: speed it up. And make it easy to complete the tasks on a mobile device. That is becoming a crucial battleground. When it comes to authentication, Millennials in particular prefer biometrics, especially eye scans and facial recognition, according to the Javelin data. Farther down the list are legacy modes such as QR codes. Very probably institutions that want to stay on the cutting edge of Millennial acceptance need to roll out multiple biometric modalities. Don’t make security into hurdles members have to jump – how many routinely forget passwords? – but do let members know that security protocols are always there, always protecting them. They want that reassurance even if they don’t want the hassles of dealing with in your face security challenges (what street did your father live on at age 6?). Sift through the Javelin findings and there is much to cheer credit union leaders. There is no way they can compete with money center banks in terms of branches – but they don’t need to. What a credit union needs is top grade digital experiences, online and mobile, that include easy account opening and build in seamless security that will protect members. None of that is easy. But it all is doable at credit unions that embrace the digital mandate. “We are not moving fast enough. We need to move 2x or 4x faster,” said John Janclaes, CEO of the $1 billion Partners Federal Credit Union headquartered in Burbank, CA. In a wide ranging interview, Janclaes revealed exactly why he had put the credit union on what he describes as a journey of digital transformation – and he also talked about progress made. You might think Partners is a blessed credit union. It has enough assets to compete and it has strong SEG ties – it essentially is the Disney credit union and pulls membership from the many Disney companies, from the theme parks to movies and ESPN. It also has two very different geographical hubs – southern California and Orlando, FL. It has a lot going for it. Not that many decades ago, credit unions, he said, were a well balanced three legged stool that offered better rates, better service, and better convenience because many members could bank at work. And then that happy bubble burst as consumers – increasingly – have demanded digital banking and many credit unions have faltered in the transformation from high personal touch and community based institutions. “We recognized we need to keep changing to remain relevant to our members,” said Janclaes. Fueling his thinking was a CO-OP funded study on digital transformation that found, in a survey of 221 credit union leaders, 88% said digital transformation is “extremely or quite important.” And about half the respondents acknowledged their digital experience is “inferior” to top brands like Google and Apple. Janclaes wanted more for Partners, he wanted to offer members a digital experience that in fact rivaled the best of breed because – face it – those are benchmarks members use to grade what they get from their financial services providers. A big step was that he went outside to Kony and also the Boston Consulting Group to help Partners in its journey. “We wanted to work with trusted partners who are industry leaders,” said Janclaes. What especially attracted him to Kony – which has done the bulk of the heavy digital lifting for Partners – is that it had a limited credit union background and also had had successes in very different industries such as retail and energy. “We did not want a credit union incumbent with a credit union mentality,” said Janclaes. Read that sentence again. Credit union management orthodoxy is to vet potential vendors based on their resumes of past credit union hits. But Janclaes turned this thinking upside down. He said he had full support from his board which, he explained, is composed of Disney executives. “Our sponsor sees us a value for the company and its cast members,” said Janclaes. A challenge, he added, is coordinating the new digital credit union with the traditional brick and mortar credit union He indicated that every measure says that in fact is happening as Partners has committed to offering an omnichannel presence that lets members pick how they want to interact. Most tasks – from account opening to joining the credit union – now can be done via any channel and that, believes Janclaes, is the future of credit unions that aim to thrive tomorrow. “We want to make incremental improvements at a rapid pace,” said Janclaes. This, he said, represents a massive “mindset shift” in credit unions that, traditionally, have aimed for perfection and that has taken time. Today calls for faster and that means, often, perfection won’t be there. But what happens will nonetheless be good enough. That of course is how all tech companies think. “Our members are already ahead of us in thinking that way,” said Janclaes. And now Janclaes is determined to bring Partners to that mindset too. An 11 minute video on the Partners digital transformation is here. It’s worth a view by any credit union manager, or board member, contemplating the next steps in their institution’s digital journey because that has become a ride no one can refuse. A new report out of Celent asks a question that just may terrify you: Are banks ready for a real time world? You probably know the answer at your credit union. Join the club: many – probably most – credit unions are nowhere close to embracing a real time financial services universe. Tell me why it takes a day – sometimes several days – to move money from an account at my credit union to a payee already in the system when, truly, it simply is a matter of shifting bits and bytes? Money can – and now should – move as fast as a text message and if a friend in India sends me an SMS via Facebook right about now it is showing up in my FB queue. What Celent is prescribing is adoption of a robust payments hub that can provide the 21st century world what it wants. “Real-time payments require all the activity in the value chain to be carried out, typically in under a second, if not quicker. If all the processes are within the hub, they are easier to manage and coordinate. But as volumes increase, this becomes more and more essential. Furthermore, functions that sit within the hub will be subject to the same design requirements in terms of availability and maintenance,” wrote the Celent author, Gareth Lodge. Some realtime functions already are in use in the United States. Digital currencies – the report pointed in particular to Ripple – are paving the way for a shift to real time money movement. Zelle also is a step into realtime for institutions that adopt it (and some credit unions already have – such as America First Credit Union and BECU). And Dwolla offers realtime ACH transfer functionality. Don’t necessarily expect smooth sailing for your institution into the real time universe. Exactly how – and how well – many competing real time systems will integrate with each other is not yet known. Institutions – and their cpre providers – are fiddling with workarounds. But that’s the point: there will definitely have to be workarounds and they may not always be easy, elegant or even straightforward. Absolutely right. Until real-time payments are part of the package the institution just isn’t a digital bank. Period.
2019-04-21T18:30:40Z
https://cu-2.com/author/robert-mcgarvey/
Several musical instruments in the past centuries were decorated with engravings, inlays, or paintings. This paper focuses on an integrated approach to detect and characterize the kind of dyes when used for the decorations. The multi analytical campaign was performed on a viol made by Joannes Marcus in the second half of the 16th century. The instrument has been shattered during World War II, and the fragments are now held in Conservatorio Giuseppe Verdi in Milan; they still conserve the original black and white purflings and the painted decorations. The study is of critical importance since Joannes Marcus worked in the sixteenth century and, in this very period, some executive features were introduced in musical instrument making, which are now veritable standards for this kind of instruments. At first, UV fluorescence examination and reflectographic analysis have been performed on the different fragments in order to characterize, respectively, the distribution of varnishes and glues on the surface and to select the areas treated with metal-gall inks that result transparent by long wave IR reflectographic technique. The materials were therefore characterized with X-Ray Fluorescence (EDXRF), Scanning Electron Microscopy with Energy dispersive X-Ray spectroscopy (SEM-EDX) microanalyses and Micro-Infrared Spectroscopy (μFT-IR) techniques. In particular, the metallic elements present in the dyes where revealed through XRF and SEM-EDX, while μFT-IR gave details about organic binders. Elemental compositions obtained for the black decorations allowed to distinguish original parts of the fragments from those restored or remade. The characterization of materials performed by our multi analytical approach, allowed us to get a deep knowledge of the technology of this ancient viol maker. In particular, the varnishes are probably composed by a diterpenic and/or triterpenic resin. In the same way, in a few traces of glue the presence of proteinaceous substances have been individuated. As for the brush-decorated area, they present a preparation layer rich in feldspars on which a black layer of carbon black particles is applied. On the other hand the purfling areas are colored by an iron-gall dye. In particular the usage of a different ink allowed to identify restored areas. The viol, or viola da gamba, was introduced in Italy in the last quarter of the 15th century from Southern Spain . In few decades the viols, made in different sizes corresponding to the different voices of a polyphonic consort, became widespread in Europe . The viol was the string instrument most appreciated among musicians and composers for a long time. The early technical development of the viol is almost contemporary to that of the violin; anyway, with the works of the Amati family, active in Cremona since the first half of the 16th century, the stringed bow instruments soon reached characteristics and shapes very similar to those of the classical and modern ones. In those days, many viol and violin makers were active in Northern Italy and there are significant distinctive features for each local making tradition . Several viols of that period had similar features, which allow to identify a clear making line developed in the area around the city of Bologna during the 16th century. Still existing 16th century viols attributable to this local technique trend have been identified, both in public and private collections, and some of them bear manuscript paper labels glued inside with the signature of the maker Joannes Marcus, or showing stylistic features closely related to him. Despite their differences, the instruments of the viol and of the violin families were made with similar construction techniques and materials. Spruce for the top plate and maple for the other structural parts were the most common wood species; proteinaceous glue, like probably bone or hide glue, were instead used to assemble the instrument; finally, transparent varnishes, composed of natural resins dissolved in alcohol, oil or turpentine spirit, were applied to protect and finish the external surfaces . The top plate of these instruments was always decorated with inlaid multi-layer purflings, made with alternate strips of bright and dark wood to point out the contour of the top and back plates and sometimes also of the ribs. The black purflings were commonly made of naturally dark wood, like ebony, but sometimes other dyed wood species were used to imitate it. Generally, the black dyes have compositions similar to iron-gall ink, based on iron complexes . Sometimes, additional painted decorations can be found on these instruments. In the second half of the 18th century, the instruments of the viol family fell progressively into disuse, finally driven out by the bowed string instruments of the violin family. Nevertheless, many viols were converted, with deep modifications of the structure, in hybrid instruments, with the purpose of a reuse. The bass viol by Joannes Marcus, object of this research, was conserved in Milan, in the musical instrument collection of the Conservatorio G.Verdi. The viol was still intact in 1943, exhibited with other instruments of the collection, but it was completely shattered during World War II when the building was destroyed by an air raid. Just a few fragments were recovered from the ruins and stored in a repository of the Conservatorio’s library, and then forgotten. Many years later they were recovered and identified.The set of remains of the Joannes Marcus bass viol is composed of five fragments (Figure 1): the neck with the upper block, with part of the ribs and of the back plate still joined to it; the scroll, divided from the rest of the neck by a sharp break; part of the back plate broken longitudinally; a narrow strip of wood from the top plate, broken in two parts. The top and back plates and the ribs are decorated with three-layered purflings; the top plate and the neck show a painted decoration: a garland on the outline of the top and a bellflower pattern on the back of the scroll. All the outer surfaces are finished with a clear and brittle varnish; on the inner side of the back plate there is a paper label with the signature of the maker; on the joint between the two longitudinal halves of the top plate there is a reinforce made with a strip of paper from a music score. Many traces and droplets of glue were visible on the surfaces. The remains include also some accessory parts: four pegs painted with the same pattern of the scroll, and a tailpiece. The importance of this research lies in the study of the fragments still not restored of the Joannes Marcus viol through a multi-analytical non destructive approach. In fact, only a few micro-samples were taken in order to characterize the materials, to identify the techniques used by the maker for both the construction and the decorations. The analytical work allowed to verify the hypothesis of old attempts of restoration and modifications of the original structure. The set of remains of Joannes Marcus viol. Fragments of Joannes Marcus bass viol. A: decorated scroll; B: neck with the upper block; C: back plate; D and E: top plate fragments; F, G, H and I: tuning pegs. Different imaging (UV-induced fluorescence, IR-reflectography, stereomicroscopy) and analytical techniques (XRF, μFTIR-ATR, optical microscopy, SEM-EDX) were employed to characterize both the materials of the painted decorations and those of the black wood purflings, of the varnishes and of the adhesives. In order to minimize any possible damage to the viol fragments, we decided for our analytical approach to be less invasive as possible. Our intent was to test and develop a procedure which could be also applied on integer instruments. For the same reason, we selected portable instruments, when available, which allow in situ examinations. To individuate and characterize the varnishes, the glue and the possible restored area (ante 1943), investigations by UV fluorescence technique have been carried out. The analytical campaign started with image analyses (namely UV and IR reflectography) in order to obtain an overlook of the materials. Infrared reflectrography measurements have been performed using a CEDIP Jade SWIR near infrared camera (HgCdTe focal plane array, spectral sensitivity 1000 to 2500 nm, 320 × 256 elements). The camera was equipped with a 50 mm macro lens. Samples were analyzed placing the camera at 10 cm distance with a circular illumination of incandescent light. The analysis with UV-induced visible fluorescence was performed by means of preliminary direct observations and then photo shots were taken. The top plate was exposed to a Wood lamp with Philips TL-D 36 W BBL IPP low pressure Hg tubes (emission peak at 360 nm); the photo shooting of visible light fluorescence was carried out using a digital camera Nikon D90 with a Micro Nikkor 85 mm F3.5 objective, using a Kodak Wratten 2E filter (absorption at λ < 415 nm). Non-destructive EDXRF analyses have been performed on the viol fragments with a portable spectrometer (Assing Lithos 3000) equipped with a low power X-ray tube with Mo anode and a Peltier cooled Si-PIN detector. A Zr transmission filter between the X-ray tube and the sample guarantees monochromatic radiation at Mo Kα energy (17.4 keV), with a 4 mm diameter collimator. The irradiated area on the sample is about 25 mm2. This means that for small details such as purflings, the irradiated area is larger that the one of interest. The distance between the sample and the X-ray tube is 1.4 cm; the same applies for the distance between the sample and the detector. The working conditions are 25 kV and 0.3 mA with a 100 s acquisition time. In a second phase, several micro-samples, less than 1 mm2 size, have been collected with a cutter. All the micro-samples have been embedded in epoxy resin EpoFix Struers (curing time 12 hours, 15 parts of resin bisphenol-A-(epichlorhydrin)/2 parts of hardener triethylenetetramine) and then the cross-section observed using a polarized light microscope Olympus BX51TF, equipped with the Olympus TH4-200 lamp (visible light) and the Olympus U-RFL-T (UV light). In order to characterize the organic compounds, on the cross sections and directly on some of the viol fragments μFT-IR analysis has been performed by the Nicolet iN10 Thermo Fischer μFT-IR spectroscope in ATR mode (Ge crystal). The IR spectra were collected in the range between 675 and 4000 cm−1 with a resolution of 4 cm−1, and subsequently expressed in absorbance units. Images at higher magnifications of the samples were obtained through the FE-SEM Tescan Mira 3XMU-series equipped with EDAX spectrometer, at an accelerating voltage of 15–20 kV in high vacuum. The samples were made conductive with a coating of Au deposited with a sputter Cressington 208 HR. The elemental results have been obtained using the EDAX Genesis software processing. This section details the results obtained from the multi-analytical approach (μ-FTIR, SEM-EDS, EDXRF, UV fluorescence and IR reflectography) of the painted decorations, inlaid purfling, varnishes and adhesives. The information obtained by complementary techniques was combined to achieve the most complete knowledge of the materials and of the late renaissance lutherie technology. The preliminary inspection under UV light allowed to identify areas where organic binder materials such as glues and varnishes were used . Figure 2 shows the most important results: in the neck rear are well evident the areas with low fluorescence due to the use and to structural modifications, furthermore, the intense yellow uniform fluorescence due to varnish in the central horizontal area of the neck appears as laid over the black decorations. Finally, on the plate (back side) two different kinds of fluorescence appear together: one, more brilliant and bluish, due to the glue and the other, yellowish, still due to varnish seepage from the front side. Preliminary inspection under UV light. Image of the UV fluorescence of soundboard. Areas that are more brilliant refer to organic polymer compounds. The UV-light induced fluorescence images allowed us to identify some areas of interest for the IR-spectroscopy analysis. In the same way, we pointed out some areas on the junctions and on the neck where the presence of glues was likely. The spectra collected on the varnish (Figure 3A) show absorption bands characteristics of: OH stretching at 3368 cm−1; C-H aliphatic stretching at 2932, 2837 cm−1; C = O broad stretching band absorption centered at 1709 cm−1; C = C double bonds of the vinyl group at 1641 cm−1; C-H absorption at 1451, 1383, 889 cm−1; band characteristic of C-O absorptions at 1249, 1174 cm−1, which intensity is generally linked to an high oxidation level of aged substances; C-C stretching band at 1034 cm−1. These characteristics absorptions could be attributable to aged resinous materials, and, in particular, in accordance with the study of Azémard et al. , to diterpenic and/or triterpenic aged resins [7–9]. IR-spectroscopy analysis performed in ATR mode. A: IR spectrum of the varnish; B: IR spectrum of the decoration. This result is fully compatible with the 16th century historical bibliography. In fact, different historical recipes are known, where diterpenic resin as sandarac and triterpenic resin as mastic were used as main components, generally melted in drying oils or solved, probably as in this case, in alcoholic solutions. In the same way, traces of glue and samples of it were analyzed: the absorption bands of the spectra collected are characteristic of proteinaceous substances (1650, 1550, 1452 cm−1 Amide I, II, III; FTIR spectrum not shown). According to the wood-working and especially with the violin-making tradition, the use of reversible protein glues has always been very common. Between these ones, animal glues like rabbit glue and hide glue have always been the most widely used. The proteinaceous substance identified by infrared spectroscopy could be probably ascribable to one of these groups. The viol fragments show traces of two different kinds of decorations: brush painted areas, especially present on the scroll and historically made with carbon black or black bone particles dispersed in an organic medium, and purfling inlays, on the upper block of the neck and on the back plate, generally made by black wooden strips colored by iron-gallic dye. In the following section, they will be discussed separately for sake of clarity. Carbon black, if pure, should be deprived of elements detectable by EDXRF analysis; on the contrary, it is very absorbent of infrared radiation so that the infrared image obtained by IR reflectography can make its presence visible. Reflectography is widely used on painting for under-drawing examination. For this reason, there is a deep knowledge of the response of black painting media. We performed long wave infrared reflectography (with sensitivity ranging 1000–2500 nm) because, in this range of wavelength, carbon black pigments are strong absorber while iron-gallic ink are transparent . There are some other materials, such as hematite (iron oxide) which have instead an intermediate behaviour at these wavelengths. The iron-gallic dyes, on the basis of the ancient recipes, were produced by mixing vegetal extracts (tannins obtained by gall-nuts) with inorganic salts (mainly vitriols, nominally iron sulphates with other metal sulphates such manganese, copper, zinc, lead and others). For this reason, this kind of pigments is very well characterized by EDXRF analysis, but it is transparent to IR radiation. The relation between metallic elements and iron, in fact, is the most important parameter for the characterization of iron dye chemical composition . Depending on the origin, the concentrations of the other sulphates listed above, compared with ferrous sulphate, in fact, can vary since the most ancient ingredients were not pure products. Moreover, ratios among the components are not explicitly quoted in ancient recipes and thus the final result can change a lot, the dye being a homemade product. For these reasons, the ratio between iron and other metals is often used to discriminate different iron inks . The samples from the decorations on the back of the scroll were investigated by SEM-EDX analyses in order to highlight the characteristics of the black painting and to study the composition of the materials used; traces of a similar painted decoration are present on the remains of the top plate too. A multilayer structure of the decoration was identified at higher magnification (Figure 4A), with a thin and smooth layer of black color applied over a composite material containing micrometer-sized particles extended on the wood cells, that represents the deepest level of the stratigraphy (Figure 4B). In order to investigate the chemical composition of the materials, EDX and μFTIR analyses were performed. The EDX spectrum of the black color layer only shows the emission peak related to the Carbon, which seems to indicate the presence of a carbon black pigment used for the decoration. However, the EDX analyses were performed also on the ground layer. The spectra show characteristic emission peaks of Mg, K, Ca, Si and Al (Figure 4C). This chemical composition seems to be consistent with the presence of minerals belonging to the group of feldspars, as silicates or aluminum silicates. The weak peak of Fe could be attributable to feldspar impurities and/or to a small quantity of iron oxides or hydroxides . The presence of S could instead be attributable to a small amount of gypsum (CaSO4) 2H2O. Historically, the carbon black was a widespread black pigment used in different artistic techniques. There are different kinds of carbon black ; the only crystalline form of carbon encountered among pigments is graphite. Non-crystalline forms can be classified into flame carbons, cokes and natural coals; quite common forms of carbon black pigment are lamp black (a flame carbon obtained burning oil or resins) and chars obtained from wood (e.g. vine black) or bone materials (e.g. ivory black) . Therefore, the presence of this kind of pigment could be considered compatible with the making and decorative techniques of musical instruments of that period. SEM-EDS investigation. A: SEM images (BSE) of the different layers of the decoration; B: SEM images (BSE) of the ground layer; C: EDX spectrum of the ground, with the characteristic elements emission. The presence of a sort of inorganic ground layer under the carbon black film is remarkable. In fact, there are no historical references on the use of a ground layer under the decorations, in contrast with the varnish of musical instruments, where the presence of an inorganic ground layer is well known, especially during the 17th century, e.g. in many Stradivari’s violins . Following the opinion of many authors, as Sacconi quoted , the surface treatment of many string instruments of the so called classical period of Italian luthery (16th and 17th centuries) is a composite coating with at least two main distinct layers: the outer layer, composed of various varnish coats, is strongly colored and henceforth it can be called color varnish; the inner one is denoted as the ground layer, and is often identified as a hard, durable and insoluble material with good optical properties. According to recent studies and investigations based mainly on SEM-EDX techniques, the principal component of the ground layer of black decorations is a mineral micro- or even nanometric particulate with an organic binder. The μFTIR analyses performed in different points of the decoration show absorption bands characteristic of amino and amide bonds, with stretching of NH at 3401 cm−1, C = O at 1655 cm−1 and NH2 at 1551 cm−1 (Figure 3B). The amino and amide bonds could be related to the presence of a proteinaceous medium of the decoration used as a binder of the carbon black pigment. The other absorption bands, and in particular those at 3360, 2926, 2855, 1709, 1451, 1382, 1170, 1038 and 887 cm−1could be ascribable to the resinous varnish already identified on the fragment surfaces, but could be also attributable to the cellulose of the wooden substrate under the decoration. Anyway, no enough historical information is available about the presence of a ground layer localized under a decoration on musical instruments; moreover, decoration interventions, subsequent to the construction of the viol as well as structural modifications, cannot be excluded.The in situ EDXRF analysis exhibits no peculiar chemical element for the pigment if compared with the not decorated areas, as we expected. Otherwise, this pigment shows strong absorption features both in the visible region of the spectrum (i.e. it appears dark see Figure 5A) and in the near-IR region too, (Figure 5B) so we can affirm that the painted decorations of the scroll and of the sound board have been surely made with a carbon black based pigment. It is interesting to observe that in the EDXRF spectra acquired from many brush decorated areas, there is the presence of characteristic X-ray lines of lead. The scrolls imaging analysis. Visible (A) and NIR (B) image of flowers decoration of the scroll. As for the tuning pegs, a separate discussion it is necessary. Their belonging to the original viol is not sure or documented. The colour of the pegs is yellow ochre and the type of painted decoration is different from the one present on the top of the scroll. For their shape, they can be divided in two groups: the tuning pegs E and F and the ones relative to the G and H.In the visible image (Figure 6) the flower decorations on the four pegs are quite similar while in the NIR images (Figure 7) they show a distinct behavior due to the different opacity of the materials. E and F pegs clearly show the presence of an opaque pigment, like a carbon black based material; moreover, by EDXRF we obtain an elemental composition in the same areas very close to the composition of the scroll decoration, therefore also in this case we can deduce the use of a carbon black pigment. For what concerns the G and H pegs, the pigment in the IR region is semi-transparent but not completely transparent. The EDXRF analysis performed on these samples shows a high content of iron correlated with a peculiar presence of manganese. This NIR semi-transparency could be attributed to the presence of an Iron oxide based mineral as an earth pigment, probably mixed with the iron-gall dye.The stems of the pegs are peculiar and distinctive too: as showed in Figure 8 the E and the F pegs result colored with a carbon black pigment; on the contrary, the other pegs are colored with an iron-gall dye. The EDXRF analysis in fact detects the presence of iron, copper and zinc and the IR reflectography proves a transparency to the NIR radiation characteristic of the iron-gallic dye. The tuning pegs. Visibile image of the E, F, G and H tuning pegs. The tuning pegs NIR images. NIR image of the E, F, G and H tuning pegs. Is evident the different opacity of the material used for the decoration of the flower. The stems of the pegs. Visible and NIR image of the stems of the H and E tuning pegs. The samples of the black purfling from the back plate inlays were investigated by SEM-EDX analyses. At lower magnification, the transverse plane of the sample shows a widespread degradation of the microanatomical wood structures, with the vessel walls cracked in various points (Figure 9A). Furthermore, the vessels appear compressed and show an elliptical shape. At higher magnification, the structure of the cells seems to be vitrified, and the elasticity loss of the wood is remarkable from different deep cracks on the walls of the vessels (Figure 9B). At the same magnification, the wood structures show various white areas all over the wood surfaces, which appear as bright stains with an undefined shape (Figure 9C). The EDX analyses performed on these white areas highlight a high content of Fe, together with the elements usually present (e.g. Na, K, Mg or Ca) in the wood (Figure 9D). This iron concentration is too high if compared with the natural content of wood and it could be related to the presence of a Fe-complex used to dye the black wood of the purfling. Generally, dyeing the wooden strips of the black purfling was a common practice and different traditional recipes are known, that used Fe-complex based materials as, e.g., iron-gall ink or also hematoxylin compound (from the heartwood of logwood) . A confirm of this treatment can be inferred from the alteration of the cell shapes pointed out in the SEM morphological study of the wood characteristics: this could be due to a dyeing treatment that included a preliminary dipping in an alkaline solution. The wooden purflings analysis. SEM images (BSE) at different magnifications of wooden purfling samples: A: transverse section; B: vessel structures; C: white stains of the black purfling; D: EDS spectrum of the white stains, with the elemental composition. A final remark has to be done about iron–gallic ink and dye found by the combined use of in situ techniques (namely EDXRF and IR reflectography). The decorative edges are transparent to the IR radiation and the EDXRF analysis detects the presence of iron, copper and nickel (peculiar elements of iron-gall dyes). Taking into account Cu/Fe, and Ni/Fe ratios , we find a correlation except for one point corresponding to a restored area. An analytical campaign on different fragments of a 16th century Viol was performed in order to characterize original materials of this ancient musical instrument. The results highlighted the possibility to get information about ancient materials as varnishes, glues, painted decorations and dyes used to color the inlays. The characterization of materials was performed by a synergic multi analytical approach, and it allowed us to get a deep knowledge of the technology of this ancient viol maker. At first step the analysis under UV light pointed out different visible fluorescence due to both varnish (especially along the less worn out part on the back of the neck) and glue (in the inner edges of the back plate) and allowed us to single out the points where non destructive analysis and microsampling could be performed. The combined use of EDXRF with IR reflectography performed on the inlay of the neck and the back plate detected the presence of an iron-complex dye used to color the black wooden purflings and a carbon black pigment used for the decorations of the scroll and the top plate fragments. These results are confirmed by SEM-EDX analysis that detected lighter elements. The μFTIR analyses were performed on the varnishes layers identified by UV fluorescence imaging and diterpenic and/or triterpenic resinous substances, were individuated. Proteinaceous components in the junctions glues of the fragments were identified by μFTIR analyses: this result could be related to the presence of a bone black pigment or hide glue. Finally the analysis on the tuning pegs highlighted different decoration techniques and helped to confirm the hypothesis about the presence of restoration parts. Letizia Bonizzoni, Claudio Canevari, Anna Galli, Marco Gargano, Nicola Ludwig, Marco Malagodi and Tommaso Rovetta contributed equally to this work. We would like to thank the Conservatorio Giuseppe Verdi in Milan for the collaboration and availability to improve this research, and Prof. Renato Meucci for his cooperation and precious advices. At last, we would like to share the memory of Federico Löwenberger, a great Italian contemporary viol maker. All authors contributed to data analyses and to finalizing the manuscript. All authors have read and approved the final version. All authors read and approved the final manuscript.
2019-04-20T02:20:20Z
https://heritagesciencejournal.springeropen.com/articles/10.1186/2050-7445-2-15
I wanted to say how much I have enjoyed reading your volume The Materials which I’ve gone through (several times) recently. The cleanliness, the clarity, the sureness of line and absence of ‘eloquence’ are very moving indeed. It’s good to see such a book in print and a pleasure to return to it and recommend it to one’s friends. I wonder if your earlier volume of 1934, noted on the jacket of The Materials, is still obtainable? Conceivably I could buy a copy from you? I am most anxious to get hold of it and would greatly appreciate knowing if it still exists. Albuquerque: In 1963 Tomlinson was guest professor at the University of New Mexico and poet in residence at the D. H. Lawrence ranch near Taos. He was on a year’s leave from the University of Bristol, where he taught from 1956 to 1992. It’s pleasant to know that you like the Materials: it is wonderfully generous of you to take the trouble to say so. I was troubled while working to know that I had no sense of an audience at all. Hardly a new complaint, of course. One imagines himself addressing his peers, I suppose — surely that might be the definition of ‘seriousness’? I would like, as you see, to convince myself that my pleasure in your response is not plain vanity but the pleasure of being heard, the pleasure of companionship, which seems more honorable. I like also the first part of that poem (beginning P.8). What is remarkable is the consistency of vision (‘What I’ve seen / Is all I’ve found: myself’ — you see, I can quote you by heart) and the growth into ever more substantial clarity in The Materials. I was intrigued in reading and re-reading the latter to know over what period these poems had been written. Not idle curiosity, but curiosity about the roots of excellence which cannot, surely, be wholly bad. I wonder also how conscious a group activity objectivism was? — I see such differences between, say, you and Williams and Reznikoff, I cannot help wondering whether Zukofsky’s objectivist programme was not later than objectivist verse which is so disparate. These half questions move on the surface of a deep enjoyment that your lovely poems have given me over the past weeks and I apologize for allowing them to intrude into what began as an expression of thanks and pure delight. Perhaps we may chat of these matters in the not too near future? My wife and I pass thro’ New York on our way back to England in mid-August and if the money lasts conceivably we shall stay for a few days. I bring out a new book of verse of my own this summer & will send it to you — not for comment, just for friendship. Again, thank you and every good wish for your work. a new book of verse: Tomlinson refers to his collection A Peopled Landscape (Oxford University Press, 1963). Sa’ib of Isfahan, the translation by Edward Browne. Or; ‘our language is our country’ I’m not sure of the accuracy of that quotation. I hadn’t thought the Discrete Series ‘bad,’ but I do think the poems require the help, the very great good will of the reader. Which you generously supply. I had meant to carry the thinking and the form of these poems as far as I could without abandoning the figures of perception for the figures of elocution, or even of mere assertion, which I profoundly distrusted. There seemed at the time a tremendous difficulty of honesty: the whole weight of sincerity seemed to rest on one’s own shoulders. As how should it not? But there was perhaps not a body of honest contemporary work, a sincere and public conversation in which to join. Not, perhaps I should add, that I take truthfulness to be a social virtue. I think very probably it is not. But I think it is poetic: I think really that nothing else is. The sentimentality of an old codger? - - but I was a mere fine broth of a codger at the time. It’s been pleasant to be invited to talk about oneself - - and to speak with such affection! I see I have rather sneakily accepted praise. But I am reminded, quite against my will, that the poems are, after all, fragmentary and sometimes strained. As you suggest, no one’s work altered, so far as I know, after the word was coined. It appeared in - - I think three - - essays that Zukofsky wrote. And of course those are simply Zukofsky’s essays. I must have owed more to Zuk. than either Williams or Rezi could have: both Rezi and Wms being older than Zuk and I younger. I had seen Zuk’s work in Exiles in, I think, 1928 - - being nineteen or twenty at the time - - and had set out to meet him. His conversation and criticism was important to me, was of great importance to me at the time. I don’t remember therefore that the essays themselves came as anything new to me. I noticed that Williams, in the autobiography, speaks of the first meeting of the Objectivists in an apartment on Columbia Heights. That would have been our apartment, my wife’s and mine. But what we discussed then was the undertaking to print books. The work of course already existed in ms. and the dust jackets of the books carried the explanation, written at that meeting by Reznikoff, that the ‘objectivist press was an organization of writers who had joined together in order to print their own work and that of others which they thought ought to be read.’ It was about as much as could be said. We were of different backgrounds; led and have led different lives. As you say, we don’t much sound alike. But the common factor is well defined in Zuk’s essay. And surely I envy still Williams’ language, Williams’ radiance; Rezi’s lucidness; and frequently Zukofsky’s line-sense. Those essays, by the way, are reprinted in Kulchur No 7. I had not seen them for some twenty years. I can’t judge their current interest, having known them so long. And the style is crabbed. But they seem to me sound statements. An essay of mine, slightly referring to these things, will appear in Kulchur 10, incidently. Not sure if you wanted all this, but I’ll complete the history. The Objectivist Press derived from To Publishers; paper-bound books printed by my wife and me in Toulon. Printed the Objectivist Anthology - - edited by Zukofsky - - and Williams’ Novelette and Other Prose. Commercially disastrous. Paper-backs were new to the U S, and encountered trouble with the U S customs and the U S customs - - the men on the pier, and the men in the book stores. Both of whom said they are not books. The book stores simply would not stock them, or most would not. Thereafter that meeting on Columbia Heights, etc. The poems of The Materials were written between 1958 and 1962. As I believe you surmised. Too long, too personal a story to undertake here: I kept nothing of the little I wrote for some twenty five years. That matter of one’s peers - - I have come to believe again, perhaps in more rather than less despair, that the only possible hope is in the conversation with one’s peers. Or in thinking as if one were in contact with one’s peers. In England, a couple of years ago, I visited Tim Pember, a writer whose work I had seen - - stories - - and he showed me your work among others. I was struck and delighted. Reason for my promptness in reply to your first letter. I have lost Pember’s address, and I don’t know whether he indicated that you knew each other. I’m sorry, since you will be in New York, that we will be in Maine in August. Unless toward the end of August - - ? You are welcome in Little Deer Island, in our rented cabin, if you could possibly make it. “our language is our country”: Oppen is partly remembering the line from Tomlinson’s “Return to Hinton,” which he would have seen in Poetry, June 1961 (later collected in A Peopled Landscape, 1963). Zuk’s essay: “Sincerity and Objectification,” in Poetry, February 1931. Tim Pember: Timothy Pember, author of the novels The Needle’s Eye (Jonathan Cape, 1948) and Swanson (Cape, 1951). We will enquire about an apartment for you. I believe something will turn up. We could offer you the use of our place, but it is impossibly small for a family of four; it would be impossible to put two children in it, unless they should happen to be v-shaped, like corner shelves. I’m afraid you may not have gone to those extremes of planned parenthood. Of course, because you did not plan to stay in New York. Your response to my ‘Persian quotation’ is a very nice event. It was not Persian. I had meant to quote you, but couldn’t remember where I had seen the poem. It seems I mis-quoted. Of course it was ‘… our language is our land.’ But I am glad your statement - - even mis-quoted - - seemed good to you, as - - even mis-remembered - - it did to me. Sorry to say we did not find a sub-let for you. Young artist by the name of Peter Young thought he might find something, and will write you if he does. There seems to be a summer rush to New York. Lord knows why. Seemed no more attractive than usual when we left. Just a line to say thanks for your efforts in seeking us an apartment. Suddenly, out of the blue, a friend in Brooklyn wrote to say he’d be away for summer, wd. we like his …? So we leave for there about the 29th, staying till we sail on Aug 17th. It’s splendid up here — mountains, streams, Spanish graveyards, bears, coyotes. Pity to leave, really, but I wd. like to see a little art in the urbs. Just reviewing yr book, so I’ve re-read the WORKS and very enjoyable it has been — review the New Mexico Quarterly to appear the Lord Knows when. Will send you my own new book, due Aug 29th, as soon as I get back to England. Are you writing? You owe us (the universal we speaking) more pomes for own good. reviewing yr. book: Tomlinson’s review of Charles Reznikoff’s By the Waters of Manhattan, Selected Verse (Charles Boni, 1930) and Oppen’s The Materials (New Directions, 1962), in New Mexico Quarterly 34, no. 1 (1964). We’ll be in New York August 1st to the 15th - - a change of plans - -. Let us know how to reach you. Yes, I’m writing quite a bit. A fair sampling will appear in July Poetry. And elsewhere, but as you say of the Quarterlies, the Lord knows when. I enjoyed very much reading your review. Thanks for sending the copy. I will have a copy made for New Directions-SF Review for the mention of Zuk. They have three or four volumes of prose in the works of which I have just no opinion at all - - in fact my report on the first two mss shown me was that nothing in the world would induce me to read them through. But the first years’ poetry schedule consists of Oppen, Reznikoff and William Bronk, in which my advice is obvious enough. My recommendation of course included Zuk, but the suggestion - - as you see - - has not been acted on. It is by now too awkward for me to discuss the matter with Zuk at all, but it is my impression that they would be more likely to do a Selected than a Collected poems, if only for budgetary reasons. I can’t really urge Louis to submit a ms. since I have no assurance at all that they would accept it. But you might urge him to try it if you think it worth the risk - - to him - - of a rejection. If they had a ms. under consideration I could re-open the discussion. I want to thank you for a people[d] landscape - - I read the quote from Millet as a statement of realism, of imagism, for a moment, and then its sense began to dawn on - - the meaning of factualness, which I think is the deepest meaning of the poems. I had seen it first in the soldi, soldi, against the sea - -. We did very much enjoy seeing you (the American plural: youse). It would be well worth the voyage to walk and talk with you (youse) in England. We will try to do it. Can’t live on that, tho. No one can. I don’t mean to deplore or to attack: can’t live on the convictions of the past either. But they cannot live on that. Something will happen. Something. Not impossible that what will happen is that they will cease to live, of course - -. I am not suggesting that we should lie to each other, this is simply where we are. I agree we must say so, I made my own defense in the last poem of my book - - ‘We must talk now’ or we abandon one another. Still, as fun, as hilarity - - There is something I know, in my bones, about that. soldi, soldi: In “Up at La Serra,” in A Peopled Landscape. This is by way of saying YOU weren’t like that. The above is not the sole impression we took home. It was a great year. Perhaps the best we have ever had … Back here, rain has been virtually incessant. Our pipes had burst last winter ruining dining room, ceilings and books. So wetly in wet we wait, mould on every hand, feeling our premature aches and pains. Why, it almost drives one to monologue. I wonder if you have the address of the San Francisco Review, George? I have an article on a Berkeley painter and I thought I might try them. As I go up the field for mushrooms I think of your promise to come one day and walk on English ground with an Angle. You will need rubber boots. Come to think of it — there are spares. Do let us know how things are with you both. A Word in Edgeways: written June–July 1963, and collected in The Way of a World (Oxford University Press, 1969). In fact I got to laughing too much to be able to read it aloud, and Mary had to read it. So it had a salutary effect: I mean, Mary got a word in edgewise. Not only improved, but comforted me; I was glad to be assured there are many worse than I. Which really I had suspected. Why O why do they do it? Partly the presence of the man from Outside, an opportunity to write their names in the sky, or anyway on something at a considerable distance. Possibly England. We do think and talk very seriously of a visit to the Underedge of Wotton. Or Wotton-Underedge. Doesn’t mean we’ll manage to do it. We become very conscious of age, of the limitation of time, of what we want to work out still. But if we should find ourselves feeling or being rich, we might invest in plane tickets for the spectacular extravagance of a one week visit in Spring. What would you think? What would be a good time? Would flying Americans be too much for your nerves? This only asked as wild speculation — I don’t know that we could do it. But we would like to. The Severn adds its lure. Don’t for the love of Pete let this worry you further. Your version of the child and the ball - - - up, down, up down - - - is a gift, and a good one. I accept. And the other is lost - - it so happens - - in the mists of architectural history. And cannot be restored to the consciousness of any reader without a red crayon. And a two-color print job, which is prohibitively expensive. - - Similar thing, Louis’ saw horses. Which I think was entirely clear at the time. The A’s, the M’s, the horses, the words, do dance and only thru the verse - - all of which he meant as a programmatic statement for his verse. The primacy of music. ‘This earth, this throne of Kings, this England - -’ You mean the man was looking down at his rubber boots when he said that? But Mary’s from Oregon, a good deal wetter than anything you can show, and New York is the worst climate in the world. AND has no mushrooms. June O. Degnan: Oppen’s sister. Your version of the child and the ball: In his review of The Materials (New Mexico Quarterly), Tomlinson had mistaken the elevator signs in “White. From the” as the up-down motion of a child bouncing a ball. Louis’ saw horses: Police saw-horses in Zukofsky’s ‘A’-7. Thanks for yours. I am now dully (how does one spell due-ly?) elevated by your two colour design. Lucidity itself. Why don’t you come and stay during next Easter vacation? It’d be lovely to have you both. Not Easter week, when the rest of the world is abroad, but one of the other four of our recess. The weather should be springy then and the summer rains will not have begun in full fury. I must check when Easter is next year. DO come. We are painting the guests’ bedroom and will do it with added zest at the prospect of your advent. You wd, I think, love the parish churches round here and the general intimacy of the green landscape with its walls of grey stone. Thank you so much for Mrs Degnan’s address. I’ll send off the MS. with this. In Longfellow’s Library: written July 1963 and published in American Scenes (Oxford University Press, 1966). You better mean it: we accept. when love has commen with lent to town, we will be in Gaynest under Gore. And walk in those green fields. Of course we didn’t mean it — Easter don’t exist: it’s just one of those Xtian myths disproved by the 19th Century. April fool! But, serieusement: my vacation is March 10th to April 20th, Justine will be out of school March 25th – April 13th. Why not come in April, as late as possible if only to make sure of good weather and also to MISS the mass holiday, i.e., Good Friday to Easter Monday, that is March 27th–30th. I write more briefly than I would like, since term is upon us … We’ve just finished painting ‘the Oppens’ room’ as we call it. Can you stand a babbling brook outside in the garden or shall I have the authorities switch it off? Love and great anticipation. If Winter comes can George and Mary be far behind. I’d meant to write long before this to say, yes, April 6–13 wd. be fine for the visit — the visit. At the moment rain and floods everywhere. I trust they will have dried out by April. Not usually the cruellest month here. In haste and the desperation of dozens of essays to grade (‘mark’ we say — I spikka da Amurricana fur clarity’s sake). How very kind of you to send us the Mailer and the very fine poem. We had always intended reading Barbary Shore and now we own a copy we shall do so. We enjoyed Naked and the Dead immensely but found, despite the good bits, The Deer Park was a sad, tired falling off. He’s an interesting chap, hipsterism apart, or maybe hipsterism is a necessary part of getting off the ground these days? We seem to have had a dreary phase of ‘sore trials’ since our return — first Justine was hospitalised, then detonsilled, then a dock strike immobilised our imported car on a London wharf for three months; then my father fell ill, was operated on, recovered, relapsed with congestion of the lungs and is now slowly coming forward again. Workmen came in to dig us a septic tank, struck three springs, got flooded out. Tedious additions like that. In the middle of the digging + removal of inner wall of the house, frost struck unexpectedly and froze the water supply for three days. Oh, but this is pure grumbling. Really, I begin to ache with self pity: ‘Tell me about yourself they / say …’ Basta. We do hope you had a nice Christmas. Ours, sandwiched between chaoses, was pleasantly intime and cloistral. Our one visitor, the vicar, brought a bottle of home-made wine; we walked in the afternoon of Xmas day with the children — a lovely, suddenly mild, sunlit time with Ozleworth valley swelling and green despite the recent pressure of frosts, the stone walls very solid yet visionary in the lowering light and the trees looking their brushy, knuckled winter selves. We look forward to Aprille with hir shoures swote. All the best for 64.
2019-04-24T10:53:30Z
https://jacket2.org/article/beginnings-1963
December 2011 – J, T, and Theo B. and the things that were at the Botanical Garden were just too cool for words. Any way you want to see it is fine with us…just take time to look. um, yeah, that sand-dollar…we kept it. it was perfect. 5 chambers for our family. we had to. This brotherly love is just going to grow stronger in the next 365 days. What are you going to build in the next year? If this is the highlight of my 2011, then so be it. How much longer will I get such unsolicited love from a 7.5 year old who just tonight begged me not to kiss him in front of his friends as I dropped him off for his first sleepover? My boy is growing up, so I’ll take all the little things I get. Goodnight 2011. You were good to us. We hope and pray for a similar 2012. We take on the world this year, Jackers, you & me. It’s a promise. Bring on the slider; I’m ready to learn to throw and catch it (maybe with Uncle Beardy’s help). We are ready for Tucker’s 6th birthday in barely 4 days, our little miracle. The joy of friends and science and piano awaits you, sweet man. You warm our hearts. Tiny fellow, how can you be turning 4 this year? Theodore, you make our hearts melt with your questions and statements, all of which are brilliant and honest. play when play needs to be done. and we will learn how to. And we will try hard to achieve all of this with grace and–for me–lots of patience. These are difficult, lofty goals for our year, but then shouldn’t we always have lofty goals? Goodnight 2011, rest well on a job well done. Time to show us your stuff. Many of you know I played every sport a girl could play in high school, and I loved it. Well, most of it; I could have done away with being “scrimmage bait” for Coach Reid’s Varsity basketball team, and I could have done away with Coach Cravey’s mile relay requirement entirely, but overall, my experience growing up with sports was outstanding, and it had a huge, huge role in developing the girl I am today. You learn a lot about pecking order when your first overnight camp experience is a 5-day basketball camp, and you learn a lot about respecting elders when your coach calls a time out solely to tell you to tuck your shirt in. Today, someone who didn’t know any better would probably start whining that their child had been wrongly singled out and ostracized and embarrassed. Back then, everyone in the gymnasium (including me) knew I simply had not adhered to one of the coach’s rules, and he called me on it. Fair enough. In hindsight, basketball wasn’t my best sport; softball was. Early, early on, my daddy became obsessed with teaching me to not “throw like a girl,” which may be one of the best skills he ever gave me. (Boys are always so amazed when a girl throws a zinger or can whip a football into a perfect spiral.) I think I actually cried when I aged-out of the local Recreational League, the same league in which my father had played as a little kid. I played intramural softball in college, graduate school and law school. At one point, I somehow found myself on a co-ed intramural team at Georgia, an experience that will toughen you up for sure–you haven’t felt adrenaline until Eric Zeier smacks a line-drive at you when you’re playing second base. Trust me on that one. It goes without saying that I am loving every minute of my boys playing sports. Baseball with Jack is a pure joy. He’s had unbelievable coaches and has been on teams full of wonderful, fun-loving families–both of which has grown the love of the game in him. Asked a few months ago, we would have said without a doubt that baseball was Jack’s favorite sport. Then along came basketball season. Move over, Fernando Valenzuela. It’s your off-season, you know. Jack and Tucker both are playing basketball for the first time this year. Sitting through basketball practices is nothing like sitting through baseball practice where the non-practicing boys are outside and can run and play and enjoy the lovely springtime weather. Basketball practice finds you trying to corral the 2 non-practicers in a drab, smelly, crowded gym while it drizzles rain outside. To say it’s challenging is an understatement. But the boys love it more than we ever imagined. I’m not sure I’ll ever understand why someone would be against organized team sports or would not let his or her child play. The world today relies on teamwork, regardless of how unique and individualized we think we are. We all need to learn how to play fair. We need to learn how to play with folks we don’t really like. There are rules, and those rules need to be followed. We need to help each other. It’s good to win, and it builds character when you lose. You are not going to win all the time. You’re also not going to lose all the time, either. Exercise is good for you. Learning life long skills is good for you. Discipline is good for you. I rest my case. In other news, my parental units are pulling in sometime today, and we are ready to get our merry on. We are also poised for a potential joint visit from Santa Claus and the Tooth Fairy (after whacking his mouth on his knee (?) last night, Jack has one tooth that’s grossly floppy and dangling). The pre-Christmas run-around has slowed down, allowing the full-on frenzy to blanket itself over our house. Our upstairs is covered with boy-made blanket forts; our downstairs is covered with half-played Monopoly games and chess matches in progress; our whole house is filled with overwhelming excitement and energy. Here comes Santa Claus, indeed…and he needs to hurry it up. Every year since Jack was born, Russ and I send one of those typed letters out along with our Christmas card. I spend more time than is necessary drafting and re-drafting these letters, sifting through a year’s worth of photos to jog my memory of things that have happened, and because I know these letters can often be long, dry and dull, I try really, really hard to make them funny. When it comes to wanting to blab on about one’s children and their antics, I am guilty as charged. And more than once last year I had a friend make a joke about needing to pull up a chair and a cup of coffee to settle in for a long winter’s read upon the arrival of our card–well, not our card but the recap of our lives printed in 10-point font (I’m looking at you, book club! 🙂 ). Jack is truthfully a grown-up in a 7-and-a-half-year-old’s body. He loves to play chess, fiddle around on the computer, work on logic puzzles with family members and read himself to sleep at night. He started 2nd grade this year at Trinity and has fallen in love with History and Social Studies. He still adores math and has been working on projects in Robotics (yes, really!) with a group of other 2nd graders. He can build an architectural masterpiece out of Legos, and he is into extreme fort-building–a sport which involves the use of beanbag chairs, pillows, a parachute and all available bed linens. He has played baseball and basketball so far this year, but has truly found a passion in running. Jack ran in a few small school-sponsored races and did spectacularly well for someone who is only 7. He keeps after me to sign him up for a “real race,” but we are having a tough time finding one that doesn’t conflict with his other sports. He is a competitive, serious and very coachable athlete. Jack still wants to be a vet when he grows up, so you can hardly imagine his excitement at getting to don a wetsuit and enter the water during the Dolphin Experience in the Bahamas over his Spring Break. Unfortunately, this also coincided with us discovering he is allergic to latex. Thankfully, the dolphin people had mercy on the little guy and let him come in the water to meet Wee-Tee the dolphin. Look closely and you might be able to see the gigantic welts all over poor Jack’s body. We’re pretty sure Jack could subsist totally on foods that begin with the letter C: Cheerios, chicken, cantaloupe…his latest excuse for being a picky eater is that he has several wiggly teeth. The tooth fairy has visited our house four times now–the last time was prematurely after Tucker knocked out one of Jack’s top teeth, which was a moderately traumatic moment for Jack since he is the most passive tooth-loser ever. No tying a string around a tooth here. We wait until gravity does its thing. Sometimes we are just amazed at how grown up our little guy is. Tucker will turn 6 a mere 10 days after Christmas and has requested–in true Tucker-form–a “Grossology” birthday party. He started Kindergarten at Trinity this fall and showed up for Meet-and-Greet day sporting a pair of ridiculous fake teeth he had stashed in his pocket when I wasn’t looking. Fortunately, his teachers also have a great sense of humor. He has quickly made lots of friends and is right at home at his new school. Tuck enjoys science and World Languages (he is taking Spanish) and loves that the Trinity playground has giant rock formations to climb. This kiddo is turning out to be our athlete. He can balance on a boogie board in the swimming pool–a feat no one else in our family (including the adults–believe me, we’ve tried) can do. He decided last January that he’d like to try to ride a 2-wheeled bike, hopped on and took off without falling over once. He can climb a tree like nobody’s business, and his scooter-tricks are unparalleled. Sweet Tucker also scored a basket in his very first basketball game. We still call Tuck “the Goat” around here. He will try anything you put in front of him–a nice change from his two brothers. He currently asks for Chinese or Thai food on a regular basis and has already put in a request to visit the Happy Sumo for his birthday meal (he has definitely outgrown his fear of the “crazy chef-fing” that takes place there). Tucker is the life of our party; with his sense of humor, kindness, fearlessness and creativity, he’s the type of friend you’d love to have. Theo would put butter on a rock and eat it. Last year, he was caught drinking maple syrup straight from the bottle; this year, he’s been busted several times with a forkful of butter (but we could hardly expect less from a child who claims his favorite restaurant is Waffle House). When asked what he wants to be when he grows up, Theo will yell out “a train driver man!” Ok, then. (His answer is decidedly less concerning than Tucker’s answer: “a daddy! Who still lives right here!”) Theo could play trains all day. It is beyond adorable to watch Jack, our original train fanatic, sit on the floor with Theo and build tracks that go up and down all over the bedroom. Theo still hauls around a menagerie of items including his stuffed dogs (Dude-Doggy, Little Dog and Barker) and as many “dot-dots” (blankets) as we can stand to let him carry. He is very particular and meticulous about all he does, often becoming very upset if things are not just right (like if he’s not given the “right” cup or if his banana breaks in half). While this is sometimes frustrating for us, one of his teachers told us that the children she’d taught who had similar idiosyncracies all grew up to be surgeons–a career that might be a bit more modern than a train-driver-man. All three boys clearly are best pals. It warms our hearts to see them running and wrestling (well, sort of; truth be told, it makes me extremely nervous) and to hear them laughing and playing. The fact that they roam in a pack also means that they have 3 brains working hard at devising crazy things to do. Jack and Tucker are generally the ringleaders and have truly enjoyed turning Theo into their “minion,” as they like to call him, when they are constructing forts, building contraptions or seeking a contraband snack. Our year was filled with goodness; everyone stayed healthy and happy. Jack’s Dog, Tuck’s Purple and Dude-Doggy/Barker/Little Dog all stayed in one piece (thank you, Lord!). We worked on our patience and tolerance, particularly when some of us are strapped in car seats. We caught (and released) all sorts of wildlife, and we explored everywhere we could. Four-fifths of us can read, and all of us can write our names. 2011 was quite good to us! We hope Santa is good to you, and we hope that your new year is filled with love, laughter and lots of good times! Merry Christmas, everyone! Welcome to December! The past week has been spent doing some serious bedecking of the halls around here, and as you can imagine, the boys are boiling over with excitement. Before we could start thinking about Christmas, we had to get the gobble on. We headed up the Charlottesville, Virginia to spend Thanksgiving with Russ’s family. This would be the child not in to hand feeding large animals. We also attend our one and only Christmas parade of the season in Charlottesville. The Barracks Road Shopping Center parade never fails to charm, mostly because it is hilarious and has a very small-town feel to it…beauty queens of all shapes, sizes and ages…random things like a person dressed like a smoothie from Smoothie-King..a herd of llamas…Santa in a truck. It’s small town goodness at its best and never fails to make me miss the Christmas parades I went to as a little kid in my hometown of Vidalia (well, except for the terrifying scimitar-wielding, belly-dancing Shriner; I’m willing to bet that that dude has scared every child in the 912 area code). We rolled back into town the Sunday after Thanksgiving, and I started migrating decorations up from the basement before we were even unpacked. One of the first things I unearthed was an ancient white ceramic Christmas tree from my grandmother’s house. I can clearly remember sitting in front of this as a child, mesmerized by its twinkling brightness as it lit up the dark of the little indented phone-nook beside her kitchen. I was literally moved to tears when I plugged its dangerous looking, frayed cord into the outlet and the tree began to glow. I loved it then and I love it now even more. Even better, it seems that many of my friends had grandparents with this same decoration (likely all bought at the same Belk Matthews, circa 1975) and this little picture below warmed many a heart with memories of Christmases past. Rock on, little white ceramic tree. Look at all the happiness you bring! Even Henry can’t help checking you out! Yesterday was the Great Tree Hunt. After carefully perusing many, many trees, we all finally settled on one–all of us, that is, except Theodore, who insisted we get a little “Charlie Brown” tree this year. Here is Theo with Calvin Coolidge, his tiny tree named by Jack. The tree-people thought we were completely insane (Jack also suggested we name the other, bigger tree John Q. Adams–so “Quincy” it is). Pulling out the tree ornaments is a favorite of mine each year. I am a pack-rat and nostalgic to a fault, so I could spend the better part of a day unwrapping ornaments one by one and placing them on the perfect branch. Of course, my family prefers to go at it at warp-speed, which is probably why we hit a new record of 5 broken ornaments this year. The boys also tend to stick ornaments on things that are not tree branches. Theo hangs his special 2011 ornament (a Waffle House one) near the trees. What to do with the world’s most expensive clothespin? Leave it to Natalie and Jill to devise an ornament! Love her authentic feathers and that brown patch, Alice! She also appears to be smiling; perhaps her name is Camilla. …has even more amazingly survived for 32 years! While I’m taking my sweet time, assuring each ornament is prominently displayed, the boys are overloading the other side of the tree. In addition to ornaments, we also have several very special Nativity scenes. Russ’s mother gave him one a long time ago, and as a toddler, Jack loved to haul around the Baby Jesus. That Baby Jesus–who is maybe the size of a walnut–has been to Publix, spent the night in Jack’s crib and even attended Music Class. When he’d tire of carrying him around, 16-month old Jack would head back over to the creche, drop the baby in the manger and say (a bit too forcefully, perhaps), “take a nap, Jesus.” It’s a true Christmas miracle that we even still have the tiny figurine. So when I opened up a box from my Mama B’s house that contained the exact same Nativity set and saw that she had rubberbanded Baby Jesus into his manger, I had to laugh. Our newest Nativity set has already been claimed by sweet Tucker. Tuck would leave these guys out year-round if he could. Who could blame him? That side-staring camel is a hoot. Here’s to hoping the Christmas spirit you’re feeling right now–that warmness in your heart and sense of philanthropy, that twinkle in your eye and pep in your step–is just a warm-up. Merry Christmas!!
2019-04-18T23:03:22Z
https://jtandtheob.com/2011/12/
Summary: Appellants were successful in resisting the attempts of Consolidated Finance Limited (“Consolidated”) to enforce mortgages over their homes, mortgages which had arisen as a consequence of engaging the Bankruptcy Protection Fund Limited (“BPF”, “Protection”) to secure annulments of their bankruptcies. The agreements were found to be refinancing agreements and thus subject to the Consumer Credit Act 1974, the requirements of which Consolidated had not met. Whilst the arguments centred around the construction and effects of the agreements, of greater interest to me are the judge’s criticisms of the transactions which, at least in the case examined as typical, were in his judgment manifestly to the bankrupt’s and her husband’s prejudice. He felt that some of the companies’ literature was misleading and noted that it made no mention of the “extraordinarily high rates of interest”. He also criticised the solicitors involved in the process, questioning whether they could avoid the duty to advise their clients, who were clearly entering into a transaction that was manifestly to their disadvantage, and suggested that they may have had “a conflict of irreconcilable interests” given their relationship with Consolidated and BPF. The Detail: Five sets of appellants sought to resist Consolidated’s attempts to enforce mortgages over their homes. The judge focussed on the facts of Mr and Mrs Collins’ case as typical of all claims. Mrs Collins had been made bankrupt owing a total of £13,544 to her creditors. She engaged the services of BPF to help her secure an annulment, given that the equity in her jointly-owned home was more than sufficient to cover all debts. Mrs Collins’ bankruptcy was annulled by reason of BPF settling all sums due by means of funds totalling £24,674 received from Consolidated. Under the terms of a Facility Letter, Consolidated agreed to make available a loan of £32,000 (which was also used to settle BPF’s fees), which was required to be repaid within three months after drawdown. Mr and Mrs Collins were unable to refinance their liabilities under the Facility Letter supported by a Legal Charge, resulting in Consolidated filing the claim, some 2.5 years later, for a total at that time of £77,385 inclusive of interest at 4% per month after the first three months (at 2.5% per month). The Facility Letter also provided for a so-called hypothecation fee of 2.5% of the principal and an exit fee of the greater of £3,000 and 2.5% of the principal. Amongst other things, the appellants contended that the agreements under which they were alleged to have incurred the liabilities were regulated for the purposes of the Consumer Credit Act 1974 (“the Act”) and did not comply with the requirements of the Act. Consolidated’s case was that it was a “restricted-use” agreement, which would lead it to be exempted from the requirements of the Act. The Collins’ argument was that, if anything, it was a refinancing agreement, which would mean that it was not exempt. Sir Stanley Burton concluded from the documents that Mrs Collins was indebted to BPF for the sums advanced at least until the annulment order was made. “The effect of the Facility Letter was to replace her indebtedness to Protection, which was then payable, with that owed to Consolidated. In other words, the purpose of the agreement between Mrs Collins and Consolidated was to refinance her indebtedness to Protection” (paragraph 47). Consequently, it was a regulated agreement and it was common ground that it did not comply with the statutory requirements and was unenforceable in the present proceedings. The judge felt inclined to air his concerns at the “unfairness” of the transactions between the Collins and BPF/Consolidated. He stated that, “at least in the case of Mr and Mrs Collins, the transactions were in my judgment manifestly to their prejudice… If they failed to refinance their liabilities to the companies, as has happened, and the Legal Charges granted to Consolidated were enforceable, it would not only be Mrs Collins’ equity in their home that would be in peril, but also that of Mr Collins. In other words, they were likely to lose their home. This was the very result that, according to the companies’ literature, entering into agreements with them would avoid, but with the added prejudice that the far greater sums sought by the companies would have to be paid out of the proceeds of sale of their home as against the sums due in the bankruptcy (for which Mr Collins had no liability)” (paragraph 56). He also noted that the companies incur no risk in making the advance to the bankrupt, as they will only do so if there is sufficient equity in the property, and therefore “to suggest that they take any relevant risk, as they do by describing their services as ‘No win no fee’, is misleading” (paragraph 57). “Moreover, the companies’ advance literature… make no mention of the extraordinarily high rates of interest they charge, rates that are even more striking given that the indebtedness is fully secured” (paragraph 58). The judge also criticised the solicitors who acted for Mrs Collins and who were introduced to her by BPF, a relationship which, he suggested, may have given them “a conflict of irreconcilable interests”. “It must, and certainly should, have been obvious to them that for the reasons I have given the transactions with Mr and Mrs Collins were manifestly to their disadvantage. Mrs Collins was their client. I raise the question whether in such circumstances a solicitor can properly avoid a duty to advise his client by excluding that duty from his retainer, as LF sought to do” (paragraph 59). Summary: Having consulted IPs and failed to seek additional funding, the company decided to make employees in one division redundant and keep another division running with a view to proposing a CVA. The CVA was approved, but the dismissed employees were granted the maximum 90 days protective awards, as the company had failed completely to consult with the trade unions/employee representatives as required by the Trade Union and Labour Relations (Consolidation) Act 1992. The company sought to have the protective awards reduced. The Appeal Tribunal acknowledged that it was unreasonable to expect the company to have continued to trade while insolvent to enable it to comply with the consultation requirements of the Act – the company could have consulted, at most, for 10 days – and that the Employment Tribunal should have considered why the company acted as it did. The protective awards were reduced to 60 days. The Detail: Around the middle of May 2011, insolvency practitioners warned the company that, unless they took action, they risked trading whilst insolvent. Following a failure to secure additional funding from the bank, the decision was made to close the company’s cable plant, leading to the redundancy of 124 employees, but continue to trade the domestic division, which employed 189 people, and seek to agree a CVA. On 27 May 2011, the 124 employees were dismissed with immediate effect and later a CVA was approved on 24 June 2011. An Employment Tribunal found that the company had failed to consult with trade unions and employee representatives as required by S188 of the Trade Union and Labour Relations (Consolidation) Act 1992. The company raised no special circumstances in an attempt to excuse non-compliance, but it did appeal the length of the protective awards, which had been granted for the full 90 days. The reasoning of the Appeal Tribunal went like this: “We very much bear in mind that the purpose of making a protective award is penal, it is not compensatory. It is penal in the sense that it is designed to encourage employers to comply with their obligations under sections 188 and 189. We also bear in mind that the starting point in considering the length of a protective award is 90 days. Nonetheless Employment Tribunals are bound to take account of mitigating factors and are bound to ask the important question why did the respondent act as it did. Had the Employment Tribunal asked this question it could not possibly have ignored the fact and the conclusion that the company simply was unable to trade lawfully after the advice it had received on 25 May. In those circumstances, it is clearly wrong for the Employment Tribunal to anticipate that a 90 day consultation period could have started” (paragraph 22). In this case, the Appeal Tribunal noted that the company could have started consultation around 17 to 20 May, when it seems the company first consulted the IPs, but there had been no consultation or no real provision of information at all before the dismissals on 27 May. “However, because in our opinion the Employment Tribunal failed to have sufficient regard to the insolvency and the consequences of trading and that a consultation period of 90 was simply not possible, the award of 90 days cannot stand” (paragraph 23). The protective awards were reduced to 60 days. Summary: An English bankrupt sought to have US proceedings against him restrained. The English court declined to intervene, observing that the Trustee’s ongoing application in the US Bankruptcy Court for recognition under UNCITRAL of the English bankruptcy would decide the bankrupt’s fate. The Detail: On 26 March 2012, Kemsley was made bankrupt on his own petition. Shortly before this, Barclays commenced proceedings against him in New York (and later in separate proceedings in Florida). Kemsley’s Trustee applied to the US Bankruptcy Court for recognition under UNCITRAL of the English bankruptcy as a foreign main proceeding. At the time of this hearing, judgment on the Trustee’s application had not yet been given, but the New York proceedings had been adjourned awaiting the outcome. Kemsley applied to the English court to restrain Barclays from continuing with either the New York or the Florida proceedings. The issue for Kemsley was that, although he would be discharged from his English bankruptcy on 26 March 2013, if Barclays were successful in the New York proceedings, that judgment would be enforceable for 20 years in the US and other jurisdictions that would recognise it. Mr Justice Roth noted a couple of authorities, which followed the principle that “there must be a good reason why the decision to stop foreign proceedings should be made here rather than there. The normal assumption is that the foreign judge is the person best qualified to decide if the proceedings in his court should be allowed to continue. Comity demands a policy of non-intervention” (paragraph 30). The judge noted that, if the English bankruptcy were recognised as foreign main proceedings on the basis that England was Kemsley’s COMI, the New York and the Florida proceedings would be stayed. But what if the US Court finds that Kemsley’s COMI was the USA? In that case, would it be right for the English court to intervene? As Roth J observed: “either Mr Kemsley’s COMI was in England, in which case an anti-suit injunction is unnecessary; or it was in the United States, in which case I regard such an injunction as wholly inappropriate” (paragraph 50). Consequently, Roth J dismissed the application. In a postscript to the judgment, it was reported that the Trustee’s application for recognition was refused by the US court. The court found that, at the time of the petition, Kemsley’s COMI was in the USA. Summary: A creditor sought the restoration of a dissolved company to the register in order to pursue a preference claim. The company had been moved to dissolution from administration in 2010, so the petitioner sought a winding-up order that would follow on immediately from the administration so that the preference claim was not already out of time. The judge restored the company and ordered the winding-up, but noted that this did not deal with the 2-year gap between insolvency proceedings. This was because he felt that, on filing the form under paragraph 84 of Schedule B1, the administration had ceased, dissolution being a later consequence, and so the eradication of the dissolution merely brought the company back to the position after the end of the administration. The Detail: To enable a preference claim to be pursued, RLoans LLP sought the restoration of a company to the register and a winding-up order to take effect retrospectively from the date that the former Administrators’ notice of move to dissolution was registered. The transaction that is subject to the preference allegation occurred in March 2006; Administrators were appointed in January 2007 and they submitted the form to move the company to dissolution in June 2010. Therefore, only if the company’s restoration was accompanied by a continuation of insolvency proceedings – either a liquidation following immediately on the cessation of the administration or an extension of the original administration – would the preference claim have any chance due to the timescales involved; it would be of no use to the petitioner if the commencement of the winding-up were the date of restoration. Mr Registrar Jones had no difficulty deciding that it was just to restore the company to the register. However, he concluded that the resultant fiction that the dissolution had not occurred had no effect on the cessation of the administration: “when paragraph 84 of Schedule B1 to the Act prescribes that the appointment ceases upon registration of the notice, it means that there is no longer any administration in existence. The cessation is not dependent upon dissolution taking place” (paragraph 26). Therefore, there would still be a gap of over two years between the end of the administration and the start of any winding-up, which would not help the petitioner. The judge also felt that the solution did not lie in extending retrospectively the original administration, because the company had ceased to be in administration before its dissolution; all the current direction could do was to restore the company to the position it was in before dissolution. In the absence of the recipient of the alleged preference, the judge was not prepared to consider suspending the limitation period between the end of the administration and the commencement of liquidation. Therefore, all he did was restore the company to the register and order its winding-up. He also declined to order that the IP waiting in the wings be appointed liquidator: “I only have power to make the appointment if a winding up order is made ‘immediately upon the appointment of an administrator ceasing to have effect’ (see section 140 of the Act). For the reasons set out above, that has not occurred” (paragraph 61). Summary: Staff employed in one part of the business were not “affected employees” under the consultation requirements of TUPE, because they had not been affected by the transfer of the other part of the business, but by the closure of their business. The fact that the original plan had been that their part of the business would also transfer was not relevant, but rather it was what was finally transferred that was relevant for TUPE consultation purposes. The Detail: I Lab (UK) Limited (“ILUK”) operated a business providing rushes and post-production work to the film and television industry. On 11 June 2009, the post-production staff were given notice of redundancy, but also were told that the plan was that some of them would be hired on new contracts. However it seems that the plan changed; the company was placed into liquidation on 30 July 2009 and on 11 August 2009 assets relating to the rushes part of its business were sold to I Lab Facilities Limited and no new contracts were made with the former post-production staff. The Employment Tribunal found that ILUK had failed to comply with regulation 13 of the Transfer of Undertakings (Protection of Employment) Regulations 2006 (“TUPE”), but the transferee appealed on the ground that the post-production staff were not “affected employees” for the purposes of TUPE, because that part of the business had not transferred, and thus they had not been entitled to consultation. The Appeal Tribunal agreed – the post-production staff had not been affected by the transfer, but by the closure of the business. However, Counsel for the employees argued that it had been the original plan – which would have affected the post-production staff also – that had generated the requirement to consult. The Appeal Tribunal reasoned: “It is necessary to appreciate that the time at which an employer must comply with the obligations under regulation 13 (2) and (6) is not defined by reference to when he first ‘envisages’ that he will take the relevant ‘measures’. Rather, the obligation is to take the necessary steps ‘long enough before’ the transfer to allow consultation to take place. That being so, it can never be said definitively that the employer is in breach of that obligation until the transfer has occurred” (paragraph 20). Consequently, as the indirect impact of the actual transfer of the rushes business did not make the post-production staff “affected employees”, the appeal was allowed. Summary: As reported in an earlier post (http://wp.me/p2FU2Z-38), the Court of Appeal overturned a rejection of an application for an Administration Order over a Jersey company. The Detail: At first instance, Mann J said that an Administration Order could not be made under S426, as the English Court was not being asked to “assist” the Jersey Court in any endeavour as there were no proceedings afoot in Jersey. In the appeal, Lord Justice Davis expressed the view that, with all respect to Mann J, “his interpretation and approach were unduly and unnecessarily restrictive” (paragraph 35). His first point was that “S426(4) is not by its actual wording applicable (notwithstanding the title to the section) to courts exercising jurisdiction in relating to insolvency law: it is by its wording applicable to courts having jurisdiction” (paragraph 36) and, in any event, Davis J felt that the Jersey court was engaged in an endeavour: “the endeavour was to further the interests of this insolvent company and its creditors and to facilitate the most efficient collection and administration of the Company’s assets” (paragraph 41) and thus the Royal Court of Jersey made the request that it did to the English Court. Categories: Case law | Tags: administration, annulment, bankruptcy, COMI, liquidation, protective awards, restoration, TULRCA, TUPE | Permalink.
2019-04-26T14:34:49Z
https://insolvencyoracle.com/2013/06/02/1-legal-charge-for-bankruptcy-annulment-service-unenforceable-2-employment-appeal-tribunal-acknowledges-companys-conflicting-statutory-duties-3-english-court-leaves-us-to-decide-bankr/
Windows 10 is finally out and has been used in many numerous brand new devices. Numerous Windows 8 laptops are still available in some store racks in the biggest store in my city or through online stores. While it is a free to make a upgrade (in limited time) when you get the best Windows 8 laptops, buying a Windows 10 laptop guarantees that the laptop will have free future upgrade and has all the perfect stuff inside it. The next tips are to get for more than 128GB of storage. Most purchase boast both of processors and graphic card, yet make a point to also take the drive storage as the consideration. The 128GB SSD should be much faster than normal HDD you might expect. In the event that you would spend the additional money, go for 256GB. Do scroll down below for further buying guide based on the price point. For most appropriate gaming laptops, there is no deficiency of Windows laptops over $1,400 with top of the line features and even 4K resolution (screens with four times larger resolution than 1080p FHD). With 16GB of RAM and 512GB of SSD, it was seen as a long shot and considerably as quickest machine of the bundle. Yet, all that power and those pixels oblige you to charge the battery more often. They might be the best contention yet to invest in a laptop setup. The best mix of combination between performance and portability in the best lightweight laptops come in the $800-to-$1,200 range. Here, you should find Windows with many different options, included slim and light design, high-resolution screens and the most recent Intel Core i5 or i7 8th gen processors . Find the one having your wishes features, like the resolution (a 3200×1800-pixel ultra-high-res alternative), the backlit keyboard (illuminated with very much dispersed keys), and the powerful of (SSD and either of Core i5 and i7 processors). These are three things should be consider for getting a better laptop. However users could also consider some worthy features like Windows 10 motions and swipes. The fans inside can make the machine sound like it’s getting prepared for liftoff, so better to see the system with Intel ULV processor which produced less heat. Also, you need to get the lower resolution below 1080p if you demand for a perfect battery life. The high resolution panel might only keep the battery for five hours with some heavy Web surfing test and brightness set around 75%; the 1080p model endured pretty much nine hours. The uplifting news now even in the middle of $600 and $800 price points, there are still some truly solid options in the good affordable laptops. You’ll make a few sacrifices in the additional features like (illuminated keyboard or touchscreens) yet you can still find and get an Intel Core i3 or i5 processor, a HD or FHD panel and not too bad build quality and finishing. Most of the keyboards aren’t backlit; it’s still shockingly great however, as its considerably as affordable enough. The battery usually here will last for almost seven hours on a single charge and the 256GB strong state drive should provide a smooth and comfortable experience with Windows 10. Individuals, who don’t have high budget or much money can get a Windows budget laptop for not more than $500, yet attempt to never pick these low-lease machines on the off chance that you need a powerful performance for finishing your work. The specs appear to be alright, however it’ll be a while before one should upgrade it after 2 o 3 years of usage. For example, you get a 14-inch flip-able touchscreen and great high quality speakers. But, as the return some of quality from the chassis would be bad such as plastic material, so make sure to see everything out before taking a system at this price point. Few other minor stuff you are going to find here are the screen is similar to gazing into a blurred mirror, the keyboard flexes like a tramp due its bad material, and the Windows 10 itself is full with bloatware that must be deleted manually. If you recollect one thing, let it be this: In case you’re in a race to purchase a portable PC, get one you can live with and spend in any event $600, and in a perfect world in the middle of $800 and $1,200. Not all of people want to spend their money for more than 1000 dollars for just getting a laptop and prefer to have the cheaper one for some reasons. I guess that is pretty normal because sometimes we do not really need that I7 processor and GTX 1050 for finishing our work. Well, if you are that kind of person and looking for a decent machine that not really that cheap, but coming with powerful specs, then you need to take look at this one. The Vivobook F510UA is basically the cheaper version of their business machine that mainly target of students and business users as their main consumers. The device is mainly built from aluminum and later finished with silver finishing that adds bit of premium look. The packaging is surprising me because it’s not that bad in comparable with similar devices at the same price. For supporting our productivity, ASUS features the system with Intel Core I5 8250U which is coming from the latest gen of Intel processor that brings significant performance improvement than what previous version promised to the consumers. The numbers of cores are boosted into 4 and make it entirely Quad Core and not Dual Core anymore. More cores mean more performance and better multitasking. The improvement is not just stopped there because the power consumption is also cut off and making it less consuming battery. The 8GB RAM seems to help the system on handling multitasking very well and I could not find any slowdown or any stuttering during the startup or even after 5 or 6 hours of usage. Like I told before, the battery life is improved here. I mostly got of around 11 or 12 hours of battery usage in single charge on using it by browsing to the internet and while connecting to the WIFI. The result is quite bit better thanks to the newest processor. Acer is always dependable of making high quality products, but never forces the consumers to spend much on getting it. The result is shown here where they put so much things on their newest of Aspire E 15. The design itself is not having any difference at all than the previous version. It still uses the same black cover that they called as Obsidian Black. I have to say that the packaging is not really the biggest selling point here where the design is mainly made plain without any detail surrounded the lid. There is only the company logo placed on the lid and beside than that, I am sure you are not going to find any impressive thing. Luckily, the build quality is top notch here and feels great on both of my hands on holding it. At least, they never play with the quality of their products. Move to the inside, then we would find something that rarely to see and even impossible to put with this price range. The system is powered by Intel 8th gen Core I5 that combined with NVIDIA 150MX. The MX series is not comparable with GTX series, but still offering a decent performance for gaming. The 150MX is actually the mobile version of GTX 1050 and still quite dependable for playing both of AAA and E-Sport games. I did make test with few games like Overwatch and Tomb Raider 2013. Both of them runs at nice performance where Overwatch mostly runs up to 60 FPS all the time with only few drops during rare situations. The same thing goes to the Tomb Raider that shows impressive result and it runs at 1080p with the highest setting up to 30 FPS. This can be the cheapest gaming laptop to afford right now for anyone in tight budget. Playing E-Sport and Indie games will be fun here. The Surface Book 2 is probably one of the best Windows devices to get right now. Its promising of both of productivity and portability at the same time to the consumers. The hybrid design is now becoming more and more popular right now and allowing you to detach the screen from the dock keyboard and only use it on the tablet mode. All of our data are saved on the tablet and we do not lose anything when detaching it. The detaching process is done easily and users just need to hold the dock with their single hand and then take off the screen. The build quality is impressive here, so never worry to take it off as much as you want. On the inside, there is a full size keyboard that fit nicely into its small chassis. All of keys are appeared in normal size except for few keys that made quite small in order to fit them all. The typing experience is not an issue here and I was able to type for more than 90 words per minute without any issue. The product is available in few different selections included the 13 inch and 15 inch versions. Both of them are not having difference except for the display size and the specs. Here, I prefer to pick the 13 inch one because it offers better portability for the consumers. The 13 inch display features of 3000 x 2000 resolution and looks amazing in such a small panel. The panel can produce 99 percent of SRGB color and quite impressive. The brightness is totally bright and you won’t need to push the brightness into maximum for any outdoor usage. For people demanding for power, then you should really love this product because it features of new Intel I5 processor and NVIDIA GTX 1050 on the dock. With portability design, powerful hardware, and decent price, I think this might be the right time for swapping your old notebook. The Helios 500 is a gaming machine that every consumers dream about. The machine is built with overall great design fit powerful hardware on the inside. The black and red schemes are very common nowadays, but it’s still giving impressive look thanks to the slim and sleek chassis. Although it fits of 17 inch display, the body is actually not really bad weight to carry over. I am still able to fit it into my small bag and carry it over. The dimension of the body itself is measured at 16.6 x 12.7 x 1.6 inches with total weight for 9 pounds. When you open the lid, you would be welcomed by full size keyboard that fully supported by backlit. The backlit support is customizable and there is an app for controlling it over to your needs. Having a bigger keyboard seems to be helpful on gaming as now I can easily communicate with my friends during the match. As for the gaming test, I think the result should not be asked anymore because the Intel I7 8750H and NVIDIA GTX 1070 are beast. The GPU even supports of VR gaming if you have any supported devices like HTC Vive or Oculus Rift. The hardware is so powerful and having any adjustment in game is not needed anymore. I tried to test of VR Chat which is so popular right now and it runs without any issue or lag. I actually did found any lag, but that is a server issue and not a hardware issue. Then, I also did few tests on games that quite demanding in term of power like The Witcher 3 and Mass Effect Andromeda. Both of games are playable up to 30 FPS at the highest setting and run very smooth all the time. I really have no bad thing to say about it and this might be your next gaming machine. The Spectre X360 should be my favorite choice from this list. With the price that similar like Surface Book 2, it promises you so many better things that not available there. For the look, they have done such a wonderful work to make it so slim and thin. The 13 inch version even features only 0.53 inches thickness where the 15 inch version only slightly far from it. The thing is impressive especially when the company is able to fit the standard port and modern ports together. There is a single USB 3.0 port and double USB Thunderbolt 3 ports. It gives you total of three USB with one of them does not need you to use the adapter just for connecting your smartphone. The company put some adapter on the package, but using the standard port is much better as we only just plug it and the problem is solved. Like Surface Book, the Spectre X360 also features of convertible design that allows you to transform it into multiple modes included the tablet mode for browsing through the internet, the tent mode that so useful for streaming movies, and the traditional mode itself for working or finishing your paper. Sadly, the screen could not be detached from the keyboard, so never ever try to do it. For adding more experience on enjoying their product, HP includes of stylus pen for free ready from the package to use. The screen supports of more than 4000 thousands pressure level and feels so smooth on taking the note and navigating through the system. The portability is really the biggest selling point here and I think that is the important matter that many users looking for. If you have not in mood on getting of Surface or Macbook Pro, this one can be your top alternative for those devices. The development for the technology moves so fast where in the past we so many bulky and heavy devices. Nowadays, it’s totally different because majority of laptops available right now are sleek and slim. This popular trend is not only happened on the convertible and hybrid devices, but also happened on gaming machine. The good example is here, Razer is successfully on creating of powerful machine into such a small packaging. On the inside, there are Intel I7 8750H, GTX 1070, 16GB RAM and all of them are fit into 4.3 pounds chassis. It looks so impressive and I would easily give them my five stars for their hard work. Moreover, the entire chassis is created from aluminum material that feels durable and light at the same time. I am able to hold it easily my single hand although opening the lid with single hand is still not possible as the base is lift up when I do it. Beside than putting of tremendous design and great hardware, Razer also put of some nice features that work beautifully with the hardware. For gaming, the operating system is featured with killer Wireless AC that basically will prioritize your connectivity into your game rather than putting it on other not useful apps. As the result, the performance on gaming feels smoother as now we mostly receive 80 percent internet connection to our games. For controlling the fan customizable keyboard, then you soon find the specific keyboard for controlling both of those things. On gaming, hardware is very important, but never also forgets that there is software that keeps everything running from the background. So, having better support on software is also important and this is what Razer never fails to satisfy their consumers. The only reason keeps people on avoiding it is the price that quite bit pricey for now. The Thinkpad X1 Yoga is specifically built for business users who searching for sturdy, fast, and durable device for their business. The build quality is the biggest selling point here as the product has received MIL durability test in order to make the product sent to the consumers are not defect. The durability tests here included of bump, drop, and even extreme temperature test. The packaging is durable, but still yet beauty with black finishing in all over the body. For adding even more security, the fingerprint is ready to let you open the system without need for adding password anymore. Here, just put your finger on top of it, then the lockscreen would be open. Having a fingerprint is very helpful as it let us open the system instantly and adding better security as there is no way for people to break into it. Many of convertible laptops right now do not bring really that great keyboard for some reasons. They will give us nice experience on typing, but the thing is totally different when you do it after 3 or four hours. Your finger will start to hurt and that is annoying because we have to take a break. Hopefully, the thing is never happened here because the keyboard we see here is different. The keyboard offers great experience even after long usage thanks to the tactile keys and decent travel distant. The travels distant between keys are not too close or too far and the each key itself gives satisfying result when you press it. This is far the best keyboard that I have tested on convertible products. Another worth thing to mention here is the battery life. The 4 cell batteries should give you up to 15 hours battery life in single charge. No need for carrying the charger anymore as it runs for a day. The Galaxy Book 12 is Samsung’s answer for Microsoft Surface Pro. The 12 inch product comes with similar design and promising things, but with cheaper price and much better hardware. The Galaxy Book features of detachable design that allowing people to use the screen only and leave the keyboard behind. I am still having my Galaxy Tab Pro with Android and holding this one really reminds me of that tablet. The dimension and the weight itself are very familiar. The total weight for the entire thing is around 2.6 pounds with thickness for 0.6 inches. Everything is so familiar with Surface, so why do not we just buy it over this one? Well that is my first opinion about it, but the thing is completely different when I see its display quality. Believe or not, Samsung put their famous AMOLED display into this small laptop. The AMOLED panel seems to be far superior to TN or IPS panel on producing color and details. It produces huge amount of details and even supports of HDR content. I am so surprised on finding so many amazing things here. For example, I though the port for charging the device is pretty similar like we see on many similar products, but this one is actually better because its supported by fast charging and charge it for 20 minutes would give you around 2 hours of battery life. Just imagine when you are on travel and we can just plug it and charge it over with power bank. The thing is much easier to do rather than searching for wall socket that almost impossible to find on travel. Moreover, the Windows 10 pre-installed is coming with application that allows you to receive, reply, and seeing message from your smartphone. With its fantastic feature, I think it’s hard not to get tempted by this product. The XPS 13 has been introduced by Dell for many years and its always received of well response from both of consumers and reviewers mainly from its well-crafted design. The laptop is always becoming the first product to be the slimmest one among the market. On this year, they still do the same thing by providing of totally sleek and robust design. The packaging itself is not having much differences beside than the weight and thickness that now cut into half. As the result of this case, now the standard USB port is completely removed and only fit of Thunderbolt ports for connecting anything. I hate to say that now I need an extra adapter every time I want to plug and charge my smartphone, but that is the price if we really want to move forward because this problem is unavoidable anymore. For supporting our productivity, the Intel I7 8550U and 16GB RAM are more than enough to run anything from the lightest one like browsing and editing document to the most demanding one like doing Photoshop and video rendering. Processing the 1080p video is easily done and still supports the resolution up to 4K. Everything runs smooth and dependable for multiple purposes. The only complaint here is stylus pen is not included on package although they called this product as convertible laptop. We have to buy it separated or just leave without it. Using your finger and stylus pen is not difference at all. The thing is only different when you want to take a note or drawing on it. For that case, then buying the stylus pen is recommended for making the processor is easier to do. I recommend you to check it further and see how it works on you. HP Stream 14 is going to be our last choice here. The product is really available in such cheap prices and works great for students or business users who only want a laptop for doing work and enjoying multimedia and not more. The packaging is their biggest selling point here as it comes with different colorful choices like blue and red one that look fun. There is black version if the users do not really want a cheerful one. Although with its cheap price tag, the build quality is not an issue here. The hinge system feels sturdy and holds the base pretty well. This is not something that will break after one or two years usage. The keyboard on the inside is also something to proud here. The keys are not stiff and shallow. It’s dependable for finishing your school project without anything to afraid off. The only thing it misses here is the backlit support. For doing all of stuff, the system is going to be powered by Intel Celeron N4000 and 4GB RAM. This Intel Celeron processor is quite new and taking care all of light and medium tasks without any issue. The 4GB memory really keeps the performance and multitasking so stable. No stuttering or low memory issue during the processor. For the test, I opened more than 13 tabs on Chrome and it still runs smooth. The real issue here is the storage that quite limited. There are 32GB and 64GB version available, but these storages are still limited as we have many apps to install here. The only way expand the storage is expanded it with micro SD slot. I think adding couple gigabytes should be enough for saving your stuff. The Windows 10 has been introduced for few years until now and I finally safe to say that this Windows version is better than Windows 8 in many aspect. The Start Menu is completely back while they still manages to keep few aspects from Metro UI work very well. The gaming compatibility is once again improved like in Windows 7 and they even add new gaming mode and bunches of stuff for users who love on playing games. If you just holding back yourself for upgrading your laptop at this case, then I guess this is the right time for buying a new companion. I have provided some great choices above, so better to use it as your recommendation on making a decision. I just hope the information provided is useful and feel free to leave any comment for further assistance.
2019-04-26T16:41:49Z
http://laptoptera.com/978/best-windows-10-laptop/
Mean for the Holidays is over, and I am full of joy, anticipation, excitement and so much more. This campaign absolutely blew me away. Before I get into the content of today’s post, I just wanted to say something to you, wonderful reader. I’ve talked a lot over the past couple weeks about the trials I’ve been through, especially when it comes to releasing new work and how easily I find myself planning things that never come to be. I was so nervous to start this campaign because I was afraid that no one would seek it out and that I wouldn’t see much of a return. When I got into this industry, I knew it was going to devolve into a numbers game, and I fought for a long time within myself because those numbers never seemed to pan out. It changed the way I worked, only seeing a few hits on a new blog post. I would drag myself through the mud and after the most impressive pity party I’d come back the next week + I’d write something new. Upset that I wasn’t making the impression I wanted to. Everything was from the heart though, and that’s something that will never change. It was a few years of me struggling with my analytics and my impressions on social media before I really started to tip, I grew so frustrated with the disconnect between what abilities I had, and what was being received that it gave birth to pretty powerful selfishness within me. Despite my mother’s constant support, I saw that those around me stopped reading and from where I sat, stopped caring about what I was doing. The thing is, I was hungry. When you’re hungry, you don’t stop hunting. So I worked and I worked. I worked so hard I put my health on the line for the sake of content I could be proud of, all to increase this imaginary number. I wanted so badly to leave an impression sizeable enough to remark upon. That work culminated into a lot of things, namely, a pretty deep depression. I’ve spoken about it this week if you want to read more. I felt this yawning gap between me now and the version of me I had inside my head and the more I struggled to do the wider that gap became. I was lost and I was searching for purpose with a digital counter. I faced my fears at night, making it a goal to climb up and do better. Write more things that would attract readers. Along this journey, I came to the conclusion that I knew next to nothing about the work I was doing and the world I so desperately wanted to be a part of. I was just as lost five years in as I was at the beginning, but that magical quality to starting a blog and running a business began to wear off. It became dull and dreary work that I could hardly stomach. I was in this mechanical place where I could crank out a full 90k word novel in a month, but it wasn’t any good. As a matter of fact, I’ve written two of them and neither of them was any good. My writing had turned from a welcome place of repose to a gutted warehouse within me that I couldn’t escape, I didn’t want to. I knew that one day I would reach the goals I wanted to reach. I would become the author I knew I could become. So I kept writing. Then came that wave of depression I would fight off with words. I would succumb to the sadness and haul out another monolith of my shame, and my guilt, and my inconsistency. I speak about this like it is a drama, and I do so willingly. I was a tad bit dramatic, I’m sure. My friends could vouch for that easily. My writing had consumed everything and nothing was safe from its grasp. I didn’t know where the dividing line was anymore. I couldn’t be a regular guy and run this business. I couldn’t be an author of the caliber I wanted no matter how many 30 day novels I’d write. Everything came to a screeching halt around May. I had just finished a novel, clocking in just over 100k words. The first few days I was proud of the accomplishment until I returned to edit it and I realized that through the course of the whole book, there was no heart. There was nothing within it that I could call my own. I had successfully become a machine, cranking out words at an astonishing rate, but that was never what I wanted. The waves came bigger at that time. Overwhelming me, almost. I began to play around with the idea of closing everything, starting over from the ground up and trying again with all I had learned. I stopped thinking about starting over though when I looked at how poor my numbers were. How few interactions I received on blog posts and how little my friends seemed to care about what I was doing. This is important. I told myself. I was afraid of being honest with myself, and admitting that going into this with so much passion and not plan was a nightmare. When I caught myself slipping I’d wire up a new schedule and get myself on track and would pound away word after word, idea after idea. Before I had settled on trying Mean for the Holidays earnestly, I sat in my bedroom with my girlfriend on one of the darkest days I’d ever had. I considered that night, giving up on everything I had put so much effort and energy into. I thought for a brief second, that I could throw it all out. The blog, the clothing, the novels, everything. I just wanted to trash it and live like a normal guy. At that moment, my mom texted me as if she knew what I had considered. She told me she missed me, and she told me she loved me. She told me something seemed wrong and she wanted to make sure I was alright. Not in so many words, but I don’t have to speak to my mother with words. She just knows. That night I contemplated giving up all of my work and my entire life’s passion because I was so focused on the numbers and the output that I lost sight of the heart and soul of why I write. It’s been a few months since then, and you’re staring at the final piece of the Mean for the Holidays campaign. I know you want to read what I’ve put below, but I hope you stick around for a bit more and let me finish this story. Depression doesn’t always come for your heart and your mind. Sometimes, it comes for the things you love the most. Your passions, your faith in your friends. It comes for you in the dark corners of your bedroom and the places you know you are weak. It comes in numbers and messages and schedules and it comes in tuning everything out just so you can write a little more. I’m no stranger to that feeling. I still need to tune things out to write, but it isn’t the same today as it was a few months ago. I still care about the numbers and the views. I think it’s prudent of every beginning author to do so. It’s important we make sure to write what we can pitch but more important than that (as a matter of fact, more important than anything else) is to write from the heart, honestly. To write what we love. I love my momma. She sat me down a few days after that text and told me to talk to her and to vent everything out for her, and for myself. When we were done she came around and gave me advice, she told me to schedule less and to be with people more, she told me that I need other people. That we all need other people. She told me that I should focus on my joy before I look to find my passion, she told me to be there for my girlfriend before anything else. She told me to never give up, to never stop, because if I stopped I’d never get it back. That night I set out to make a lot of things different. I came up with the Soul Project. I found ways to separate Alva from Alan and I found ways to blend them together. I still have days where that crippling beast comes down to me and tries to strangle me, but he has a much harder time reaching me anymore. I don’t let him in like I used to. There are fewer cracks to worry about. I’ve always had a knack for overworking myself. Especially when it’s something I’m passionate about. But I’m getting better because of my momma, and my dad, and my girlfriend and my friends. I don’t like to talk about my innermost feelings. It’s pretty difficult for a guy in my position to admit that I go through these seasons of depression. I’ve spent the last five years or so working on convincing you that I’m the embodiment of sunshine, right? There are a lot of pressures we put on ourselves. I’m much better now because I stopped making the numbers and the schedule and the output the end goal. I’m just writing because there is nothing in this world that I love more than telling stories. Tall ones, small ones, true ones. It doesn’t matter to me. As long as I’m here, I’ll have a story to tell. December of 2018 was far and away my most successful month on my blog, over half of my yearly views came from December ALONE + that is something to celebrate about. I am so humbled and amazed by the support I’ve seen from you for Mean for the Holidays. I’ve told you before that this is just the beginning. I have so much more down the line for you, but I want to be sure to appreciate the beginning of my story as much as the end, and right now I am on top of the world. If I could go back and talk to myself at 8 years old and tell him that 2000 people would hear my stories this year, that over 200 would come back week after week to listen to the things I had to tell, he wouldn’t have made it to 25 year old me. He would’ve keeled over in excitement right there. So, thank you. I know it’s small, and some may scoff at the small numbers, but this is more than I’ve ever had and I just wanted to say thank you. I didn’t think I’d see this kind of reaction from my blog ever, after all the stress and doubt I’ve laid upon myself, I am proud to look my younger self in the face and tell him what happened this month. You’ve made the dreams of that little boy a reality, you’ve allowed me to surpass his wildest imagination, and his imagination is the same as mine. So I guess, that eight-year-old boy is still here somewhere, and he is dancing. He is singing because I never gave up. He is throwing confetti in the air and he is every part of me that is celebrating today because I am honored that you took time out to read what I’ve written. Even on my off days, even if I don’t directly mention it to you, know that I see you. Every week when you come and like a post, or leave me a message. I remember all of you, and as I’m sure you’ve heard… this is only the beginning. By the end, I’m going to have a full book of people to talk to that little boy about, and I know he will be singing still with every new one. I was planning on saving this announcement for a bit, but I wanted to send it out now, as a thank you. Perhaps a Christmas Gift. I went through a tremendous amount of trouble within my heart this year. I struggled with many things, and all of those things culminated in this. If you’ve been reading my blog for any length of time, you likely know that I theme every year after a “movement” and those movements don’t necessarily mean anything, they are just a way for me to align a focus to each post, to explain away my incoherent ramblings as something worthwhile. This year, all of those things were screaming to be told in a new way. Umbral Dawning marks something significant within me. It is an awakening. It is a new realization within myself, and while you may never notice a difference, just know that I have grown so much because of what I’ve been through, what I’ve put myself through. I hope you never go through it. All of that pain, all of those questions and feelings and world-shattering realizations are bottled up inside this story. This story that I will begin releasing in 2019, on my birthday, for you to read. I’ve even left a little piece of it here for you. Just to taste what I’ve created. One more time before you go off to your Christmas festivities, thank you. Thank you for this month, and this opportunity. I hope that I will always write what will hit home for you. It is the greatest honor. Her eyes burned as she opened them, the blazing sun scathed against her pale skin, threatening to sear her flesh for daring to lay in the sunlight any longer. Her chest sore from the fall, she wasn’t sure of the distance, but it hurt like hell. She rolled to her stomach and braced her hands on the hot ground, looking around her to gain her bearings. The space was a clearing, of sorts. She marveled at the height of the massive trees, stretching into the sky from the earth where they were rooted in a bright golden sand. It must have cushioned her fall, and for a moment she was thankful she hadn’t fallen into something less friendly… like a liquor storage room or a Red Scare meeting basement. The immediate area was absent, save for her. Her pants were frayed, still spattered with oil from the shattering of the machine. Her shirt was still ripped, the cause of reasonable discourse between herself and her beloved dog Tesla, who hadn’t been keen on her decision to stand up to the Labyrinth Master. As she pushed aside a thick leaf that blocked her view, a large city revealed itself in the distance before her. Beyond the reach of the jungle where the trees gave way to arid desert ground and seldom life bearing foliage, she saw a small pathway. As if anyone could hear her. She had fallen through a hole in the floor and found herself in a smoking Wonderland. What could possibly be awaiting her there, a caterpillar to give sage advice or a grinning cat to assist her in finding trouble? In a desert such as this? Hardly. “I need water first.” Her voice scratchy and rough from the dry air. She could find no spring or river or oasis around her that wasn’t just a substantial hallucination. Foraging onward, the heat of the sun threatened to burn her scalp as she treaded through the strange foliage. The plants were unlike anything she had ever seen. Some of them, the thickest, stood proudly with their roots exposed on the sand. Burrowing only deep enough to hold them steady should a gust of wind threaten their outcropping of dry dirt. Others were huddled against the shade of the larger trees, as if hiding from the sun. A sentiment that Indigo agreed with as she sat down to collect her thoughts, trying desperately to stop thinking about her need for water. “So, after separating the Labyrinth Master from his horrible machine, he hit me, and I fell backwards. Tesla started tugging on my shirt to get me to leave, I’m sure. The Master stepped forward to hit me again when Hydra attacked him. I’ll need to reprimand the awful bot when I find my way home.” Indigo reached behind her briefly, feeling along her spine until her fingers traced the sleek box that had rooted within her flesh. “If nothing else, I still have my bones, I suppose.” She laughed to herself. The shade was unequivocally more pleasant than the desert, but food and water didn’t seem to be abundant in the land where she had awoken. She was nervous to pluck the strange shaped fruit that grew from nearly every tree. She stood up, and stepped out into the sunlight, shielding her eyes. Reminiscing in the shade any longer wouldn’t be worth the trouble. The only conclusion she would find is the memory of that horrible skeleton hanging within the Labyrinth. Black bones and all, she remembered plucking one in a panic to defend herself when it attacked to her body. Crawling along her flesh like a sinister caterpillar of sorts. Fusing with her spine. All of her prior resistance to join the rest of society was put out like fire on a damp log. She continued stepping away from the shade of the tree and towards the desert as she focused on reaching the city. A towering creation in the middle of the desert to be sure, walls of white and gold. In the center there stood a towering building, almost like a fortress. In the center there was a single tower the stretched upward into the sky crowned with a golden clock. A symbol etched into the crown of the tower, from this distance it appeared to be a circle with a triangle desperately trying to hang on by one point and not fall into the city square. It vaguely reminded her of an eye, or perhaps a metronome. She plucked one of the larger leaves and used it for shade, as she broke out of the tree line and continued looking towards the city. In her mind she fantasized about being a young monk on a pilgrimage towards a holy city, one with water and worship and aa comfortable bed. Three things she had grown accustomed to back home, for better or worse. She had made, by her estimation, about a half a mile’s worth of distance and the city still seemed no closer than when she began. That was, until she turned around to peer behind her, however, and saw that she had only moved thirty or so feet from the dense jungle. A gentle wind picked up as she trudged through the sand more, frustrated that she wasn’t born with wheels in her ankles like the Hydra were. It would have made her life so much easier, no more long walks to the market. Just a quick roll down the road and she could return with the ingredients to another recipe her mother had found online. She didn’t know how long she had been out in that clearing, but however long it was had been ample time for her to decide she was a perfectly suitable conversational partner. From behind her, Indigo heard a series of quick footsteps. A woman’s voice gently landed on her ears, somehow less than human. It seemed like it was modified, like it was a woman speaking through one of those ridiculous voice modulation apps her sister had started using after her exposure to the Labyrinth. She turned, expecting to see her sister’s grin in the sand. She knew it wouldn’t be so, not after what had happened. But she hoped. Instead of her sister, she saw a tall figure, dressed head to toe in robes with a thick hood covering its face. It appeared to be a woman by the shape of its body, but that couldn’t possibly be. The figure behind her was made of thin metal plates fitted together to form a person. It was like gazing at a scientist’s fever dream. The woman machine stepped forward once more and held her hand out. “Indigo.” She pulled the leaf over her eyes, attempting to hide her face from the strange thing. “I’m Mantis-4. Do you know where you are?” The woman machine took another step forward, still holding her hand out. Mantis-4 laughed aloud, the lights that acted as her eyes responded in tandem with her voice and expressions. Eyes squinting in the sunlight even, an unusual trait for a robot to have. Indigo paused for a moment, unsure of how to reply. She was old enough to know better than to walk through a desert with a woman machine. Her mother had always told her so, or something. “I suppose.” Indigo, however, wasn’t good at listening to the advice of others when her curiosity took over her thoughts. Mantis-4 looked taken aback. As if Indigo had insulted her, perhaps she had. “What sector of Karka do you live in?” She caught up to Indigo as they continued walking together. Indigo scratched her head briefly. Mantis-4 continued walking with her, lighted eyes wide with confusion. Indigo shook her head. None of those places were familiar, and the thought of living in a gutter wasn’t exactly appealing to her. That’s all I’ll give out for now. But don’t worry. The rest is nearly ready for release. I’ll have more information as March draws closer. I’ll be talking about it a great deal on social media after I recover from the holidays. I’ve been working hard on this campaign, and I am so pleased with everything I’ve made and shown you here. In order to keep my head about me, I’m going to spend the next few days working hard on laying in bed, eating good food and enjoying the fact that I’m alive and I am blessed beyond measure. I hope you have a Christmas twice as good as mine will be. Thank you for this month. If you want to catch up on anything you might’ve missed from the Mean for the Holidays campaign, you can find it all below. Thank you, one last time, for spending any time with me at all. Now get outta here, enjoy your holidays.
2019-04-22T20:27:18Z
https://paxgravitas.com/2018/12/24/time-is-ticking/